Science.gov

Sample records for addresses gsa privacy

  1. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to gsa.privacyact@gsa.gov or send to: GSA Privacy Act Officer (CIB),...

  2. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to gsa.privacyact@gsa.gov or send to: GSA Privacy Act Officer (CIB),...

  3. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to gsa.privacyact@gsa.gov or send to: GSA Privacy Act Officer (CIB),...

  4. For telehealth to succeed, privacy and security risks must be identified and addressed.

    PubMed

    Hall, Joseph L; McGraw, Deven

    2014-02-01

    The success of telehealth could be undermined if serious privacy and security risks are not addressed. For example, sensors that are located in a patient's home or that interface with the patient's body to detect safety issues or medical emergencies may inadvertently transmit sensitive information about household activities. Similarly, routine data transmissions from an app or medical device, such as an insulin pump, may be shared with third-party advertisers. Without adequate security and privacy protections for underlying telehealth data and systems, providers and patients will lack trust in the use of telehealth solutions. Although some federal and state guidelines for telehealth security and privacy have been established, many gaps remain. No federal agency currently has authority to enact privacy and security requirements to cover the telehealth ecosystem. This article examines privacy risks and security threats to telehealth applications and summarizes the extent to which technical controls and federal law adequately address these risks. We argue for a comprehensive federal regulatory framework for telehealth, developed and enforced by a single federal entity, the Federal Trade Commission, to bolster trust and fully realize the benefits of telehealth.

  5. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.108 How does... physical safeguards to ensure the security and confidentiality of records, protect the records...

  6. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.108 How does... physical safeguards to ensure the security and confidentiality of records, protect the records...

  7. Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks.

    PubMed

    Raisaro, Jean Louis; Tramèr, Florian; Ji, Zhanglong; Bu, Diyue; Zhao, Yongan; Carey, Knox; Lloyd, David; Sofia, Heidi; Baker, Dixie; Flicek, Paul; Shringarpure, Suyash; Bustamante, Carlos; Wang, Shuang; Jiang, Xiaoqian; Ohno-Machado, Lucila; Tang, Haixu; Wang, XiaoFeng; Hubaux, Jean-Pierre

    2017-02-20

    The Global Alliance for Genomics and Health (GA4GH) created the Beacon Project as a means of testing the willingness of data holders to share genetic data in the simplest technical context-a query for the presence of a specified nucleotide at a given position within a chromosome. Each participating site (or "beacon") is responsible for assuring that genomic data are exposed through the Beacon service only with the permission of the individual to whom the data pertains and in accordance with the GA4GH policy and standards.While recognizing the inference risks associated with large-scale data aggregation, and the fact that some beacons contain sensitive phenotypic associations that increase privacy risk, the GA4GH adjudged the risk of re-identification based on the binary yes/no allele-presence query responses as acceptable. However, recent work demonstrated that, given a beacon with specific characteristics (including relatively small sample size and an adversary who possesses an individual's whole genome sequence), the individual's membership in a beacon can be inferred through repeated queries for variants present in the individual's genome.In this paper, we propose three practical strategies for reducing re-identification risks in beacons. The first two strategies manipulate the beacon such that the presence of rare alleles is obscured; the third strategy budgets the number of accesses per user for each individual genome. Using a beacon containing data from the 1000 Genomes Project, we demonstrate that the proposed strategies can effectively reduce re-identification risk in beacon-like datasets.

  8. 41 CFR 102-118.630 - How must a TSP refund amounts due to GSA?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... must promptly refund amounts due to GSA, preferably by EFT. If an EFT is not used, checks must be made... Services Administration P.O. Box 93746 Chicago, IL 60673 (b) If an EFT address is needed, please...

  9. 41 CFR 102-118.630 - How must a TSP refund amounts due to GSA?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... must promptly refund amounts due to GSA, preferably by EFT. If an EFT is not used, checks must be made... Services Administration P.O. Box 93746 Chicago, IL 60673 (b) If an EFT address is needed, please...

  10. 41 CFR 102-118.630 - How must a TSP refund amounts due to GSA?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... must promptly refund amounts due to GSA, preferably by EFT. If an EFT is not used, checks must be made... Services Administration P.O. Box 93746 Chicago, IL 60673 (b) If an EFT address is needed, please...

  11. 41 CFR 102-118.630 - How must a TSP refund amounts due to GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... must promptly refund amounts due to GSA, preferably by EFT. If an EFT is not used, checks must be made... Services Administration P.O. Box 93746 Chicago, IL 60673 (b) If an EFT address is needed, please...

  12. 41 CFR 102-118.630 - How must a TSP refund amounts due to GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... must promptly refund amounts due to GSA, preferably by EFT. If an EFT is not used, checks must be made... Services Administration P.O. Box 93746 Chicago, IL 60673 (b) If an EFT address is needed, please...

  13. 41 CFR 105-64.102 - What is GSA's policy on disclosure of information in a system of records?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... disclosure of information in a system of records? 105-64.102 Section 105-64.102 Public Contracts and Property... Responsibilities § 105-64.102 What is GSA's policy on disclosure of information in a system of records? No information contained in a Privacy Act system of records will be disclosed to third parties without...

  14. 41 CFR 105-64.102 - What is GSA's policy on disclosure of information in a system of records?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... disclosure of information in a system of records? 105-64.102 Section 105-64.102 Public Contracts and Property... Responsibilities § 105-64.102 What is GSA's policy on disclosure of information in a system of records? No information contained in a Privacy Act system of records will be disclosed to third parties without...

  15. 41 CFR 105-64.102 - What is GSA's policy on disclosure of information in a system of records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... disclosure of information in a system of records? 105-64.102 Section 105-64.102 Public Contracts and Property... Responsibilities § 105-64.102 What is GSA's policy on disclosure of information in a system of records? No information contained in a Privacy Act system of records will be disclosed to third parties without...

  16. 41 CFR 105-64.102 - What is GSA's policy on disclosure of information in a system of records?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... disclosure of information in a system of records? 105-64.102 Section 105-64.102 Public Contracts and Property... Responsibilities § 105-64.102 What is GSA's policy on disclosure of information in a system of records? No information contained in a Privacy Act system of records will be disclosed to third parties without...

  17. 41 CFR 105-64.102 - What is GSA's policy on disclosure of information in a system of records?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... disclosure of information in a system of records? 105-64.102 Section 105-64.102 Public Contracts and Property... Responsibilities § 105-64.102 What is GSA's policy on disclosure of information in a system of records? No information contained in a Privacy Act system of records will be disclosed to third parties without...

  18. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  19. Comparison of two speech privacy measurements, articulation index (AI) and speech privacy noise isolation class (NIC'), in open workplaces

    NASA Astrophysics Data System (ADS)

    Yoon, Heakyung C.; Loftness, Vivian

    2002-05-01

    Lack of speech privacy has been reported to be the main dissatisfaction among occupants in open workplaces, according to workplace surveys. Two speech privacy measurements, Articulation Index (AI), standardized by the American National Standards Institute in 1969, and Speech Privacy Noise Isolation Class (NIC', Noise Isolation Class Prime), adapted from Noise Isolation Class (NIC) by U. S. General Services Administration (GSA) in 1979, have been claimed as objective tools to measure speech privacy in open offices. To evaluate which of them, normal privacy for AI or satisfied privacy for NIC', is a better tool in terms of speech privacy in a dynamic open office environment, measurements were taken in the field. AIs and NIC's in the different partition heights and workplace configurations have been measured following ASTM E1130 (Standard Test Method for Objective Measurement of Speech Privacy in Open Offices Using Articulation Index) and GSA test PBS-C.1 (Method for the Direct Measurement of Speech-Privacy Potential (SPP) Based on Subjective Judgments) and PBS-C.2 (Public Building Service Standard Method of Test Method for the Sufficient Verification of Speech-Privacy Potential (SPP) Based on Objective Measurements Including Methods for the Rating of Functional Interzone Attenuation and NC-Background), respectively.

  20. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  1. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  2. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  3. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  4. 41 CFR 105-56.016 - GSA participation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false GSA participation. 105-56.016 Section 105-56.016 Public Contracts and Property Management Federal Property Management... Offset (CSO) Procedures-GSA as Creditor Agency § 105-56.016 GSA participation. (a) As required under 5...

  5. 41 CFR 105-56.026 - GSA participation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false GSA participation. 105-56.026 Section 105-56.026 Public Contracts and Property Management Federal Property Management... Offset (CSO) Procedures-GSA as Paying Agency § 105-56.026 GSA participation. (a) As required under 5...

  6. 41 CFR 105-56.016 - GSA participation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false GSA participation. 105-56.016 Section 105-56.016 Public Contracts and Property Management Federal Property Management... Offset (CSO) Procedures-GSA as Creditor Agency § 105-56.016 GSA participation. (a) As required under 5...

  7. 41 CFR 105-56.026 - GSA participation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false GSA participation. 105-56.026 Section 105-56.026 Public Contracts and Property Management Federal Property Management... Offset (CSO) Procedures-GSA as Paying Agency § 105-56.026 GSA participation. (a) As required under 5...

  8. 41 CFR 105-56.026 - GSA participation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false GSA participation. 105-56.026 Section 105-56.026 Public Contracts and Property Management Federal Property Management... Offset (CSO) Procedures-GSA as Paying Agency § 105-56.026 GSA participation. (a) As required under 5...

  9. 41 CFR 105-56.026 - GSA participation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false GSA participation. 105-56.026 Section 105-56.026 Public Contracts and Property Management Federal Property Management... Offset (CSO) Procedures-GSA as Paying Agency § 105-56.026 GSA participation. (a) As required under 5...

  10. 41 CFR 105-56.016 - GSA participation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false GSA participation. 105-56.016 Section 105-56.016 Public Contracts and Property Management Federal Property Management... Offset (CSO) Procedures-GSA as Creditor Agency § 105-56.016 GSA participation. (a) As required under 5...

  11. 41 CFR 105-56.026 - GSA participation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false GSA participation. 105-56.026 Section 105-56.026 Public Contracts and Property Management Federal Property Management... Offset (CSO) Procedures-GSA as Paying Agency § 105-56.026 GSA participation. (a) As required under 5...

  12. 41 CFR 105-56.016 - GSA participation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false GSA participation. 105-56.016 Section 105-56.016 Public Contracts and Property Management Federal Property Management... Offset (CSO) Procedures-GSA as Creditor Agency § 105-56.016 GSA participation. (a) As required under 5...

  13. 41 CFR 105-56.016 - GSA participation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false GSA participation. 105-56.016 Section 105-56.016 Public Contracts and Property Management Federal Property Management... Offset (CSO) Procedures-GSA as Creditor Agency § 105-56.016 GSA participation. (a) As required under 5...

  14. 41 CFR 105-64.107 - What standards of conduct apply to employees with privacy-related responsibilities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... conduct apply to employees with privacy-related responsibilities? 105-64.107 Section 105-64.107 Public... SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.107 What standards of conduct apply to employees with...

  15. Student Privacy versus Campus Safety: Has Recent Legislation Compromised Privacy Rights?

    ERIC Educational Resources Information Center

    van der Kaay, Christopher D.

    This study highlights major legislation addressing campus safety and crime reporting and discusses its impact on a student's right to privacy. The 1974 Family Educational Rights and Privacy Act, commonly referred to as the "Buckley Amendment," was among the first pieces of legislation to address the notion of student privacy and confidentiality.…

  16. Collaborative Privacy - A Community-Based Privacy Infrastructure

    NASA Astrophysics Data System (ADS)

    Kolter, Jan; Kernchen, Thomas; Pernul, Günther

    The landscape of the World Wide Web with all its versatile services heavily relies on the disclosure of private user information. Service providers collecting more and more of these personal user data pose a growing privacy threat for users. Addressing user concerns privacy-enhancing technologies emerged. One goal of these technologies is to enable users to improve the control over their personal data. A famous representative is the PRIME project that aims for a holistic privacy-enhancing identity management system. However, approaches like the PRIME privacy architecture require service providers to change their server infrastructure and add specific privacy-enhancing components. In the near future, service providers are not expected to alter internal processes. In this paper, we introduce a collaborative privacy community that allows the open exchange of privacy-related information. We lay out the privacy community’s functions and potentials within a user-centric, provider-independent privacy architecture that will help foster the usage and acceptance of privacy-enhancing technologies.

  17. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C... operation of a system of records using commercial information technology services or information...

  18. 77 FR 58105 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-19

    .... Juanita Gaines, Freedom of Information and Privacy Office, Defense Threat Reduction Agency, 8725 John J... privacy program; 32 CFR 318; or may be obtained from the Chief, Freedom of Information and Privacy Office...: * * * * * System manager(s) and address: Delete and replace with ``Chief, Freedom of Information and Privacy...

  19. Location Privacy

    NASA Astrophysics Data System (ADS)

    Meng, Xiaofeng; Chen, Jidong

    With rapid development of sensor and wireless mobile devices, it is easy to access mobile users' location information anytime and anywhere. On one hand, LBS is becoming more and more valuable and important. On the other hand, location privacy issues raised by such applications have also gained more attention. However, due to the specificity of location information, traditional privacy-preserving techniques in data publishing cannot be used. In this chapter, we will introduce location privacy, and analyze the challenges of location privacy-preserving, and give a survey of existing work including the system architecture, location anonymity and query processing.

  20. 41 CFR 101-27.209-1 - GSA stock items.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true GSA stock items. 101-27.209-1 Section 101-27.209-1 Public Contracts and Property Management Federal Property Management...-Management of Shelf-Life Materials § 101-27.209-1 GSA stock items. Shelf-life items that meet the...

  1. 41 CFR 101-27.209-1 - GSA stock items.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 2 2012-07-01 2012-07-01 false GSA stock items. 101-27.209-1 Section 101-27.209-1 Public Contracts and Property Management Federal Property Management...-Management of Shelf-Life Materials § 101-27.209-1 GSA stock items. Shelf-life items that meet the...

  2. 41 CFR 101-27.209-1 - GSA stock items.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true GSA stock items. 101-27.209-1 Section 101-27.209-1 Public Contracts and Property Management Federal Property Management...-Management of Shelf-Life Materials § 101-27.209-1 GSA stock items. Shelf-life items that meet the...

  3. 41 CFR 101-27.209-1 - GSA stock items.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true GSA stock items. 101-27.209-1 Section 101-27.209-1 Public Contracts and Property Management Federal Property Management...-Management of Shelf-Life Materials § 101-27.209-1 GSA stock items. Shelf-life items that meet the...

  4. 41 CFR 101-27.209-1 - GSA stock items.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA stock items. 101-27.209-1 Section 101-27.209-1 Public Contracts and Property Management Federal Property Management...-Management of Shelf-Life Materials § 101-27.209-1 GSA stock items. Shelf-life items that meet the...

  5. 76 FR 31350 - Public Workshop; Privacy Compliance Basics and 2011 Developments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-31

    ... Privacy Act rulings, program case studies, mapping to IT security requirements, and developments in... facilitate security requirements of the GSA facility, attendees must register in advance for this workshop... verify their previously-provided registration information. This is a security requirement of the...

  6. The Regulatory Framework for Privacy and Security

    NASA Astrophysics Data System (ADS)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  7. 78 FR 18473 - Army Privacy Act Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-27

    ... Department of the Army 32 CFR Part 505 Army Privacy Act Program AGENCY: Department of the Army, DoD. ACTION... Litigation Division when complaints citing the Privacy Act are filed in order to correct the mailing address in Sec. 505.12. The address for notifying the Army Litigation Division of cases citing the...

  8. Privacy Questions from Practicing School Nurses

    ERIC Educational Resources Information Center

    Bergren, Martha Dewey

    2004-01-01

    This Question and Answer (Q&A) article addresses practice issues related to school health records and school nursing documentation that were posed by school nurses in the field. Specifically, the questions addressed concern the following: education records, medication privacy issues, sharing of sensitive health information, privacy of…

  9. Privacy Act

    EPA Pesticide Factsheets

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  10. GSA committees: Progress through service the Annual Program Committee

    USGS Publications Warehouse

    Costa, J.E.

    2007-01-01

    The GSA's Annual Program Committee (APC) is directly responsible for the GSA's meeting and other responsibilities especially before the main event. It decides on the locations, the number and content of the technical sessions, annual membership surveys, hospitality for the guests, field trips and more. In addition, it pays significant attention to creative thinking about geoscience discoveries and directions as well as identify new and emerging areas of earth science. APC is also looking for new ideas, approaches and directions.

  11. 78 FR 79460 - Notification of GSA Strategic Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-30

    ...GSA is announcing the availability of the Draft FY 2014-2018 GSA Strategic Plan for public review and comment, as part of the periodic update required by the Government Performance and Results Act (GPRA) Modernization Act of 2010. The agency anticipates the final Strategic Plan will be submitted to Congress with the submission of the FY 2015 President's Budget. The Strategic Plan provides the......

  12. Hidden drivers of low-dose pharmaceutical pollutant mixtures revealed by the novel GSA-QHTS screening method

    PubMed Central

    Rodea-Palomares, Ismael; Gonzalez-Pleiter, Miguel; Gonzalo, Soledad; Rosal, Roberto; Leganes, Francisco; Sabater, Sergi; Casellas, Maria; Muñoz-Carpena, Rafael; Fernández-Piñas, Francisca

    2016-01-01

    The ecological impacts of emerging pollutants such as pharmaceuticals are not well understood. The lack of experimental approaches for the identification of pollutant effects in realistic settings (that is, low doses, complex mixtures, and variable environmental conditions) supports the widespread perception that these effects are often unpredictable. To address this, we developed a novel screening method (GSA-QHTS) that couples the computational power of global sensitivity analysis (GSA) with the experimental efficiency of quantitative high-throughput screening (QHTS). We present a case study where GSA-QHTS allowed for the identification of the main pharmaceutical pollutants (and their interactions), driving biological effects of low-dose complex mixtures at the microbial population level. The QHTS experiments involved the integrated analysis of nearly 2700 observations from an array of 180 unique low-dose mixtures, representing the most complex and data-rich experimental mixture effect assessment of main pharmaceutical pollutants to date. An ecological scaling-up experiment confirmed that this subset of pollutants also affects typical freshwater microbial community assemblages. Contrary to our expectations and challenging established scientific opinion, the bioactivity of the mixtures was not predicted by the null mixture models, and the main drivers that were identified by GSA-QHTS were overlooked by the current effect assessment scheme. Our results suggest that current chemical effect assessment methods overlook a substantial number of ecologically dangerous chemical pollutants and introduce a new operational framework for their systematic identification. PMID:27617294

  13. Hidden drivers of low-dose pharmaceutical pollutant mixtures revealed by the novel GSA-QHTS screening method.

    PubMed

    Rodea-Palomares, Ismael; Gonzalez-Pleiter, Miguel; Gonzalo, Soledad; Rosal, Roberto; Leganes, Francisco; Sabater, Sergi; Casellas, Maria; Muñoz-Carpena, Rafael; Fernández-Piñas, Francisca

    2016-09-01

    The ecological impacts of emerging pollutants such as pharmaceuticals are not well understood. The lack of experimental approaches for the identification of pollutant effects in realistic settings (that is, low doses, complex mixtures, and variable environmental conditions) supports the widespread perception that these effects are often unpredictable. To address this, we developed a novel screening method (GSA-QHTS) that couples the computational power of global sensitivity analysis (GSA) with the experimental efficiency of quantitative high-throughput screening (QHTS). We present a case study where GSA-QHTS allowed for the identification of the main pharmaceutical pollutants (and their interactions), driving biological effects of low-dose complex mixtures at the microbial population level. The QHTS experiments involved the integrated analysis of nearly 2700 observations from an array of 180 unique low-dose mixtures, representing the most complex and data-rich experimental mixture effect assessment of main pharmaceutical pollutants to date. An ecological scaling-up experiment confirmed that this subset of pollutants also affects typical freshwater microbial community assemblages. Contrary to our expectations and challenging established scientific opinion, the bioactivity of the mixtures was not predicted by the null mixture models, and the main drivers that were identified by GSA-QHTS were overlooked by the current effect assessment scheme. Our results suggest that current chemical effect assessment methods overlook a substantial number of ecologically dangerous chemical pollutants and introduce a new operational framework for their systematic identification.

  14. 78 FR 79457 - Privacy Act of 1974; Notice of an Updated System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-30

    ..., committees, and small agencies serviced by GSA; and persons in intern, youth employment, and work/study.... Employee's name, Social Security Number, home address, date of birth, sex, work schedule, and type...

  15. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 4 2013-10-01 2013-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  16. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 4 2012-10-01 2012-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  17. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  18. From Data Privacy to Location Privacy

    NASA Astrophysics Data System (ADS)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  19. 75 FR 13763 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Form 1217...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-23

    ... ADMINISTRATION DEPARTMENT OF DEFENSE NATIONAL AERONAUTICS AND SPACE ADMINISTRATION General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Form 1217, Lessor's Annual Cost Statement AGENCY: Department of Defense (DOD), General Services Administration (GSA), and National Aeronautics...

  20. 41 CFR 105-53.132 - GSA Board of Contract Appeals.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... FUNCTIONS Central Offices § 105-53.132 GSA Board of Contract Appeals. (a) Creation and authority. The GSA... as to whether adequate evidence exists to support the cause for suspension, delivers written...

