Science.gov

Sample records for addresses gsa privacy

  1. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to gsa.privacyact@gsa.gov or send to: GSA Privacy Act Officer (CIB),...

  2. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to gsa.privacyact@gsa.gov or send to: GSA Privacy Act Officer (CIB),...

  3. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to gsa.privacyact@gsa.gov or send to: GSA Privacy Act Officer (CIB),...

  4. For telehealth to succeed, privacy and security risks must be identified and addressed.

    PubMed

    Hall, Joseph L; McGraw, Deven

    2014-02-01

    The success of telehealth could be undermined if serious privacy and security risks are not addressed. For example, sensors that are located in a patient's home or that interface with the patient's body to detect safety issues or medical emergencies may inadvertently transmit sensitive information about household activities. Similarly, routine data transmissions from an app or medical device, such as an insulin pump, may be shared with third-party advertisers. Without adequate security and privacy protections for underlying telehealth data and systems, providers and patients will lack trust in the use of telehealth solutions. Although some federal and state guidelines for telehealth security and privacy have been established, many gaps remain. No federal agency currently has authority to enact privacy and security requirements to cover the telehealth ecosystem. This article examines privacy risks and security threats to telehealth applications and summarizes the extent to which technical controls and federal law adequately address these risks. We argue for a comprehensive federal regulatory framework for telehealth, developed and enforced by a single federal entity, the Federal Trade Commission, to bolster trust and fully realize the benefits of telehealth. PMID:24493763

  5. Challenges created by data dissemination and access restrictions when attempting to address community concerns: individual privacy versus public wellbeing

    PubMed Central

    Colquhoun, Amy; Aplin, Laura; Geary, Janis; Goodman, Karen J.; Hatcher, Juanita

    2012-01-01

    Background Population health data are vital for the identification of public health problems and the development of public health strategies. Challenges arise when attempts are made to disseminate or access anonymised data that are deemed to be potentially identifiable. In these situations, there is debate about whether the protection of an individual's privacy outweighs potentially beneficial public health initiatives developed using potentially identifiable information. While these issues have an impact at planning and policy levels, they pose a particular dilemma when attempting to examine and address community concerns about a specific health problem. Methods Research currently underway in northern Canadian communities on the frequency of Helicobacter pylori infection and associated diseases, such as stomach cancer, is used in this article to illustrate the challenges that data controls create on the ability of researchers and health officials to address community concerns. Results Barriers are faced by public health professionals and researchers when endeavouring to address community concerns; specifically, provincial cancer surveillance departments and community-driven participatory research groups face challenges related to data release or access that inhibit their ability to effectively address community enquiries. The resulting consequences include a limited ability to address misinformation or to alleviate concerns when dealing with health problems in small communities. Conclusions The development of communication tools and building of trusting relationships are essential components of a successful investigation into community health concerns. It may also be important to consider that public wellbeing may outweigh the value of individual privacy in these situations. As such, a re-evaluation of data disclosure policies that are applicable in these circumstances should be considered. PMID:22584511

  6. 77 FR 9659 - General Services Administration Acquisition Regulation; Information Collection; GSA Mentor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-17

    ... ADMINISTRATION General Services Administration Acquisition Regulation; Information Collection; GSA Mentor-Prot g... collection concerning the GSA Mentor-Prot g Program, General Service Administration Acquisition Manual (GSAM..., 2012. ADDRESSES: Submit comments identified by Information Collection 3090- 0286, GSA Mentor-Prot...

  7. 48 CFR 41.204 - GSA areawide contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... entire geographical area covered by an areawide contract, although it may be available at specific... information copy furnished to GSA at the address in 41.301(a). (2) Each areawide contract includes an... administrative requirements of the agency, applicable rate schedules, technical information and detailed maps...

  8. 48 CFR 41.204 - GSA areawide contracts.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... entire geographical area covered by an areawide contract, although it may be available at specific... information copy furnished to GSA at the address in 41.301(a). (2) Each areawide contract includes an... administrative requirements of the agency, applicable rate schedules, technical information and detailed maps...

  9. 48 CFR 41.204 - GSA areawide contracts.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... entire geographical area covered by an areawide contract, although it may be available at specific... information copy furnished to GSA at the address in 41.301(a). (2) Each areawide contract includes an... administrative requirements of the agency, applicable rate schedules, technical information and detailed maps...

  10. 48 CFR 41.204 - GSA areawide contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... entire geographical area covered by an areawide contract, although it may be available at specific... information copy furnished to GSA at the address in 41.301(a). (2) Each areawide contract includes an... administrative requirements of the agency, applicable rate schedules, technical information and detailed maps...

  11. 48 CFR 570.702 - GSA forms.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PROGRAMS ACQUIRING LEASEHOLD INTERESTS IN REAL PROPERTY Forms 570.702 GSA forms. (a) You may use GSA Form 3626, U.S. Government Lease for Real Property (Short Form), to award leases if you use the simplified leasing procedures in 570.2 or if you determine it advantageous to use. (b) You may use GSA Form...

  12. 41 CFR 102-118.630 - How must a TSP refund amounts due to GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... must promptly refund amounts due to GSA, preferably by EFT. If an EFT is not used, checks must be made... Services Administration P.O. Box 93746 Chicago, IL 60673 (b) If an EFT address is needed, please...

  13. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  14. Protecting Privacy.

    ERIC Educational Resources Information Center

    Coyle, Karen

    2001-01-01

    Discusses privacy issues related to use of the Internet. Topics include data gathering functions that are built into applications of the World Wide Web; cookies that identify Web site visitors; personal identity information; libraries and privacy, including the need for privacy policies; protecting your privacy; and developing privacy literacy.…

  15. 41 CFR 101-25.203 - Centralized purchases by GSA.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...-Interagency Purchase Assignments § 101-25.203 Centralized purchases by GSA. GSA will exclusively, or with... with §§ 101-25.202 and 101-25.204. (e) GSA has issued appropriate regulations, or a Federal...

  16. 41 CFR 101-25.203 - Centralized purchases by GSA.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...-Interagency Purchase Assignments § 101-25.203 Centralized purchases by GSA. GSA will exclusively, or with... with §§ 101-25.202 and 101-25.204. (e) GSA has issued appropriate regulations, or a Federal...

  17. 41 CFR 101-25.203 - Centralized purchases by GSA.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...-Interagency Purchase Assignments § 101-25.203 Centralized purchases by GSA. GSA will exclusively, or with... with §§ 101-25.202 and 101-25.204. (e) GSA has issued appropriate regulations, or a Federal...

  18. 41 CFR 101-25.203 - Centralized purchases by GSA.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...-Interagency Purchase Assignments § 101-25.203 Centralized purchases by GSA. GSA will exclusively, or with... with §§ 101-25.202 and 101-25.204. (e) GSA has issued appropriate regulations, or a Federal...

  19. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  20. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  1. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  2. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  3. Comparison of two speech privacy measurements, articulation index (AI) and speech privacy noise isolation class (NIC'), in open workplaces

    NASA Astrophysics Data System (ADS)

    Yoon, Heakyung C.; Loftness, Vivian

    2002-05-01

    Lack of speech privacy has been reported to be the main dissatisfaction among occupants in open workplaces, according to workplace surveys. Two speech privacy measurements, Articulation Index (AI), standardized by the American National Standards Institute in 1969, and Speech Privacy Noise Isolation Class (NIC', Noise Isolation Class Prime), adapted from Noise Isolation Class (NIC) by U. S. General Services Administration (GSA) in 1979, have been claimed as objective tools to measure speech privacy in open offices. To evaluate which of them, normal privacy for AI or satisfied privacy for NIC', is a better tool in terms of speech privacy in a dynamic open office environment, measurements were taken in the field. AIs and NIC's in the different partition heights and workplace configurations have been measured following ASTM E1130 (Standard Test Method for Objective Measurement of Speech Privacy in Open Offices Using Articulation Index) and GSA test PBS-C.1 (Method for the Direct Measurement of Speech-Privacy Potential (SPP) Based on Subjective Judgments) and PBS-C.2 (Public Building Service Standard Method of Test Method for the Sufficient Verification of Speech-Privacy Potential (SPP) Based on Objective Measurements Including Methods for the Rating of Functional Interzone Attenuation and NC-Background), respectively.

  4. Student Privacy versus Campus Safety: Has Recent Legislation Compromised Privacy Rights?

    ERIC Educational Resources Information Center

    van der Kaay, Christopher D.

    This study highlights major legislation addressing campus safety and crime reporting and discusses its impact on a student's right to privacy. The 1974 Family Educational Rights and Privacy Act, commonly referred to as the "Buckley Amendment," was among the first pieces of legislation to address the notion of student privacy and confidentiality.…

  5. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C... operation of a system of records using commercial information technology services or information...

  6. Biobanking and Privacy in India.

    PubMed

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India. PMID:27256123

  7. 76 FR 34650 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... expected to include the following items: --Cloud Security and Privacy Panel discussion on addressing security and privacy for different types of cloud computing, --Presentation from National Strategy...

  8. Privacy Legislation.

    ERIC Educational Resources Information Center

    Scanlon, Robert G.

    Four major pieces of legislation enacted since 1974--Family Educational Rights and Privacy Act (the "Buckley Amendment"), Amendment to the Freedom of Information Act, The National Research Act, and The Privacy Act--represent a broad scope, impacting the administration of research, funding procedures, and the very substance and techniques of…

  9. The Regulatory Framework for Privacy and Security

    NASA Astrophysics Data System (ADS)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  10. Privacy Questions from Practicing School Nurses

    ERIC Educational Resources Information Center

    Bergren, Martha Dewey

    2004-01-01

    This Question and Answer (Q&A) article addresses practice issues related to school health records and school nursing documentation that were posed by school nurses in the field. Specifically, the questions addressed concern the following: education records, medication privacy issues, sharing of sensitive health information, privacy of individual…

  11. 75 FR 28253 - Federal Management Regulation (FMR); Notice of GSA Bulletin FMR B-26

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ... ADMINISTRATION Federal Management Regulation (FMR); Notice of GSA Bulletin FMR B-26 AGENCY: Office of... announces GSA Bulletin FMR B-26. GSA Bulletin FMR B-26 provides guidance to Federal agencies relative to the...- existent. GSA Bulletin FMR B-26 may be found at http://www.gsa.gov/bulletin . DATES: The bulletin...

  12. 75 FR 29548 - Privacy Act of 1974; Notice of New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-26

    .... SUPPLEMENTARY INFORMATION: GSA proposes to establish a new system of records subject to the Privacy Act of 1974... needed. The system contains information related to unsolicited resumes from the public, suitability... AND THEIR PURPOSES FOR USING THE SYSTEM. System information may be accessed and used by the...

  13. 78 FR 79460 - Notification of GSA Strategic Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-30

    ... ADMINISTRATION Notification of GSA Strategic Plan AGENCY: Office of the Chief Financial Officer, U.S. General... announcing the availability of the Draft FY 2014-2018 GSA Strategic Plan for public review and comment, as... Act of 2010. The agency anticipates the final Strategic Plan will be submitted to Congress with...

  14. 41 CFR 101-27.209-1 - GSA stock items.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true GSA stock items. 101-27.209-1 Section 101-27.209-1 Public Contracts and Property Management Federal Property Management...-Management of Shelf-Life Materials § 101-27.209-1 GSA stock items. Shelf-life items that meet the...

  15. 41 CFR 101-27.209-1 - GSA stock items.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA stock items. 101-27.209-1 Section 101-27.209-1 Public Contracts and Property Management Federal Property Management...-Management of Shelf-Life Materials § 101-27.209-1 GSA stock items. Shelf-life items that meet the...

  16. 41 CFR 101-27.209-1 - GSA stock items.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 2 2012-07-01 2012-07-01 false GSA stock items. 101-27.209-1 Section 101-27.209-1 Public Contracts and Property Management Federal Property Management...-Management of Shelf-Life Materials § 101-27.209-1 GSA stock items. Shelf-life items that meet the...

  17. 32 CFR 644.344 - Coordination with GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Coordination with GSA. 644.344 Section 644.344 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE HANDBOOK Disposal Clearances-Army Military Real Property § 644.344 Coordination with GSA. At...

  18. 32 CFR 644.344 - Coordination with GSA.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 4 2011-07-01 2011-07-01 false Coordination with GSA. 644.344 Section 644.344 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE HANDBOOK Disposal Clearances-Army Military Real Property § 644.344 Coordination with GSA. At...

  19. 41 CFR 105-56.016 - GSA participation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... matching. To meet this requirement, GSA will notify FMS of all past-due, legally enforceable debts...)(6). Additionally, GSA may notify FMS of past-due, legally enforceable debts delinquent for less than 180 days for purposes of administrative offset. (b) Prior to submitting a debt to FMS for purposes...

  20. 41 CFR 105-56.016 - GSA participation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... matching. To meet this requirement, GSA will notify FMS of all past-due, legally enforceable debts...)(6). Additionally, GSA may notify FMS of past-due, legally enforceable debts delinquent for less than 180 days for purposes of administrative offset. (b) Prior to submitting a debt to FMS for purposes...

  1. 41 CFR 105-56.016 - GSA participation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... matching. To meet this requirement, GSA will notify FMS of all past-due, legally enforceable debts...)(6). Additionally, GSA may notify FMS of past-due, legally enforceable debts delinquent for less than 180 days for purposes of administrative offset. (b) Prior to submitting a debt to FMS for purposes...

  2. 41 CFR 105-56.016 - GSA participation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... matching. To meet this requirement, GSA will notify FMS of all past-due, legally enforceable debts...)(6). Additionally, GSA may notify FMS of past-due, legally enforceable debts delinquent for less than 180 days for purposes of administrative offset. (b) Prior to submitting a debt to FMS for purposes...

  3. 41 CFR 105-56.016 - GSA participation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... matching. To meet this requirement, GSA will notify FMS of all past-due, legally enforceable debts...)(6). Additionally, GSA may notify FMS of past-due, legally enforceable debts delinquent for less than 180 days for purposes of administrative offset. (b) Prior to submitting a debt to FMS for purposes...

  4. Privacy Preserving Nearest Neighbor Search

    NASA Astrophysics Data System (ADS)

    Shaneck, Mark; Kim, Yongdae; Kumar, Vipin

    Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privacy laws (e.g. HIPAA) or policies. Privacy preserving data mining techniques have been developed to address this issue by providing mechanisms to mine the data while giving certain privacy guarantees. In this chapter we address the issue of privacy preserving nearest neighbor search, which forms the kernel of many data mining applications. To this end, we present a novel algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data. We show how this algorithm can be used in three important data mining algorithms, namely LOF outlier detection, SNN clustering, and kNN classification. We prove the security of these algorithms under the semi-honest adversarial model, and describe methods that can be used to optimize their performance. Keywords: Privacy Preserving Data Mining, Nearest Neighbor Search, Outlier Detection, Clustering, Classification, Secure Multiparty Computation

  5. Privacy Policy

    MedlinePlus

    ... are available at: http://www.addthis.com/privacy . Go.USA.Gov and Bit.ly NLM uses the Go.USA.gov and Bit.ly URL shortening services. ... shortened URLs. The analytics data is provided by Go.USA.Gov and Bit.ly. This data does ...