  1. 41 CFR 105-53.132 - GSA Board of Contract Appeals.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... FUNCTIONS Central Offices § 105-53.132 GSA Board of Contract Appeals. (a) Creation and authority. The GSA... as to whether adequate evidence exists to support the cause for suspension, delivers written...

  2. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Evaluating information systems for Privacy Act... systems for Privacy Act compliance. Information system owners and developers must address Privacy Act... cycle of the information system. This is accomplished with a Privacy Impact Assessment. (a) The...

  3. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Evaluating information systems for Privacy Act... systems for Privacy Act compliance. Information system owners and developers must address Privacy Act... cycle of the information system. This is accomplished with a Privacy Impact Assessment. (a) The...

  4. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Evaluating information systems for Privacy Act... systems for Privacy Act compliance. Information system owners and developers must address Privacy Act... cycle of the information system. This is accomplished with a Privacy Impact Assessment. (a) The...

  5. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Evaluating information systems for Privacy Act... systems for Privacy Act compliance. Information system owners and developers must address Privacy Act... cycle of the information system. This is accomplished with a Privacy Impact Assessment. (a) The...

  6. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Evaluating information systems for Privacy Act... systems for Privacy Act compliance. Information system owners and developers must address Privacy Act... cycle of the information system. This is accomplished with a Privacy Impact Assessment. (a) The...

  7. The Potential to Promote Resilience: Piloting a Minority Stress-Informed, GSA-Based, Mental Health Promotion Program for LGBTQ Youth

    PubMed Central

    Heck, Nicholas C.

    2015-01-01

    This article describes the results of a pilot study to determine the feasibility and acceptability of a mental health promotion program that was developed to address minority stressors and promote coping skills among lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth. It was hypothesized that the program would be feasible to implement within the context of a gay-straight alliance (GSA) and that GSA members would find the program acceptable (e.g., educational, enjoyable, helpful, and relevant). Participants included ten members of a high school GSA in the northeastern United States. The program sessions were delivered during GSA meetings. The first session emphasized the identification of minority and general stressors, which was followed by a discussion of coping strategies. The remaining sessions emphasized the development of cognitive coping, affect regulation, and problem-solving skills. After each session, participants completed a 13-item feedback form. Ten items assessed acceptability and three open-ended items allowed participants to provide constructive feedback. Although the program was feasible to implement within the GSA setting, attendance at the sessions was variable. Those who attended the sessions reported them to be enjoyable, informative, relevant to their lives, and potentially helpful for other LGBTQ students. After revising the program, future research is needed to investigate its dissemination potential and determine whether the program can disrupt the minority stress-psychiatric distress relationship. PMID:26366425

  8. The Potential to Promote Resilience: Piloting a Minority Stress-Informed, GSA-Based, Mental Health Promotion Program for LGBTQ Youth.

    PubMed

    Heck, Nicholas C

    2015-09-01

    This article describes the results of a pilot study to determine the feasibility and acceptability of a mental health promotion program that was developed to address minority stressors and promote coping skills among lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth. It was hypothesized that the program would be feasible to implement within the context of a gay-straight alliance (GSA) and that GSA members would find the program acceptable (e.g., educational, enjoyable, helpful, and relevant). Participants included ten members of a high school GSA in the northeastern United States. The program sessions were delivered during GSA meetings. The first session emphasized the identification of minority and general stressors, which was followed by a discussion of coping strategies. The remaining sessions emphasized the development of cognitive coping, affect regulation, and problem-solving skills. After each session, participants completed a 13-item feedback form. Ten items assessed acceptability and three open-ended items allowed participants to provide constructive feedback. Although the program was feasible to implement within the GSA setting, attendance at the sessions was variable. Those who attended the sessions reported them to be enjoyable, informative, relevant to their lives, and potentially helpful for other LGBTQ students. After revising the program, future research is needed to investigate its dissemination potential and determine whether the program can disrupt the minority stress-psychiatric distress relationship.

  9. GSA's Green Proving Ground: Identifying, Testing and Evaluating Innovative Technologies (Presentation)

    SciTech Connect

    Kandt, A.; Lowell, M.

    2012-05-01

    GSA's Green Proving Ground (GPG) program utilizes GSA's real estate portfolio to test and evaluate innovative and underutilized sustainable building technologies and practices. Findings are used to support the development of GSA performance specifications and inform decision making within GSA, other federal agencies, and the real estate industry. The program aims to drive innovation in environmental performance in federal buildings and help lead market transformation through deployment of new technologies.

  10. Privacy in the Genomic Era.

    PubMed

    Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W; Fellay, Jacques; Gunter, Carl A; Hubaux, Jean-Pierre; Malin, Bradley A; Wang, Xiaofeng

    2015-09-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.

  11. Privacy in the Genomic Era

    PubMed Central

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  12. 41 CFR 101-1.4902 - GSA forms.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA forms. 101-1.4902 Section 101-1.4902 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.49-Illustrations of Forms §...

  13. 41 CFR 105-50.106 - GSA response to requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false GSA response to requests. 105-50.106 Section 105-50.106 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION 50-PROVISION OF SPECIAL OR TECHNICAL...

  14. 41 CFR 105-50.001-6 - GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false GSA. 105-50.001-6 Section 105-50.001-6 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION 50-PROVISION OF SPECIAL OR TECHNICAL SERVICES TO...

  15. 41 CFR 101-27.504 - Notice to GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Notice to GSA. 101-27.504 Section 101-27.504 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 27-INVENTORY MANAGEMENT 27.5-Return of...

  16. Leveraging Lighting for Energy Savings: GSA Northwest/Artic Region

    SciTech Connect

    2016-01-01

    Case study describes how the Northwest/Arctic Region branch of the General Services Administration (GSA) improved safety and energy efficiency in its Fairbanks Federal Building parking garage used by federal employees, U.S. Marshals, and the District Court. A 74% savings was realized by replacing 220 high-pressure sodium fixtures with 220 light-emitting diode fixtures.

  17. 48 CFR 41.204 - GSA areawide contracts.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false GSA areawide contracts. 41.204 Section 41.204 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL... entire geographical area covered by an areawide contract, although it may be available at...

  18. 41 CFR 102-75.1150 - What happens to the gift if GSA determines it to be acceptable?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... if GSA determines it to be acceptable? 102-75.1150 Section 102-75.1150 Public Contracts and Property...-75.1150 What happens to the gift if GSA determines it to be acceptable? When GSA determines that the gift is acceptable and can be accepted and used in the form in which it was offered, GSA must...

  19. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... agency forces a GSA customer to move? 102-85.215 Section 102-85.215 Public Contracts and Property... PROPERTY 85-PRICING POLICY FOR OCCUPANCY IN GSA SPACE Continued Occupancy, Relocation and Forced Moves § 102-85.215 What if another customer agency forces a GSA customer to move? If a GSA customer agency,...

  20. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... agency forces a GSA customer to move? 102-85.215 Section 102-85.215 Public Contracts and Property... PROPERTY 85-PRICING POLICY FOR OCCUPANCY IN GSA SPACE Continued Occupancy, Relocation and Forced Moves § 102-85.215 What if another customer agency forces a GSA customer to move? If a GSA customer agency,...

  1. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... agency forces a GSA customer to move? 102-85.215 Section 102-85.215 Public Contracts and Property... PROPERTY 85-PRICING POLICY FOR OCCUPANCY IN GSA SPACE Continued Occupancy, Relocation and Forced Moves § 102-85.215 What if another customer agency forces a GSA customer to move? If a GSA customer agency,...

  2. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... agency forces a GSA customer to move? 102-85.215 Section 102-85.215 Public Contracts and Property... PROPERTY 85-PRICING POLICY FOR OCCUPANCY IN GSA SPACE Continued Occupancy, Relocation and Forced Moves § 102-85.215 What if another customer agency forces a GSA customer to move? If a GSA customer agency,...

  3. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... agency forces a GSA customer to move? 102-85.215 Section 102-85.215 Public Contracts and Property... PROPERTY 85-PRICING POLICY FOR OCCUPANCY IN GSA SPACE Continued Occupancy, Relocation and Forced Moves § 102-85.215 What if another customer agency forces a GSA customer to move? If a GSA customer agency,...

  4. Formal Methods for Privacy

    DTIC Science & Technology

    2009-09-01

    Against a vast and rich canvas of diverse types of privacy rights and violations, we argue technology’s dual role in privacy : new technologies raise...new threats to privacy rights and new technologies can help preserve privacy . Formal methods, as just one class of technology , can be applied to...differs from what a teenager thinks, and vice versa [18]. New technologies give rise to new privacy concerns. Warren and Brandeis’s 1890 seminal paper

  5. Privacy and security in Pennsylvania: ensuring privacy and security of health information exchange in Pennsylvania.

    PubMed

    Marshall, Glen F; Gillespie, William; Fox, Steven J

    2009-01-01

    Though HIPAA addresses privacy and security on a nationwide basis, state laws and regulations vary. This paper describes the landscape for privacy and security in Pennsylvania and its key elements. It addresses common myths and misunderstandings and provides an overview of what is actually required to provide needed protections privacy policies from government and the stakeholders; risk analysis and management; and technical and non-technical means to enforce policies and mitigate risks. Also covered are the enablers, barriers and key recommendations for the future.

  6. Design variables for speech privacy in offices

    NASA Astrophysics Data System (ADS)

    Lewitz, Joel A.

    2002-11-01

    Open plan office environments have a lower potential for speech privacy and freedom from distraction than conventional enclosed offices. The three areas of concern for the acoustical designer are the source, path and listener environments. Given a source spectrum, level and directivity, design elements, which influence attenuation paths, will be addressed with evaluations of their relative importance. The spectrum, level, uniformity and incoherence of background sound at the listener are critical to establishing adequate signal-to-noise ratio for high privacy criteria. Case studies will be addressed comparing challenges, solutions, and results for various open and closed plan spaces. These will be compared to a computer model, which evaluates the relative contribution to privacy of the most important open plan office design variables. Sound masking was shown to be the most powerful and cost effective design tool for establishing acoustical environments with varying privacy criteria.

  7. Teaching Information Privacy in Marketing Courses: Key Educational Issues for Principles of Marketing and Elective Marketing Courses

    ERIC Educational Resources Information Center

    Peltier, James W.; Milne, George R.; Phelps, Joseph E.; Barrett, Jennifer T.

    2010-01-01

    An "information privacy gap" exists in marketing education, with little research addressing the state of information privacy and how appropriate privacy strategies and tactics should be communicated to students. The primary purpose of this article is to provide educators an understanding of information privacy and how they can incorporate this…

  8. Pre-Capture Privacy for Small Vision Sensors.

    PubMed

    Pittaluga, Francesco; Koppal, Sanjeev

    2016-12-08

    The next wave of micro and nano devices will create a world with trillions of small networked cameras. This will lead to increased concerns about privacy and security. Most privacy preserving algorithms for computer vision are applied after image/video data has been captured. We propose to use privacy preserving optics that filter or block sensitive information directly from the incident light-field before sensor measurements are made, adding a new layer of privacy. In addition to balancing the privacy and utility of the captured data, we address trade-offs unique to miniature vision sensors, such as achieving high-quality field-of-view and resolution within the constraints of mass and volume. Our privacy preserving optics enable applications such as depth sensing, full-body motion tracking, people counting, blob detection and privacy preserving face recognition. While we demonstrate applications on macro-scale devices (smartphones, webcams, etc.) our theory has impact for smaller devices.

  9. CARAVAN: Providing Location Privacy for VANET

    DTIC Science & Technology

    2005-01-01

    vehicles. However, many challenges including the security and privacy issues remain to be addressed [ 4 ], [5], [6]. The unique requirements of maintaining...REPORT TYPE 3. DATES COVERED 00-00-2005 to 00-00-2005 4 . TITLE AND SUBTITLE CARAVAN: Providing Location Privacy for VANET 5a. CONTRACT NUMBER...pseudonym update, it is still possible to link the new and old pseudonyms of a node using temporal and spatial relation between the new and old locations of

  10. Privacy Act Statement

    EPA Pesticide Factsheets

    Any information you provide to the Environmental Protection Agency’s (EPA) Suspension and Debarment Program will be governed by the Privacy Act and will be included in the EPA Debarment and Suspension Files, a Privacy Act system of records.

  11. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees

    PubMed Central

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-01-01

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417

  12. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.

    PubMed

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-09-10

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one.

  13. 41 CFR 102-73.95 - How are Federal agencies required to assist GSA?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... carrying out his responsibilities respecting office buildings and space; (b) Take measures to give GSA... excessive costs or significant loss of efficiency. Competition in Contracting Act of 1984...

  14. 41 CFR 102-73.95 - How are Federal agencies required to assist GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... carrying out his responsibilities respecting office buildings and space; (b) Take measures to give GSA... excessive costs or significant loss of efficiency. Competition in Contracting Act of 1984...

  15. 41 CFR 102-73.95 - How are Federal agencies required to assist GSA?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... carrying out his responsibilities respecting office buildings and space; (b) Take measures to give GSA... excessive costs or significant loss of efficiency. Competition in Contracting Act of 1984...

  16. 77 FR 28390 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Form 527...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-14

    ..., Contractor's Qualifications and Financial Information AGENCY: Office of the Chief Finance Officer, GSA... , including any personal and/or business confidential information provided. SUPPLEMENTARY INFORMATION:...

  17. Privacy and Library Records

    ERIC Educational Resources Information Center

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  18. Privacy-preserving heterogeneous health data sharing

    PubMed Central

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-01-01

    Objective Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. Methods The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. Results We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. Limitation The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Conclusions Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis. PMID:23242630

  19. Privacy-preserving backpropagation neural network learning.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2009-10-01

    With the development of distributed computing environment , many learning problems now have to deal with distributed input data. To enhance cooperations in learning, it is important to address the privacy concern of each data holder by extending the privacy preservation notion to original learning algorithms. In this paper, we focus on preserving the privacy in an important learning model, multilayer neural networks. We present a privacy-preserving two-party distributed algorithm of backpropagation which allows a neural network to be trained without requiring either party to reveal her data to the other. We provide complete correctness and security analysis of our algorithms. The effectiveness of our algorithms is verified by experiments on various real world data sets.

  20. 77 FR 56676 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ... Service is modifying a system of records to account for the previous omission of an accounting of... Financial Disclosure Reports. USPS 800.000 System Name: Address Change, Mail Forwarding, and Related... records, or who contest a record, subject to the provisions of the Privacy Act and privacy complaints....

  1. 78 FR 25414 - Privacy Act of 1974, System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-01

    ...; ] AGENCY FOR INTERNATIONAL DEVELOPMENT Privacy Act of 1974, System of Records AGENCY: United States Agency... of records maintained in accordance with the Privacy Act of 1974, (5 U.S.C. 552a), as amended... of record for a non-significant change, to reflect the address change for the location of the...

  2. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  3. Should There Be an Expectation of Privacy in the Library? Online Treasures

    ERIC Educational Resources Information Center

    Balas, Janet L.

    2005-01-01

    Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…

  4. 5 CFR 1830.2 - Requirements for making Privacy Act requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Requirements for making Privacy Act requests. 1830.2 Section 1830.2 Administrative Personnel OFFICE OF SPECIAL COUNSEL PRIVACY § 1830.2 Requirements for making Privacy Act requests. (a) How made and addressed. A request for OSC records under...

  5. 5 CFR 1830.2 - Requirements for making Privacy Act requests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Requirements for making Privacy Act requests. 1830.2 Section 1830.2 Administrative Personnel OFFICE OF SPECIAL COUNSEL PRIVACY § 1830.2 Requirements for making Privacy Act requests. (a) How made and addressed. A request for OSC records under...

  6. 5 CFR 1830.2 - Requirements for making Privacy Act requests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Requirements for making Privacy Act requests. 1830.2 Section 1830.2 Administrative Personnel OFFICE OF SPECIAL COUNSEL PRIVACY § 1830.2 Requirements for making Privacy Act requests. (a) How made and addressed. A request for OSC records under...

  7. LEA in Private: A Privacy and Data Protection Framework for a Learning Analytics Toolbox

    ERIC Educational Resources Information Center

    Steiner, Christina M.; Kickmeier-Rust, Michael D.; Albert, Dietrich

    2016-01-01

    To find a balance between learning analytics research and individual privacy, learning analytics initiatives need to appropriately address ethical, privacy, and data protection issues. A range of general guidelines, model codes, and principles for handling ethical issues and for appropriate data and privacy protection are available, which may…

  8. 76 FR 63896 - Federal Acquisition Regulation; Privacy Training, 2010-013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-14

    ... 9000-AM02 Federal Acquisition Regulation; Privacy Training, 2010-013 AGENCY: Department of Defense (DoD...) to require contractors to complete training that addresses the protection of privacy, in accordance... Regulation (FAR) to add a new subpart 24.3, entitled ``Privacy Training,'' and related clause to ensure...

  9. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  10. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  11. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  12. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  13. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  14. 41 CFR 102-192.95 - Why does GSA require annual mail management reports?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... annual mail management reports? 102-192.95 Section 102-192.95 Public Contracts and Property Management... PROGRAMS 192-MAIL MANAGEMENT Reporting Requirements § 102-192.95 Why does GSA require annual mail management reports? GSA requires annual agency mail management reports to— (a) Ensure that Federal...

  15. 41 CFR 102-192.170 - What are GSA's responsibilities in mail management?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... responsibilities in mail management? 102-192.170 Section 102-192.170 Public Contracts and Property Management... PROGRAMS 192-MAIL MANAGEMENT GSA's Responsibilities and Services § 102-192.170 What are GSA's responsibilities in mail management? 44 U.S.C § 2904(b) directs the Administrator of General Services to...

  16. 41 CFR 102-192.95 - Why does GSA require annual mail management reports?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... annual mail management reports? 102-192.95 Section 102-192.95 Public Contracts and Property Management... PROGRAMS 192-MAIL MANAGEMENT Reporting Requirements § 102-192.95 Why does GSA require annual mail management reports? GSA requires annual agency mail management reports to— (a) Ensure that Federal...

  17. 41 CFR 102-192.95 - Why does GSA require annual mail management reports?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... annual mail management reports? 102-192.95 Section 102-192.95 Public Contracts and Property Management... PROGRAMS 192-MAIL MANAGEMENT Reporting Requirements § 102-192.95 Why does GSA require annual mail management reports? GSA requires annual agency mail management reports to— (a) Ensure that Federal...

  18. 41 CFR 102-192.170 - What are GSA's responsibilities in mail management?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... responsibilities in mail management? 102-192.170 Section 102-192.170 Public Contracts and Property Management... PROGRAMS 192-MAIL MANAGEMENT GSA's Responsibilities and Services § 102-192.170 What are GSA's responsibilities in mail management? 44 U.S.C § 2904(b) directs the Administrator of General Services to...

  19. 41 CFR 102-192.170 - What are GSA's responsibilities in mail management?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... responsibilities in mail management? 102-192.170 Section 102-192.170 Public Contracts and Property Management... PROGRAMS 192-MAIL MANAGEMENT GSA's Responsibilities and Services § 102-192.170 What are GSA's responsibilities in mail management? 44 U.S.C § 2904(b) directs the Administrator of General Services to...

  20. 41 CFR 102-192.95 - Why does GSA require annual mail management reports?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... annual mail management reports? 102-192.95 Section 102-192.95 Public Contracts and Property Management... PROGRAMS 192-MAIL MANAGEMENT Reporting Requirements § 102-192.95 Why does GSA require annual mail management reports? GSA requires annual agency mail management reports to— (a) Ensure that Federal...

  1. 41 CFR 102-192.95 - Why does GSA require annual mail management reports?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... annual mail management reports? 102-192.95 Section 102-192.95 Public Contracts and Property Management... PROGRAMS 192-MAIL MANAGEMENT Reporting Requirements § 102-192.95 Why does GSA require annual mail management reports? GSA requires annual agency mail management reports to— (a) Ensure that Federal...

  2. 41 CFR 102-84.50 - May the GSA Form 1166 be used to report information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...-ANNUAL REAL PROPERTY INVENTORIES § 102-84.50 May the GSA Form 1166 be used to report information? No. Agencies must submit information in accordance with the electronic format outlined in the annual reporting... other information and guidance on the Annual Real Property Inventory, contact GSA's Office...

  3. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... responsibilities in the donation of surplus property? 102-37.90 Section 102-37.90 Public Contracts and Property... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY General Services Administration (GSA) § 102-37.90 What are GSA's responsibilities in the donation of surplus property? The General Services...

  4. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... responsibilities in the donation of surplus property? 102-37.90 Section 102-37.90 Public Contracts and Property... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY General Services Administration (GSA) § 102-37.90 What are GSA's responsibilities in the donation of surplus property? The General Services...

  5. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  6. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  7. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  8. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  9. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  10. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... responsibilities in the donation of surplus property? 102-37.90 Section 102-37.90 Public Contracts and Property... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY General Services Administration (GSA) § 102-37.90 What are GSA's responsibilities in the donation of surplus property? The General Services...

  11. 77 FR 39494 - Submission for OMB Review; Federal Management Regulation; GSA Form 3040, State Agency Monthly...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-03

    ... Donation Report of Surplus Property AGENCY: Federal Acquisition Service, GSA. ] ACTION: Notice of request... requirement regarding GSA Form 3040, State Agency Monthly Donation Report of Surplus Property. A notice was... Information Collection 3090- 0112, State Agency Monthly Donation Report of Surplus Personal Property by any...

  12. 77 FR 15759 - Information Collection; Federal Management Regulation; GSA Form 3040, State Agency Monthly...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... Donation Report of Surplus Property AGENCY: Federal Acquisition Service, GSA. ACTION: Notice of request for... regarding GSA Form 3040, State Agency Monthly Donation Report of Surplus Property. Public comments are..., State Agency Monthly Donation Report of Surplus Personal Property by any of the following...

  13. 41 CFR 101-26.503 - Multiple award schedule purchases made by GSA supply distribution facilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Multiple award schedule... Multiple award schedule purchases made by GSA supply distribution facilities. GSA supply distribution... items. Stocking a variety of commercial, high-demand items purchased from FSS multiple award...

  14. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and... GSA Form 1398: Motor vehicle purchase and inspection label. Note: The form illustrated in §...

  15. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and... GSA Form 1398: Motor vehicle purchase and inspection label. Note: The form illustrated in §...

  16. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and... GSA Form 1398: Motor vehicle purchase and inspection label. Note: The form illustrated in §...

  17. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and... GSA Form 1398: Motor vehicle purchase and inspection label. Note: The form illustrated in §...

  18. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 2 2012-07-01 2012-07-01 false GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and... GSA Form 1398: Motor vehicle purchase and inspection label. Note: The form illustrated in §...

  19. 48 CFR 515.209-70 - Examination of records by GSA clause.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Examination of records by GSA clause. 515.209-70 Section 515.209-70 Federal Acquisition Regulations System GENERAL SERVICES... Proposals and Information 515.209-70 Examination of records by GSA clause. Clause for Other Than...

  20. 45 CFR 12a.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... REAL PROPERTY TO ASSIST THE HOMELESS § 12a.5 Real property reported excess to GSA. (a) Each landholding... property. (b) If a landholding agency reports a property to GSA which has been reviewed by HUD for homeless... § 12a.5(g) and will advise HUD of the availability of the property for use by the homeless as...

  1. 45 CFR 12a.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... REAL PROPERTY TO ASSIST THE HOMELESS § 12a.5 Real property reported excess to GSA. (a) Each landholding... property. (b) If a landholding agency reports a property to GSA which has been reviewed by HUD for homeless... § 12a.5(g) and will advise HUD of the availability of the property for use by the homeless as...

  2. 45 CFR 12a.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... REAL PROPERTY TO ASSIST THE HOMELESS § 12a.5 Real property reported excess to GSA. (a) Each landholding... property. (b) If a landholding agency reports a property to GSA which has been reviewed by HUD for homeless... § 12a.5(g) and will advise HUD of the availability of the property for use by the homeless as...

  3. 45 CFR 12a.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... REAL PROPERTY TO ASSIST THE HOMELESS § 12a.5 Real property reported excess to GSA. (a) Each landholding... property. (b) If a landholding agency reports a property to GSA which has been reviewed by HUD for homeless... § 12a.5(g) and will advise HUD of the availability of the property for use by the homeless as...

  4. 45 CFR 12a.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... REAL PROPERTY TO ASSIST THE HOMELESS § 12a.5 Real property reported excess to GSA. (a) Each landholding... property. (b) If a landholding agency reports a property to GSA which has been reviewed by HUD for homeless... § 12a.5(g) and will advise HUD of the availability of the property for use by the homeless as...

  5. 41 CFR 102-33.380 - Who must report information to GSA on Government aircraft?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... information to GSA on Government aircraft? 102-33.380 Section 102-33.380 Public Contracts and Property... PROPERTY 33-MANAGEMENT OF GOVERNMENT AIRCRAFT Reporting Information on Government Aircraft Overview § 102-33.380 Who must report information to GSA on Government aircraft? You must report information to...

  6. 41 CFR 102-33.380 - Who must report information to GSA on Government aircraft?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information to GSA on Government aircraft? 102-33.380 Section 102-33.380 Public Contracts and Property... PROPERTY 33-MANAGEMENT OF GOVERNMENT AIRCRAFT Reporting Information on Government Aircraft Overview § 102-33.380 Who must report information to GSA on Government aircraft? You must report information to...

  7. 41 CFR 102-33.380 - Who must report information to GSA on Government aircraft?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... information to GSA on Government aircraft? 102-33.380 Section 102-33.380 Public Contracts and Property... PROPERTY 33-MANAGEMENT OF GOVERNMENT AIRCRAFT Reporting Information on Government Aircraft Overview § 102-33.380 Who must report information to GSA on Government aircraft? You must report information to...

  8. 41 CFR 102-33.380 - Who must report information to GSA on Government aircraft?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information to GSA on Government aircraft? 102-33.380 Section 102-33.380 Public Contracts and Property... PROPERTY 33-MANAGEMENT OF GOVERNMENT AIRCRAFT Reporting Information on Government Aircraft Overview § 102-33.380 Who must report information to GSA on Government aircraft? You must report information to...

  9. 41 CFR 102-33.380 - Who must report information to GSA on Government aircraft?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information to GSA on Government aircraft? 102-33.380 Section 102-33.380 Public Contracts and Property... PROPERTY 33-MANAGEMENT OF GOVERNMENT AIRCRAFT Reporting Information on Government Aircraft Overview § 102-33.380 Who must report information to GSA on Government aircraft? You must report information to...

  10. 41 CFR 101-26.505-7 - GSA assistance in selection of furniture and furnishings.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... selection of furniture and furnishings. 101-26.505-7 Section 101-26.505-7 Public Contracts and Property... selection of furniture and furnishings. The Customer Service Representative in each GSA regional office will... of office and household furniture and furnishings available through the GSA purchase program....

  11. 75 FR 13131 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Advantage...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ...) contractors must participate in the GSA Advantage! system at 552.238-55. It is an online shopping service... From the Federal Register Online via the Government Publishing Office GENERAL SERVICES ADMINISTRATION General Services Administration Acquisition Regulation; Submission for OMB Review; GSA...

  12. Energy Savings from GSA's National Deep Retrofit Program

    SciTech Connect

    Shonder, John A

    2014-09-01

    Under its National Deep Energy Retrofit (NDER) program, the U.S. General Services Administration (GSA) awarded 10 ESPC projects with the objectives of using innovative technologies and renewable energy technologies, and moving buildings toward net zero energy consumption. This report analyzes data on energy savings from the 10 NDER projects, and compares them with the savings of a sample of other recently awarded Federal ESPC projects. It is shown that by emphasizing the need for deeper energy savings, and by the establishment of a central Project Management Office (PMO) to provide authoritative contracting, technical and pricing assistance, the NDER projects achieved an average level of savings more than twice that of the other Federal ESPC projects. The level of savings achieved in each project seems to be dependent more on the availability of ECMs at the site than on energy price, energy cost per square foot, pre-retrofit EUI or the length of the contract term. This suggests that GSA can achieve similar results in a wide variety of building

  13. Achieving network level privacy in Wireless Sensor Networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2010-01-01

    Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.

  14. Plug-Load Control and Behavioral Change Research in GSA Office Buildings

    SciTech Connect

    Metzger, I.; Cutler, D.; Sheppy, M.

    2012-10-01

    The U.S. General Services Administration (GSA) owns and leases over 354 million square feet (ft2) of space in over 9,600 buildings [1]. GSA is a leader among federal agencies in aggressively pursuing energy efficiency (EE) opportunities for its facilities and installing renewable energy (RE) systems to provide heating, cooling, and power to these facilities. According to several energy assessments of GSA's buildings conducted by the National Renewable Energy Laboratory (NREL), plug-loads account for approximately 21% of the total electricity consumed within a standard GSA Region 3 office building. This study aims to provide insight on how to effectively manage plug-load energy consumption and attain higher energy and cost savings for plug-loads. As GSA improves the efficiency of its building stock, plug-loads will become an even greater portion of its energy footprint.

  15. 41 CFR 102-73.85 - Can agencies with independent statutory authority to lease space have GSA perform the leasing...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... independent statutory authority to lease space have GSA perform the leasing functions? 102-73.85 Section 102...-73.85 Can agencies with independent statutory authority to lease space have GSA perform the leasing functions? Yes, upon request, GSA may perform, on a reimbursable basis, all functions of leasing...

  16. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA...

  17. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA...

  18. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA...

  19. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA...

  20. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA...

  1. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... property services. The detailed guidance implementing these policies is contained in separate customer... philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5... General Services Administration's (GSA) real property policies? GSA's real property policies contained...

  2. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... property services. The detailed guidance implementing these policies is contained in separate customer... philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5... General Services Administration's (GSA) real property policies? GSA's real property policies contained...

  3. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... property services. The detailed guidance implementing these policies is contained in separate customer... philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5... General Services Administration's (GSA) real property policies? GSA's real property policies contained...

  4. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... property services. The detailed guidance implementing these policies is contained in separate customer... philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5... General Services Administration's (GSA) real property policies? GSA's real property policies contained...

  5. 41 CFR 102-117.35 - What are the advantages and disadvantages of using GSA's tender of service?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... and disadvantages of using GSA's tender of service? 102-117.35 Section 102-117.35 Public Contracts and...-117.35 What are the advantages and disadvantages of using GSA's tender of service? (a) It is an... disadvantage to use GSA's tender of service when: (1) You want an agreement that is binding for a longer...

  6. 41 CFR 102-117.35 - What are the advantages and disadvantages of using GSA's tender of service?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and disadvantages of using GSA's tender of service? 102-117.35 Section 102-117.35 Public Contracts and...-117.35 What are the advantages and disadvantages of using GSA's tender of service? (a) It is an... damage claims. (b) It is a disadvantage to use GSA's tender of service when: (1) You want an...

  7. 77 FR 38064 - Public Buildings Service; Information Collection; GSA Form 3453, Application/Permit for Use of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-26

    ... ADMINISTRATION Public Buildings Service; Information Collection; GSA Form 3453, Application/Permit for Use of Space in Public Buildings and Grounds AGENCY: Public Buildings Service, GSA. ACTION: Notice of request... requirement regarding GSA Form 3453, Application/Permit for Use of Space in Public Buildings and...

  8. 41 CFR 102-73.85 - Can agencies with independent statutory authority to lease space have GSA perform the leasing...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... independent statutory authority to lease space have GSA perform the leasing functions? 102-73.85 Section 102...-73.85 Can agencies with independent statutory authority to lease space have GSA perform the leasing functions? Yes, upon request, GSA may perform, on a reimbursable basis, all functions of leasing...

  9. Users or Students? Privacy in University MOOCS.

    PubMed

    Jones, Meg Leta; Regner, Lucas

    2016-10-01

    Two terms, student privacy and Massive Open Online Courses, have received a significant amount of attention recently. Both represent interesting sites of change in entrenched structures, one educational and one legal. MOOCs represent something college courses have never been able to provide: universal access. Universities not wanting to miss the MOOC wave have started to build MOOC courses and integrate them into the university system in various ways. However, the design and scale of university MOOCs create tension for privacy laws intended to regulate information practices exercised by educational institutions. Are MOOCs part of the educational institutions these laws and policies aim to regulate? Are MOOC users students whose data are protected by aforementioned laws and policies? Many university researchers and faculty members are asked to participate as designers and instructors in MOOCs but may not know how to approach the issues proposed. While recent scholarship has addressed the disruptive nature of MOOCs, student privacy generally, and data privacy in the K-12 system, we provide an in-depth description and analysis of the MOOC phenomenon and the privacy laws and policies that guide and regulate educational institutions today. We offer privacy case studies of three major MOOC providers active in the market today to reveal inconsistencies among MOOC platform and the level and type of legal uncertainty surrounding them. Finally, we provide a list of organizational questions to pose internally to navigate the uncertainty presented to university MOOC teams.

  10. Patient privacy in the genomic era.

    PubMed

    Raisaro, Jean Louis; Ayday, Erman; Hubaux, Jean-Pierre

    2014-05-07

    According to many scientists and clinicians, genomics is taking on a key role in the field of medicine. Impressive advances in genome sequencing have opened the way to a variety of revolutionary applications in modern healthcare. In particular, the increasing understanding of the human genome, and of its relation to diseases and response to treatments brings promise of improvements in better preventive and personalized medicine. However, this progress raises important privacy and ethical concerns that need to be addressed. Indeed, each genome is the ultimate identifier of its owner and, due to its nature, it contains highly personal and privacy-sensitive data. In this article, after summarizing recent advances in genomics, we discuss some important privacy issues associated with human genomic information and methods put in place to address them.

  11. GSA-PCA: gene set generation by principal component analysis of the Laplacian matrix of a metabolic network

    PubMed Central

    2012-01-01

    Background Gene Set Analysis (GSA) has proven to be a useful approach to microarray analysis. However, most of the method development for GSA has focused on the statistical tests to be used rather than on the generation of sets that will be tested. Existing methods of set generation are often overly simplistic. The creation of sets from individual pathways (in isolation) is a poor reflection of the complexity of the underlying metabolic network. We have developed a novel approach to set generation via the use of Principal Component Analysis of the Laplacian matrix of a metabolic network. We have analysed a relatively simple data set to show the difference in results between our method and the current state-of-the-art pathway-based sets. Results The sets generated with this method are semi-exhaustive and capture much of the topological complexity of the metabolic network. The semi-exhaustive nature of this method has also allowed us to design a hypergeometric enrichment test to determine which genes are likely responsible for set significance. We show that our method finds significant aspects of biology that would be missed (i.e. false negatives) and addresses the false positive rates found with the use of simple pathway-based sets. Conclusions The set generation step for GSA is often neglected but is a crucial part of the analysis as it defines the full context for the analysis. As such, set generation methods should be robust and yield as complete a representation of the extant biological knowledge as possible. The method reported here achieves this goal and is demonstrably superior to previous set analysis methods. PMID:22876834

  12. 78 FR 64230 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-28

    ... familiar with the data privacy- related issues addressed by small- to medium-sized enterprises; and 3... Department ethics officials. DHS may not release these reports or the information in them to the...

  13. Stratospheric Transparency: Perspectives on Internet Privacy

    ERIC Educational Resources Information Center

    Hauck, Rita M.

    2009-01-01

    As a parent of teenagers in the 1980s, I recall a concern of the intrusion by MTV into our home. After futile attempts to block the program, my spouse and I set out to convince our sons of its intrusion. Our challenge was miniscule when compared to the Internet privacy issues of today. This paper addresses such challenges and proposes some…

  14. Achieving Optimal Privacy in Trust-Aware Social Recommender Systems

    NASA Astrophysics Data System (ADS)

    Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail

    Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.

  15. Availability and quality of mobile health app privacy policies.

    PubMed

    Sunyaev, Ali; Dehling, Tobias; Taylor, Patrick L; Mandl, Kenneth D

    2015-04-01

    Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35,000 mHealth apps are available for iOS and Android. Of the 600 most commonly used apps, only 183 (30.5%) had privacy policies. Average policy length was 1755 (SD 1301) words with a reading grade level of 16 (SD 2.9). Two thirds (66.1%) of privacy policies did not specifically address the app itself. Our findings show that currently mHealth developers often fail to provide app privacy policies. The privacy policies that are available do not make information privacy practices transparent to users, require college-level literacy, and are often not focused on the app itself. Further research is warranted to address why privacy policies are often absent, opaque, or irrelevant, and to find a remedy.

  16. Ethics and Privacy.

    ERIC Educational Resources Information Center

    Brewer, Erin; Eastmond, Nick; Geertsen, Reed; Johnson, Doug; Lewandowski, Judith; Yeaman, Andrew R. J.

    2003-01-01

    Contains four articles covering trends and issues on ethics and privacy in instructional technology, including: considerations for assessing ethical issues; what schools must do to develop ethical behaviors in students; a privacy primer for educators; and manufacturing technophopia. Each article contains references. (MES)

  17. Children's Online Privacy.

    ERIC Educational Resources Information Center

    Aidman, Amy

    2000-01-01

    The first federal Internet privacy law (the Children's Online Privacy Protection Act) provides safeguards for children by regulating collection of their personal information. Unfortunately, teens are not protected. Legislation is pending to protect children from online marketers such as ZapMe! Interactive technologies require constant vigilance.…

  18. Historical Perspectives on Privacy.

    ERIC Educational Resources Information Center

    Huttenstine, Marian L.

    A number of court cases involving public disclosure of private information are described in this paper to point to historical trends involving the issue of privacy and to illustrate some of the problems with all aspects of the issue. After noting the conflict between the principle of individual privacy and the principle of free disclosure of…

  19. Information Privacy Revealed

    ERIC Educational Resources Information Center

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  20. Toward practicing privacy

    PubMed Central

    Dwork, Cynthia; Pottenger, Rebecca

    2013-01-01

    Private data analysis—the useful analysis of confidential data—requires a rigorous and practicable definition of privacy. Differential privacy, an emerging standard, is the subject of intensive investigation in several diverse research communities. We review the definition, explain its motivation, and discuss some of the challenges to bringing this concept to practice. PMID:23243088

  1. Emerging Privacy Issues.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    As the issue of information privacy increases in complexity in terms of the number of organizations involved, the intricacy of the information flows, and the difficulty of conceiving appropriate legal safeguards, it is not certain that the practices and laws that have been developed for current privacy protection can work for new situations.…

  2. 32 CFR 644.314 - Rules and regulations of the General Services Administration (GSA).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... other property being reported to GSA for disposal. (c) Fixtures, structures, and improvements of any kind to be disposed of without the underlying land. (d) Standing timber and embedded gravel, sand,...

  3. 32 CFR 644.314 - Rules and regulations of the General Services Administration (GSA).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... other property being reported to GSA for disposal. (c) Fixtures, structures, and improvements of any kind to be disposed of without the underlying land. (d) Standing timber and embedded gravel, sand,...

  4. 32 CFR 644.314 - Rules and regulations of the General Services Administration (GSA).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... other property being reported to GSA for disposal. (c) Fixtures, structures, and improvements of any kind to be disposed of without the underlying land. (d) Standing timber and embedded gravel, sand,...

  5. 32 CFR 644.314 - Rules and regulations of the General Services Administration (GSA).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... other property being reported to GSA for disposal. (c) Fixtures, structures, and improvements of any kind to be disposed of without the underlying land. (d) Standing timber and embedded gravel, sand,...

  6. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key... addition, this information will assist you in showing your management the magnitude of your...

  7. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key... addition, this information will assist you in showing your management the magnitude of your...

  8. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key... addition, this information will assist you in showing your management the magnitude of your...

  9. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key... addition, this information will assist you in showing your management the magnitude of your...

  10. 77 FR 5020 - General Services Administration Acquisition Regulation; Information Collection; GSA Form 527...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-01

    ... to http://www.regulations.gov , including any personal and/or business confidential information..., Contractor's Qualifications and Financial Information AGENCY: Office of the Chief Finance Officer, GSA... Financial Information. Public comments are particularly invited on: Whether this collection of...

  11. Privacy, technology, and norms: the case of Smart Meters.

    PubMed

    Horne, Christine; Darras, Brice; Bean, Elyse; Srivastava, Anurag; Frickel, Scott

    2015-05-01

    Norms shift and emerge in response to technological innovation. One such innovation is Smart Meters - components of Smart Grid energy systems capable of minute-to-minute transmission of consumer electricity use information. We integrate theory from sociological research on social norms and privacy to examine how privacy threats affect the demand for and expectations of norms that emerge in response to new technologies, using Smart Meters as a test case. Results from three vignette experiments suggest that increased threats to privacy created by Smart Meters are likely to provoke strong demand for and expectations of norms opposing the technology and that the strength of these normative rules is at least partly conditional on the context. Privacy concerns vary little with actors' demographic characteristics. These findings contribute to theoretical understanding of norm emergence and have practical implications for implementing privacy protections that effectively address concerns of electricity users.

  12. Privacy and Property in the Biobank Context

    PubMed Central

    2010-01-01

    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is all about and aim for a fruitful perspective on the issues of property and privacy rights in the context of biobanking. This paper argues that the limits and handling of private matters is determined in specific social relations. The crucial point is thus to determine which information and activities are or are not the legitimate concern of others. Privacy and property rights should be seen as balanced by duties, that is as inherently relational interests extending into the public sphere, rather than to see these rights as the control of an object—for instance the participant’s biobank material. PMID:20799053

  13. DQC Comments on the Posted Recommendations Regarding Data Security and Privacy Protections

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2010

    2010-01-01

    The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…

  14. EGRP Privacy Policy & Disclaimers

    Cancer.gov

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  15. Disentangling privacy from property: toward a deeper understanding of genetic privacy.

    PubMed

    Suter, Sonia M

    2004-04-01

    connoting commodification, disaggregation, and arms-length dealings, can negatively affect the self and harm these relationships. This Article concludes that a deeper understanding of genetic privacy calls for remedies for privacy violations that address dignitary harm and breach of trust, as opposed to market harms, as the property model suggests.

  16. 41 CFR Appendix A to Part 105 - 64-Addresses for Geographically Dispersed Records

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Geographically Dispersed Records Address requests for physically dispersed records, as noted in the system of... appropriate regional GSA office, as follows: Great Lakes Region (includes Illinois, Indiana, Michigan, Ohio... of the Regional Administrator (4A), 77 Forsyth Street, Atlanta, GA 30303. The Heartland...