  6. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 4 2013-10-01 2013-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  7. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 4 2014-10-01 2014-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  8. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  9. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 4 2012-10-01 2012-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  10. Protecting Children's Online Privacy.

    ERIC Educational Resources Information Center

    Kresses, Mamie

    2001-01-01

    Discuss provisions of new federal Children's Online Privacy Protection Act that principals should know to protect student privacy on the Internet. Also discusses relevant provisions of the Family Educational Rights and Privacy Act. (PKP)

  11. 41 CFR 101-26.503 - Multiple award schedule purchases made by GSA supply distribution facilities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... purchases made by GSA supply distribution facilities. 101-26.503 Section 101-26.503 Public Contracts and... SUPPLY AND PROCUREMENT 26-PROCUREMENT SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.503 Multiple award schedule purchases made by GSA supply distribution facilities. GSA supply...

  12. 41 CFR 101-26.503 - Multiple award schedule purchases made by GSA supply distribution facilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... purchases made by GSA supply distribution facilities. 101-26.503 Section 101-26.503 Public Contracts and... SUPPLY AND PROCUREMENT 26-PROCUREMENT SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.503 Multiple award schedule purchases made by GSA supply distribution facilities. GSA supply...

  13. 41 CFR 101-26.503 - Multiple award schedule purchases made by GSA supply distribution facilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... purchases made by GSA supply distribution facilities. 101-26.503 Section 101-26.503 Public Contracts and... SUPPLY AND PROCUREMENT 26-PROCUREMENT SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.503 Multiple award schedule purchases made by GSA supply distribution facilities. GSA supply...

  14. 41 CFR 101-26.503 - Multiple award schedule purchases made by GSA supply distribution facilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... purchases made by GSA supply distribution facilities. 101-26.503 Section 101-26.503 Public Contracts and... SUPPLY AND PROCUREMENT 26-PROCUREMENT SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.503 Multiple award schedule purchases made by GSA supply distribution facilities. GSA supply...

  15. 41 CFR 102-85.195 - Does GSA provide special services?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Does GSA provide special services? 102-85.195 Section 102-85.195 Public Contracts and Property Management Federal Property... OCCUPANCY IN GSA SPACE Special Services § 102-85.195 Does GSA provide special services? Yes, GSA...

  16. 41 CFR 102-85.195 - Does GSA provide special services?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Does GSA provide special services? 102-85.195 Section 102-85.195 Public Contracts and Property Management Federal Property... OCCUPANCY IN GSA SPACE Special Services § 102-85.195 Does GSA provide special services? Yes, GSA...

  17. Privacy in the Genomic Era

    PubMed Central

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  18. GSA committees: Progress through service the Annual Program Committee

    USGS Publications Warehouse

    Costa, J.E.

    2007-01-01

    The GSA's Annual Program Committee (APC) is directly responsible for the GSA's meeting and other responsibilities especially before the main event. It decides on the locations, the number and content of the technical sessions, annual membership surveys, hospitality for the guests, field trips and more. In addition, it pays significant attention to creative thinking about geoscience discoveries and directions as well as identify new and emerging areas of earth science. APC is also looking for new ideas, approaches and directions.

  19. Extending SQL to Support Privacy Policies

    NASA Astrophysics Data System (ADS)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  20. Widening Privacy Concerns.

    ERIC Educational Resources Information Center

    Amidon, Paige

    1992-01-01

    Discusses privacy concerns relating to electronic information media. European privacy initiatives from the European Community are described, including personal data protection, impact on the online industry, and telecommunications privacy; and activities in the United States are examined, including telephone caller privacy, electronic mail…

  1. Hidden drivers of low-dose pharmaceutical pollutant mixtures revealed by the novel GSA-QHTS screening method.

    PubMed

    Rodea-Palomares, Ismael; Gonzalez-Pleiter, Miguel; Gonzalo, Soledad; Rosal, Roberto; Leganes, Francisco; Sabater, Sergi; Casellas, Maria; Muñoz-Carpena, Rafael; Fernández-Piñas, Francisca

    2016-09-01

    The ecological impacts of emerging pollutants such as pharmaceuticals are not well understood. The lack of experimental approaches for the identification of pollutant effects in realistic settings (that is, low doses, complex mixtures, and variable environmental conditions) supports the widespread perception that these effects are often unpredictable. To address this, we developed a novel screening method (GSA-QHTS) that couples the computational power of global sensitivity analysis (GSA) with the experimental efficiency of quantitative high-throughput screening (QHTS). We present a case study where GSA-QHTS allowed for the identification of the main pharmaceutical pollutants (and their interactions), driving biological effects of low-dose complex mixtures at the microbial population level. The QHTS experiments involved the integrated analysis of nearly 2700 observations from an array of 180 unique low-dose mixtures, representing the most complex and data-rich experimental mixture effect assessment of main pharmaceutical pollutants to date. An ecological scaling-up experiment confirmed that this subset of pollutants also affects typical freshwater microbial community assemblages. Contrary to our expectations and challenging established scientific opinion, the bioactivity of the mixtures was not predicted by the null mixture models, and the main drivers that were identified by GSA-QHTS were overlooked by the current effect assessment scheme. Our results suggest that current chemical effect assessment methods overlook a substantial number of ecologically dangerous chemical pollutants and introduce a new operational framework for their systematic identification. PMID:27617294

  2. Hidden drivers of low-dose pharmaceutical pollutant mixtures revealed by the novel GSA-QHTS screening method

    PubMed Central

    Rodea-Palomares, Ismael; Gonzalez-Pleiter, Miguel; Gonzalo, Soledad; Rosal, Roberto; Leganes, Francisco; Sabater, Sergi; Casellas, Maria; Muñoz-Carpena, Rafael; Fernández-Piñas, Francisca

    2016-01-01

    The ecological impacts of emerging pollutants such as pharmaceuticals are not well understood. The lack of experimental approaches for the identification of pollutant effects in realistic settings (that is, low doses, complex mixtures, and variable environmental conditions) supports the widespread perception that these effects are often unpredictable. To address this, we developed a novel screening method (GSA-QHTS) that couples the computational power of global sensitivity analysis (GSA) with the experimental efficiency of quantitative high-throughput screening (QHTS). We present a case study where GSA-QHTS allowed for the identification of the main pharmaceutical pollutants (and their interactions), driving biological effects of low-dose complex mixtures at the microbial population level. The QHTS experiments involved the integrated analysis of nearly 2700 observations from an array of 180 unique low-dose mixtures, representing the most complex and data-rich experimental mixture effect assessment of main pharmaceutical pollutants to date. An ecological scaling-up experiment confirmed that this subset of pollutants also affects typical freshwater microbial community assemblages. Contrary to our expectations and challenging established scientific opinion, the bioactivity of the mixtures was not predicted by the null mixture models, and the main drivers that were identified by GSA-QHTS were overlooked by the current effect assessment scheme. Our results suggest that current chemical effect assessment methods overlook a substantial number of ecologically dangerous chemical pollutants and introduce a new operational framework for their systematic identification. PMID:27617294

  3. Framework for objective evaluation of privacy filters

    NASA Astrophysics Data System (ADS)

    Korshunov, Pavel; Melle, Andrea; Dugelay, Jean-Luc; Ebrahimi, Touradj

    2013-09-01

    Extensive adoption of video surveillance, affecting many aspects of our daily lives, alarms the public about the increasing invasion into personal privacy. To address these concerns, many tools have been proposed for protection of personal privacy in image and video. However, little is understood regarding the effectiveness of such tools and especially their impact on the underlying surveillance tasks, leading to a tradeoff between the preservation of privacy offered by these tools and the intelligibility of activities under video surveillance. In this paper, we investigate this privacy-intelligibility tradeoff objectively by proposing an objective framework for evaluation of privacy filters. We apply the proposed framework on a use case where privacy of people is protected by obscuring faces, assuming an automated video surveillance system. We used several popular privacy protection filters, such as blurring, pixelization, and masking and applied them with varying strengths to people's faces from different public datasets of video surveillance footage. Accuracy of face detection algorithm was used as a measure of intelligibility (a face should be detected to perform a surveillance task), and accuracy of face recognition algorithm as a measure of privacy (a specific person should not be identified). Under these conditions, after application of an ideal privacy protection tool, an obfuscated face would be visible as a face but would not be correctly identified by the recognition algorithm. The experiments demonstrate that, in general, an increase in strength of privacy filters under consideration leads to an increase in privacy (i.e., reduction in recognition accuracy) and to a decrease in intelligibility (i.e., reduction in detection accuracy). Masking also shows to be the most favorable filter across all tested datasets.

  4. The Potential to Promote Resilience: Piloting a Minority Stress-Informed, GSA-Based, Mental Health Promotion Program for LGBTQ Youth

    PubMed Central

    Heck, Nicholas C.

    2015-01-01

    This article describes the results of a pilot study to determine the feasibility and acceptability of a mental health promotion program that was developed to address minority stressors and promote coping skills among lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth. It was hypothesized that the program would be feasible to implement within the context of a gay-straight alliance (GSA) and that GSA members would find the program acceptable (e.g., educational, enjoyable, helpful, and relevant). Participants included ten members of a high school GSA in the northeastern United States. The program sessions were delivered during GSA meetings. The first session emphasized the identification of minority and general stressors, which was followed by a discussion of coping strategies. The remaining sessions emphasized the development of cognitive coping, affect regulation, and problem-solving skills. After each session, participants completed a 13-item feedback form. Ten items assessed acceptability and three open-ended items allowed participants to provide constructive feedback. Although the program was feasible to implement within the GSA setting, attendance at the sessions was variable. Those who attended the sessions reported them to be enjoyable, informative, relevant to their lives, and potentially helpful for other LGBTQ students. After revising the program, future research is needed to investigate its dissemination potential and determine whether the program can disrupt the minority stress-psychiatric distress relationship. PMID:26366425

  5. 77 FR 5020 - General Services Administration Acquisition Regulation; Information Collection; GSA Form 527...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-01

    ... ADMINISTRATION General Services Administration Acquisition Regulation; Information Collection; GSA Form 527, Contractor's Qualifications and Financial Information AGENCY: Office of the Chief Finance Officer, GSA... Financial Information. Public comments are particularly invited on: Whether this collection of...

  6. Teaching Information Privacy in Marketing Courses: Key Educational Issues for Principles of Marketing and Elective Marketing Courses

    ERIC Educational Resources Information Center

    Peltier, James W.; Milne, George R.; Phelps, Joseph E.; Barrett, Jennifer T.

    2010-01-01

    An "information privacy gap" exists in marketing education, with little research addressing the state of information privacy and how appropriate privacy strategies and tactics should be communicated to students. The primary purpose of this article is to provide educators an understanding of information privacy and how they can incorporate this…

  7. GSA's Green Proving Ground: Identifying, Testing and Evaluating Innovative Technologies (Presentation)

    SciTech Connect

    Kandt, A.; Lowell, M.

    2012-05-01

    GSA's Green Proving Ground (GPG) program utilizes GSA's real estate portfolio to test and evaluate innovative and underutilized sustainable building technologies and practices. Findings are used to support the development of GSA performance specifications and inform decision making within GSA, other federal agencies, and the real estate industry. The program aims to drive innovation in environmental performance in federal buildings and help lead market transformation through deployment of new technologies.

  8. 48 CFR 552.219-75 - GSA Mentor-Protégé Program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false GSA Mentor-ProtégÃ....219-75 GSA Mentor-Protégé Program. As prescribed in 519.7017(a), insert the following clause: GSA Mentor-ProtéGé Program (SEP 2009) (a) Prime contractors, including small businesses, are encouraged...

  9. 48 CFR 552.219-75 - GSA Mentor-Protégé Program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false GSA Mentor-ProtégÃ....219-75 GSA Mentor-Protégé Program. As prescribed in 519.7017(a), insert the following clause: GSA Mentor-ProtéGé Program (SEP 2009) (a) Prime contractors, including small businesses, are encouraged...

  10. 48 CFR 552.219-75 - GSA Mentor-Protégé Program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false GSA Mentor-ProtégÃ....219-75 GSA Mentor-Protégé Program. As prescribed in 519.7017(a), insert the following clause: GSA Mentor-ProtéGé Program (SEP 2009) (a) Prime contractors, including small businesses, are encouraged...

  11. 48 CFR 552.219-75 - GSA Mentor-Protégé Program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false GSA Mentor-ProtégÃ....219-75 GSA Mentor-Protégé Program. As prescribed in 519.7017(a), insert the following clause: GSA Mentor-ProtéGé Program (SEP 2009) (a) Prime contractors, including small businesses, are encouraged...

  12. 48 CFR 552.219-75 - GSA Mentor-Protégé Program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false GSA Mentor-ProtégÃ....219-75 GSA Mentor-Protégé Program. As prescribed in 519.7017(a), insert the following clause: GSA Mentor-ProtéGé Program (SEP 2009) (a) Prime contractors, including small businesses, are encouraged...

  13. 78 FR 18473 - Army Privacy Act Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-27

    ... Register (71 FR 46052), the Department of the Army issued a final rule. This final rule corrects the... Litigation Division when complaints citing the Privacy Act are filed in order to correct the mailing address in Sec. 505.12. The address for notifying the Army Litigation Division of cases citing the...

  14. Privacy and Library Records

    ERIC Educational Resources Information Center

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  15. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.

    PubMed

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-01-01

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417

  16. Leveraging Lighting for Energy Savings: GSA Northwest/Artic Region

    SciTech Connect

    2016-01-01

    Case study describes how the Northwest/Arctic Region branch of the General Services Administration (GSA) improved safety and energy efficiency in its Fairbanks Federal Building parking garage used by federal employees, U.S. Marshals, and the District Court. A 74% savings was realized by replacing 220 high-pressure sodium fixtures with 220 light-emitting diode fixtures.

  17. 41 CFR 101-25.203 - Centralized purchases by GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Centralized purchases by GSA. 101-25.203 Section 101-25.203 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 25-GENERAL...

  18. 41 CFR 105-60.403 - Appeal within GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Appeal within GSA. 105-60.403 Section 105-60.403 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General...

  19. 41 CFR 105-60.403 - Appeal within GSA.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Appeal within GSA. 105-60.403 Section 105-60.403 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General...

  20. 41 CFR 105-60.403 - Appeal within GSA.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Appeal within GSA. 105-60.403 Section 105-60.403 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General...

  1. 41 CFR 105-60.403 - Appeal within GSA.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Appeal within GSA. 105-60.403 Section 105-60.403 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General...

  2. 41 CFR 105-60.403 - Appeal within GSA.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Appeal within GSA. 105-60.403 Section 105-60.403 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services Administration 60-PUBLIC AVAILABILITY OF AGENCY RECORDS...

  3. 41 CFR 101-1.4902 - GSA forms.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true GSA forms. 101-1.4902 Section 101-1.4902 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.49-Illustrations of Forms §...

  4. 41 CFR 101-1.4902 - GSA forms.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true GSA forms. 101-1.4902 Section 101-1.4902 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.49-Illustrations of Forms §...

  5. 41 CFR 101-1.4902 - GSA forms.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA forms. 101-1.4902 Section 101-1.4902 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.49-Illustrations of Forms §...

  6. Privacy-preserving backpropagation neural network learning.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2009-10-01

    With the development of distributed computing environment , many learning problems now have to deal with distributed input data. To enhance cooperations in learning, it is important to address the privacy concern of each data holder by extending the privacy preservation notion to original learning algorithms. In this paper, we focus on preserving the privacy in an important learning model, multilayer neural networks. We present a privacy-preserving two-party distributed algorithm of backpropagation which allows a neural network to be trained without requiring either party to reveal her data to the other. We provide complete correctness and security analysis of our algorithms. The effectiveness of our algorithms is verified by experiments on various real world data sets. PMID:19709975

  7. 41 CFR 101-1.4902-2053 - GSA Form 2053, Agency Consolidated Requirements for GSA Regulations and Other External Issuances.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true GSA Form 2053, Agency...-2053 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.49-Illustrations of Forms § 101-1.4902-2053...

  8. 41 CFR 101-1.4902-2053 - GSA Form 2053, Agency Consolidated Requirements for GSA Regulations and Other External Issuances.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true GSA Form 2053, Agency...-2053 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.49-Illustrations of Forms § 101-1.4902-2053...

  9. 41 CFR 101-1.4902-2053 - GSA Form 2053, Agency Consolidated Requirements for GSA Regulations and Other External Issuances.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA Form 2053, Agency...-2053 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.49-Illustrations of Forms § 101-1.4902-2053...

  10. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  11. 41 CFR 102-118.620 - How will a TSP know if the GSA Audit Division disallows a claim?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false How will a TSP know if the GSA Audit Division disallows a claim? 102-118.620 Section 102-118.620 Public Contracts and... know if the GSA Audit Division disallows a claim? The GSA Audit Division will furnish a GSA Form...

  12. 41 CFR 102-75.1150 - What happens to the gift if GSA determines it to be acceptable?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... if GSA determines it to be acceptable? 102-75.1150 Section 102-75.1150 Public Contracts and Property...-75.1150 What happens to the gift if GSA determines it to be acceptable? When GSA determines that the gift is acceptable and can be accepted and used in the form in which it was offered, GSA must...

  13. 76 FR 42737 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-19

    ... Security Number, date of birth, citizenship, home address, personal phone/cell numbers, employing entity... (12) Privacy Act systems of records notices on December 28, 2007 (72 FR 73887); fourteen (14) Privacy Act systems of records notices on April 2, 2010 (75 FR 16853) and now adds six (6) systems of...

  14. Should There Be an Expectation of Privacy in the Library? Online Treasures

    ERIC Educational Resources Information Center

    Balas, Janet L.

    2005-01-01

    Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…

  15. Achieving Network Level Privacy in Wireless Sensor Networks†

    PubMed Central

    Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2010-01-01

    Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks. PMID:22294881

  16. Achieving network level privacy in Wireless Sensor Networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2010-01-01

    Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks. PMID:22294881

  17. Patient privacy in the genomic era.

    PubMed

    Raisaro, Jean Louis; Ayday, Erman; Hubaux, Jean-Pierre

    2014-05-01

    According to many scientists and clinicians, genomics is taking on a key role in the field of medicine. Impressive advances in genome sequencing have opened the way to a variety of revolutionary applications in modern healthcare. In particular, the increasing understanding of the human genome, and of its relation to diseases and response to treatments brings promise of improvements in better preventive and personalized medicine. However, this progress raises important privacy and ethical concerns that need to be addressed. Indeed, each genome is the ultimate identifier of its owner and, due to its nature, it contains highly personal and privacy-sensitive data. In this article, after summarizing recent advances in genomics, we discuss some important privacy issues associated with human genomic information and methods put in place to address them. PMID:24800770

  18. 76 FR 20986 - Privacy Act of 1974; Notice of New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-14

    ..., addresses, phone numbers, e- mail address, birth date, financial information, medical records, or employment... track, manage, and process claims, protests, administrative actions, and litigation cases in the Office.... SYSTEM NAME: GSA/OGC-1 (Office of General Counsel Cases). SYSTEM LOCATION: The system is...

  19. The Impact of Privacy Legislation on the Federal Statistical System

    ERIC Educational Resources Information Center

    Duncan, Joseph W.

    1975-01-01

    Potential implications of the "Privacy Act of 1974" as well as related issues from the perspective of the federal statistical system are discussed. Journal address: DUALabs, 1601 N. Kent St., Suite 900, Arlington, Va. 22209. (RC)

  20. Health Care Apps Often Offer Little Privacy Protection

    MedlinePlus

    ... nlm.nih.gov/medlineplus/news/fullstory_157691.html Health Care Apps Often Offer Little Privacy Protection: Study Many ... of 2012, about 7 percent of American primary care doctors recommended health apps to their patients. Such apps address a ...

  1. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... disclosure, including those laws addressing the confidentiality of information about minors and the privacy... part 431 of this chapter; (c) Maintain the records and information in a timely and accurate manner; (d... copy of records and information pertaining to the enrollee in a timely manner and that an enrollee...

  2. Stratospheric Transparency: Perspectives on Internet Privacy

    ERIC Educational Resources Information Center

    Hauck, Rita M.

    2009-01-01

    As a parent of teenagers in the 1980s, I recall a concern of the intrusion by MTV into our home. After futile attempts to block the program, my spouse and I set out to convince our sons of its intrusion. Our challenge was miniscule when compared to the Internet privacy issues of today. This paper addresses such challenges and proposes some…

  3. Information Privacy Revealed

    ERIC Educational Resources Information Center

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  4. Emerging Privacy Issues.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    As the issue of information privacy increases in complexity in terms of the number of organizations involved, the intricacy of the information flows, and the difficulty of conceiving appropriate legal safeguards, it is not certain that the practices and laws that have been developed for current privacy protection can work for new situations.…

  5. Toward practicing privacy

    PubMed Central

    Dwork, Cynthia; Pottenger, Rebecca

    2013-01-01

    Private data analysis—the useful analysis of confidential data—requires a rigorous and practicable definition of privacy. Differential privacy, an emerging standard, is the subject of intensive investigation in several diverse research communities. We review the definition, explain its motivation, and discuss some of the challenges to bringing this concept to practice. PMID:23243088

  6. Children's Online Privacy.

    ERIC Educational Resources Information Center

    Aidman, Amy

    2000-01-01

    The first federal Internet privacy law (the Children's Online Privacy Protection Act) provides safeguards for children by regulating collection of their personal information. Unfortunately, teens are not protected. Legislation is pending to protect children from online marketers such as ZapMe! Interactive technologies require constant vigilance.…

  7. Achieving Optimal Privacy in Trust-Aware Social Recommender Systems

    NASA Astrophysics Data System (ADS)

    Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail

    Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.

  8. Testing Privacy Awareness

    NASA Astrophysics Data System (ADS)

    Bergmann, Mike

    In web-based business processes the disclosure of personal data by the user is an essential part and mandatory for the processes. Privacy policies help to inform the user about his/her rights and to protect the user’s privacy. In this paper we present a test to empirically measure how the user’s privacy awareness changes by presenting specific elements of the privacy policy in close proximity to the required data items. We compare an experimental group using an enhanced interface to a control group using a conventional interface regarding their capability to recall the agreed privacy-related facts. A concrete online survey has been performed. The major results are presented.

  9. Availability and quality of mobile health app privacy policies.

    PubMed

    Sunyaev, Ali; Dehling, Tobias; Taylor, Patrick L; Mandl, Kenneth D

    2015-04-01

    Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35,000 mHealth apps are available for iOS and Android. Of the 600 most commonly used apps, only 183 (30.5%) had privacy policies. Average policy length was 1755 (SD 1301) words with a reading grade level of 16 (SD 2.9). Two thirds (66.1%) of privacy policies did not specifically address the app itself. Our findings show that currently mHealth developers often fail to provide app privacy policies. The privacy policies that are available do not make information privacy practices transparent to users, require college-level literacy, and are often not focused on the app itself. Further research is warranted to address why privacy policies are often absent, opaque, or irrelevant, and to find a remedy. PMID:25147247

  10. Smart video surveillance system preserving privacy

    NASA Astrophysics Data System (ADS)

    Dufaux, Frederic; Ebrahimi, Touradj

    2005-03-01

    In this paper, we present a smart video surveillance system based on standard technologies and wired or wireless IP networking. The key novelty of the system is that it protects the privacy of people under surveillance. More specifically, a video analysis module detects regions of interest in the scene by change detection or face detection techniques. It is assumed that these regions contain private and sensitive information. Scrambling is then applied only to the corresponding regions. Furthermore, the amount of distortion can be controlled by restricting scrambling to some resolution levels. As a result, the scene remains visible, but privacy-sensitive information is unidentifiable. The scrambling is controlled by a private encryption key which is kept under control of legal authorities. The latter are therefore the only ones who can grant authorization to unlock the protection and view the whole scene. Therefore, this system successfully addresses the loss of privacy issue associated with video surveillance.

  11. 77 FR 32111 - Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-31

    ...'s name, home address, home telephone number, personal cell phone number, personal email address(es... phone and cell phone number(s), complainant(s), and file identification name and/or number, etc... COMMISSION Privacy Act System of Records AGENCY: Federal Communications Commission. ACTION: Notice; one...

  12. Privacy, technology, and norms: the case of Smart Meters.

    PubMed

    Horne, Christine; Darras, Brice; Bean, Elyse; Srivastava, Anurag; Frickel, Scott

    2015-05-01

    Norms shift and emerge in response to technological innovation. One such innovation is Smart Meters - components of Smart Grid energy systems capable of minute-to-minute transmission of consumer electricity use information. We integrate theory from sociological research on social norms and privacy to examine how privacy threats affect the demand for and expectations of norms that emerge in response to new technologies, using Smart Meters as a test case. Results from three vignette experiments suggest that increased threats to privacy created by Smart Meters are likely to provoke strong demand for and expectations of norms opposing the technology and that the strength of these normative rules is at least partly conditional on the context. Privacy concerns vary little with actors' demographic characteristics. These findings contribute to theoretical understanding of norm emergence and have practical implications for implementing privacy protections that effectively address concerns of electricity users. PMID:25769852

  13. Evaluating Common Privacy Vulnerabilities in Internet Service Providers

    NASA Astrophysics Data System (ADS)

    Kotzanikolaou, Panayiotis; Maniatis, Sotirios; Nikolouzou, Eugenia; Stathopoulos, Vassilios

    Privacy in electronic communications receives increased attention in both research and industry forums, stemming from both the users' needs and from legal and regulatory requirements in national or international context. Privacy in internet-based communications heavily relies on the level of security of the Internet Service Providers (ISPs), as well as on the security awareness of the end users. This paper discusses the role of the ISP in the privacy of the communications. Based on real security audits performed in national-wide ISPs, we illustrate privacy-specific threats and vulnerabilities that many providers fail to address when implementing their security policies. We subsequently provide and discuss specific security measures that the ISPs can implement, in order to fine-tune their security policies in the context of privacy protection.

  14. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  15. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  16. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  17. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  18. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A...

  19. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... responsibilities in the donation of surplus property? 102-37.90 Section 102-37.90 Public Contracts and Property... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY General Services Administration (GSA) § 102-37.90 What are GSA's responsibilities in the donation of surplus property? The General Services...

  20. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... responsibilities in the donation of surplus property? 102-37.90 Section 102-37.90 Public Contracts and Property... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY General Services Administration (GSA) § 102-37.90 What are GSA's responsibilities in the donation of surplus property? The General Services...

  1. 77 FR 15759 - Information Collection; Federal Management Regulation; GSA Form 3040, State Agency Monthly...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... Donation Report of Surplus Property AGENCY: Federal Acquisition Service, GSA. ACTION: Notice of request for... regarding GSA Form 3040, State Agency Monthly Donation Report of Surplus Property. Public comments are..., State Agency Monthly Donation Report of Surplus Personal Property by any of the following...

  2. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... responsibilities in the donation of surplus property? 102-37.90 Section 102-37.90 Public Contracts and Property... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY General Services Administration (GSA) § 102-37.90 What are GSA's responsibilities in the donation of surplus property? The General Services...

  3. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... responsibilities in the donation of surplus property? 102-37.90 Section 102-37.90 Public Contracts and Property... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY General Services Administration (GSA) § 102-37.90 What are GSA's responsibilities in the donation of surplus property? The General Services...

  4. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... responsibilities in the donation of surplus property? 102-37.90 Section 102-37.90 Public Contracts and Property... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY General Services Administration (GSA) § 102-37.90 What are GSA's responsibilities in the donation of surplus property? The General Services...

  5. 75 FR 13131 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Advantage...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ... collection requirement regarding GSA Advantage! and Electronic Commerce-FACNET. A request for public comments was published in the Federal Register at 74 FR 4596, January 26, 2009. No comments were received...! and Electronic Commerce- FACNET AGENCY: Office of the Chief Acquisition Officer, GSA. ACTION:...

  6. 5 CFR 6701.103 - Prohibited purchases of property sold by GSA.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... pursuant to 5 U.S.C. 7342, that an employee may purchase pursuant to 41 CFR part 101-49. (c) Waiver. An... this section, no GSA employee, or spouse or minor child of a GSA employee, shall purchase, directly or... or nonpublic information to obtain an advantageous purchase or create an appearance of loss...

  7. 5 CFR 6701.103 - Prohibited purchases of property sold by GSA.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... pursuant to 5 U.S.C. 7342, that an employee may purchase pursuant to 41 CFR part 101-49. (c) Waiver. An... this section, no GSA employee, or spouse or minor child of a GSA employee, shall purchase, directly or... or nonpublic information to obtain an advantageous purchase or create an appearance of loss...