  17. 41 CFR Appendix A to Part 105 - 64-Addresses for Geographically Dispersed Records

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Geographically Dispersed Records Address requests for physically dispersed records, as noted in the system of... appropriate regional GSA office, as follows: Great Lakes Region (includes Illinois, Indiana, Michigan, Ohio... of the Regional Administrator (4A), 77 Forsyth Street, Atlanta, GA 30303. The Heartland...

  18. 41 CFR Appendix A to Part 105 - 64-Addresses for Geographically Dispersed Records

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Geographically Dispersed Records Address requests for physically dispersed records, as noted in the system of... appropriate regional GSA office, as follows: Great Lakes Region (includes Illinois, Indiana, Michigan, Ohio... of the Regional Administrator (4A), 77 Forsyth Street, Atlanta, GA 30303. The Heartland...

  19. Summary of the Privacy Act

    EPA Pesticide Factsheets

    The purpose of the Privacy Act is to balance the government's need to maintain information about individuals with the rights of individuals to be protected against unwarranted invasions of their privacy.

  20. 77 FR 3238 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-23

    .... SUPPLEMENTARY INFORMATION: The Defense Logistics Agency's system of record subject to the Privacy Act of 1974 (5... address in FOR FURTHER INFORMATION CONTACT. The proposed changes to the record system being amended are... whether information about themselves is contained in this system should address written inquiries to...

  1. The ultimate physical limits of privacy

    NASA Astrophysics Data System (ADS)

    Ekert, Artur; Renner, Renato

    2014-03-01

    Among those who make a living from the science of secrecy, worry and paranoia are just signs of professionalism. Can we protect our secrets against those who wield superior technological powers? Can we trust those who provide us with tools for protection? Can we even trust ourselves, our own freedom of choice? Recent developments in quantum cryptography show that some of these questions can be addressed and discussed in precise and operational terms, suggesting that privacy is indeed possible under surprisingly weak assumptions.

  2. The ultimate physical limits of privacy.

    PubMed

    Ekert, Artur; Renner, Renato

    2014-03-27

    Among those who make a living from the science of secrecy, worry and paranoia are just signs of professionalism. Can we protect our secrets against those who wield superior technological powers? Can we trust those who provide us with tools for protection? Can we even trust ourselves, our own freedom of choice? Recent developments in quantum cryptography show that some of these questions can be addressed and discussed in precise and operational terms, suggesting that privacy is indeed possible under surprisingly weak assumptions.

  3. Inequalities for the quantum privacy

    NASA Astrophysics Data System (ADS)

    Trindade, M. A. S.; Pinto, E.

    2016-02-01

    In this work, we investigate the asymptotic behavior related to the quantum privacy for multipartite systems. In this context, an inequality for quantum privacy was obtained by exploiting of quantum entropy properties. Subsequently, we derive a lower limit for the quantum privacy through the entanglement fidelity. In particular, we show that there is an interval where an increase in entanglement fidelity implies a decrease in quantum privacy.

  4. Privacy Expectations in Online Contexts

    ERIC Educational Resources Information Center

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  5. Overview of Privacy in Social Networking Sites (SNS)

    NASA Astrophysics Data System (ADS)

    Powale, Pallavi I.; Bhutkar, Ganesh D.

    2013-07-01

    Social Networking Sites (SNS) have become an integral part of communication and life style of people in today's world. Because of the wide range of services offered by SNSs mostly for free of cost, these sites are attracting the attention of all possible Internet users. Most importantly, users from all age groups have become members of SNSs. Since many of the users are not aware of the data thefts associated with information sharing, they freely share their personal information with SNSs. Therefore, SNSs may be used for investigating users' character and social habits by familiar or even unknown persons and agencies. Such commercial and social scenario, has led to number of privacy and security threats. Though, all major issues in SNSs need to be addressed, by SNS providers, privacy of SNS users is the most crucial. And therefore, in this paper, we have focused our discussion on "privacy in SNSs". We have discussed different ways of Personally Identifiable Information (PII) leakages from SNSs, information revelation to third-party domains without user consent and privacy related threats associated with such information sharing. We expect that this comprehensive overview on privacy in SNSs will definitely help in raising user awareness about sharing data and managing their privacy with SNSs. It will also help SNS providers to rethink about their privacy policies.

  6. GSA-Tuning IPD Control of a Field-Sensed Magnetic Suspension System

    PubMed Central

    Li, Jen-Hsing; Chiou, Juing-Shian

    2015-01-01

    The purpose of this paper is to propose a GSA-tuning IPD control technique for magnetic suspension systems. An educational demonstration on a magnetic-field sensed magnetic suspension system is examined for effectiveness. For the magnetic-field sensed magnetic suspension system (FSMSS), the current transducer is employed for measuring the electromagnetic coil current, and a Hall effect device is used for detecting the position of the suspended object. To achieve optimal performance, the gravitational search algorithm (GSA) is adopted for tuning the integral-proportional-derivative (IPD) controller. The IPD control includes the specified PD controller and an integrator. The specified PD control is employed for stabilizing the inherently unstable FSMSS, whereas the integral control is utilized for eliminating the steady-state error. The GSA can tune the IPD control parameters to enable optimal FSMSS performance. We achieved excellent results from the simulations and hands-on experiments for the proposed control strategies and structures. PMID:26694404

  7. GSA-Tuning IPD Control of a Field-Sensed Magnetic Suspension System.

    PubMed

    Li, Jen-Hsing; Chiou, Juing-Shian

    2015-12-16

    The purpose of this paper is to propose a GSA-tuning IPD control technique for magnetic suspension systems. An educational demonstration on a magnetic-field sensed magnetic suspension system is examined for effectiveness. For the magnetic-field sensed magnetic suspension system (FSMSS), the current transducer is employed for measuring the electromagnetic coil current, and a Hall effect device is used for detecting the position of the suspended object. To achieve optimal performance, the gravitational search algorithm (GSA) is adopted for tuning the integral-proportional-derivative (IPD) controller. The IPD control includes the specified PD controller and an integrator. The specified PD control is employed for stabilizing the inherently unstable FSMSS, whereas the integral control is utilized for eliminating the steady-state error. The GSA can tune the IPD control parameters to enable optimal FSMSS performance. We achieved excellent results from the simulations and hands-on experiments for the proposed control strategies and structures.

  8. Addressing healthcare.

    PubMed

    Daly, Rich

    2013-02-11

    Though President Barack Obama has rarely made healthcare references in his State of the Union addresses, health policy experts are hoping he changes that strategy this year. "The question is: Will he say anything? You would hope that he would, given that that was the major issue he started his presidency with," says Dr. James Weinstein, left, of the Dartmouth-Hitchcock health system.

  9. What was privacy?

    PubMed

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  10. Privacy Policy | Smokefree 60+

    Cancer.gov

    The National Cancer Institute (NCI) respects the privacy of users of its websites. This is why we have taken the time to disclose our privacy policy and information collection practices. NCI does not disclose, give, sell, or transfer any personal information about visitors unless required to do so by law. NCI automatically collects a limited amount of information about the use of websites for statistical purposes — that is, to measure the numbers of visitors. This information may be helpful when considering changes that improve our websites for future visitors.

  11. 41 CFR 102-36.305 - May we abandon or destroy excess personal property without reporting it to GSA?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... destroy excess personal property without reporting it to GSA? 102-36.305 Section 102-36.305 Public... without reporting it to GSA? Yes, you may abandon or destroy excess personal property when you have made a... when it has neither utility nor monetary value (either as an item or as scrap)....

  12. 41 CFR 102-118.440 - What are the postpayment audit responsibilities and roles of the GSA Audit Division?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... audit responsibilities and roles of the GSA Audit Division? 102-118.440 Section 102-118.440 Public... § 102-118.440 What are the postpayment audit responsibilities and roles of the GSA Audit Division? When..., agreements or tenders and make adjustments to protect the interest of an agency; (b) Examine, adjudicate,...

  13. 41 CFR 102-118.440 - What are the postpayment audit responsibilities and roles of the GSA Audit Division?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... audit responsibilities and roles of the GSA Audit Division? 102-118.440 Section 102-118.440 Public... § 102-118.440 What are the postpayment audit responsibilities and roles of the GSA Audit Division? When..., agreements or tenders and make adjustments to protect the interest of an agency; (b) Examine, adjudicate,...

  14. 76 FR 13617 - Office of Federal High-Performance Green Buildings (OFHPGB); Notice of GSA Bulletin OFHPGB 2011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-14

    ... ADMINISTRATION Office of Federal High-Performance Green Buildings (OFHPGB); Notice of GSA Bulletin OFHPGB 2011... Policy on Energy Efficient Commercial Buildings Tax Deduction. GSA Bulletin OFHPGB 2011-OGP-1 may be... Commercial Building Tax Deduction for government-owned buildings is set forth in Notice 2008-40,...

  15. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or...

  16. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or...

  17. 41 CFR 105-64.106 - What is GSA's policy on information accuracy in a system of records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... information accuracy in a system of records? 105-64.106 Section 105-64.106 Public Contracts and Property... Responsibilities § 105-64.106 What is GSA's policy on information accuracy in a system of records? System managers... GSA systems are reviewed annually. Those systems that contain Personally Identifiable Information...

  18. 41 CFR 102-36.395 - How may GSA assist us in disposing of foreign excess personal property?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How may GSA assist us in disposing of foreign excess personal property? 102-36.395 Section 102-36.395 Public Contracts and Property... Handling Foreign Excess Personal Property § 102-36.395 How may GSA assist us in disposing of foreign...

  19. 41 CFR 102-36.395 - How may GSA assist us in disposing of foreign excess personal property?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false How may GSA assist us in disposing of foreign excess personal property? 102-36.395 Section 102-36.395 Public Contracts and Property... Handling Foreign Excess Personal Property § 102-36.395 How may GSA assist us in disposing of foreign...

  20. 41 CFR 102-36.395 - How may GSA assist us in disposing of foreign excess personal property?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false How may GSA assist us in disposing of foreign excess personal property? 102-36.395 Section 102-36.395 Public Contracts and Property... Handling Foreign Excess Personal Property § 102-36.395 How may GSA assist us in disposing of foreign...

  1. 41 CFR 102-36.395 - How may GSA assist us in disposing of foreign excess personal property?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false How may GSA assist us in disposing of foreign excess personal property? 102-36.395 Section 102-36.395 Public Contracts and Property... Handling Foreign Excess Personal Property § 102-36.395 How may GSA assist us in disposing of foreign...

  2. 41 CFR 102-36.395 - How may GSA assist us in disposing of foreign excess personal property?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false How may GSA assist us in disposing of foreign excess personal property? 102-36.395 Section 102-36.395 Public Contracts and Property... Handling Foreign Excess Personal Property § 102-36.395 How may GSA assist us in disposing of foreign...

  3. 41 CFR 102-118.530 - Will GSA instruct my agency's disbursing offices to offset unpaid TSP billings?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Will GSA instruct my agency's disbursing offices to offset unpaid TSP billings? 102-118.530 Section 102-118.530 Public... to offset unpaid TSP billings? Yes, GSA will instruct one or more of your agency's disbursing...

  4. 41 CFR 102-118.530 - Will GSA instruct my agency's disbursing offices to offset unpaid TSP billings?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Will GSA instruct my agency's disbursing offices to offset unpaid TSP billings? 102-118.530 Section 102-118.530 Public... to offset unpaid TSP billings? Yes, GSA will instruct one or more of your agency's disbursing...

  5. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public... UNCLAIMED PERSONAL PROPERTY Personal Property Requiring Special Handling Forfeited Distilled Spirits, Wine, and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for...

  6. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public... UNCLAIMED PERSONAL PROPERTY Personal Property Requiring Special Handling Forfeited Distilled Spirits, Wine, and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for...

  7. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public... UNCLAIMED PERSONAL PROPERTY Personal Property Requiring Special Handling Forfeited Distilled Spirits, Wine, and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for...

  8. 48 CFR 52.211-4 - Availability for Examination of Specifications Not Listed in the GSA Index of Federal...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Examination of Specifications Not Listed in the GSA Index of Federal Specifications, Standards and Commercial... Clauses 52.211-4 Availability for Examination of Specifications Not Listed in the GSA Index of Federal Specifications, Standards and Commercial Item Descriptions. As prescribed in 11.204(d), insert a...

  9. Assessing the privacy policies in mobile personal health records.

    PubMed

    Zapata, Belén Cruz; Hernández Niñirola, Antonio; Fernández-Alemán, José Luis; Toval, Ambrosio

    2014-01-01

    The huge increase in the number and use of smartphones and tablets has led health service providers to take an interest in mHealth. Popular mobile app markets like Apple App Store or Google Play contain thousands of health applications. Although mobile personal health records (mPHRs) have a number of benefits, important challenges appear in the form of adoption barriers. Security and privacy have been identified as part of these barriers and should be addressed. This paper analyzes and assesses a total of 24 free mPHRs for Android and iOS. Characteristics regarding privacy and security were extracted from the HIPAA. The results show important differences in both the mPHRs and the characteristics analyzed. A questionnaire containing six questions concerning privacy policies was defined. Our questionnaire may assist developers and stakeholders to evaluate the security and privacy of their mPHRs.

  10. Toilet privacy in hospital.

    PubMed

    Logan, Karen

    Good practice in toilet management and continence promotion can help hospital patients to maintain their dignity. This article reports on an audit that highlighted the issues important to patients and nurses in terms of improving privacy and dignity for inpatients using the toilet.

  11. Computers and Personal Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    Privacy is an issue that arises from the intersection of a demand for improved recordkeeping processes, and computing technology as the response to the demand. Recordkeeping in the United States centers on information about people. Modern day computing technology has the ability to maintain, store, and retrieve records quickly; however, this…

  12. Privacy vs. the Media.

    ERIC Educational Resources Information Center

    Naylor, David T.; Smith, Bruce D.

    1982-01-01

    Describes five learning activities designed to teach secondary students about the right of the public to know and the right of privacy. The activities will help teacher to extract information from Kubek's article and bring it to American history, government, sociology, or journalism classes. (AM)

  13. 32 CFR 806b.18 - Third party information in a Privacy Act System of Record.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Third party information in a Privacy Act System... party information in a Privacy Act System of Record. Ordinarily a person is entitled to their entire... information that is not “about” him or her (for example, the home address of a third party contained in...

  14. 32 CFR 806b.18 - Third party information in a Privacy Act System of Record.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Third party information in a Privacy Act System... party information in a Privacy Act System of Record. Ordinarily a person is entitled to their entire... information that is not “about” him or her (for example, the home address of a third party contained in...

  15. 32 CFR 806b.18 - Third party information in a Privacy Act System of Record.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Third party information in a Privacy Act System... party information in a Privacy Act System of Record. Ordinarily a person is entitled to their entire... information that is not “about” him or her (for example, the home address of a third party contained in...

  16. 32 CFR 806b.18 - Third party information in a Privacy Act System of Record.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Third party information in a Privacy Act System... party information in a Privacy Act System of Record. Ordinarily a person is entitled to their entire... information that is not “about” him or her (for example, the home address of a third party contained in...

  17. 32 CFR 806b.18 - Third party information in a Privacy Act System of Record.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Third party information in a Privacy Act System... party information in a Privacy Act System of Record. Ordinarily a person is entitled to their entire... information that is not “about” him or her (for example, the home address of a third party contained in...

  18. 78 FR 11648 - Privacy Act of 1974; Notice of New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-19

    ... Identification Number (TIN), and entity address. In the case of a sole proprietor, tax laws allow them to use... individual, only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and... requirements of the Privacy Act, the Computer Security Act, and the SAM System Security Plan. System roles...

  19. 41 CFR 102-34.220 - What does GSA do if it learns of unofficial use of a Government motor vehicle?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What does GSA do if it learns of unofficial use of a Government motor vehicle? 102-34.220 Section 102-34.220 Public Contracts....220 What does GSA do if it learns of unofficial use of a Government motor vehicle? GSA reports...

  20. 41 CFR 102-34.220 - What does GSA do if it learns of unofficial use of a Government motor vehicle?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What does GSA do if it learns of unofficial use of a Government motor vehicle? 102-34.220 Section 102-34.220 Public Contracts....220 What does GSA do if it learns of unofficial use of a Government motor vehicle? GSA reports...

  1. 41 CFR 102-34.220 - What does GSA do if it learns of unofficial use of a Government motor vehicle?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What does GSA do if it learns of unofficial use of a Government motor vehicle? 102-34.220 Section 102-34.220 Public Contracts....220 What does GSA do if it learns of unofficial use of a Government motor vehicle? GSA reports...

  2. 41 CFR 102-34.220 - What does GSA do if it learns of unofficial use of a Government motor vehicle?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What does GSA do if it learns of unofficial use of a Government motor vehicle? 102-34.220 Section 102-34.220 Public Contracts....220 What does GSA do if it learns of unofficial use of a Government motor vehicle? GSA reports...

  3. 41 CFR 102-34.220 - What does GSA do if it learns of unofficial use of a Government motor vehicle?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What does GSA do if it learns of unofficial use of a Government motor vehicle? 102-34.220 Section 102-34.220 Public Contracts....220 What does GSA do if it learns of unofficial use of a Government motor vehicle? GSA reports...

  4. Taking the next step to privacy compliance for hospitals: implementing the OHA guidelines.

    PubMed

    Beardwood, John

    2003-01-01

    The recently released "Guidelines for Managing Privacy, Data Protection and Security for Ontario Hospitals," prepared by the Ontario Hospital eHealth Council Privacy and Security Working Group (the "Guidelines") are useful in that they provide a comprehensive overview of the types of issues raised for hospitals by existing and pending privacy legislation, and a very high-level framework for addressing same. However, the Guidelines are, as stated high-level guidelines only,--leaving hospital management to grapple with the next big step towards privacy compliance: how to operationalize the Guidelines within their particular hospital.

  5. Deriving a Set of Privacy Specific Heuristics for the Assessment of PHRs (Personal Health Records).

    PubMed

    Furano, Riccardo F; Kushniruk, Andre; Barnett, Jeff

    2017-01-01

    With the emergence of personal health record (PHR) platforms becoming more widely available, this research focused on the development of privacy heuristics to assess PHRs regarding privacy. Existing sets of heuristics are typically not application specific and do not address patient-centric privacy as a main concern prior to undergoing PHR procurement. A set of privacy specific heuristics were developed based on a scoping review of the literature. An internet-based commercially available, vendor specific PHR application was evaluated using the derived set of privacy specific heuristics. The proposed set of privacy specific derived heuristics is explored in detail in relation to ISO 29100. The assessment of the internet-based commercially available, vendor specific PHR application indicated numerous violations. These violations were noted within the study. It is argued that the new derived privacy heuristics should be used in addition to Nielsen's well-established set of heuristics. Privacy specific heuristics could be used to assess PHR portal system-level privacy mechanisms in the procurement process of a PHR application and may prove to be a beneficial form of assessment to prevent the selection of a PHR platform with a poor privacy specific interface design.

  6. Space in Space: Designing for Privacy in the Workplace

    NASA Technical Reports Server (NTRS)

    Akin, Jonie

    2015-01-01

    Privacy is cultural, socially embedded in the spatial, temporal, and material aspects of the lived experience. Definitions of privacy are as varied among scholars as they are among those who fight for their personal rights in the home and the workplace. Privacy in the workplace has become a topic of interest in recent years, as evident in discussions on Big Data as well as the shrinking office spaces in which people work. An article in The New York Times published in February of this year noted that "many companies are looking to cut costs, and one way to do that is by trimming personal space". Increasingly, organizations ranging from tech start-ups to large corporations are downsizing square footage and opting for open-office floorplans hoping to trim the budget and spark creative, productive communication among their employees. The question of how much is too much to trim when it comes to privacy, is one that is being actively addressed by the National Aeronautics and Space Administration (NASA) as they explore habitat designs for future space missions. NASA recognizes privacy as a design-related stressor impacting human health and performance. Given the challenges of sustaining life in an isolated, confined, and extreme environment such as Mars, NASA deems it necessary to determine the acceptable minimal amount for habitable volume for activities requiring at least some level of privacy in order to support optimal crew performance. Ethnographic research was conducted in 2013 to explore perceptions of privacy and privacy needs among astronauts living and working in space as part of a long-distance, long-duration mission. The allocation of space, or habitable volume, becomes an increasingly complex issue in outer space due to the costs associated with maintaining an artificial, confined environment bounded by limitations of mass while located in an extreme environment. Privacy in space, or space in space, provides a unique case study of the complex notions of

  7. GSA Advisors' Self-Efficacy Related to LGBT Youth of Color and Transgender Youth

    ERIC Educational Resources Information Center

    Poteat, V. Paul; Scheer, Jillian R.

    2016-01-01

    Gay-Straight Alliances (GSAs) serve lesbian, gay, bisexual, transgender (LGBT) and heterosexual youth from diverse backgrounds. Although some attention has been given to youth members in general, little attention has been given to adult advisors. Among 47 GSA advisors from 33 high schools (39 cisgender female, 8 cisgender male), the authors…

  8. 41 CFR 102-3.100 - What are the responsibilities and functions of GSA?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What are the responsibilities and functions of GSA? 102-3.100 Section 102-3.100 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION GENERAL 3-FEDERAL...