  8. 5 CFR 6701.103 - Prohibited purchases of property sold by GSA.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... pursuant to 5 U.S.C. 7342, that an employee may purchase pursuant to 41 CFR part 101-49. (c) Waiver. An... this section, no GSA employee, or spouse or minor child of a GSA employee, shall purchase, directly or... or nonpublic information to obtain an advantageous purchase or create an appearance of loss...

  9. 41 CFR 102-42.85 - What gifts or decorations must we report to GSA?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... decorations must we report to GSA? 102-42.85 Section 102-42.85 Public Contracts and Property Management... 42-UTILIZATION, DONATION, AND DISPOSAL OF FOREIGN GIFTS AND DECORATIONS Utilization of Foreign Gifts and Decorations § 102-42.85 What gifts or decorations must we report to GSA? You must report to...

  10. 41 CFR 102-75.145 - Is GSA required to review each report of excess?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... review each report of excess? 102-75.145 Section 102-75.145 Public Contracts and Property Management...-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.145 Is GSA required to review each report of excess? Yes, GSA must review each report of excess...

  11. 41 CFR 102-75.145 - Is GSA required to review each report of excess?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... review each report of excess? 102-75.145 Section 102-75.145 Public Contracts and Property Management...-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.145 Is GSA required to review each report of excess? Yes, GSA must review each report of excess...

  12. 41 CFR 102-42.85 - What gifts or decorations must we report to GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... decorations must we report to GSA? 102-42.85 Section 102-42.85 Public Contracts and Property Management... 42-UTILIZATION, DONATION, AND DISPOSAL OF FOREIGN GIFTS AND DECORATIONS Utilization of Foreign Gifts and Decorations § 102-42.85 What gifts or decorations must we report to GSA? You must report to...

  13. 41 CFR 102-75.145 - Is GSA required to review each report of excess?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... review each report of excess? 102-75.145 Section 102-75.145 Public Contracts and Property Management...-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.145 Is GSA required to review each report of excess? Yes, GSA must review each report of excess...

  14. 41 CFR 102-42.85 - What gifts or decorations must we report to GSA?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... decorations must we report to GSA? 102-42.85 Section 102-42.85 Public Contracts and Property Management... 42-UTILIZATION, DONATION, AND DISPOSAL OF FOREIGN GIFTS AND DECORATIONS Utilization of Foreign Gifts and Decorations § 102-42.85 What gifts or decorations must we report to GSA? You must report to...

  15. 41 CFR 102-42.85 - What gifts or decorations must we report to GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... decorations must we report to GSA? 102-42.85 Section 102-42.85 Public Contracts and Property Management... 42-UTILIZATION, DONATION, AND DISPOSAL OF FOREIGN GIFTS AND DECORATIONS Utilization of Foreign Gifts and Decorations § 102-42.85 What gifts or decorations must we report to GSA? You must report to...

  16. 41 CFR 102-42.85 - What gifts or decorations must we report to GSA?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... decorations must we report to GSA? 102-42.85 Section 102-42.85 Public Contracts and Property Management... 42-UTILIZATION, DONATION, AND DISPOSAL OF FOREIGN GIFTS AND DECORATIONS Utilization of Foreign Gifts and Decorations § 102-42.85 What gifts or decorations must we report to GSA? You must report to...

  17. 41 CFR 102-75.145 - Is GSA required to review each report of excess?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... review each report of excess? 102-75.145 Section 102-75.145 Public Contracts and Property Management...-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.145 Is GSA required to review each report of excess? Yes, GSA must review each report of excess...

  18. 41 CFR 102-75.145 - Is GSA required to review each report of excess?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... review each report of excess? 102-75.145 Section 102-75.145 Public Contracts and Property Management...-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.145 Is GSA required to review each report of excess? Yes, GSA must review each report of excess...

  19. 45 CFR 12a.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... determine interest in the property in accordance with current regulations. (See 41 CFR 101-47.203-5, 101-47... protect and maintain any property which is reported excess to GSA as provided in 41 CFR 101-47.402. ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Real property reported excess to GSA....

  20. 41 CFR 102-75.180 - May landholding agencies transfer excess real property without notifying GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... transfer excess real property without notifying GSA? 102-75.180 Section 102-75.180 Public Contracts and... REGULATION REAL PROPERTY 75-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Transfers § 102-75.180 May landholding agencies transfer excess real property without notifying GSA? Landholding agencies...

  1. 41 CFR 102-192.95 - Why does GSA require annual mail management reports?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Why does GSA require annual mail management reports? 102-192.95 Section 102-192.95 Public Contracts and Property Management... PROGRAMS 192-MAIL MANAGEMENT Reporting Requirements § 102-192.95 Why does GSA require annual...

  2. 41 CFR 102-192.95 - Why does GSA require annual mail management reports?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Why does GSA require annual mail management reports? 102-192.95 Section 102-192.95 Public Contracts and Property Management... PROGRAMS 192-MAIL MANAGEMENT Reporting Requirements § 102-192.95 Why does GSA require annual...

  3. 41 CFR 102-35.15 - What are the goals of GSA's personal property regulations?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... GSA's personal property regulations? 102-35.15 Section 102-35.15 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 35-DISPOSITION OF PERSONAL PROPERTY § 102-35.15 What are the goals of GSA's personal...

  4. 45 CFR 12a.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... determine interest in the property in accordance with current regulations. (See 41 CFR 101-47.203-5, 101-47... protect and maintain any property which is reported excess to GSA as provided in 41 CFR 101-47.402. ... REAL PROPERTY TO ASSIST THE HOMELESS § 12a.5 Real property reported excess to GSA. (a) Each...

  5. 41 CFR 102-85.195 - Does GSA provide special services?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 85-PRICING POLICY FOR... bill amount. The bill amount for separable special services is either based on a previously agreed upon... special services on a cost-reimbursable basis: (a) In GSA-controlled space, GSA may provide for...

  6. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  7. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  8. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  9. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  10. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching...

  11. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How does GSA safeguard... GSA safeguard personal information? (a) System managers will establish administrative, technical, and physical safeguards to ensure the security and confidentiality of records, protect the records...

  12. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false How does GSA safeguard... GSA safeguard personal information? (a) System managers will establish administrative, technical, and physical safeguards to ensure the security and confidentiality of records, protect the records...

  13. Energy Savings from GSA's National Deep Retrofit Program

    SciTech Connect

    Shonder, John A

    2014-09-01

    Under its National Deep Energy Retrofit (NDER) program, the U.S. General Services Administration (GSA) awarded 10 ESPC projects with the objectives of using innovative technologies and renewable energy technologies, and moving buildings toward net zero energy consumption. This report analyzes data on energy savings from the 10 NDER projects, and compares them with the savings of a sample of other recently awarded Federal ESPC projects. It is shown that by emphasizing the need for deeper energy savings, and by the establishment of a central Project Management Office (PMO) to provide authoritative contracting, technical and pricing assistance, the NDER projects achieved an average level of savings more than twice that of the other Federal ESPC projects. The level of savings achieved in each project seems to be dependent more on the availability of ECMs at the site than on energy price, energy cost per square foot, pre-retrofit EUI or the length of the contract term. This suggests that GSA can achieve similar results in a wide variety of building

  14. DQC Comments on the Posted Recommendations Regarding Data Security and Privacy Protections

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2010

    2010-01-01

    The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…

  15. Privacy, Part Deux.

    ERIC Educational Resources Information Center

    Dowling-Sendor, Benjamin

    2002-01-01

    Discusses Oklahoma case ("Owasso Independent School District No. 1-001 v. Falvo") wherein the Supreme Court ruled unanimously in February 2002 that peer grading did not violate the Family Education Rights and Privacy Act (FERPA). (PKP)

  16. Legal Protections for Privacy

    ERIC Educational Resources Information Center

    Leslie, David W.

    1977-01-01

    Individual interest in privacy is a multiple legal issue, roughly divided into four parts according to different types of law: constitutional, statutory, administrative, and common law. Policy implications of this issue for institutions are discussed. (Editor/LBH)

  17. EGRP Privacy Policy & Disclaimers

    Cancer.gov

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  18. Privacy and biometric passports.

    PubMed

    Vakalis, Ioannis

    2011-01-01

    This work deals with privacy implications and threats that can emerge with the large-scale use of electronic biometric documents, such the recently introduced electronic passport (e-Passport). A brief introduction to privacy and personal data protection is followed by a presentation of the technical characteristics of the e-Passport. The description includes the digital data structure, and the communication and reading mechanisms of the e-Passport, indicating the possible points and methods of attack. PMID:21380483

  19. Plug-Load Control and Behavioral Change Research in GSA Office Buildings

    SciTech Connect

    Metzger, I.; Cutler, D.; Sheppy, M.

    2012-10-01

    The U.S. General Services Administration (GSA) owns and leases over 354 million square feet (ft2) of space in over 9,600 buildings [1]. GSA is a leader among federal agencies in aggressively pursuing energy efficiency (EE) opportunities for its facilities and installing renewable energy (RE) systems to provide heating, cooling, and power to these facilities. According to several energy assessments of GSA's buildings conducted by the National Renewable Energy Laboratory (NREL), plug-loads account for approximately 21% of the total electricity consumed within a standard GSA Region 3 office building. This study aims to provide insight on how to effectively manage plug-load energy consumption and attain higher energy and cost savings for plug-loads. As GSA improves the efficiency of its building stock, plug-loads will become an even greater portion of its energy footprint.

  20. 77 FR 38064 - Public Buildings Service; Information Collection; GSA Form 3453, Application/Permit for Use of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-26

    ... Space in Public Buildings and Grounds AGENCY: Public Buildings Service, GSA. ACTION: Notice of request... requirement regarding GSA Form 3453, Application/Permit for Use of Space in Public Buildings and Grounds... Information Collection 3090- 0044, GSA Form 3453, Application/Permit for Use of Space in Public Buildings...

  1. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA...

  2. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA...

  3. 41 CFR 102-117.35 - What are the advantages and disadvantages of using GSA's tender of service?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are the advantages...-117.35 What are the advantages and disadvantages of using GSA's tender of service? (a) It is an advantage to use GSA's tender of service when you want to: (1) Use GSA's authority to negotiate on behalf...

  4. 41 CFR 102-2.115 - What kinds of non-regulatory material does GSA publish outside of the FMR?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What kinds of non-regulatory material does GSA publish outside of the FMR? 102-2.115 Section 102-2.115 Public Contracts and....115 What kinds of non-regulatory material does GSA publish outside of the FMR? As GSA converts...

  5. 78 FR 79694 - Privacy Act of 1974; Notice of an Updated System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-31

    ..., Director, Human Resources Information Technology (HRIT) Services Division (IBH). GSA/PPFM-11 SYSTEM NAME... (SSN); Employee address; Banking information; Credit card number. AUTHORITY FOR MAINTAINING THE SYSTEM..., INCLUDING CATEGORIES OF USERS AND THEIR PURPOSE FOR USING THE SYSTEM: System information accessed by...

  6. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-18

    ...The Board of Governors of the Federal Reserve System (Board) is issuing a final rule to amend its regulation implementing the Privacy Act of 1974 (Privacy Act). The primary changes concern the waiver of copying fees charged to current and former Board employees, and applicants for Board employment, for access to their records under the Privacy Act; the amendment of special procedures for the......

  7. Inequalities for the quantum privacy

    NASA Astrophysics Data System (ADS)

    Trindade, M. A. S.; Pinto, E.

    2016-02-01

    In this work, we investigate the asymptotic behavior related to the quantum privacy for multipartite systems. In this context, an inequality for quantum privacy was obtained by exploiting of quantum entropy properties. Subsequently, we derive a lower limit for the quantum privacy through the entanglement fidelity. In particular, we show that there is an interval where an increase in entanglement fidelity implies a decrease in quantum privacy.

  8. Maximal privacy without coherence.

    PubMed

    Leung, Debbie; Li, Ke; Smith, Graeme; Smolin, John A

    2014-07-18

    Privacy is a fundamental feature of quantum mechanics. A coherently transmitted quantum state is inherently private. Remarkably, coherent quantum communication is not a prerequisite for privacy: there are quantum channels that are too noisy to transmit any quantum information reliably that can nevertheless send private classical information. Here, we ask how much private classical information a channel can transmit if it has little quantum capacity. We present a class of channels N(d) with input dimension d(2), quantum capacity Q(N(d)) ≤ 1, and private capacity P(N(d)) = log d. These channels asymptotically saturate an interesting inequality P(N) ≤ (1/2)[log d(A) + Q(N)] for any channel N with input dimension d(A) and capture the essence of privacy stripped of the confounding influence of coherence. PMID:25083622

  9. a Gsa-Svm Hybrid System for Classification of Binary Problems

    NASA Astrophysics Data System (ADS)

    Sarafrazi, Soroor; Nezamabadi-pour, Hossein; Barahman, Mojgan

    2011-06-01

    This paperhybridizesgravitational search algorithm (GSA) with support vector machine (SVM) and made a novel GSA-SVM hybrid system to improve the classification accuracy in binary problems. GSA is an optimization heuristic toolused to optimize the value of SVM kernel parameter (in this paper, radial basis function (RBF) is chosen as the kernel function). The experimental results show that this newapproach can achieve high classification accuracy and is comparable to or better than the particle swarm optimization (PSO)-SVM and genetic algorithm (GA)-SVM, which are two hybrid systems for classification.

  10. 75 FR 2117 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-14

    ... address, work and cell phone numbers, employee type, office/unit name, home and work e-mail address...,'' dated February 8, 1996 (February 20, 1996, 61 FR 6427). Dated: January 8, 2010. Mitchell S. Bryman... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force,...

  11. 77 FR 4798 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-31

    ...; home and work addresses; home and work email addresses; phone numbers (home, office, cell, and fax... February 8, 1996 (February 20, 1996, 61 FR 6427). Dated: January 26, 2012. Aaron Siegel, Alternate OSD... Department of the Navy Privacy Act of 1974; System of Records AGENCY: Department of the Navy, DoD....

  12. 75 FR 77872 - Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-14

    ... family data, home address, home address history, home telephone number(s), personal cell phone number(s...,'' as referenced under this Notice by publication in the Federal Register on April 5, 2006 (71 FR 17234... COMMISSION Privacy Act System of Records AGENCY: Federal Communications Commission (FCC, Commission, or...

  13. Advertising and Invasion of Privacy.

    ERIC Educational Resources Information Center

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  14. Privacy Expectations in Online Contexts

    ERIC Educational Resources Information Center

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  15. What was privacy?