  9. 41 CFR 102-35.15 - What are the goals of GSA's personal property regulations?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are the goals of GSA's personal property regulations? 102-35.15 Section 102-35.15 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 35-DISPOSITION OF PERSONAL PROPERTY...

  10. 41 CFR 102-36.220 - Must we report all excess personal property to GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... dangerous to public health and safety. (11) Classified items or property determined to be sensitive for... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Must we report all excess personal property to GSA? 102-36.220 Section 102-36.220 Public Contracts and Property...

  11. 48 CFR 552.219-75 - GSA Mentor-Protégé Program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the GSA Office of Small Business Utilization (E), Washington, DC 20405, (202) 501-1021, for further... Mentor-ProtéGé Program (SEP 2009) (a) Prime contractors, including small businesses, are encouraged to... subcontracting plan, or that are eligible small businesses; (2) Protégés are subcontractors to the...

  12. 41 CFR 102-118.410 - Can GSA suspend my agency's prepayment audit program?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... agency's prepayment audit program? 102-118.410 Section 102-118.410 Public Contracts and Property... TRANSPORTATION 118-TRANSPORTATION PAYMENT AND AUDIT Prepayment Audits of Transportation Services Suspension of Agency Prepayment Audit Programs § 102-118.410 Can GSA suspend my agency's prepayment audit program?...

  13. 75 FR 82029 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Form 1217...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ... Doc No: 2010-32775] GENERAL SERVICES ADMINISTRATION [OMB Control No. 3090-00XX; Docket 2010-0002; Sequence 15] General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Form 1217, Lessor's Annual Cost Statement AGENCY: Department of Defense (DOD), General...

  14. 41 CFR 102-192.170 - What are GSA's responsibilities in mail management?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are GSA's responsibilities in mail management? 102-192.170 Section 102-192.170 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  15. 41 CFR 102-37.125 - What are some donations that do not require GSA's approval?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are some donations... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Holding Agency § 102-37.125 What are some donations that do not require GSA's approval? (a) Some donations of surplus property that do not require...

  16. 41 CFR 101-26.505-7 - GSA assistance in selection of furniture and furnishings.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA assistance in... Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND..., upon request, furnish agencies with information on the types, styles, finishes, coverings, and...

  17. 41 CFR 102-192.170 - What are GSA's responsibilities in mail management?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What are GSA's responsibilities in mail management? 102-192.170 Section 102-192.170 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  18. 41 CFR 102-75.180 - May landholding agencies transfer excess real property without notifying GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., without notifying GSA, transfer excess real property that they use, occupy, or control under a lease, permit, license, easement, or similar instrument when— (a) The lease or other instrument is subject to... other instrument, including renewal rights, will provide for less than nine months of use and...

  19. 41 CFR 101-26.305 - Submission of orders to GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Submission of orders to GSA. 101-26.305 Section 101-26.305 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT...

  20. 41 CFR 101-26.309 - Cancellation of orders for GSA stock items.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Cancellation of orders for GSA stock items. 101-26.309 Section 101-26.309 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT...

  1. 41 CFR 101-26.306 - Planned requisitioning for GSA stock items.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Planned requisitioning for GSA stock items. 101-26.306 Section 101-26.306 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT...

  2. Privacy Awareness: A Means to Solve the Privacy Paradox?

    NASA Astrophysics Data System (ADS)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  3. Inaugural address

    NASA Astrophysics Data System (ADS)

    Joshi, P. S.

    2014-03-01

    From jets to cosmos to cosmic censorship P S Joshi Tata Institute of Fundamental Research, Homi Bhabha Road, Colaba, Mumbai 400005, India E-mail: psj@tifr.res.in 1. Introduction At the outset, I should like to acknowledge that part of the title above, which tries to capture the main flavour of this meeting, and has been borrowed from one of the plenary talks at the conference. When we set out to make the programme for the conference, we thought of beginning with observations on the Universe, but then we certainly wanted to go further and address deeper questions, which were at the very foundations of our inquiry, and understanding on the nature and structure of the Universe. I believe, we succeeded to a good extent, and it is all here for you in the form of these Conference Proceedings, which have been aptly titled as 'Vishwa Mimansa', which could be possibly translated as 'Analysis of the Universe'! It is my great pleasure and privilege to welcome you all to the ICGC-2011 meeting at Goa. The International Conference on Gravitation and Cosmology (ICGC) series of meetings are being organized by the Indian Association for General Relativity and Gravitation (IAGRG), and the first such meeting was planned and conducted in Goa in 1987, with subsequent meetings taking place at a duration of about four years at various locations in India. So, it was thought appropriate to return to Goa to celebrate the 25 years of the ICGC meetings. The recollections from that first meeting have been recorded elsewhere here in these Proceedings. The research and teaching on gravitation and cosmology was initiated quite early in India, by V V Narlikar at the Banares Hindu University, and by N R Sen in Kolkata in the 1930s. In course of time, this activity grew and gained momentum, and in early 1969, at the felicitation held for the 60 years of V V Narlikar at a conference in Ahmedabad, P C Vaidya proposed the formation of the IAGRG society, with V V Narlikar being the first President. This

  4. Convocation address.

    PubMed

    Kakodkar, A

    1999-07-01

    This convocation addressed by Dr. Anil Kakodkar focuses on the challenges faced by graduating students. In his speech, he emphasized the high level of excellence achieved by the industrial sector; however, he noted that there has been a loss of initiative in maximizing value addition, which was worsened by an increasing population pressure. In facing a stiff competition in the external and domestic markets, it is imperative to maximize value addition within the country in a competitive manner and capture the highest possible market share. To achieve this, high-quality human resources are central. Likewise, family planning programs should become more effective and direct available resources toward national advantage. To boost the domestic market, he suggests the need to search for strengths to achieve leadership position in those areas. First, an insight into the relationship between the lifestyles and the needs of our people and the natural resource endowment must be gained. Second, remodeling of the education system must be undertaken to prepare the people for adding the necessary innovative content in our value addition activities. Lastly, Dr. Kakodkar emphasizes the significance of developing a strong bond between parents and children to provide a sound foundation and allow the education system to grow upon it.

  5. Location Privacy in RFID Applications

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  6. Gaussian operations and privacy

    SciTech Connect

    Navascues, Miguel; Acin, Antonio

    2005-07-15

    We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states.

  7. Opening Address

    NASA Astrophysics Data System (ADS)

    Yamada, T.

    2014-12-01

    Ladies and Gentlemen, it is my great honor and pleasure to present an opening address of the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3). On the behalf of the organizing committee, I certainly welcome all your visits to KGU Kannai Media Center belonging to Kanto Gakuin University, and stay in Yokohama. In particular, to whom come from abroad more than 17 countries, I would appreciate your participations after long long trips from your homeland to Yokohama. The first international workshop on "State of the Art in Nuclear Cluster Physics", called SOTANCP, was held in Strasbourg, France, in 2008, and the second one was held in Brussels, Belgium, in 2010. Then the third workshop is now held in Yokohama. In this period, we had the traditional 10th cluster conference in Debrecen, Hungary, in 2012. Thus we have the traditional cluster conference and SOTANCP, one after another, every two years. This obviously shows our field of nuclear cluster physics is very active and flourishing. It is for the first time in about 10 years to hold the international workshop on nuclear cluster physics in Japan, because the last cluster conference held in Japan was in Nara in 2003, about 10 years ago. The president in Nara conference was Prof. K. Ikeda, and the chairpersons were Prof. H. Horiuchi and Prof. I. Tanihata. I think, quite a lot of persons in this room had participated at the Nara conference. Since then, about ten years passed. So, this workshop has profound significance for our Japanese colleagues. The subjects of this workshop are to discuss "the state of the art in nuclear cluster physics" and also discuss the prospect of this field. In a couple of years, we saw significant progresses of this field both in theory and in experiment, which have brought better and new understandings on the clustering aspects in stable and unstable nuclei. I think, the concept of clustering has been more important than ever. This is true also in the

  8. Presidential address.

    PubMed

    Vohra, U

    1993-07-01

    The Secretary of India's Ministry of Health and Family Welfare serves as Chair of the Executive Council of the International Institute for Population Sciences in Bombay. She addressed its 35th convocation in 1993. Global population stands at 5.43 billion and increases by about 90 million people each year. 84 million of these new people are born in developing countries. India contributes 17 million new people annually. The annual population growth rate in India is about 2%. Its population size will probably surpass 1 billion by the 2000. High population growth rates are a leading obstacle to socioeconomic development in developing countries. Governments of many developing countries recognize this problem and have expanded their family planning programs to stabilize population growth. Asian countries that have done so and have completed the fertility transition include China, Japan, Singapore, South Korea, and Thailand. Burma, Malaysia, North Korea, Sri Lanka, and Vietnam have not yet completed the transition. Afghanistan, Bangladesh, Iran, Nepal, and Pakistan are half-way through the transition. High population growth rates put pressure on land by fragmenting finite land resources, increasing the number of landless laborers and unemployment, and by causing considerable rural-urban migration. All these factors bring about social stress and burden civic services. India has reduced its total fertility rate from 5.2 to 3.9 between 1971 and 1991. Some Indian states have already achieved replacement fertility. Considerable disparity in socioeconomic development exists among states and districts. For example, the states of Bihar, Madhya Pradesh, Rajasthan, and Uttar Pradesh have female literacy rates lower than 27%, while that for Kerala is 87%. Overall, infant mortality has fallen from 110 to 80 between 1981 and 1990. In Uttar Pradesh, it has fallen from 150 to 98, while it is at 17 in Kerala. India needs innovative approaches to increase contraceptive prevalence rates

  9. Welcome Address

    NASA Astrophysics Data System (ADS)

    Kiku, H.

    2014-12-01

    Ladies and Gentlemen, It is an honor for me to present my welcome address in the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3), as the president of Kanto Gakuin University. Particularly to those from abroad more than 17 countries, I am very grateful for your participation after long long trips from your home to Yokohama. On the behalf of the Kanto Gakuin University, we certainly welcome your visit to our university and stay in Yokohama. First I would like to introduce Kanto Gakuin University briefly. Kanto Gakuin University, which is called KGU, traces its roots back to the Yokohama Baptist Seminary founded in 1884 in Yamate, Yokohama. The seminary's founder was Albert Arnold Bennett, alumnus of Brown University, who came to Japan from the United States to establish a theological seminary for cultivating and training Japanese missionaries. Now KGU is a major member of the Kanto Gakuin School Corporation, which is composed of two kindergartens, two primary schools, two junior high schools, two senior high schools as well as KGU. In this university, we have eight faculties with graduate school including Humanities, Economics, Law, Sciences and Engineering, Architecture and Environmental Design, Human and Environmental Studies, Nursing, and Law School. Over eleven thousands students are currently learning in our university. By the way, my major is the geotechnical engineering, and I belong to the faculty of Sciences and Engineering in my university. Prof. T. Yamada, here, is my colleague in the same faculty. I know that the nuclear physics is one of the most active academic fields in the world. In fact, about half of the participants, namely, more than 50 scientists, come from abroad in this conference. Moreover, I know that the nuclear physics is related to not only the other fundamental physics such as the elementary particle physics and astrophysics but also chemistry, medical sciences, medical cares, and radiation metrology

  10. Privacy enhanced group communication in clinical environment

    NASA Astrophysics Data System (ADS)

    Li, Mingyan; Narayanan, Sreeram; Poovendran, Radha

    2005-04-01

    Privacy protection of medical records has always been an important issue and is mandated by the recent Health Insurance Portability and Accountability Act (HIPAA) standards. In this paper, we propose security architectures for a tele-referring system that allows electronic group communication among professionals for better quality treatments, while protecting patient privacy against unauthorized access. Although DICOM defines the much-needed guidelines for confidentiality of medical data during transmission, there is no provision in the existing medical security systems to guarantee patient privacy once the data has been received. In our design, we address this issue by enabling tracing back to the recipient whose received data is disclosed to outsiders, using watermarking technique. We present security architecture design of a tele-referring system using a distributed approach and a centralized web-based approach. The resulting tele-referring system (i) provides confidentiality during the transmission and ensures integrity and authenticity of the received data, (ii) allows tracing of the recipient who has either distributed the data to outsiders or whose system has been compromised, (iii) provides proof of receipt or origin, and (iv) can be easy to use and low-cost to employ in clinical environment.

  11. 76 FR 24564 - Privacy Act of 1974: Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-02

    ... Internal Revenue Service Privacy Act of 1974: Computer Matching Program AGENCY: Internal Revenue Service... Information to Federal, State and Local Agencies (DIFSLA) Computer Matching Program. DATES: Effective Date... copy of the applicable computer matching agreement at the address provided above. Purpose The...

  12. 78 FR 37801 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-24

    ... from the address in FOR FURTHER INFORMATION CONTACT or from the Defense Privacy and Civil Liberties... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE...: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor, Suite...

  13. 78 FR 73508 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-06

    ... available from the address in FOR FURTHER INFORMATION CONTACT or from the Defense Privacy and Civil... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE...: Federal Docket Management System Office, 4800 Mark Center Drive East Tower, 2nd Floor, Suite...

  14. 78 FR 73507 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-06

    ... from the address in FOR FURTHER INFORMATION CONTACT or at the Defense Privacy and Civil Liberties... Secretary of Defense/Joint Staff Freedom of Information Act Requester Service Center, Office of Freedom of... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE...

  15. 78 FR 37800 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-24

    ... from the address in FOR FURTHER INFORMATION CONTACT or from the Defense Privacy and Civil Liberties... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE...: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor, Suite...

  16. 78 FR 73512 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-06

    ... address in FOR FURTHER INFORMATION CONTACT or from the Defense Privacy and Civil Liberties Office Web site... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF DEFENSE... Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor, Suite 02G09, Alexandria, VA...

  17. 32 CFR 701.101 - Privacy program terms and definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... assessment to evaluate adequate practices in balancing privacy concerns with the security needs of...

  18. 41 CFR 102-118.260 - Must my agency send all quotations, tenders, or contracts with a TSP to GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... execution to—General Services Administration, Transportation Audit Division (QMCA), Crystal Plaza 4, Room 300, 2200 Crystal Drive, Arlington, VA 22202, www.gsa.gov/transaudits. (b) Tenders must be...

  19. 41 CFR 102-118.260 - Must my agency send all quotations, tenders, or contracts with a TSP to GSA?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... execution to—General Services Administration, Transportation Audit Division (QMCA), Crystal Plaza 4, Room 300, 2200 Crystal Drive, Arlington, VA 22202, www.gsa.gov/transaudits. (b) Tenders must be...

  20. Privacy Law and Print Photojournalism.

    ERIC Educational Resources Information Center

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  1. Child Advocacy and Family Privacy.

    ERIC Educational Resources Information Center

    Feshbach, Seymour; Feshbach, Norma Deitch

    This paper discusses the issues involved in achieving a balance between a child's rights to protection and adequate care and a family's rights to privacy and autonomy. The paper advocates a shift from the current norm of privacy concerning parents' child rearing practices towards increased openness and freer community-family communication. In view…

  2. Student Privacy and School Responsibility.

    ERIC Educational Resources Information Center

    Gluckman, Ivan

    1987-01-01

    This pamphlet considers students' right to privacy and the application of this right to the confidentiality of information disclosed to administrators and counselors. Privacy is also considered in regard to special problems associated with counseling students about drugs, contraceptives, sexually transmitted diseases, abortion, and possible threat…

  3. Privacy Issues and New Technologies.

    ERIC Educational Resources Information Center

    Colman, Sue

    1997-01-01

    Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…

  4. Zone Level Occupant-Responsive Building Energy Systems at the GSA

    SciTech Connect

    Robinson, Alastair

    2014-03-01

    The General Services Administration (GSA) partnered with the U.S. Department of Energy (DOE) to develop and implement building energy system retrofits, aiming to reduce energy consumption of at least two building systems by a total of 30 percent or more, as part of DOE’s Commercial Building Partnership (CBP) Program. Lawrence Berkeley National Laboratory (LBNL) provided technical expertise in support of this DOE program, working with the GSA and a team of consultants. This case study reports expected energy savings from appropriate energy efficient design and operations modifications to lighting and heating, ventilating and air conditioning (HVAC) systems at the selected study sites. These retrofits comprised installation of new lighting systems with dimming capability and occupancy-sensor control at the individual light fixture level, and utilized lighting system occupancy sensor signals to continually readjust zone-level ventilation airflow according to the number of people present, down to minimum rates when vacant.

  5. User Privacy in RFID Networks

    NASA Astrophysics Data System (ADS)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  6. Aspinall Courthouse: GSA's Historic Preservation and Net-Zero Renovation Case Study

    SciTech Connect

    Chang, R.; Hayter, S.; Hotchkiss, E.; Pless, S.; Sielcken, J.; Smith-Larney, C.

    2014-10-01

    The federal government is mandated with improving efficiency of buildings, incorporating renewable energy, and achieving net-zero energy operations where possible. These challenges led GSA to consider aligning historic preservation renovations with net-zero energy goals. The Wayne N. Aspinall Federal Building and U.S. Courthouse (Aspinall Courthouse), in Grand Junction, Colorado, is an example of a renovation project that aimed to accomplish both historic preservation and net-zero energy goals.

  7. Formation of Structure and Properties of Carbide-Free Bainite in Steel 30KhGSA

    NASA Astrophysics Data System (ADS)

    Panov, D. O.; Simonov, Yu. N.; Leont'ev, P. A.; Kaletin, A. Yu.; Georgiev, M. N.

    2016-05-01

    The process of formation of carbide-free bainite, its structure and properties in steel 30KhGSA are studied. The results of a dilatometric analysis are used to determine the temperature and time boundaries of formation of upper and lower carbide-free bainite. The methods of scanning and transmission electron microscopy are used to determine the special features of the structure of bainite as a function of the temperature of isothermal treatment.

  8. GSA's Green Proving Ground: Identifying, Testing and Evaluating Innovative Technologies; Preprint

    SciTech Connect

    Kandt, A.; Lowell, M.

    2012-05-01

    This paper will provide an overview of the GPG program and its objectives as well as a summary and status update of the 16 technologies selected for enhanced testing and evaluation in 2011. The federal government's General Services Administration's (GSA) Public Buildings Service (PBS) acquires space on behalf of the federal government through new construction and leasing, and acts as a caretaker for federal properties across the country. PBS owns or leases 9,624 assets and maintains an inventory of more than 370.2 million square feet of workspace, and as such has enormous potential for implementing energy efficient and renewable energy technologies to reduce energy and water use and associated emissions. The Green Proving Ground (GPG) program utilizes GSA's real estate portfolio to test and evaluate innovative and underutilized sustainable building technologies and practices. Findings are used to support the development of GSA performance specifications and inform decision making within GSA, other federal agencies, and the real estate industry. The program aims to drive innovation in environmental performance in federal buildings and help lead market transformation through deployment of new technologies. In 2011, the GPG program selected 16 technologies or practices for rigorous testing and evaluation. Evaluations are currently being performed in collaboration with the Department of Energy's National Laboratories, and a steady stream of results will be forthcoming throughout 2012. This paper will provide an overview of the GPG program and its objectives as well as a summary and status update of the 16 technologies selected for enhanced testing and evaluation in 2011. Lastly, it provides a general overview of the 2012 program.

  9. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  10. Speech privacy: Beyond architectural solutions

    NASA Astrophysics Data System (ADS)

    Mazer, Susan

    2005-09-01

    HIPAA regulations have brought unparalleled pressures on healthcare organizations to protect private and confidential information from reaching third parties. Yet, as this paper explains, often in the middle of noisy corridors and waiting rooms, this same information needs to be quickly transferred from physician to nurse to family member to others for the care of patients. Research and examples are presented that show that when families, patients, staff are participating together, although independently, in the same or adjacent spaces, the ``caf effect'' produces rising noise levels as each person competes to be heard. This threatens the very confidentiality demanded by HIPAA. Solutions to this problem are not easy or completely resolved by engineering or design specifications. This paper makes the case that it is ultimately the culture of a healthcare organization that determines the ``sound'' of a hospital, and any other organization that battles openness with privacy. It presents and discusses proven solutions to address culture in tandem with architectural and acoustic design interventions.

  11. δ-dependency for privacy-preserving XML data publishing.

    PubMed

    Landberg, Anders H; Nguyen, Kinh; Pardede, Eric; Rahayu, J Wenny

    2014-08-01

    An ever increasing amount of medical data such as electronic health records, is being collected, stored, shared and managed in large online health information systems and electronic medical record systems (EMR) (Williams et al., 2001; Virtanen, 2009; Huang and Liou, 2007) [1-3]. From such rich collections, data is often published in the form of census and statistical data sets for the purpose of knowledge sharing and enabling medical research. This brings with it an increasing need for protecting individual people privacy, and it becomes an issue of great importance especially when information about patients is exposed to the public. While the concept of data privacy has been comprehensively studied for relational data, models and algorithms addressing the distinct differences and complex structure of XML data are yet to be explored. Currently, the common compromise method is to convert private XML data into relational data for publication. This ad hoc approach results in significant loss of useful semantic information previously carried in the private XML data. Health data often has very complex structure, which is best expressed in XML. In fact, XML is the standard format for exchanging (e.g. HL7 version 3(1)) and publishing health information. Lack of means to deal directly with data in XML format is inevitably a serious drawback. In this paper we propose a novel privacy protection model for XML, and an algorithm for implementing this model. We provide general rules, both for transforming a private XML schema into a published XML schema, and for mapping private XML data to the new privacy-protected published XML data. In addition, we propose a new privacy property, δ-dependency, which can be applied to both relational and XML data, and that takes into consideration the hierarchical nature of sensitive data (as opposed to "quasi-identifiers"). Lastly, we provide an implementation of our model, algorithm and privacy property, and perform an experimental analysis

  12. Safety, security, hygiene and privacy in migrant farmworker housing.

    PubMed

    Arcury, Thomas A; Weir, Maria M; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F; Bischoff, Werner E; Quandt, Sara A

    2012-01-01

    Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed.