    PubMed

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line. PMID:18822675

  16. Overview of Privacy in Social Networking Sites (SNS)

    NASA Astrophysics Data System (ADS)

    Powale, Pallavi I.; Bhutkar, Ganesh D.

    2013-07-01

    Social Networking Sites (SNS) have become an integral part of communication and life style of people in today's world. Because of the wide range of services offered by SNSs mostly for free of cost, these sites are attracting the attention of all possible Internet users. Most importantly, users from all age groups have become members of SNSs. Since many of the users are not aware of the data thefts associated with information sharing, they freely share their personal information with SNSs. Therefore, SNSs may be used for investigating users' character and social habits by familiar or even unknown persons and agencies. Such commercial and social scenario, has led to number of privacy and security threats. Though, all major issues in SNSs need to be addressed, by SNS providers, privacy of SNS users is the most crucial. And therefore, in this paper, we have focused our discussion on "privacy in SNSs". We have discussed different ways of Personally Identifiable Information (PII) leakages from SNSs, information revelation to third-party domains without user consent and privacy related threats associated with such information sharing. We expect that this comprehensive overview on privacy in SNSs will definitely help in raising user awareness about sharing data and managing their privacy with SNSs. It will also help SNS providers to rethink about their privacy policies.

  17. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key... addition, this information will assist you in showing your management the magnitude of your...

  18. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key... addition, this information will assist you in showing your management the magnitude of your...

  19. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key... addition, this information will assist you in showing your management the magnitude of your...

  20. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key... addition, this information will assist you in showing your management the magnitude of your...

  1. 41 CFR 102-117.350 - How will GSA use reports I submit?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... transportation related services will provide GSA with: (1) The ability to assess the magnitude and key... addition, this information will assist you in showing your management the magnitude of your...

  2. 19. INTERIOR, 'CHILLER NO. 2' (G.S.A. PHOTOCOPY, N.D.) (4 x ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. INTERIOR, 'CHILLER NO. 2' (G.S.A. PHOTOCOPY, N.D.) (4 x 5 NEGATIVE) - U.S. General Services Administration, Central Heating Plant, C & D Streets between Twelfth & Thirteenth Streets Southwest, Washington, District of Columbia, DC

  3. Correlation of Tc-99m GSA hepatic studies with biopsies in patients with chronic active hepatitis.

    PubMed

    Tomiguchi, S; Kira, T; Oyama, Y; Nabeshima, M; Nakashima, R; Tsuji, A; Kojima, A; Takahashi, M; Yoshimatsu, S; Sagara, K

    1995-08-01

    To determine whether scintigraphic findings of Tc-99m DTPA-galactosyl-HSA (GSA) correspond to histopathologic findings, Tc-99m GSA hepatic scintigraphy and biopsy were compared in 65 patients with chronic active hepatitis. After injecting 185 MBq of Tc-99m GSA, anterior images were obtained at 5 minutes and 15 minutes. Scintigrams were classified into three grades according to the extent of visualization of the cardiac blood pool on 5 minute and 15 minute images. Biopsies were subjectively graded for findings of necrosis and fibrosis. Scintigraphic grades on 5 minute images were correlated with hepatic necrosis and fibrosis and those on 15-minute images with hepatic fibrosis. Scintigraphic abnormalities of Tc-99m GSA correlated well with histopathologic abnormalities, especially with hepatic fibrosis and necrosis in patients with chronic active hepatitis. PMID:7586877

  4. 77 FR 31016 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Mentor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-24

    ... Manual (GSAM). A notice was published in the Federal Register at 77 FR 9659, on February 17, 2012. No... First Street NE., Washington, DC 20417. ATTN: Hada Flowers/IC 3090-0286, GSA Mentor-Prot g...

  5. Assessing the privacy policies in mobile personal health records.

    PubMed

    Zapata, Belén Cruz; Hernández Niñirola, Antonio; Fernández-Alemán, José Luis; Toval, Ambrosio

    2014-01-01

    The huge increase in the number and use of smartphones and tablets has led health service providers to take an interest in mHealth. Popular mobile app markets like Apple App Store or Google Play contain thousands of health applications. Although mobile personal health records (mPHRs) have a number of benefits, important challenges appear in the form of adoption barriers. Security and privacy have been identified as part of these barriers and should be addressed. This paper analyzes and assesses a total of 24 free mPHRs for Android and iOS. Characteristics regarding privacy and security were extracted from the HIPAA. The results show important differences in both the mPHRs and the characteristics analyzed. A questionnaire containing six questions concerning privacy policies was defined. Our questionnaire may assist developers and stakeholders to evaluate the security and privacy of their mPHRs. PMID:25571104

  6. Assessing the HIPAA standard in practice: PHR privacy policies.

    PubMed

    Carrión, Inmaculada; Alemán, José Luis Fernández; Toval, Ambrosio

    2011-01-01

    Health service providers are starting to become interested in providing PHRs (Personal Health Records). With PHRs, access to data is controlled by the patient, and not by the health care provider. Companies such as Google and Microsoft are establishing a leadership position in this emerging market. A number of benefits can be achieved with PHRs, but important challenges related to security and privacy must be addressed. This paper presents a review of the privacy policies of 20 free web-based PHRs. Security and privacy characteristics were extracted and assessed according to the HIPAA standard. The results show a number of important differences in the characteristics analyzed. Some improvements can be made to current PHR privacy policies to enhance the audit and management of access to users' PHRs. A questionnaire has been defined to assist PHR designers in this task. PMID:22254820

  7. Computers and Personal Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    Privacy is an issue that arises from the intersection of a demand for improved recordkeeping processes, and computing technology as the response to the demand. Recordkeeping in the United States centers on information about people. Modern day computing technology has the ability to maintain, store, and retrieve records quickly; however, this…

  8. Clinical implication of the preoperative GSA index in ⁹⁹mTc-GSA scintigraphy in hepatitis C virus-related hepatocellular carcinoma.

    PubMed

    Nishikawa, Hiroki; Osaki, Yukio; Komekado, Hideyuki; Sakamoto, Azusa; Saito, Sumio; Nishijima, Norihiro; Nasu, Akihiro; Arimoto, Akira; Kita, Ryuichi; Kimura, Toru

    2015-03-01

    We aimed to examine the relationship between the preoperative GSA index [uptake ratio of the liver to the liver plus heart at 15 min (LHL15) to uptake ratio of the heart at 15 min to that at 3 min (HH15) ratio] calculated from 99mTc‑labeled diethylene triamine pentaacetate-galactosyl human serum albumin (99mTc-GSA) scintigraphy and background liver fibrosis and to investigate whether the GSA index can be a useful predictor in hepatitis C virus (HCV)-related hepatocellular carcinoma (HCC) patients treated with surgical resection (SR). A total of 213 HCV-related HCC patients were analyzed. Receiver operating characteristic (ROC) curve analysis was performed for calculating the area under the ROC (AUROC) for nine noninvasive parameters including GSA index, indocyanine green retention at 15 min, aspartate aminotransferase (AST) to platelet ratio index, FIB-4 index, AST to alanine aminotransferase ratio, serum albumin, total bilirubin, platelet count and prothrombin time for cirrhosis. We also examined predictive factors associated with overall survival (OS) and recurrence-free survival (RFS) after SR in univariate and multivariate analyses. There were 153 males and 60 females with the mean age of 69.9 years. The median observation periods were 2.8 years. The mean maximum tumor size was 4.1 cm. HH15 ranged from 0.452 to 0.897. LHL15 ranged from 0.669 to 0.982. The mean value of the GSA index was 1.41. Among the nine parameters, the GSA index yielded the highest AUROC for cirrhosis with a level of 0.786 at an optimal cut-off value of 1.37 (sensitivity, 65.9%; specificity, 79.0%). In multivariate analyses, the GSA index was an independent predictor (P<0.001) linked to RFS and it had a marginal significance in terms of OS (P=0.074). In conclusion, the preoperative GSA index can be a useful predictor in HCV-related HCC patients treated with SR. PMID:25528990

  9. Addressing healthcare.

    PubMed

    Daly, Rich

    2013-02-11

    Though President Barack Obama has rarely made healthcare references in his State of the Union addresses, health policy experts are hoping he changes that strategy this year. "The question is: Will he say anything? You would hope that he would, given that that was the major issue he started his presidency with," says Dr. James Weinstein, left, of the Dartmouth-Hitchcock health system. PMID:23487896

  10. Taking the next step to privacy compliance for hospitals: implementing the OHA guidelines.

    PubMed

    Beardwood, John

    2003-01-01

    The recently released "Guidelines for Managing Privacy, Data Protection and Security for Ontario Hospitals," prepared by the Ontario Hospital eHealth Council Privacy and Security Working Group (the "Guidelines") are useful in that they provide a comprehensive overview of the types of issues raised for hospitals by existing and pending privacy legislation, and a very high-level framework for addressing same. However, the Guidelines are, as stated high-level guidelines only,--leaving hospital management to grapple with the next big step towards privacy compliance: how to operationalize the Guidelines within their particular hospital. PMID:14674181

  11. Privacy Awareness: A Means to Solve the Privacy Paradox?

    NASA Astrophysics Data System (ADS)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  12. Space in Space: Designing for Privacy in the Workplace

    NASA Technical Reports Server (NTRS)

    Akin, Jonie

    2015-01-01

    Privacy is cultural, socially embedded in the spatial, temporal, and material aspects of the lived experience. Definitions of privacy are as varied among scholars as they are among those who fight for their personal rights in the home and the workplace. Privacy in the workplace has become a topic of interest in recent years, as evident in discussions on Big Data as well as the shrinking office spaces in which people work. An article in The New York Times published in February of this year noted that "many companies are looking to cut costs, and one way to do that is by trimming personal space". Increasingly, organizations ranging from tech start-ups to large corporations are downsizing square footage and opting for open-office floorplans hoping to trim the budget and spark creative, productive communication among their employees. The question of how much is too much to trim when it comes to privacy, is one that is being actively addressed by the National Aeronautics and Space Administration (NASA) as they explore habitat designs for future space missions. NASA recognizes privacy as a design-related stressor impacting human health and performance. Given the challenges of sustaining life in an isolated, confined, and extreme environment such as Mars, NASA deems it necessary to determine the acceptable minimal amount for habitable volume for activities requiring at least some level of privacy in order to support optimal crew performance. Ethnographic research was conducted in 2013 to explore perceptions of privacy and privacy needs among astronauts living and working in space as part of a long-distance, long-duration mission. The allocation of space, or habitable volume, becomes an increasingly complex issue in outer space due to the costs associated with maintaining an artificial, confined environment bounded by limitations of mass while located in an extreme environment. Privacy in space, or space in space, provides a unique case study of the complex notions of

  13. 41 CFR 105-55.017 - Use and disclosure of mailing addresses.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Use and disclosure of... Administration 55-COLLECTION OF CLAIMS OWED THE UNITED STATES § 105-55.017 Use and disclosure of mailing... designee) to obtain a debtor's mailing address from the records of the Internal Revenue Service. (b) GSA...

  14. Gaussian operations and privacy

    SciTech Connect

    Navascues, Miguel; Acin, Antonio

    2005-07-15

    We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states.

  15. Inaugural address

    NASA Astrophysics Data System (ADS)

    Joshi, P. S.

    2014-03-01

    From jets to cosmos to cosmic censorship P S Joshi Tata Institute of Fundamental Research, Homi Bhabha Road, Colaba, Mumbai 400005, India E-mail: psj@tifr.res.in 1. Introduction At the outset, I should like to acknowledge that part of the title above, which tries to capture the main flavour of this meeting, and has been borrowed from one of the plenary talks at the conference. When we set out to make the programme for the conference, we thought of beginning with observations on the Universe, but then we certainly wanted to go further and address deeper questions, which were at the very foundations of our inquiry, and understanding on the nature and structure of the Universe. I believe, we succeeded to a good extent, and it is all here for you in the form of these Conference Proceedings, which have been aptly titled as 'Vishwa Mimansa', which could be possibly translated as 'Analysis of the Universe'! It is my great pleasure and privilege to welcome you all to the ICGC-2011 meeting at Goa. The International Conference on Gravitation and Cosmology (ICGC) series of meetings are being organized by the Indian Association for General Relativity and Gravitation (IAGRG), and the first such meeting was planned and conducted in Goa in 1987, with subsequent meetings taking place at a duration of about four years at various locations in India. So, it was thought appropriate to return to Goa to celebrate the 25 years of the ICGC meetings. The recollections from that first meeting have been recorded elsewhere here in these Proceedings. The research and teaching on gravitation and cosmology was initiated quite early in India, by V V Narlikar at the Banares Hindu University, and by N R Sen in Kolkata in the 1930s. In course of time, this activity grew and gained momentum, and in early 1969, at the felicitation held for the 60 years of V V Narlikar at a conference in Ahmedabad, P C Vaidya proposed the formation of the IAGRG society, with V V Narlikar being the first President. This

  16. Opening addresses.

    PubMed

    Chukudebelu, W O; Lucas, A O; Ransome-kuti, O; Akinla, O; Obayi, G U

    1988-01-01

    The theme of the 3rd International Conference of the Society of Gynecology and Obstetrics of Nigeria (SOGON) held October 26, 1986 in Enugu was maternal morbidity and mortality in Africa. The opening addresses emphasize the high maternal mortality rate in Africa and SOGON's dedication to promoting women's health and welfare. In order to reduce maternal mortality, the scope of this problem must be made evident by gathering accurate mortality rates through maternity care monitoring and auditing. Governments, health professionals, educators, behavioral scientists, and communication specialists have a responsibility to improve maternal health services in this country. By making the population aware of this problem through education, measures can be taken to reduce the presently high maternal mortality rates. Nigerian women are physically unprepared for childbirth; therefore, balanced diets and disease prevention should be promoted. Since about 40% of deliveries are unmanaged, training for traditional birth attendants should be provided. Furthermore, family planning programs should discourage teenage pregnancies, encourage birth spacing and small families, and promote the use of family planning techniques among men. The problem of child bearing and rearing accompanied by hard work should also be investigated. For practices to change so that maternal mortality rates can be reduced, attitudes must be changed such that the current rates are viewed as unacceptable. PMID:12179275

  17. Privacy enhanced group communication in clinical environment

    NASA Astrophysics Data System (ADS)

    Li, Mingyan; Narayanan, Sreeram; Poovendran, Radha

    2005-04-01

    Privacy protection of medical records has always been an important issue and is mandated by the recent Health Insurance Portability and Accountability Act (HIPAA) standards. In this paper, we propose security architectures for a tele-referring system that allows electronic group communication among professionals for better quality treatments, while protecting patient privacy against unauthorized access. Although DICOM defines the much-needed guidelines for confidentiality of medical data during transmission, there is no provision in the existing medical security systems to guarantee patient privacy once the data has been received. In our design, we address this issue by enabling tracing back to the recipient whose received data is disclosed to outsiders, using watermarking technique. We present security architecture design of a tele-referring system using a distributed approach and a centralized web-based approach. The resulting tele-referring system (i) provides confidentiality during the transmission and ensures integrity and authenticity of the received data, (ii) allows tracing of the recipient who has either distributed the data to outsiders or whose system has been compromised, (iii) provides proof of receipt or origin, and (iv) can be easy to use and low-cost to employ in clinical environment.