  13. SAFETY, SECURITY, HYGIENE AND PRIVACY IN MIGRANT FARMWORKER HOUSING

    PubMed Central

    Arcury, Thomas A.; Weir, Maria M.; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F.; Bischoff, Werner E.; Quandt, Sara A.

    2013-01-01

    Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed. PMID:22776578

  14. Will you accept the government's friend request? Social networks and privacy concerns.

    PubMed

    Siegel, David A

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  15. Tangled in a Complex Web of Relationships: Athletic/Academic Advisors Negotiating Privacy Disclosure Warnings with College Student-Athletes

    ERIC Educational Resources Information Center

    Thompson, Jason

    2013-01-01

    To investigate privacy management in the relationship between athletic/academic advisors and college student-athletes, I interviewed 37 advisors to address the following questions: What type of privacy rules do student-athletes communicate to advisors? How do advisors manage student-athletes' private information following these rules?…

  16. Extensive Nonadditivity of Privacy

    NASA Astrophysics Data System (ADS)

    Smith, Graeme; Smolin, John A.

    2009-09-01

    Quantum information theory establishes the ultimate limits on communication and cryptography in terms of channel capacities for various types of information. The private capacity is particularly important because it quantifies achievable rates of quantum key distribution. We study the power of quantum channels with limited private capacity, focusing on channels that dephase in random bases. These display extensive nonadditivity of private capacity: a channel with 2log⁡d input qubits that has a private capacity less than 2, but when used together with a second channel with zero private capacity, the joint capacity jumps to (1/2)log⁡d. In contrast to earlier work which found nonadditivity vanishing as a fraction of input size or conditional on unproven mathematical assumptions, this provides a natural setting manifesting nonadditivity of privacy of the strongest possible sort.

  17. Extensive nonadditivity of privacy.

    PubMed

    Smith, Graeme; Smolin, John A

    2009-09-18

    Quantum information theory establishes the ultimate limits on communication and cryptography in terms of channel capacities for various types of information. The private capacity is particularly important because it quantifies achievable rates of quantum key distribution. We study the power of quantum channels with limited private capacity, focusing on channels that dephase in random bases. These display extensive nonadditivity of private capacity: a channel with 2logd input qubits that has a private capacity less than 2, but when used together with a second channel with zero private capacity, the joint capacity jumps to (1/2)logd. In contrast to earlier work which found nonadditivity vanishing as a fraction of input size or conditional on unproven mathematical assumptions, this provides a natural setting manifesting nonadditivity of privacy of the strongest possible sort.

  18. META-GSA: Combining Findings from Gene-Set Analyses across Several Genome-Wide Association Studies

    PubMed Central

    Rosenberger, Albert; Friedrichs, Stefanie; Amos, Christopher I.; Brennan, Paul; Fehringer, Gordon; Heinrich, Joachim; Hung, Rayjean J.; Muley, Thomas; Müller-Nurasyid, Martina; Risch, Angela; Bickeböller, Heike

    2015-01-01

    Introduction Gene-set analysis (GSA) methods are used as complementary approaches to genome-wide association studies (GWASs). The single marker association estimates of a predefined set of genes are either contrasted with those of all remaining genes or with a null non-associated background. To pool the p-values from several GSAs, it is important to take into account the concordance of the observed patterns resulting from single marker association point estimates across any given gene set. Here we propose an enhanced version of Fisher’s inverse χ2-method META-GSA, however weighting each study to account for imperfect correlation between association patterns. Simulation and Power We investigated the performance of META-GSA by simulating GWASs with 500 cases and 500 controls at 100 diallelic markers in 20 different scenarios, simulating different relative risks between 1 and 1.5 in gene sets of 10 genes. Wilcoxon’s rank sum test was applied as GSA for each study. We found that META-GSA has greater power to discover truly associated gene sets than simple pooling of the p-values, by e.g. 59% versus 37%, when the true relative risk for 5 of 10 genes was assume to be 1.5. Under the null hypothesis of no difference in the true association pattern between the gene set of interest and the set of remaining genes, the results of both approaches are almost uncorrelated. We recommend not relying on p-values alone when combining the results of independent GSAs. Application We applied META-GSA to pool the results of four case-control GWASs of lung cancer risk (Central European Study and Toronto/Lunenfeld-Tanenbaum Research Institute Study; German Lung Cancer Study and MD Anderson Cancer Center Study), which had already been analyzed separately with four different GSA methods (EASE; SLAT, mSUMSTAT and GenGen). This application revealed the pathway GO0015291 “transmembrane transporter activity” as significantly enriched with associated genes (GSA-method: EASE, p = 0

  19. Privacy and Security Issues Surrounding the Protection of Data Generated by Continuous Glucose Monitors.

    PubMed

    Britton, Katherine E; Britton-Colonnese, Jennifer D

    2017-03-01

    Being able to track, analyze, and use data from continuous glucose monitors (CGMs) and through platforms and apps that communicate with CGMs helps achieve better outcomes and can advance the understanding of diabetes. The risks to patients' expectation of privacy are great, and their ability to control how their information is collected, stored, and used is virtually nonexistent. Patients' physical security is also at risk if adequate cybersecurity measures are not taken. Currently, data privacy and security protections are not robust enough to address the privacy and security risks and stymies the current and future benefits of CGM and the platforms and apps that communicate with them.

  20. Physical underpinnings of privacy

    NASA Astrophysics Data System (ADS)

    Renes, Joseph M.; Boileau, Jean-Christian

    2008-09-01

    One of the remarkable features of quantum mechanics is the ability to ensure secrecy. Private states embody this effect, as they are precisely those multipartite quantum states from which two parties can produce a shared secret that cannot under any circumstances be correlated with an external system. Naturally, these play an important role in quantum key distribution (QKD) and quantum information theory. However, a general distillation method has heretofore been missing. Inspired by Koashi’s complementary control scenario [M. Koashi, e-print arXiv:0704.3661 (2007)], we give a new definition of private states in terms of one party’s potential knowledge of two complementary measurements made on the other and use this to construct a general method of private state distillation using quantum error-correcting codes. The procedure achieves the same key rate as recent, more information-theoretic approaches while demonstrating the physical principles underlying privacy of the key. Additionally, the same approach can be used to establish the hashing inequality for entanglement distillation, as well as the direct quantum coding theorem.

  1. 77 FR 15835 - Privacy Act of 1974: Revision of Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... ADMINISTRATION Privacy Act of 1974: Revision of Privacy Act System of Records AGENCY: Small Business Administration (SBA). ACTION: Notice of Revision of Privacy Act Systems of Records. SUMMARY: SBA is revising the Privacy Act Systems of Records for the Loan System, SBA 21 (``SOR 21'') and the Suspension and...

  2. Proposed draft document for GSA office waste removal and procurement of densified refuse derived fuel for use as a supplemental fuel in GAS operated boilers

    NASA Astrophysics Data System (ADS)

    Campbell, J. A.

    1981-09-01

    A contract specifying waste collection and disposal from buildings managed by Government Services Administration (GSA) in the Washington, D. C. area and the production and delivery of pelletized fuel for burning with coal in one or two GSA steam generating plants is given.

  3. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration...

  4. Contract and beyond GEMnet status and accomplishments: GSA's energy and maintenance network

    SciTech Connect

    Piette, Mary Ann; Kinney, Satkartar; Levi, Mark; McBride, David; May, Stephen

    2002-05-01

    The U.S. General Services Administration Pacific Rim Region (Region 9), manages over 20 million gross square feet of federally owned office space, plus additional leased office space, for the federal government in California, Nevada, Arizona, Hawaii and the Pacific territories. To assist in this real estate management the Pacific Rim Region is developing the GSA Energy and Maintenance Network, or GEMnet. GEMnet is a collection of information technology initiatives, including remote monitoring and control to reduce operational costs by improving energy efficiency, reducing peak demand, and optimizing maintenance in buildings. Ultimately the various systems use a common database platform. This paper describes the status and plans for GEMnet, focusing on how it compares with related monitoring and information technology currently used in nonresidential buildings. This paper will also report on recent activities within the GEMnet purview, demand-shedding and retro-commissioning. For example, two large GSA office buildings in the San Francisco Bay Area participated in the California Independent System Operator (ISO) demand relief program (DRP) during the summer of 2001, shedding nearly 1 MW when called upon. In conjunction with the fielding of GEMnet related programs, a series of retro-commissioning projects is being implemented, scoped to the needs of particular buildings. Details on the BAS retro-commissioning at one building is presented.

  5. 78 FR 23204 - Privacy Act of 1974, System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-18

    ... Authority, the Equal Employment Opportunity Commission, the Office of Government Ethics, and other Federal... other media (photographs, audio recordings, diskettes, CD's etc) are stored in GSA-approved...

  6. 39 CFR 262.5 - Systems (Privacy).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a... 39 Postal Service 1 2011-07-01 2011-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system...

  7. 39 CFR 262.5 - Systems (Privacy).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION RECORDS AND INFORMATION MANAGEMENT DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system...

  8. Pass the Cookies and Uphold the Privacy.

    ERIC Educational Resources Information Center

    Guenther, Kim

    2001-01-01

    Considers how privacy issues related to online profiling affect library patrons and what librarians should do to protect them. Discusses the need for a privacy policy and provides guidelines from the OECD (Organisation for Economic Cooperation and Development) privacy statement generator that can be adapted for libraries. (LRW)

  9. Effective Management of Information Security and Privacy

    ERIC Educational Resources Information Center

    Anderson, Alicia

    2006-01-01

    No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…

  10. 78 FR 69552 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... Department of the Navy 32 CFR Part 701 Privacy Act; Implementation AGENCY: Department of the Navy, DoD... Privacy Act Program by adding the (k)(5) exemption to accurately describe the basis for exempting the... Department of the Navy Privacy Program rules that will exempt applicable Department records and/or...

  11. 78 FR 17471 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-21

    ... Internal Revenue Service Privacy Act of 1974 AGENCY: Internal Revenue Service, Treasury. ACTION: IRS notice...) and the Congressional committees responsible for oversight of the Privacy Act in accordance with the Privacy Act of 1974, OMB Guidelines on the Conduct of Matching Programs (54 FR 25818, June 19, 1989),...

  12. 75 FR 22577 - Proposed Privacy Policy Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... COMMISSION Proposed Privacy Policy Statement AGENCY: U.S. Election Assistance Commission. ACTION: Notice and request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99-...

  13. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 2 2011-04-01 2011-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  14. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance: Treasury 1 2013-07-01 2013-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  15. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  16. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  17. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 2 2012-04-01 2012-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  18. 75 FR 61994 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-07

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC25 Privacy Act; Implementation AGENCY: Office of Foreign... requirements of the Privacy Act of 1974, as amended, the Department of the Treasury is amending its regulations... records by revising the number and title of the Privacy Act system of records for which an exemption...

  19. 76 FR 71293 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-17

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC37 Privacy Act; Implementation AGENCY: Office of the Secretary, Treasury. ACTION: Proposed rule. SUMMARY: In accordance with the requirements of the Privacy Act... Identification Number Records'' from certain provisions of the Privacy Act. DATES: Comments must be received...

  20. 78 FR 69550 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD... updating the DIA Privacy Act Program by adding the (k)(2) and (k)(5) exemptions to accurately describe the... rules. These changes will allow the Department to add exemption rules to the DIA Privacy Program...

  1. 78 FR 69551 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD... proposing to update the DIA Privacy Act Program by adding the (k)(2) and (k)(5) exemptions to accurately... exemption rules to the DIA Privacy Program rules that will exempt applicable Department records...

  2. 76 FR 49661 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... Office of the Secretary 32 CFR Part 323 Privacy Act; Implementation AGENCY: Defense Logistics Agency, DoD... updating the DLA Privacy Act Program Rules by updating the language of the (k)(2) exemption. The update of the exemption will more accurately describe the basis for exempting the records. The Privacy...

  3. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance: Treasury 1 2012-07-01 2012-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  4. Sexiled: Privacy Acquisition Strategies of College Roommates

    ERIC Educational Resources Information Center

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  5. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  6. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 5 2014-04-01 2014-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  7. 75 FR 54162 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-03

    ... Services [CMS Computer Match No. 2010-01; HHS Computer Match No. 1006] Privacy Act of 1974 AGENCY...: Notice of Computer Matching Program (CMP). SUMMARY: In accordance with the requirements of the Privacy.... The Privacy Act provides an opportunity for interested persons to comment on the proposed...

  8. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  9. 77 FR 56771 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-14

    ... Department of the Navy 32 CFR Part 701 Privacy Act; Implementation AGENCY: Department of the Navy, DoD... Privacy Act Program by adding the (k)(2) exemption to accurately describe the basis for exempting the... nonsubstantive changes dealing with DoD's management of its Privacy Programs. DoD expects no opposition to...

  10. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 2 2014-04-01 2014-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  11. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 2 2013-04-01 2013-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  12. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  13. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  14. 77 FR 57015 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD... that have been previously claimed for the records in another Privacy Act system of records. DIA is updating the DIA Privacy Act Program by adding the (k)(2) and (k)(5) exemptions to accurately describe...

  15. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 5 2013-04-01 2013-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  16. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 5 2011-04-01 2011-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  17. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance: Treasury 1 2011-07-01 2011-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  18. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 5 2012-04-01 2012-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  19. 75 FR 65229 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-22

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC26 Privacy Act; Implementation AGENCY: Departmental... of the Privacy Act of 1974, as amended, the Department of the Treasury is revising the title of an... FURTHER INFORMATION CONTACT: Dale Underwood, Privacy Act officer, Department of the Treasury,...

  20. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  1. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 1 2014-07-01 2014-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  2. PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems

    PubMed Central

    Xu, Chang; Lu, Rongxing; Wang, Huaxiong; Zhu, Liehuang; Huang, Cheng

    2017-01-01

    Air pollution has become one of the most pressing environmental issues in recent years. According to a World Health Organization (WHO) report, air pollution has led to the deaths of millions of people worldwide. Accordingly, expensive and complex air-monitoring instruments have been exploited to measure air pollution. Comparatively, a vehicle sensing system (VSS), as it can be effectively used for many purposes and can bring huge financial benefits in reducing high maintenance and repair costs, has received considerable attention. However, the privacy issues of VSS including vehicles’ location privacy have not been well addressed. Therefore, in this paper, we propose a new privacy-preserving data aggregation scheme, called PAVS, for VSS. Specifically, PAVS combines privacy-preserving classification and privacy-preserving statistics on both the mean E(·) and variance Var(·), which makes VSS more promising, as, with minimal privacy leakage, more vehicles are willing to participate in sensing. Detailed analysis shows that the proposed PAVS can achieve the properties of privacy preservation, data accuracy and scalability. In addition, the performance evaluations via extensive simulations also demonstrate its efficiency. PMID:28273795

  3. PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems.

    PubMed

    Xu, Chang; Lu, Rongxing; Wang, Huaxiong; Zhu, Liehuang; Huang, Cheng

    2017-03-03

    Air pollution has become one of the most pressing environmental issues in recent years. According to a World Health Organization (WHO) report, air pollution has led to the deaths of millions of people worldwide. Accordingly, expensive and complex air-monitoring instruments have been exploited to measure air pollution. Comparatively, a vehicle sensing system (VSS), as it can be effectively used for many purposes and can bring huge financial benefits in reducing high maintenance and repair costs, has received considerable attention. However, the privacy issues of VSS including vehicles' location privacy have not been well addressed. Therefore, in this paper, we propose a new privacy-preserving data aggregation scheme, called PAVS, for VSS. Specifically, PAVS combines privacy-preserving classification and privacy-preserving statistics on both the mean E(·) and variance Var(·), which makes VSS more promising, as, with minimal privacy leakage, more vehicles are willing to participate in sensing. Detailed analysis shows that the proposed PAVS can achieve the properties of privacy preservation, data accuracy and scalability. In addition, the performance evaluations via extensive simulations also demonstrate its efficiency.

  4. HIPAA Privacy 101: essentials for case management practice.

    PubMed

    DiBenedetto, Deborah V

    2003-01-01

    The Health Insurance Portability and Accountability Act (HIPAA) has significant impact on the delivery of healthcare in the United States. The Administrative Simplification (AS) requirements of HIPAA are aimed at reducing administrative costs and burdens in the healthcare industry. The core components of HIPAA's AS requirements address healthcare transactions, code sets, security, unique identifiers, and privacy of health information. HIPAA's privacy standard limits the nonconsensual use and release of private health information, gives patients new rights to access their medical records and to know who else has accessed them, restricts most disclosure of health information to the minimum needed for the intended purpose, establishes new criminal and civil sanctions for improper use or disclosure, and establishes new requirements for access to records by researchers and others. This article focuses on HIPAA's privacy requirements as related to case management of workers compensation populations, the treatment of protected health information, and how case managers can ensure they provide appropriate services while navigating the requirements of HIPAA's privacy standard.

  5. Digression and Value Concatenation to Enable Privacy-Preserving Regression

    PubMed Central

    Li, Xiao-Bai; Sarkar, Sumit

    2015-01-01

    Regression techniques can be used not only for legitimate data analysis, but also to infer private information about individuals. In this paper, we demonstrate that regression trees, a popular data-analysis and data-mining technique, can be used to effectively reveal individuals’ sensitive data. This problem, which we call a “regression attack,” has not been addressed in the data privacy literature, and existing privacy-preserving techniques are not appropriate in coping with this problem. We propose a new approach to counter regression attacks. To protect against privacy disclosure, our approach introduces a novel measure, called digression, which assesses the sensitive value disclosure risk in the process of building a regression tree model. Specifically, we develop an algorithm that uses the measure for pruning the tree to limit disclosure of sensitive data. We also propose a dynamic value-concatenation method for anonymizing data, which better preserves data utility than a user-defined generalization scheme commonly used in existing approaches. Our approach can be used for anonymizing both numeric and categorical data. An experimental study is conducted using real-world financial, economic and healthcare data. The results of the experiments demonstrate that the proposed approach is very effective in protecting data privacy while preserving data quality for research and analysis. PMID:26752802

  6. [Mental Health Centers, in regard to professional confidentiality and privacy].

    PubMed

    Catanesi, Roberto; Carabellese, Felice

    2012-01-01

    Maintaining privacy in the complex operative reality of public psychiatric services is not easy. Many operational doubts arise and psychiatrists encounter difficulties in application of the privacy norms, partly due to the clinical and treatment peculiarities of the psychiatric domain and partly to organizational and structural limits. The risk addressed in this work is that the apparent complexity of the privacy norms may be perceived by psychiatrists in the public sector simply as a further bureaucratization of the doctor-patient relationship rather than as an opportunity to institute greater safeguards of patients' rights. Hence, the Authors aim to clarify the key points of the law, integrating them with the classic issues of confidentiality, in order to outline the goals, provide suggestions as to how best to adapt practice to conform to these norms, and highlight ways to simplify procedures. The Authors conclude by expressing the hope that the principles embodied in the privacy norms may become an integral part of the cultural heritage of territorial psychiatric services.

  7. Privacy and security of patient data in the pathology laboratory

    PubMed Central

    Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904

  8. Privacy and security of patient data in the pathology laboratory.

    PubMed

    Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.

  9. Privacy-enhanced electronic mail

    NASA Astrophysics Data System (ADS)

    Bishop, Matt

    1990-06-01

    The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.

  10. The development of specifications and discussion of business models for ensuring speech privacy in the healthcare industry

    NASA Astrophysics Data System (ADS)

    Lavallee, Timothy; Good, Kenneth; Sykes, David

    2005-09-01

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was developed, among other reasons, to hold healthcare providers accountable for the privacy of patient's personal and medical information. It includes language addressing the need for ``reasonable safeguards'' for speech privacy and oral communication in a healthcare setting. After 50 years of development, speech privacy science and mechanisms are well understood. However, current specifications cannot be directly applied and are not specifically written to address the application of the current acoustical knowledgebase to the health care industry's need for compliance. This is a discussion of the state of existing privacy technology and specifications; the ability and availability of mechanisms currently in the health care industry as a possible route for implementation of the regulation; the state of development of specification to address specifically the industry's needs; and a potential business model for implementation.

  11. The Privacy War: Enabling Siblings the Right to Privacy.

    ERIC Educational Resources Information Center

    Sagarese, Margaret; Giannetti, Charlene

    2003-01-01

    Polled adolescents, parents, and teachers to determine where the child's right to privacy ends and the parent's responsibility to protect begins. Results indicate that the worst offenders tend to be siblings. The paper presents a three-pronged strategy to help parents deal with battling children: recognize the breaches, negotiate the truce…

  12. Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges.