  18. Opening Address

    NASA Astrophysics Data System (ADS)

    Yamada, T.

    2014-12-01

    Ladies and Gentlemen, it is my great honor and pleasure to present an opening address of the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3). On the behalf of the organizing committee, I certainly welcome all your visits to KGU Kannai Media Center belonging to Kanto Gakuin University, and stay in Yokohama. In particular, to whom come from abroad more than 17 countries, I would appreciate your participations after long long trips from your homeland to Yokohama. The first international workshop on "State of the Art in Nuclear Cluster Physics", called SOTANCP, was held in Strasbourg, France, in 2008, and the second one was held in Brussels, Belgium, in 2010. Then the third workshop is now held in Yokohama. In this period, we had the traditional 10th cluster conference in Debrecen, Hungary, in 2012. Thus we have the traditional cluster conference and SOTANCP, one after another, every two years. This obviously shows our field of nuclear cluster physics is very active and flourishing. It is for the first time in about 10 years to hold the international workshop on nuclear cluster physics in Japan, because the last cluster conference held in Japan was in Nara in 2003, about 10 years ago. The president in Nara conference was Prof. K. Ikeda, and the chairpersons were Prof. H. Horiuchi and Prof. I. Tanihata. I think, quite a lot of persons in this room had participated at the Nara conference. Since then, about ten years passed. So, this workshop has profound significance for our Japanese colleagues. The subjects of this workshop are to discuss "the state of the art in nuclear cluster physics" and also discuss the prospect of this field. In a couple of years, we saw significant progresses of this field both in theory and in experiment, which have brought better and new understandings on the clustering aspects in stable and unstable nuclei. I think, the concept of clustering has been more important than ever. This is true also in the

  19. Presidential address.

    PubMed

    Vohra, U

    1993-07-01

    The Secretary of India's Ministry of Health and Family Welfare serves as Chair of the Executive Council of the International Institute for Population Sciences in Bombay. She addressed its 35th convocation in 1993. Global population stands at 5.43 billion and increases by about 90 million people each year. 84 million of these new people are born in developing countries. India contributes 17 million new people annually. The annual population growth rate in India is about 2%. Its population size will probably surpass 1 billion by the 2000. High population growth rates are a leading obstacle to socioeconomic development in developing countries. Governments of many developing countries recognize this problem and have expanded their family planning programs to stabilize population growth. Asian countries that have done so and have completed the fertility transition include China, Japan, Singapore, South Korea, and Thailand. Burma, Malaysia, North Korea, Sri Lanka, and Vietnam have not yet completed the transition. Afghanistan, Bangladesh, Iran, Nepal, and Pakistan are half-way through the transition. High population growth rates put pressure on land by fragmenting finite land resources, increasing the number of landless laborers and unemployment, and by causing considerable rural-urban migration. All these factors bring about social stress and burden civic services. India has reduced its total fertility rate from 5.2 to 3.9 between 1971 and 1991. Some Indian states have already achieved replacement fertility. Considerable disparity in socioeconomic development exists among states and districts. For example, the states of Bihar, Madhya Pradesh, Rajasthan, and Uttar Pradesh have female literacy rates lower than 27%, while that for Kerala is 87%. Overall, infant mortality has fallen from 110 to 80 between 1981 and 1990. In Uttar Pradesh, it has fallen from 150 to 98, while it is at 17 in Kerala. India needs innovative approaches to increase contraceptive prevalence rates

  20. 77 FR 56676 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ... CORRECT NUMBERING TO READ 1 THROUGH 8] SYSTEM MANAGER(S) AND ADDRESS: Chief Marketing/Sales Officer and... the Privacy Act, or who request amendment of a record, including name, Social Security Number, date of... public posting on USPS.com : Initial and Final Decisions that have been reviewed for inclusion of...

  1. 76 FR 51123 - Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-17

    ... at 75 FR 78802, pursuant to the Privacy Act of 1974, as amended, 5 U.S.C. 552a. FMS proposes to amend... being unbanked, and gender in determining what types of account options best meet the needs of low- to... ``address'' add the phrase ``as well as demographic data, such as income range, gender or...

  2. 77 FR 38782 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-29

    ..., cell telephone phone, email address, bank or credit union name, city, state, and zip code, ABA routing..., 1996, 61 FR 6427). Dated: June 26, 2012. Aaron Siegel, Alternate OSD Federal Register Liaison Officer... Department of the Navy Privacy Act of 1974; System of Records AGENCY: Department of the Navy, DoD....

  3. 75 FR 52518 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-26

    ... System: Records consist of name, date and place of birth, personal address, home and cell phone numbers... Responsibilities for Maintaining Records About Individuals,'' dated February 8, 1996 (February 20, 1996; 61 FR 6427... Department of the Navy Privacy Act of 1974; System of Records AGENCY: Department of the Navy, DoD....

  4. 78 FR 34352 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-07

    ... personal cell phone numbers, US government credit card number, personal and alternative email addresses..., 1996 (February 20, 1996, 61 FR 6427). Dated: June 3, 2013. Aaron Siegel, Alternate OSD Federal Register... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary of...

  5. 78 FR 69653 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... address, home and/or work telephone numbers, cell phone information, identification numbers (e.g. Social... Maintaining Records About Individuals,'' dated February 8, 1996 (February 20, 1996, 61 FR 6427). Dated... Department of the Navy Privacy Act of 1974; System of Records AGENCY: Department of the Navy, DoD....

  6. 77 FR 27859 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ... demographic information (e.g., name, address, phone numbers, date of birth, social security number, internal... abuse, alcoholism or alcohol abuse, sickle cell anemia, or infection with the human immunodeficiency.... 552a(r) (Privacy Act) and guidelines issued by OMB (65 FR 77677), December 12, 2000. Approved: April...

  7. 76 FR 23810 - Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-28

    ..., home telephone number(s), personal cell phone number(s), account number(s) for telephone, cell phone....; and 2. FCC employees: individual's name, home address, home telephone number(s), personal cell phone... COMMISSION Privacy Act System of Records AGENCY: Federal Communications Commission (FCC or...

  8. 75 FR 60437 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-30

    ... February 8, 1996, (February 20, 1996; 61 FR 6427). Dated: September 24, 2010. Mitchell S. Bryman, Alternate... Privacy Act Office, Office of Warfighting Integration and Chief Information officer, ATTN: SAF/XCPPI, 1800... address: Director, Information Systems and Technology, SAF/FMPSA, 1602 B- Wing Suite 327, Andrews...

  9. 77 FR 56630 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Information Systems Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Information Systems Agency... contained in this system of records should address written inquiries to the Defense Information...

  10. Electronic Record Systems and Individual Privacy. Federal Government Information Technology.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Office of Technology Assessment.

    This report considers the privacy issues raised by the growth of the new technology being applied to the personal information collected, maintained, and disseminated by the Federal Government. Four major areas are addressed: (1) technological developments relevant to government record systems; (2) current and prospective Federal agency use of…

  11. 78 FR 25974 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-03

    ... instructions for submitting comments. * Mail: Federal Docket Management System Office, 4800 Mark Center Drive.... SUPPLEMENTARY INFORMATION: The Department of the Army system of records notices subject to the Privacy Act of... information about themselves is contained in this records system should address written inquiries to...

  12. Privacy Issues and New Technologies.

    ERIC Educational Resources Information Center

    Colman, Sue

    1997-01-01

    Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…

  13. 76 FR 59073 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-23

    ... From the Federal Register Online via the Government Publishing Office CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency (CIA) has undertaken and completed...

  14. Privacy in the Electronic Community.

    ERIC Educational Resources Information Center

    Spetalnick, Terrie

    1993-01-01

    Examines issues relating to privacy in the electronic community. Highlights include digital information versus print products; the Bill of Rights and Responsibilities for Electronic Learners; electronically stored personal information; institutional versus individual ownership; the right of free speech versus the right of privacy; and the need for…

  15. Welcome Address

    NASA Astrophysics Data System (ADS)

    Kiku, H.

    2014-12-01

    Ladies and Gentlemen, It is an honor for me to present my welcome address in the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3), as the president of Kanto Gakuin University. Particularly to those from abroad more than 17 countries, I am very grateful for your participation after long long trips from your home to Yokohama. On the behalf of the Kanto Gakuin University, we certainly welcome your visit to our university and stay in Yokohama. First I would like to introduce Kanto Gakuin University briefly. Kanto Gakuin University, which is called KGU, traces its roots back to the Yokohama Baptist Seminary founded in 1884 in Yamate, Yokohama. The seminary's founder was Albert Arnold Bennett, alumnus of Brown University, who came to Japan from the United States to establish a theological seminary for cultivating and training Japanese missionaries. Now KGU is a major member of the Kanto Gakuin School Corporation, which is composed of two kindergartens, two primary schools, two junior high schools, two senior high schools as well as KGU. In this university, we have eight faculties with graduate school including Humanities, Economics, Law, Sciences and Engineering, Architecture and Environmental Design, Human and Environmental Studies, Nursing, and Law School. Over eleven thousands students are currently learning in our university. By the way, my major is the geotechnical engineering, and I belong to the faculty of Sciences and Engineering in my university. Prof. T. Yamada, here, is my colleague in the same faculty. I know that the nuclear physics is one of the most active academic fields in the world. In fact, about half of the participants, namely, more than 50 scientists, come from abroad in this conference. Moreover, I know that the nuclear physics is related to not only the other fundamental physics such as the elementary particle physics and astrophysics but also chemistry, medical sciences, medical cares, and radiation metrology

  16. GSA-Tuning IPD Control of a Field-Sensed Magnetic Suspension System.

    PubMed

    Li, Jen-Hsing; Chiou, Juing-Shian

    2015-01-01

    The purpose of this paper is to propose a GSA-tuning IPD control technique for magnetic suspension systems. An educational demonstration on a magnetic-field sensed magnetic suspension system is examined for effectiveness. For the magnetic-field sensed magnetic suspension system (FSMSS), the current transducer is employed for measuring the electromagnetic coil current, and a Hall effect device is used for detecting the position of the suspended object. To achieve optimal performance, the gravitational search algorithm (GSA) is adopted for tuning the integral-proportional-derivative (IPD) controller. The IPD control includes the specified PD controller and an integrator. The specified PD control is employed for stabilizing the inherently unstable FSMSS, whereas the integral control is utilized for eliminating the steady-state error. The GSA can tune the IPD control parameters to enable optimal FSMSS performance. We achieved excellent results from the simulations and hands-on experiments for the proposed control strategies and structures. PMID:26694404

  17. GSA-Tuning IPD Control of a Field-Sensed Magnetic Suspension System

    PubMed Central

    Li, Jen-Hsing; Chiou, Juing-Shian

    2015-01-01

    The purpose of this paper is to propose a GSA-tuning IPD control technique for magnetic suspension systems. An educational demonstration on a magnetic-field sensed magnetic suspension system is examined for effectiveness. For the magnetic-field sensed magnetic suspension system (FSMSS), the current transducer is employed for measuring the electromagnetic coil current, and a Hall effect device is used for detecting the position of the suspended object. To achieve optimal performance, the gravitational search algorithm (GSA) is adopted for tuning the integral-proportional-derivative (IPD) controller. The IPD control includes the specified PD controller and an integrator. The specified PD control is employed for stabilizing the inherently unstable FSMSS, whereas the integral control is utilized for eliminating the steady-state error. The GSA can tune the IPD control parameters to enable optimal FSMSS performance. We achieved excellent results from the simulations and hands-on experiments for the proposed control strategies and structures. PMID:26694404

  18. The ultimate physical limits of privacy.

    PubMed

    Ekert, Artur; Renner, Renato

    2014-03-27

    Among those who make a living from the science of secrecy, worry and paranoia are just signs of professionalism. Can we protect our secrets against those who wield superior technological powers? Can we trust those who provide us with tools for protection? Can we even trust ourselves, our own freedom of choice? Recent developments in quantum cryptography show that some of these questions can be addressed and discussed in precise and operational terms, suggesting that privacy is indeed possible under surprisingly weak assumptions. PMID:24670761

  19. User Privacy in RFID Networks

    NASA Astrophysics Data System (ADS)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  20. 41 CFR 102-118.530 - Will GSA instruct my agency's disbursing offices to offset unpaid TSP billings?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Will GSA instruct my agency's disbursing offices to offset unpaid TSP billings? 102-118.530 Section 102-118.530 Public... to offset unpaid TSP billings? Yes, GSA will instruct one or more of your agency's disbursing...

  1. 75 FR 6032 - Property Obtained Through the Use of Charge Cards; Notice of GSA Bulletin FMR B-25

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-05

    ... ADMINISTRATION Property Obtained Through the Use of Charge Cards; Notice of GSA Bulletin FMR B-25 AGENCY: Office.... SUMMARY: This notice announces GSA Federal Management Regulation (FMR) Bulletin B-25 which provides... Travel, Transportation and Asset Management, at (202) 501- 1777. Please cite Bulletin FMR...

  2. 41 CFR 102-75.150 - What happens when GSA determines that the report of excess is adequate?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... determines that the report of excess is adequate? 102-75.150 Section 102-75.150 Public Contracts and Property... PROPERTY 75-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.150 What happens when GSA determines that the report of excess is adequate? When GSA...

  3. 41 CFR 102-75.150 - What happens when GSA determines that the report of excess is adequate?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... determines that the report of excess is adequate? 102-75.150 Section 102-75.150 Public Contracts and Property... PROPERTY 75-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.150 What happens when GSA determines that the report of excess is adequate? When GSA...

  4. 41 CFR 102-75.150 - What happens when GSA determines that the report of excess is adequate?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... determines that the report of excess is adequate? 102-75.150 Section 102-75.150 Public Contracts and Property... PROPERTY 75-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.150 What happens when GSA determines that the report of excess is adequate? When GSA...

  5. 41 CFR 102-75.150 - What happens when GSA determines that the report of excess is adequate?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... determines that the report of excess is adequate? 102-75.150 Section 102-75.150 Public Contracts and Property... PROPERTY 75-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.150 What happens when GSA determines that the report of excess is adequate? When GSA...