    PubMed

    Sajid, Anam; Abbas, Haider

    2016-06-01

    The widespread deployment and utility of Wireless Body Area Networks (WBAN's) in healthcare systems required new technologies like Internet of Things (IoT) and cloud computing, that are able to deal with the storage and processing limitations of WBAN's. This amalgamation of WBAN-based healthcare systems to cloud-based healthcare systems gave rise to serious privacy concerns to the sensitive healthcare data. Hence, there is a need for the proactive identification and effective mitigation mechanisms for these patient's data privacy concerns that pose continuous threats to the integrity and stability of the healthcare environment. For this purpose, a systematic literature review has been conducted that presents a clear picture of the privacy concerns of patient's data in cloud-assisted healthcare systems and analyzed the mechanisms that are recently proposed by the research community. The methodology used for conducting the review was based on Kitchenham guidelines. Results from the review show that most of the patient's data privacy techniques do not fully address the privacy concerns and therefore require more efforts. The summary presented in this paper would help in setting research directions for the techniques and mechanisms that are needed to address the patient's data privacy concerns in a balanced and light-weight manner by considering all the aspects and limitations of the cloud-assisted healthcare systems.

  13. Privacy and data security in E-health: requirements from the user's perspective.

    PubMed

    Wilkowska, Wiktoria; Ziefle, Martina

    2012-09-01

    In this study two currently relevant aspects of using medical assistive technologies were addressed-security and privacy. In a two-step empirical approach that used focus groups (n = 19) and a survey (n = 104), users' requirements for the use of medical technologies were collected and evaluated. Specifically, we focused on the perceived importance of data security and privacy issues. Outcomes showed that both security and privacy aspects play an important role in the successful adoption of medical assistive technologies in the home environment. In particular, analysis of data with respect to gender, health-status and age (young, middle-aged and old users) revealed that females and healthy adults require, and insist on, the highest security and privacy standards compared with males and the ailing elderly.

  14. Re-Assessing Green Building Performance: A Post Occupancy Evaluation of 22 GSA Buildings

    SciTech Connect

    Fowler, Kimberly M.; Rauch, Emily M.; Henderson, Jordan W.; Kora, Angela R.

    2010-06-01

    2nd report on the performance of GSA's sustainably designed buildings. The purpose of this study was to provide an overview of measured whole building performance as it compares to GSA and industry baselines. The PNNL research team found the data analysis illuminated strengths and weaknesses of individual buildings as well as the portfolio of buildings. This section includes summary data, observations that cross multiple performance metrics, discussion of lessons learned from this research, and opportunities for future research. The summary of annual data for each of the performance metrics is provided in Table 25. The data represent 1 year of measurements and are not associated with any specific design features or strategies. Where available, multiple years of data were examined and there were minimal significant differences between the years. Individually focused post occupancy evaluation (POEs) would allow for more detailed analysis of the buildings. Examining building performance over multiple years could potentially offer a useful diagnostic tool for identifying building operations that are in need of operational changes. Investigating what the connection is between the building performance and the design intent would offer potential design guidance and possible insight into building operation strategies. The 'aggregate operating cost' metric used in this study represents the costs that were available for developing a comparative industry baseline for office buildings. The costs include water utilities, energy utilities, general maintenance, grounds maintenance, waste and recycling, and janitorial costs. Three of the buildings that cost more than the baseline in Figure 45 have higher maintenance costs than the baseline, and one has higher energy costs. Given the volume of data collected and analyzed for this study, the inevitable request is for a simple answer with respect to sustainably designed building performance. As previously stated, compiling the

  15. 41 CFR 105-64.106 - What is GSA's policy on information accuracy in a system of records?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What is GSA's policy on information accuracy in a system of records? 105-64.106 Section 105-64.106 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES...

  16. 41 CFR 105-64.106 - What is GSA's policy on information accuracy in a system of records?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is GSA's policy on information accuracy in a system of records? 105-64.106 Section 105-64.106 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES...

  17. 41 CFR 105-64.106 - What is GSA's policy on information accuracy in a system of records?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What is GSA's policy on information accuracy in a system of records? 105-64.106 Section 105-64.106 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES...

  18. 41 CFR 105-64.106 - What is GSA's policy on information accuracy in a system of records?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What is GSA's policy on information accuracy in a system of records? 105-64.106 Section 105-64.106 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES...

  19. 41 CFR 105-64.111 - What is GSA's policy on directives that may conflict with this part?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is GSA's policy on directives that may conflict with this part? 105-64.111 Section 105-64.111 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES...

  20. Pulse shaping for 112 Gbit/s polarization multiplexed 16-QAM signals using a 21 GSa/s DAC.

    PubMed

    Cartledge, John C; Downie, John D; Hurley, Jason E; Karar, Abdullah S; Jiang, Ying; Roberts, Kim

    2011-12-12

    The implications of increasing the symbol rate for a given digital-to-analog converter (DAC) sampling rate are investigated by considering the generation of 112 Gbit/s PM 16-QAM signals (14 Gsym/s) using a 21 GSa/s DAC with 6-bit resolution.

  1. 41 CFR 102-192.90 - What must we include in our annual mail management report to GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What must we include in our annual mail management report to GSA? 102-192.90 Section 102-192.90 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT...

  2. 41 CFR 102-36.55 - What is GSA's role in the disposition of excess personal property?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is GSA's role in the disposition of excess personal property? 102-36.55 Section 102-36.55 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 36-DISPOSITION OF...

  3. 41 CFR 102-118.510 - Can my agency revise or alter a GSA Form 7931, Certificate of Settlement?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Can my agency revise or... Information for All Claims § 102-118.510 Can my agency revise or alter a GSA Form 7931, Certificate...

  4. 48 CFR 552.212-71 - Contract Terms and Conditions Applicable to GSA Acquisition of Commercial Items.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Acquisition Regulations System GENERAL SERVICES ADMINISTRATION CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 552.212-71 Contract Terms and Conditions Applicable to GSA Acquisition of Commercial Items. As prescribed in 512.301(a)(2), insert the following clause: Contract...

  5. 41 CFR 105-64.103 - What is GSA's policy on collecting and using information in a system of records?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... collecting and using information in a system of records? 105-64.103 Section 105-64.103 Public Contracts and... Responsibilities § 105-64.103 What is GSA's policy on collecting and using information in a system of records? System managers must collect information that is used to determine your rights, benefits, or...

  6. 41 CFR 105-64.103 - What is GSA's policy on collecting and using information in a system of records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... collecting and using information in a system of records? 105-64.103 Section 105-64.103 Public Contracts and... Responsibilities § 105-64.103 What is GSA's policy on collecting and using information in a system of records? System managers must collect information that is used to determine your rights, benefits, or...

  7. 41 CFR 105-64.103 - What is GSA's policy on collecting and using information in a system of records?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... collecting and using information in a system of records? 105-64.103 Section 105-64.103 Public Contracts and... Responsibilities § 105-64.103 What is GSA's policy on collecting and using information in a system of records? System managers must collect information that is used to determine your rights, benefits, or...

  8. 41 CFR 105-64.103 - What is GSA's policy on collecting and using information in a system of records?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... collecting and using information in a system of records? 105-64.103 Section 105-64.103 Public Contracts and... Responsibilities § 105-64.103 What is GSA's policy on collecting and using information in a system of records? System managers must collect information that is used to determine your rights, benefits, or...

  9. 41 CFR 105-64.103 - What is GSA's policy on collecting and using information in a system of records?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... collecting and using information in a system of records? 105-64.103 Section 105-64.103 Public Contracts and... Responsibilities § 105-64.103 What is GSA's policy on collecting and using information in a system of records? System managers must collect information that is used to determine your rights, benefits, or...

  10. 5 CFR 6701.104 - Prohibited purchases of real estate by certain GSA employees involved in the acquisition or...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Prohibited purchases of real estate by certain GSA employees involved in the acquisition or disposal of real estate. 6701.104 Section 6701.104... OF THE GENERAL SERVICES ADMINISTRATION § 6701.104 Prohibited purchases of real estate by certain...

  11. 41 CFR 102-72.90 - What are Executive agencies' responsibilities under a security delegation of authority from GSA?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What are Executive... What are Executive agencies' responsibilities under a security delegation of authority from GSA? Law enforcement and related security functions were transferred to the Department of Homeland Security upon...

  12. 41 CFR 102-72.90 - What are Executive agencies' responsibilities under a security delegation of authority from GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What are Executive... What are Executive agencies' responsibilities under a security delegation of authority from GSA? Law enforcement and related security functions were transferred to the Department of Homeland Security upon...

  13. 41 CFR 102-41.30 - What is GSA's role in the disposition of property covered by this part?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is GSA's role in... Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT... official use. (2) In the event that the property is not ordered by competent authority to be forfeited...

  14. 41 CFR 102-2.85 - What are the reasons for writing to GSA about FMR deviations?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What are the reasons for writing to GSA about FMR deviations? 102-2.85 Section 102-2.85 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION GENERAL...

  15. 41 CFR 102-2.85 - What are the reasons for writing to GSA about FMR deviations?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What are the reasons for writing to GSA about FMR deviations? 102-2.85 Section 102-2.85 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION GENERAL...

  16. 41 CFR 102-2.85 - What are the reasons for writing to GSA about FMR deviations?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are the reasons for writing to GSA about FMR deviations? 102-2.85 Section 102-2.85 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION GENERAL...

  17. 41 CFR 102-2.85 - What are the reasons for writing to GSA about FMR deviations?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What are the reasons for writing to GSA about FMR deviations? 102-2.85 Section 102-2.85 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION GENERAL...

  18. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is the scope and philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5...) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 71-GENERAL § 102-71.5 What is the scope and philosophy of...

  19. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy.

    PubMed

    Mulligan, Deirdre K; Koopman, Colin; Doty, Nick

    2016-12-28

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy's disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy's essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy's multiple uses across multiple contexts.This article is part of the themed issue 'The ethical impact of data science'.

  20. Comprehensive quantitative analysis on privacy leak behavior.

    PubMed

    Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan

    2013-01-01

    Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects.

  1. Comprehensive Quantitative Analysis on Privacy Leak Behavior

    PubMed Central

    Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan

    2013-01-01

    Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects. PMID:24066046

  2. Public Perspectives of Mobile Phones' Effects on Healthcare Quality and Medical Data Security and Privacy: A 2-Year Nationwide Survey.

    PubMed

    Richardson, Joshua E; Ancker, Jessica S

    2015-01-01

    Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician's electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized.

  3. Public Perspectives of Mobile Phones’ Effects on Healthcare Quality and Medical Data Security and Privacy: A 2-Year Nationwide Survey

    PubMed Central

    Richardson, Joshua E.; Ancker, Jessica S.

    2015-01-01

    Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician’s electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized. PMID:26958246

  4. Panel: RFID Security and Privacy

    NASA Astrophysics Data System (ADS)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  5. Patient privacy and social media.

    PubMed

    Hader, Amy L; Brown, Evan D

    2010-08-01

    Healthcare providers using social media must remain mindful of professional boundaries and patients' privacy rights. Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics.

  6. 76 FR 59073 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-23

    ...: Consistent with the Privacy Act (PA), the Central Intelligence Agency (CIA) has undertaken and completed a... clearly reflect the current CIA organizational structure and policies and practices, and to eliminate... Act (PA), the CIA has undertaken and completed a review of its public PA regulations. As a result...

  7. MedlinePlus: Privacy Policy

    MedlinePlus

    ... are available at: http://www.addthis.com/privacy . Go.USA.Gov and Bit.ly NLM uses the Go.USA.gov and Bit.ly URL shortening services. ... shortened URLs. The analytics data is provided by Go.USA.Gov and Bit.ly. This data does ...

  8. Facebook: When Education Meets Privacy

    ERIC Educational Resources Information Center

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  9. Personal Privacy and the Archivist.

    ERIC Educational Resources Information Center

    Raaska, Helmi

    This discussion of the protection of privacy as it relates to archival functions draws on the procedures followed by three repositories: the Gerald R. Ford Presidential Library (NLF), the Michigan Historical Collections (MHC) at the University of Michigan, and the Walter P. Reuther Library of Labor and Urban Affairs (Reuther Library) at Wayne…

  10. Privacy and Security: A Bibliography.

    ERIC Educational Resources Information Center

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  11. The Paradoxical Value of Privacy

    DTIC Science & Technology

    2003-03-14

    on occurrence of identity theft correlated with consumer behavior so that probabilities of at least such clear privacy problems could be assigned to...now. And, the market typically needs to learn from experience, so consumer behavior is likely to lag behind any current reality. So one answer is that

  12. 78 FR 46256 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code...

  13. Children's Privacy and Children's Copyright

    EPA Pesticide Factsheets

    This document establishes the policy for protecting the privacy of children on the EPA public access website and the EPA Intranet and also establishes policy on copyright issues related to works created by and submitted to EPA by children both online and offline.

  14. The privacy rule that's not.

    PubMed

    Sobel, Richard

    2007-01-01

    HIPAA is often described as a privacy rule. It is not. In fact, HIPAA is a disclosure regulation, and it has effectively dismantled the longstanding moral and legal tradition of patient confidentiality. By permitting broad and easy dissemination of patients' medical information, with no audit trails for most disclosures, it has undermined both medical ethics and the effectiveness of medical care.

  15. College and University Privacy Leadership

    ERIC Educational Resources Information Center

    Showalter, Rodney J.

    2009-01-01

    Beginning in the late 1990s, international corporations began hiring Chief Privacy Officers (CPOs). By 2002, large universities responded to this trend by creating this distinct position or modifying an existing job description to include CPO responsibilities. While not every registrar assumes the role of CPO, increasing practical and legislative…

  16. Privacy-protecting video surveillance

    NASA Astrophysics Data System (ADS)

    Wickramasuriya, Jehan; Alhazzazi, Mohanned; Datt, Mahesh; Mehrotra, Sharad; Venkatasubramanian, Nalini

    2005-02-01

    Forms of surveillance are very quickly becoming an integral part of crime control policy, crisis management, social control theory and community consciousness. In turn, it has been used as a simple and effective solution to many of these problems. However, privacy-related concerns have been expressed over the development and deployment of this technology. Used properly, video cameras help expose wrongdoing but typically come at the cost of privacy to those not involved in any maleficent activity. This work describes the design and implementation of a real-time, privacy-protecting video surveillance infrastructure that fuses additional sensor information (e.g. Radio-frequency Identification) with video streams and an access control framework in order to make decisions about how and when to display the individuals under surveillance. This video surveillance system is a particular instance of a more general paradigm of privacy-protecting data collection. In this paper we describe in detail the video processing techniques used in order to achieve real-time tracking of users in pervasive spaces while utilizing the additional sensor data provided by various instrumented sensors. In particular, we discuss background modeling techniques, object tracking and implementation techniques that pertain to the overall development of this system.

  17. Providing Source-Location Privacy in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Li, Yun; Ren, Jian

    Wireless sensor networks (WSN) have been widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized detection, interception and and even node capture. Privacy is becoming one of the major issues that jeopardize the successful deployment and survivability of wireless sensor networks. While confidentiality of the message can be ensured through content encryption, it is much more difficult to adequately address the source-location privacy. For WSN, source-location privacy service is further complicated by the fact that the sensor nodes consist of low-cost and low-power radio devices, computationally intensive cryptographic algorithms (such as public-key cryptosystems) and large scale broadcasting-based protocols are not suitable for WSN. In this paper, we propose a two-step routing strategy for the messages to be routed from the actual source node to the SINK node through either a single, or multiple, randomly selected intermediate node(s) away from the source node so that it is to make it infeasible for the adversaries to trace back to the source node through hop-by-hop routing analysis. In the first protocol, the messages will be routed to a single intermediate node. This scheme can provide very good local source-location privacy. We also propose routing through multiple randomly selected intermediate nodes based on angle and quadrant to further improve the performance and security. While providing source-location privacy for WSN, our simulation results demonstrate that the proposed schemes are very efficient in energy consumption, and transmission latency. The proposed schemes can also assurance high message delivery ratio. Therefore, they can be used for many practical applications.

  18. GcoGSA-BA: a global core genome SNP analysis for Bacillus anthracis.

    PubMed

    Yamashita, Akifmi; Sekizuka, Tsuyoshi; Kuroda, Makoto

    2015-01-01

    As an issue of biosecurity, it is important to identify the origin of a suspected sample to distinguish whether it originated from the release of a bioterrorism agent or from environmental contamination with a virulent agent. Here we have developed an analytical pipeline that can infer the phylogenetic position of Bacillus cereus group species, including B. anthracis, from next-generation sequencing reads without extensive genomics skills. GcoGSA-BA can also detect the existence of anthrax plasmid pXO1 carrying 3 anthrax toxins (lethal factor, edema factor, and protective antigen). This pipeline can also be used to correctly infer the phylogenetic position and to detect the suspected isolate carrying anthrax toxins among B. cereus group.

  19. GSA/ExxonMobil Bighorn Basin Field Award - getting students into the field each summer

    NASA Astrophysics Data System (ADS)

    Nocerino, J.

    2010-12-01

    Field schools have long been a mainstay for geoscience education. They offer an intensive hands-on experience while using classroom and laboratory knowledge to solve geological problems in the field. Their importance to practicing geologists is unquestionable; however, the opportunities to experience field geology are dwindling. GSA, in cooperation with ExxonMobil, are currently offering 20 undergraduate and 5 faculty members a one week field course where they can learn practical, multi-disciplinary integrated basin exploration. In this annual, all expenses paid course, students and professors are placed into five teams through which mentoring is encouraged, activities are completed, and a final group presentation is prepared. This program provides an example of how a non-profit and industry can work together for the benefit of undergraduate students.

  20. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section 332.2 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form...

  1. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Model privacy form and examples. 160.2 Section 160.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A...

  2. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  3. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  4. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  5. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  6. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  7. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  8. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  9. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendixA of this part, consistent with the instructions in...

  10. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  11. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the...

  12. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  13. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  14. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  15. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  16. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  17. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  18. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  19. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  20. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  1. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  2. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  3. 6 CFR 1002.4 - Responses to Privacy Act requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Responses to Privacy Act requests. 1002.4 Section 1002.4 Domestic Security PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 1002.4 Responses to Privacy Act requests. (a) Acknowledgement. The Privacy Act...

  4. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  5. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  6. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  7. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Model privacy form and... (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A...

  8. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  9. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 13 Business Credit and Assistance 1 2014-01-01 2014-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  10. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  11. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  12. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  13. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  14. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  15. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  16. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 13 Business Credit and Assistance 1 2013-01-01 2013-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  17. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  18. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  19. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  20. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-25

    ... compliance fundamentals, privacy and data security, and the privacy compliance life cycle. A learning lunch... SECURITY Office of the Secretary Public Workshop: Privacy Compliance Workshop AGENCY: Privacy Office, DHS. ACTION: Notice Announcing Public Workshop. SUMMARY: The Department of Homeland Security Privacy...

  1. Biobank research and the right to privacy.

    PubMed

    Ursin, Lars Oystein

    2008-01-01

    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants in biobank research might have to privacy, it is argued that their interests should be related to the specific context of the provision and reception of health care that participation in biobank research is connected with. Rather than just granting participants an exclusive right to or ownership of their health information, which must be waived in order to make biobank research possible, the privacy aspect of health information should be viewed in light of the moral rights and duties that accompany any involvement in a research based system of health services.

  2. 78 FR 39021 - Privacy Act of 1974; Privacy and Civil Liberties Oversight Board; System of Records Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-28

    ... From the Federal Register Online via the Government Publishing Office PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD Privacy Act of 1974; Privacy and Civil Liberties Oversight Board; System of Records Notice AGENCY: Privacy and Civil Liberties Oversight Board. ACTION: Notice of Privacy Act system of...

  3. 75 FR 44803 - Privacy Act of 1974; Notice of a New Privacy Act System of Records (SORN), Ginnie Mae Master...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-29

    ... URBAN DEVELOPMENT Privacy Act of 1974; Notice of a New Privacy Act System of Records (SORN), Ginnie Mae... Privacy Act SORN. SUMMARY: The Department proposes to establish a new Privacy Act SORN subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. The Ginne Mae Master Subservicer System will be used...

  4. Informational Privacy and the Public's Health: The Model State Public Health Privacy Act

    PubMed Central

    Gostin, Lawrence O.; Hodge, James G.; Valdiserri, Ronald O.