  6. 41 CFR 102-75.150 - What happens when GSA determines that the report of excess is adequate?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... determines that the report of excess is adequate? 102-75.150 Section 102-75.150 Public Contracts and Property... PROPERTY 75-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.150 What happens when GSA determines that the report of excess is adequate? When GSA...

  7. 76 FR 13617 - Office of Federal High-Performance Green Buildings (OFHPGB); Notice of GSA Bulletin OFHPGB 2011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-14

    ... found at http://www.gsa.gov/portal/content/221677 . DATES: Effective March 14, 2011. FOR FURTHER... Buildings.'' Notice 2008-40 can be found at http://www.irs.gov/irb/2008-14_IRB/ar12.html . For clarification... Green Building are located on the Internet at http://www.gsa.gov/portal/content/105239 as...

  8. 41 CFR 102-117.340 - What other types of assistance may GSA provide agencies in dealing with regulatory bodies?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... assistance may GSA provide agencies in dealing with regulatory bodies? 102-117.340 Section 102-117.340 Public... MANAGEMENT REGULATION TRANSPORTATION 117-TRANSPORTATION MANAGEMENT Representation Before Regulatory Body... bodies? (a) GSA has oversight of all public utilities used by the Federal Government...

  9. 41 CFR 102-117.340 - What other types of assistance may GSA provide agencies in dealing with regulatory bodies?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... assistance may GSA provide agencies in dealing with regulatory bodies? 102-117.340 Section 102-117.340 Public... MANAGEMENT REGULATION TRANSPORTATION 117-TRANSPORTATION MANAGEMENT Representation Before Regulatory Body... bodies? (a) GSA has oversight of all public utilities used by the Federal Government...

  10. 41 CFR 102-117.340 - What other types of assistance may GSA provide agencies in dealing with regulatory bodies?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... assistance may GSA provide agencies in dealing with regulatory bodies? 102-117.340 Section 102-117.340 Public... MANAGEMENT REGULATION TRANSPORTATION 117-TRANSPORTATION MANAGEMENT Representation Before Regulatory Body... bodies? (a) GSA has oversight of all public utilities used by the Federal Government...

  11. 41 CFR 102-36.55 - What is GSA's role in the disposition of excess personal property?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is GSA's role in the disposition of excess personal property? 102-36.55 Section 102-36.55 Public Contracts and Property... GSA's role in the disposition of excess personal property? In addition to developing and...

  12. 41 CFR 102-41.30 - What is GSA's role in the disposition of property covered by this part?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is GSA's role in the disposition of property covered by this part? 102-41.30 Section 102-41.30 Public Contracts and... PERSONAL PROPERTY General Provisions Responsibility § 102-41.30 What is GSA's role in the disposition...

  13. 41 CFR 102-117.340 - What other types of assistance may GSA provide agencies in dealing with regulatory bodies?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... assistance may GSA provide agencies in dealing with regulatory bodies? 102-117.340 Section 102-117.340 Public... MANAGEMENT REGULATION TRANSPORTATION 117-TRANSPORTATION MANAGEMENT Representation Before Regulatory Body... bodies? (a) GSA has oversight of all public utilities used by the Federal Government...

  14. 41 CFR 102-117.340 - What other types of assistance may GSA provide agencies in dealing with regulatory bodies?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... assistance may GSA provide agencies in dealing with regulatory bodies? 102-117.340 Section 102-117.340 Public... MANAGEMENT REGULATION TRANSPORTATION 117-TRANSPORTATION MANAGEMENT Representation Before Regulatory Body... bodies? (a) GSA has oversight of all public utilities used by the Federal Government...

  15. 41 CFR 102-192.175 - What types of support does GSA offer to Federal agency mail management programs?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... mail; (e) Maintaining a current list of agency mail managers; (f) Establishing, developing and... 1221, Washington, DC 20405; or e-mail: federal.mail@gsa.gov. ... does GSA offer to Federal agency mail management programs? 102-192.175 Section 102-192.175...

  16. 41 CFR 102-192.175 - What types of support does GSA offer to Federal agency mail management programs?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... mail; (e) Maintaining a current list of agency mail managers; (f) Establishing, developing and... 1221, Washington, DC 20405; or e-mail: federal.mail@gsa.gov. ... does GSA offer to Federal agency mail management programs? 102-192.175 Section 102-192.175...

  17. 41 CFR 102-36.305 - May we abandon or destroy excess personal property without reporting it to GSA?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... destroy excess personal property without reporting it to GSA? 102-36.305 Section 102-36.305 Public... without reporting it to GSA? Yes, you may abandon or destroy excess personal property when you have made a... when it has neither utility nor monetary value (either as an item or as scrap)....

  18. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or...

  19. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or...

  20. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or...

  1. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or...

  2. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or...

  3. 41 CFR 102-117.35 - What are the advantages and disadvantages of using GSA's tender of service?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What are the advantages and disadvantages of using GSA's tender of service? 102-117.35 Section 102-117.35 Public Contracts and...-117.35 What are the advantages and disadvantages of using GSA's tender of service? (a) It is...

  4. 41 CFR 102-117.35 - What are the advantages and disadvantages of using GSA's tender of service?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What are the advantages and disadvantages of using GSA's tender of service? 102-117.35 Section 102-117.35 Public Contracts and...-117.35 What are the advantages and disadvantages of using GSA's tender of service? (a) It is...

  5. 41 CFR 102-117.35 - What are the advantages and disadvantages of using GSA's tender of service?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What are the advantages and disadvantages of using GSA's tender of service? 102-117.35 Section 102-117.35 Public Contracts and...-117.35 What are the advantages and disadvantages of using GSA's tender of service? (a) It is...

  6. 41 CFR 102-117.35 - What are the advantages and disadvantages of using GSA's tender of service?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What are the advantages and disadvantages of using GSA's tender of service? 102-117.35 Section 102-117.35 Public Contracts and...-117.35 What are the advantages and disadvantages of using GSA's tender of service? (a) It is...

  7. 41 CFR 102-192.90 - What must we include in our annual mail management report to GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... mail in § 102-192.30). (2) These amounts should include all postage costs associated with mailing... regardless of how the postage expense is paid (e.g., GSA's Federal Acquisition Service (FAS) produces a... sources. GSA should include the postage that it uses to mail Marketips in the amounts that it...

  8. Speech privacy: Beyond architectural solutions

    NASA Astrophysics Data System (ADS)

    Mazer, Susan

    2005-09-01

    HIPAA regulations have brought unparalleled pressures on healthcare organizations to protect private and confidential information from reaching third parties. Yet, as this paper explains, often in the middle of noisy corridors and waiting rooms, this same information needs to be quickly transferred from physician to nurse to family member to others for the care of patients. Research and examples are presented that show that when families, patients, staff are participating together, although independently, in the same or adjacent spaces, the ``caf effect'' produces rising noise levels as each person competes to be heard. This threatens the very confidentiality demanded by HIPAA. Solutions to this problem are not easy or completely resolved by engineering or design specifications. This paper makes the case that it is ultimately the culture of a healthcare organization that determines the ``sound'' of a hospital, and any other organization that battles openness with privacy. It presents and discusses proven solutions to address culture in tandem with architectural and acoustic design interventions.

  9. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  10. Employee Privacy Rights: A Management Guide.

    ERIC Educational Resources Information Center

    Shepard, Ira Michael; Olsen, Harry

    Employee privacy rights are considered, along with practical problems and permissible parameters of employer activity. Included is a state-by-state analysis of the status of workplace privacy. Definitions are offered of "invasion of privacy," with attention to four types of privacy invasions: (1) placing someone in a "false light," (2) the public…

  11. Privacy in Social Networks: A Survey

    NASA Astrophysics Data System (ADS)

    Zheleva, Elena; Getoor, Lise

    In this chapter, we survey the literature on privacy in social networks. We focus both on online social networks and online affiliation networks. We formally define the possible privacy breaches and describe the privacy attacks that have been studied. We present definitions of privacy in the context of anonymization together with existing anonymization techniques.

  12. δ-dependency for privacy-preserving XML data publishing.

    PubMed

    Landberg, Anders H; Nguyen, Kinh; Pardede, Eric; Rahayu, J Wenny

    2014-08-01

    An ever increasing amount of medical data such as electronic health records, is being collected, stored, shared and managed in large online health information systems and electronic medical record systems (EMR) (Williams et al., 2001; Virtanen, 2009; Huang and Liou, 2007) [1-3]. From such rich collections, data is often published in the form of census and statistical data sets for the purpose of knowledge sharing and enabling medical research. This brings with it an increasing need for protecting individual people privacy, and it becomes an issue of great importance especially when information about patients is exposed to the public. While the concept of data privacy has been comprehensively studied for relational data, models and algorithms addressing the distinct differences and complex structure of XML data are yet to be explored. Currently, the common compromise method is to convert private XML data into relational data for publication. This ad hoc approach results in significant loss of useful semantic information previously carried in the private XML data. Health data often has very complex structure, which is best expressed in XML. In fact, XML is the standard format for exchanging (e.g. HL7 version 3(1)) and publishing health information. Lack of means to deal directly with data in XML format is inevitably a serious drawback. In this paper we propose a novel privacy protection model for XML, and an algorithm for implementing this model. We provide general rules, both for transforming a private XML schema into a published XML schema, and for mapping private XML data to the new privacy-protected published XML data. In addition, we propose a new privacy property, δ-dependency, which can be applied to both relational and XML data, and that takes into consideration the hierarchical nature of sensitive data (as opposed to "quasi-identifiers"). Lastly, we provide an implementation of our model, algorithm and privacy property, and perform an experimental analysis

  13. SAFETY, SECURITY, HYGIENE AND PRIVACY IN MIGRANT FARMWORKER HOUSING

    PubMed Central

    Arcury, Thomas A.; Weir, Maria M.; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F.; Bischoff, Werner E.; Quandt, Sara A.

    2013-01-01

    Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed. PMID:22776578

  14. Safety, security, hygiene and privacy in migrant farmworker housing.

    PubMed

    Arcury, Thomas A; Weir, Maria M; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F; Bischoff, Werner E; Quandt, Sara A

    2012-01-01

    Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed. PMID:22776578

  15. Health information privacy protection: crisis or common sense?

    PubMed

    Kumekawa, J K

    2001-01-01

    Concerns about the protection of personally identifiable information are not unique to the health care industry; however, consumers view their medical records as more "private" than other information, such as financial data, because involuntary disclosure can affect jobs or health insurance status. This paper briefly touches upon new sweeping federal privacy standards mandated under the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The article outlines who and what is covered under the new rules, considers how practitioners can approach compliance with common sense, addresses concerns related to risk management, discusses consumer health privacy issues, and notes the difficulty of evaluating these rules and regulations. The article also looks at some unique privacy issues facing telemedicine and telehealth practitioners. PMID:11936942

  16. 77 FR 5252 - Federal Travel Regulation; GSA E-Gov Travel Service (ETS) Transition to E-Gov Travel Service 2...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-02

    ... ADMINISTRATION Federal Travel Regulation; GSA E-Gov Travel Service (ETS) Transition to E-Gov Travel Service 2..., DC 22202 E-GOV TRAVEL SERVICE GSA Bulletin ETS 12-01 TO: Heads of Federal Agencies SUBJECT: GSA E-Gov... Regulation (FTR) Part 301-73 requires all agencies to deploy and implement an E-Gov Travel Service (ETS)....

  17. 41 CFR 102-34.220 - What does GSA do if it learns of unofficial use of a Government motor vehicle?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What does GSA do if it learns of unofficial use of a Government motor vehicle? 102-34.220 Section 102-34.220 Public Contracts....220 What does GSA do if it learns of unofficial use of a Government motor vehicle? GSA reports...

  18. 41 CFR 102-34.220 - What does GSA do if it learns of unofficial use of a Government motor vehicle?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What does GSA do if it learns of unofficial use of a Government motor vehicle? 102-34.220 Section 102-34.220 Public Contracts....220 What does GSA do if it learns of unofficial use of a Government motor vehicle? GSA reports...

  19. A Privacy Manager for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Pearson, Siani; Shen, Yun; Mowbray, Miranda

    We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud computing provider to conform to privacy law. We describe different possible architectures for privacy management in cloud computing; give an algebraic description of obfuscation, one of the features of the privacy manager; and describe how the privacy manager might be used to protect private metadata of online photos.

  20. Will you accept the government's friend request? Social networks and privacy concerns.

    PubMed

    Siegel, David A

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim. PMID:24312236

  1. Will You Accept the Government's Friend Request? Social Networks and Privacy Concerns

    PubMed Central

    Siegel, David A.

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim. PMID:24312236

  2. Tangled in a Complex Web of Relationships: Athletic/Academic Advisors Negotiating Privacy Disclosure Warnings with College Student-Athletes

    ERIC Educational Resources Information Center

    Thompson, Jason

    2013-01-01

    To investigate privacy management in the relationship between athletic/academic advisors and college student-athletes, I interviewed 37 advisors to address the following questions: What type of privacy rules do student-athletes communicate to advisors? How do advisors manage student-athletes' private information following these rules?…

  3. Data protection, privacy.

    PubMed

    La Monaca, G; Schiralli, I

    2010-01-01

    The topic of data protection is referred closely to the concept of privacy--characterized by the American political philosophy in order to indicate a sphere recognized as personal, and therefore private or intimate, of the person, which exclude other individuals or society--whose protection has deep roots in the international right. The technological progress in the field of telecommunication has increased the facility of acquisition and spreading of information, the exchange of data, and the possibility of access to confidential information by other people. This made it made necessary the regulation of the management and the transfer of these information in order to protect individual rights and, on the other hand, an easy circulation of data for legitimate and useful goals. PMID:20499037

  4. 41 CFR 102-35.20 - What definitions apply to GSA's personal property regulations?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What definitions apply to GSA's personal property regulations? 102-35.20 Section 102-35.20 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 35-DISPOSITION OF PERSONAL...

  5. 24 CFR 581.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... property in accordance with current regulations. (See 41 CFR 101-47.203-5, 101-47.204-1 and 101-47.303-2... property which is reported excess to GSA as provided in 41 CFR 101-47.402. ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Real property reported excess...

  6. 41 CFR 101-26.503 - Multiple award schedule purchases made by GSA supply distribution facilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Multiple award schedule purchases made by GSA supply distribution facilities. 101-26.503 Section 101-26.503 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT...

  7. 41 CFR 105-62.103 - Access to GSA-originated materials.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... of General Services in 41 CFR part 105-61. (e) Access by the General Accounting Office and... in historical research projects, may be authorized access to classified information or material... information over which GSA has classification jurisdiction. (3) The material requested is...