    2001-01-01

    Protecting public health requires the acquisition, use, and storage of extensive health-related information about individuals. The electronic accumulation and exchange of personal data promises significant public health benefits but also threatens individual privacy; breaches of privacy can lead to individual discrimination in employment, insurance, and government programs. Individuals concerned about privacy invasions may avoid clinical or public health tests, treatments, or research. Although individual privacy protections are critical, comprehensive federal privacy protections do not adequately protect public health data, and existing state privacy laws are inconsistent and fragmented. The Model State Public Health Privacy Act provides strong privacy safeguards for public health data while preserving the ability of state and local public health departments to act for the common good. PMID:11527765

  5. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    PubMed

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  6. Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Burghardt, Thorben; Buchmann, Erik; Müller, Jens; Böhm, Klemens

    Location based services (LBS) let people retrieve and share information related to their current position. Examples are Google Latitude or Panoramio. Since LBS share user-related content, location information etc., they put user privacy at risk. Literature has proposed various privacy mechanisms for LBS. However, it is unclear which mechanisms humans really find useful, and how they make use of them. We present a user study that addresses these issues. To obtain realistic results, we have implemented a geotagging application on the web and on GPS cellphones, and our study participants use this application in their daily lives. We test five privacy mechanisms that differ in the awareness, mental effort and degree of informedness required from the users. Among other findings, we have observed that in situations where a single simple mechanism does not meet all privacy needs, people want to use simple and sophisticated mechanisms in combination. Further, individuals are concerned about the privacy of others, even when they do not value privacy for themselves.

  7. [Patients' perception about privacy in the hospital].

    PubMed

    Pupulim, Jussara Simone Lenzi; Sawada, Namie Okino

    2012-01-01

    This qualitative study aimed to describe the hospitalized patient's perception on privacy, using the content analysis. Thirty-four patients, who have been at least three days hospitalized, participated in the study. The analysis of the information was based on the theoretical reference framework of privacy, and evidenced three thematic categories: dignity and respect, autonomy, personal and territorial space. The subjects pointed out behavioral factors, which contribute or not for the protection and maintenance of the privacy in the hospital, highlighting respect as the most important aspect, followed by personal control over situations that violate privacy. Patients believe that privacy is linked to dignity and respect, depends on the demarcation of the personal/territorial space and the autonomy's security; and that these concepts and attitudes are connected and essential to protect privacy in the hospital context.

  8. Genetic privacy: orthodoxy or oxymoron?

    PubMed Central

    Sommerville, A; English, V

    1999-01-01

    In this paper we question whether the concept of "genetic privacy" is a contradiction in terms. And, if so, whether the implications of such a conclusion, inevitably impact on how society comes to perceive privacy and responsibility generally. Current law and ethical discourse place a high value on self-determination and the rights of individuals. In the medical sphere, the recognition of patient "rights" has resulted in health professionals being given clear duties of candour and frankness. Dilemmas arise, however, when patients decline to know relevant information or, knowing it, refuse to share it with others who may also need to know. This paper considers the notions of interconnectedness and responsibility to others which are brought to the fore in the genetic sphere and which challenge the primacy afforded to personal autonomy. It also explores the extent to which an individual's perceived moral obligations can or should be enforced. PMID:10226920

  9. Privacy and security in teleradiology.

    PubMed

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  10. Trust and Privacy in Healthcare

    NASA Astrophysics Data System (ADS)

    Singleton, Peter; Kalra, Dipak

    This paper considers issues of trust and privacy in healthcare around increased data-sharing through Electronic Health Records (EHRs). It uses a model structured around different aspects of trust in the healthcare organisation’s reasons for greater data-sharing and their ability to execute EHR projects, particularly any associated confidentiality controls. It reflects the individual’s personal circumstances and attitude to use of health records.

  11. Fictional privacy among Facebook users.

    PubMed

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  12. Social Network Privacy via Evolving Access Control

    NASA Astrophysics Data System (ADS)

    di Crescenzo, Giovanni; Lipton, Richard J.

    We study the problem of limiting privacy loss due to data shared in a social network, where the basic underlying assumptions are that users are interested in sharing data and cannot be assumed to constantly follow appropriate privacy policies. Note that if these two assumptions do not hold, social network privacy is theoretically very easy to achieve; for instance, via some form of access control and confidentiality transformation on the data.

  13. Patient Privacy: A Consumer Protection Approach

    PubMed Central

    Brannigan, Vincent M.

    1983-01-01

    In the United States, a “Constitutional Analysis” of medical data privacy has been so far unsuccessful in obtaining significant protection. Statutory protection has evolved primarily to protect the citizen against the state, not to vindicate the privacy interest of the individual. A “Consumer Protection” approach rather than a right to privacy approach can be used to develop a coherent, practical approach to the needs of various parties in the health care system in the U.S.

  14. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    PubMed

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  15. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... From the Federal Register Online via the Government Publishing Office NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and...: Patti F. Stockman, Privacy Act Officer, Office of the Chief Information Officer, National...

  16. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... candidates for and recipients of training associated with ] NASA Astronaut and Human Space Flight Programs... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Each...

  17. The Dimensions of Privacy: A National Opinion Research Survey of Attitudes Toward Privacy.

    ERIC Educational Resources Information Center

    Westin, Alan F.; And Others

    This report of a Louis Harris poll on national opinions toward privacy includes the questions asked of each respondent and the responses given in categories related to age, sex, employment, income, and other factors. There are chapters on privacy and the individual; personal privacy in relation to governmental and business institutions; privacy…

  18. The Need for Privacy and the Application of Privacy to the Day Care Setting.

    ERIC Educational Resources Information Center

    Jacobs, Ellen

    This paper, focusing on young children's need for privacy, describes a study conducted to determine the manner in which children in day care centers resolve the problem of reduced space and time for privacy. A pilot study revealed that children displayed three privacy seeking behaviors: (1) verbal and nonverbal territorial behavior (use or defense…

  19. 77 FR 65206 - Privacy Act of 1974; Amendment of Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-25

    ... BOARD Privacy Act of 1974; Amendment of Privacy Act System of Records AGENCY: Merit Systems Protection... maintains subject to the Privacy Act of 1974 (5 U.S.C. 552a). MSPB/ GOVT-1, ``Appeals and Case Records,'' is being amended to reflect that its location is in the Office of the Clerk of the Board. Also, the...

  20. Privacy Challenges for Wireless Medical Devices

    SciTech Connect

    Lagesse, Brent J

    2010-01-01

    Implantable medical devices are becoming more pervasive as new technologies increase their reliability and safety. Furthermore, these devices are becoming increasingly reliant on wireless communication for interaction with the device. Such technologies have the potential to leak information that could be utilized by an attacker to threaten the lives of patients. Privacy of patient information is essential; however, this information is not the only privacy issue that must be considered. In this paper, we discuss why information privacy is insufficient for protecting patients from some attacks and how information regarding the presence of individual devices can leak vulnerabilities. Furthermore, we examine existing privacy enhancing algorithms and discuss their applicability to implantable medical devices.

  1. Customer privacy on UK healthcare websites.

    PubMed

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  2. Class Restricted Clustering and Micro-Perturbation for Data Privacy.

    PubMed

    Li, Xiao-Bai; Sarkar, Sumit

    2013-04-01

    The extensive use of information technologies by organizations to collect and share personal data has raised strong privacy concerns. To respond to the public's demand for data privacy, a class of clustering-based data masking techniques is increasingly being used for privacy-preserving data sharing and analytics. Traditional clustering-based approaches for masking numeric attributes, while addressing re-identification risks, typically do not consider the disclosure risk of categorical confidential attributes. We propose a new approach to deal with this problem. The proposed method clusters data such that the data points within a group are similar in the non-confidential attribute values whereas the confidential attribute values within a group are well distributed. To accomplish this, the clustering method, which is based on a minimum spanning tree (MST) technique, uses two risk-utility tradeoff measures in the growing and pruning stages of the MST technique respectively. As part of our approach we also propose a novel cluster-level micro-perturbation method for masking data that overcomes a common problem of traditional clustering-based methods for data masking, which is their inability to preserve important statistical properties such as the variance of attributes and the covariance across attributes. We show that the mean vector and the covariance matrix of the masked data generated using the micro-perturbation method are unbiased estimates of the original mean vector and covariance matrix. An experimental study on several real-world datasets demonstrates the effectiveness of the proposed approach.

  3. Preserving Patient Privacy When Sharing Same-Disease Data.

    PubMed

    Liu, Xiaoping; Li, Xiao-Bai; Motiwalla, Luvai; Li, Wenjun; Zheng, Hua; Franklin, Patricia D

    2016-10-01

    Medical and health data are often collected for studying a specific disease. For such same-disease microdata, a privacy disclosure occurs as long as an individual is known to be in the microdata. Individuals in same-disease microdata are thus subject to higher disclosure risk than those in microdata with different diseases. This important problem has been overlooked in data-privacy research and practice, and no prior study has addressed this problem. In this study, we analyze the disclosure risk for the individuals in same-disease microdata and propose a new metric that is appropriate for measuring disclosure risk in this situation. An efficient algorithm is designed and implemented for anonymizing same-disease data to minimize the disclosure risk while keeping data utility as good as possible. An experimental study was conducted on real patient and population data. Experimental results show that traditional reidentification risk measures underestimate the actual disclosure risk for the individuals in same-disease microdata and demonstrate that the proposed approach is very effective in reducing the actual risk for same-disease data. This study suggests that privacy protection policy and practice for sharing medical and health data should consider not only the individuals' identifying attributes but also the health and disease information contained in the data. It is recommended that data-sharing entities employ a statistical approach, instead of the HIPAA's Safe Harbor policy, when sharing same-disease microdata.

  4. Preserving Patient Privacy When Sharing Same-Disease Data

    PubMed Central

    LIU, XIAOPING; LI, XIAO-BAI; MOTIWALLA, LUVAI; LI, WENJUN; ZHENG, HUA; FRANKLIN, PATRICIA D.

    2016-01-01

    Medical and health data are often collected for studying a specific disease. For such same-disease microdata, a privacy disclosure occurs as long as an individual is known to be in the microdata. Individuals in same-disease microdata are thus subject to higher disclosure risk than those in microdata with different diseases. This important problem has been overlooked in data-privacy research and practice, and no prior study has addressed this problem. In this study, we analyze the disclosure risk for the individuals in same-disease microdata and propose a new metric that is appropriate for measuring disclosure risk in this situation. An efficient algorithm is designed and implemented for anonymizing same-disease data to minimize the disclosure risk while keeping data utility as good as possible. An experimental study was conducted on real patient and population data. Experimental results show that traditional reidentification risk measures underestimate the actual disclosure risk for the individuals in same-disease microdata and demonstrate that the proposed approach is very effective in reducing the actual risk for same-disease data. This study suggests that privacy protection policy and practice for sharing medical and health data should consider not only the individuals’ identifying attributes but also the health and disease information contained in the data. It is recommended that data-sharing entities employ a statistical approach, instead of the HIPAA's Safe Harbor policy, when sharing same-disease microdata. PMID:27867450

  5. 77 FR 13388 - Treasury Inspector General for Tax Administration; Privacy Act of 1974: Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-06

    ... Treasury Inspector General for Tax Administration; Privacy Act of 1974: Computer Matching Program AGENCY... conduct of TIGTA's computer matching program. DATES: Effective Date: April 5, 2012. ADDRESSES: Comments or... Administration, (202) 622-4068. SUPPLEMENTARY INFORMATION: TIGTA's computer matching program assists in...

  6. 78 FR 23811 - Privacy Act of 1974; Proposed New Routine Uses and System of Records Alterations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-22

    ... Records Alterations and Proposed New Routine Uses Required by the Privacy Act of 1974 System Number: 60... offices (FO). FO addresses and telephone numbers can be found in local telephone directories under... the system: Records in this system consist of: 1. Names and Social Security numbers (SSNs)...

  7. The Use of Electronic Data Interchange under the Family Educational Rights and Privacy Act.

    ERIC Educational Resources Information Center

    Rhinehart, Paul T.

    1996-01-01

    When used in managing college student records, electronic data interchange allows electronic student records to be fed directly into a receiving institution's database instead of being sent by mail. Although the process offers many clear advantages, one important question that must be addressed is how students' privacy will be protected under a…

  8. 76 FR 39978 - Departmental Offices; Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-07

    ... supporting materials, will become part of the public record and subject to public disclosure. You should... Consumer Financial Protection Bureau (``CFPB''), gives notice of the establishment of a new Privacy Act.... ADDRESSES: Comments should be sent to Claire Stapleton, Consumer Financial Protection Bureau...

  9. 77 FR 24929 - Privacy Act of 1974; New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-26

    ..., and email address; and it is used to solicit participation in the NWOS. The information collected... United States citizens and lawful permanent residents. The Privacy Act requires each agency to publish in... sent to the Chairman, Committee on Homeland Security and Governmental Affairs, United States...

  10. 78 FR 12298 - Privacy Act of 1974; System of Records-School Participation Division Complaints Tracking System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-22

    ... Privacy Act of 1974; System of Records--School Participation Division Complaints Tracking System AGENCY... proposing to add a new system of records entitled ``School Participation Division Complaints Tracking System... result of public comment or OMB review. ] ADDRESSES: Address all comments about the School...

  11. The Genetics of Sexuality and Aggression (GSA) twin samples in Finland.

    PubMed

    Johansson, Ada; Jern, Patrick; Santtila, Pekka; von der Pahlen, Bettina; Eriksson, Elias; Westberg, Lars; Nyman, Henrik; Pensar, Johan; Corander, Jukka; Sandnabba, N Kenneth

    2013-02-01

    The Genetics of Sexuality and Aggression (GSA) project was launched at the Abo Akademi University in Turku, Finland in 2005 and has so far undertaken two major population-based data collections involving twins and siblings of twins. To date, it consists of about 14,000 individuals (including 1,147 informative monozygotic twin pairs, 1,042 informative same-sex dizygotic twin pairs, 741 informative opposite-sex dizygotic twin pairs). Participants have been recruited through the Central Population Registry of Finland and were 18-49 years of age at the time of the data collections. Saliva samples for DNA genotyping (n = 4,278) and testosterone analyses (n = 1,168) were collected in 2006. The primary focus of the data collections has been on sexuality (both sexual functioning and sexual behavior) and aggressive behavior. This paper provides an overview of the data collections as well as an outline of the phenotypes and biological data assembled within the project. A detailed overview of publications can be found at the project's Web site: http://www.cebg.fi/.

  12. A 15 GSa/s, 1.5 GHz bandwidth waveform digitizing ASIC

    NASA Astrophysics Data System (ADS)

    Oberla, Eric; Genat, Jean-Francois; Grabas, Hervé; Frisch, Henry; Nishimura, Kurtis; Varner, Gary

    2014-01-01

    The PSEC4 custom integrated circuit was designed for the recording of fast waveforms for use in large-area time-of-flight detector systems. The ASIC has been fabricated using the IBM-8RF 0.13 μm CMOS process. On each of the six analog channels, PSEC4 employs a switched capacitor array (SCA) of 256 samples deep, a ramp-compare ADC with 10.5 bits of DC dynamic range, and a serial data readout with the capability of region-of-interest windowing to reduce dead time. The sampling rate can be adjusted between 4 and 15 Gigasamples/second (GSa/s) on all channels and is servo-controlled on-chip with a low-jitter delay-locked loop (DLL). The input signals are passively coupled on-chip with a -3 dB analog bandwidth of 1.5 GHz. The power consumption in quiescent sampling mode is less than 50 mW/chip; at a sustained trigger and a readout rate of 50 kHz the chip draws 100 mW. After fixed-pattern pedestal subtraction, the uncorrected integral non-linearity is 0.15% over a 750 mV dynamic range. With a linearity correction, a full 1 V signal voltage range is available. The sampling timebase has a fixed-pattern non-linearity with an RMS of 13%, which can be corrected for precision waveform feature extraction and timing.

  13. Just in Time Research: Privacy Practices

    ERIC Educational Resources Information Center

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  14. Privacy and Psychosomatic Stress: An Empirical Analysis.

    ERIC Educational Resources Information Center

    Webb, Stephen D.

    1978-01-01

    Examines the supposition that insufficient privacy is stressful to the individual. Data were obtained from urban centers in New Zealand. Findings support the hypothesis that a percieved lack of privacy is associated with psychosomatic stress. The relationship is specified by measures of stress and sex of respondents. (Author)

  15. Reconsidering the Right to Privacy in Canada

    ERIC Educational Resources Information Center

    Shade, Leslie Regan

    2008-01-01

    This article argues that post-September 11 political debates and legislation around security necessitates a reconsideration of a right to privacy in Canada. It looks at the proposal for a Canadian Charter of Privacy Rights promoted by Senator Sheila Finestone in the late 1990s and the current challenges of emergent material technologies…

  16. The Press, Privacy, and Community Mores.

    ERIC Educational Resources Information Center

    Glasser, Theodore L.

    Because of judicial indifference and legislative inaction, the conflict between the right of privacy and the freedom of the press is no closer to a resolution than it was a century ago. William Prosser's reduction of the common law of privacy into four separate torts has not solved the problem. The concept of "newsworthiness" has not been helpful…

  17. Contemporary Privacy Theory Contributions to Learning Analytics

    ERIC Educational Resources Information Center

    Heath, Jennifer

    2014-01-01

    With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems…

  18. Technology, Privacy, and Electronic Freedom of Speech.

    ERIC Educational Resources Information Center

    McDonald, Frances M.

    1986-01-01

    Explores five issues related to technology's impact on privacy and access to information--regulation and licensing of the press, electronic surveillance, invasion of privacy, copyright, and policy-making and regulation. The importance of First Amendment rights and civil liberties in forming a coherent national information policy is stressed.…

  19. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy of... accessed, used, or shared for any purpose other than to ensure compliance with this title or to facilitate a product recall to protect public health and safety. (c) A regulated seller who in good...

  20. Privacy and the National Information Infrastructure.

    ERIC Educational Resources Information Center

    Rotenberg, Marc

    1994-01-01

    Explains the work of Computer Professionals for Social Responsibility regarding privacy issues in the use of electronic networks; recommends principles that should be adopted for a National Information Infrastructure privacy code; discusses the need for public education; and suggests pertinent legislative proposals. (LRW)

  1. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 1 2014-10-01 2014-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  2. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  3. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  4. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  5. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  6. Privacy-Preserving Location-Based Services

    ERIC Educational Resources Information Center

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  7. 77 FR 57013 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is updating the Defense Intelligence Agency Privacy Act Program, by adding the (k)(2) exemption to...

  8. The Law, Computers, and Student Privacy.

    ERIC Educational Resources Information Center

    Curran, Robert

    1988-01-01

    The problem with privacy and computers is not technology but lack of systematic value education in those who use, teach, and learn about computers. A deeper issue than updating the law to the age of computers is integrating computers and the right to privacy into the world of education. (MSE)

  9. Privacy and Ethics in Undergraduate GIS Curricula

    ERIC Educational Resources Information Center

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  10. 76 FR 25409 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... AFFAIRS Privacy Act of 1974 AGENCY: Department of Veterans Affairs (VA). ACTION: Notice of Amendment to System of Records. SUMMARY: The Privacy Act of 1974 (5 U.S.C. 552a(e)(4)) requires that all agencies... amending the system by revising the System Location, Categories of Records in the System, Purpose,...

  11. Performance-Oriented Privacy-Preserving Data Integration

    SciTech Connect

    Pon, R K; Critchlow, T

    2004-09-15

    Current solutions to integrating private data with public data have provided useful privacy metrics, such as relative information gain, that can be used to evaluate alternative approaches. Unfortunately, they have not addressed critical performance issues, especially when the public database is very large. The use of hashes and noise yields better performance than existing techniques while still making it difficult for unauthorized entities to distinguish which data items truly exist in the private database. As we show here, leveraging the uncertainty introduced by collisions caused by hashing and the injection of noise, we present a technique for performing a relational join operation between a massive public table and a relatively smaller private one.

  12. Protecting privacy in a clinical data warehouse.

    PubMed

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world.

  13. Providing Strong Security and High Privacy in Low-Cost RFID Networks

    NASA Astrophysics Data System (ADS)

    David, Mathieu; Prasad, Neeli R.

    Since the dissemination of Radio Frequency IDentification (RFID) tags is getting larger and larger, the requirement for strong security and privacy is also increasing. Low-cost and ultra-low-cost tags are being implemented on everyday products, and their limited resources constraints the security algorithms to be designed especially for those tags. In this paper, a complete solution providing strong security and high privacy during the whole product lifetime is presented. Combining bit-wise operations and secret keys, the algorithm proposed addresses and solves all the common security attacks.

  14. 76 FR 58524 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-21

    ... Imaging Technology by the Transportation Security Administration's Privacy Officer. In addition, the... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office... Privacy and Integrity Advisory Committee will meet on October 5, 2011, in Arlington, VA. The meeting...

  15. 78 FR 51197 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-20

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office... Privacy and Integrity Advisory Committee will meet on September 12, 2013, in Washington, DC. The meeting will be open to the public. DATES: The DHS Data Privacy and Integrity Advisory Committee will meet...

  16. 76 FR 39406 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Request for Applicants for Appointment to the DHS Data Privacy and... applicants for appointment to the DHS Data Privacy and Integrity Advisory Committee. DATES: Applications...

  17. 76 FR 8754 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Notice of Federal Advisory Committee meeting. SUMMARY: The DHS Data Privacy and Integrity.... DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on Wednesday, March 9, 2011,...

  18. 77 FR 37685 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-22

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Request for Applicants for Appointment to the DHS Data Privacy and... applicants for appointment to the DHS Data Privacy and Integrity Advisory Committee. ] DATES:...

  19. 75 FR 8087 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The DHS Data Privacy and Integrity.... DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on Thursday, March 18, 2010,...

  20. 75 FR 52769 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Notice of Federal Advisory Committee meeting. SUMMARY: The DHS Data Privacy and Integrity... public. DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on Tuesday, September...