  8. 41 CFR 105-62.103 - Access to GSA-originated materials.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... of General Services in 41 CFR part 105-61. (e) Access by the General Accounting Office and... in historical research projects, may be authorized access to classified information or material... information over which GSA has classification jurisdiction. (3) The material requested is...

  9. 41 CFR 105-62.103 - Access to GSA-originated materials.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... of General Services in 41 CFR part 105-61. (e) Access by the General Accounting Office and... in historical research projects, may be authorized access to classified information or material... information over which GSA has classification jurisdiction. (3) The material requested is...

  10. 41 CFR 105-62.103 - Access to GSA-originated materials.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... of General Services in 41 CFR part 105-61. (e) Access by the General Accounting Office and... in historical research projects, may be authorized access to classified information or material... information over which GSA has classification jurisdiction. (3) The material requested is...

  11. Gay-Straight Alliance (GSA) Members' Engagement with Sex Education in Canadian High Schools

    ERIC Educational Resources Information Center

    Lapointe, Alicia

    2014-01-01

    This paper offers an examination of gay-straight alliance (GSA) members' engagement with sex education, sexual health, and prejudice and discrimination in Canadian public high schools. It explores how five students' (four straight and one gay-identifying) participation in GSAs served as a springboard for learning about and challenging…

  12. 41 CFR 102-36.210 - Why must we report excess personal property to GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Why must we report excess personal property to GSA? 102-36.210 Section 102-36.210 Public Contracts and Property Management... 36-DISPOSITION OF EXCESS PERSONAL PROPERTY Disposition of Excess Personal Property § 102-36.210...

  13. 41 CFR 102-36.210 - Why must we report excess personal property to GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Why must we report excess personal property to GSA? 102-36.210 Section 102-36.210 Public Contracts and Property Management... 36-DISPOSITION OF EXCESS PERSONAL PROPERTY Disposition of Excess Personal Property § 102-36.210...

  14. 41 CFR 102-35.20 - What definitions apply to GSA's personal property regulations?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... personal property regulations in the FMR (CFR Parts 102-36 through 102-42). Other personal property terms... to GSA's personal property regulations? 102-35.20 Section 102-35.20 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  15. 41 CFR 102-71.20 - What definitions apply to GSA's real property policies?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What definitions apply to GSA's real property policies? 102-71.20 Section 102-71.20 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 71-GENERAL § 102-71.20 What definitions...

  16. 41 CFR 102-71.20 - What definitions apply to GSA's real property policies?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What definitions apply to GSA's real property policies? 102-71.20 Section 102-71.20 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY...

  17. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  18. 48 CFR 552.215-71 - Examination of Records by GSA (Multiple Award Schedule).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Examination of Records by GSA (Multiple Award Schedule). 552.215-71 Section 552.215-71 Federal Acquisition Regulations System GENERAL SERVICES ADMINISTRATION CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text...

  19. 24 CFR 581.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... property in accordance with current regulations. (See 41 CFR 101-47.203-5, 101-47.204-1 and 101-47.303-2... property which is reported excess to GSA as provided in 41 CFR 101-47.402. ... 24 Housing and Urban Development 3 2011-04-01 2010-04-01 true Real property reported excess to...

  20. 41 CFR 101-26.4902-1781 - GSA Form 1781, Motor Vehicle Requisition-Delivery Order.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true GSA Form 1781, Motor Vehicle Requisition-Delivery Order. 101-26.4902-1781 Section 101-26.4902-1781 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  1. 41 CFR 101-26.4902-1781 - GSA Form 1781, Motor Vehicle Requisition-Delivery Order.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true GSA Form 1781, Motor Vehicle Requisition-Delivery Order. 101-26.4902-1781 Section 101-26.4902-1781 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  2. 41 CFR 101-26.4902-1781 - GSA Form 1781, Motor Vehicle Requisition-Delivery Order.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 2 2012-07-01 2012-07-01 false GSA Form 1781, Motor Vehicle Requisition-Delivery Order. 101-26.4902-1781 Section 101-26.4902-1781 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  3. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 2 2012-07-01 2012-07-01 false GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  4. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  5. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  6. 41 CFR 101-26.4902-1781 - GSA Form 1781, Motor Vehicle Requisition-Delivery Order.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true GSA Form 1781, Motor Vehicle Requisition-Delivery Order. 101-26.4902-1781 Section 101-26.4902-1781 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  7. 41 CFR 101-26.4902-1398 - GSA Form 1398: Motor vehicle purchase and inspection label.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true GSA Form 1398: Motor vehicle purchase and inspection label. 101-26.4902-1398 Section 101-26.4902-1398 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT...

  8. 41 CFR 102-118.435 - What procedures does GSA use to perform a postpayment audit?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What procedures does GSA use to perform a postpayment audit? 102-118.435 Section 102-118.435 Public Contracts and Property... cites applicable tariff or tender along with other data relied on to support the overcharge. A...

  9. 41 CFR 102-118.435 - What procedures does GSA use to perform a postpayment audit?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What procedures does GSA use to perform a postpayment audit? 102-118.435 Section 102-118.435 Public Contracts and Property... cites applicable tariff or tender along with other data relied on to support the overcharge. A...

  10. 41 CFR 102-118.435 - What procedures does GSA use to perform a postpayment audit?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What procedures does GSA use to perform a postpayment audit? 102-118.435 Section 102-118.435 Public Contracts and Property... cites applicable tariff or tender along with other data relied on to support the overcharge. A...

  11. 41 CFR 102-118.435 - What procedures does GSA use to perform a postpayment audit?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What procedures does GSA use to perform a postpayment audit? 102-118.435 Section 102-118.435 Public Contracts and Property... cites applicable tariff or tender along with other data relied on to support the overcharge. A...

  12. 41 CFR 102-118.435 - What procedures does GSA use to perform a postpayment audit?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What procedures does GSA use to perform a postpayment audit? 102-118.435 Section 102-118.435 Public Contracts and Property... cites applicable tariff or tender along with other data relied on to support the overcharge. A...

  13. 41 CFR 102-3.100 - What are the responsibilities and functions of GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are the responsibilities and functions of GSA? 102-3.100 Section 102-3.100 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION GENERAL 3-FEDERAL...

  14. 78 FR 73466 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-06

    ... or qualifications for Federal civilian employment, military service, Federal contracts or access to... From the Federal Register Online via the Government Publishing Office OVERSEAS PRIVATE INVESTMENT CORPORATION 22 CFR Part 707 Privacy Act AGENCY: Overseas Private Investment Corporation. ACTION: Notice...

  15. MedlinePlus: Privacy Policy

    MedlinePlus

    ... is available at: https://bitly.com/pages/privacy . Facebook NLM has multiple Facebook pages where we share information about NLM news, ... register or provide personal information to view our Facebook pages. The complete list of NLM Facebook pages ...

  16. Privacy enabling technology for video surveillance

    NASA Astrophysics Data System (ADS)

    Dufaux, Frédéric; Ouaret, Mourad; Abdeljaoued, Yousri; Navarro, Alfonso; Vergnenègre, Fabrice; Ebrahimi, Touradj

    2006-05-01

    In this paper, we address the problem privacy in video surveillance. We propose an efficient solution based on transformdomain scrambling of regions of interest in a video sequence. More specifically, the sign of selected transform coefficients is flipped during encoding. We address more specifically the case of Motion JPEG 2000. Simulation results show that the technique can be successfully applied to conceal information in regions of interest in the scene while providing with a good level of security. Furthermore, the scrambling is flexible and allows adjusting the amount of distortion introduced. This is achieved with a small impact on coding performance and negligible computational complexity increase. In the proposed video surveillance system, heterogeneous clients can remotely access the system through the Internet or 2G/3G mobile phone network. Thanks to the inherently scalable Motion JPEG 2000 codestream, the server is able to adapt the resolution and bandwidth of the delivered video depending on the usage environment of the client.

  17. Meeting the Privacy Requirements for the Development of a Multi-Centre Patient Registry in Canada: The Rick Hansen Spinal Cord Injury Registry

    PubMed Central

    Noonan, Vanessa K.; Thorogood, Nancy P.; Joshi, Phalgun B.; Fehlings, Michael G.; Craven, B. Catharine; Linassi, Gary; Fourney, Daryl R.; Kwon, Brian K.; Bailey, Christopher S.; Tsai, Eve C.; Drew, Brian M.; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F.

    2013-01-01

    Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. PMID:23968640

  18. 45 CFR 1182.3 - Inquiries about the Institute's systems of records or implementation of the Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Public Welfare (Continued) NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES INSTITUTE OF MUSEUM AND... records or implementation of the Privacy Act should be sent to the following address: Institute of...

  19. 45 CFR 1182.3 - Inquiries about the Institute's systems of records or implementation of the Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Public Welfare (Continued) NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES INSTITUTE OF MUSEUM AND... records or implementation of the Privacy Act should be sent to the following address: Institute of...

  20. 45 CFR 1182.3 - Inquiries about the Institute's systems of records or implementation of the Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Public Welfare (Continued) NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES INSTITUTE OF MUSEUM AND... records or implementation of the Privacy Act should be sent to the following address: Institute of...

  1. 45 CFR 1182.3 - Inquiries about the Institute's systems of records or implementation of the Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Public Welfare (Continued) NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES INSTITUTE OF MUSEUM AND... records or implementation of the Privacy Act should be sent to the following address: Institute of...

  2. 45 CFR 1182.3 - Inquiries about the Institute's systems of records or implementation of the Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Public Welfare (Continued) NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES INSTITUTE OF MUSEUM AND... records or implementation of the Privacy Act should be sent to the following address: Institute of...

  3. ENVIRONMENTAL ASSESSMENT OF A WASTE-TO-ENERGY PROCESS: GSA/PENTAGON CO-FIRED BOILER TESTS

    EPA Science Inventory

    Midwest Research Institute (MRI), in conjuction with the General Services Administration (GSA) and the National Center for Resource Recovery (NCRR), conducted a series of emission tests at the Virginia Heating and Refrigeration Plant (VHRP) in Arlington, Virginia (this plant prov...

  4. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PROPERTY 85-PRICING POLICY FOR OCCUPANCY IN GSA SPACE Continued Occupancy, Relocation and Forced Moves... the agency being “forced” to move, including architectural-engineering design, move coordination...

  5. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... PROPERTY 85-PRICING POLICY FOR OCCUPANCY IN GSA SPACE Continued Occupancy, Relocation and Forced Moves... the agency being “forced” to move, including architectural-engineering design, move coordination...

  6. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... PROPERTY 85-PRICING POLICY FOR OCCUPANCY IN GSA SPACE Continued Occupancy, Relocation and Forced Moves... the agency being “forced” to move, including architectural-engineering design, move coordination...

  7. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... PROPERTY 85-PRICING POLICY FOR OCCUPANCY IN GSA SPACE Continued Occupancy, Relocation and Forced Moves... the agency being “forced” to move, including architectural-engineering design, move coordination...

  8. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PROPERTY 85-PRICING POLICY FOR OCCUPANCY IN GSA SPACE Continued Occupancy, Relocation and Forced Moves... the agency being “forced” to move, including architectural-engineering design, move coordination...

  9. Is Privacy Important in Scoliosis Screening?

    ERIC Educational Resources Information Center

    Quick, Miriam M.; Highriter, Marion E.

    1981-01-01

    In a study done to determine the importance of privacy during scoliosis screening, individual privacy was provided for some children. Results indicated a definite lessening of anxiety for those students screened privately. (JN)

  10. Zone Level Occupant-Responsive Building Energy Systems at the GSA

    SciTech Connect

    Robinson, Alastair

    2014-03-01

    The General Services Administration (GSA) partnered with the U.S. Department of Energy (DOE) to develop and implement building energy system retrofits, aiming to reduce energy consumption of at least two building systems by a total of 30 percent or more, as part of DOE’s Commercial Building Partnership (CBP) Program. Lawrence Berkeley National Laboratory (LBNL) provided technical expertise in support of this DOE program, working with the GSA and a team of consultants. This case study reports expected energy savings from appropriate energy efficient design and operations modifications to lighting and heating, ventilating and air conditioning (HVAC) systems at the selected study sites. These retrofits comprised installation of new lighting systems with dimming capability and occupancy-sensor control at the individual light fixture level, and utilized lighting system occupancy sensor signals to continually readjust zone-level ventilation airflow according to the number of people present, down to minimum rates when vacant.

  11. 75 FR 61861 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ...As required by the Privacy Act of 1974 (5 U.S.C. 552a(e)(4)), notice is hereby given that the Department of Veterans Affairs (VA) is updating a system of records in its inventory entitled ``Repatriated American Prisoners of War--VA'' (60VA21). VA is amending the system of records by revising the Purpose(s), System Manager and address, and Routine Uses of Records Maintained in the System. VA is......

  12. 75 FR 61865 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ...As required by the Privacy Act of 1974, 5 U.S.C. 552a(e)(4), notice is hereby given that the Department of Veterans Affairs (VA) proposes to update system of records, ``Veterans Assistance Discharge System--VA'' (45VA21). VA is amending the system of records by revising the Purpose(s), System Manager and address, and Routine Uses of Records Maintained in the System. VA is republishing the......

  13. GSA's Green Proving Ground: Identifying, Testing and Evaluating Innovative Technologies; Preprint

    SciTech Connect

    Kandt, A.; Lowell, M.

    2012-05-01

    This paper will provide an overview of the GPG program and its objectives as well as a summary and status update of the 16 technologies selected for enhanced testing and evaluation in 2011. The federal government's General Services Administration's (GSA) Public Buildings Service (PBS) acquires space on behalf of the federal government through new construction and leasing, and acts as a caretaker for federal properties across the country. PBS owns or leases 9,624 assets and maintains an inventory of more than 370.2 million square feet of workspace, and as such has enormous potential for implementing energy efficient and renewable energy technologies to reduce energy and water use and associated emissions. The Green Proving Ground (GPG) program utilizes GSA's real estate portfolio to test and evaluate innovative and underutilized sustainable building technologies and practices. Findings are used to support the development of GSA performance specifications and inform decision making within GSA, other federal agencies, and the real estate industry. The program aims to drive innovation in environmental performance in federal buildings and help lead market transformation through deployment of new technologies. In 2011, the GPG program selected 16 technologies or practices for rigorous testing and evaluation. Evaluations are currently being performed in collaboration with the Department of Energy's National Laboratories, and a steady stream of results will be forthcoming throughout 2012. This paper will provide an overview of the GPG program and its objectives as well as a summary and status update of the 16 technologies selected for enhanced testing and evaluation in 2011. Lastly, it provides a general overview of the 2012 program.

  14. Aspinall Courthouse: GSA's Historic Preservation and Net-Zero Renovation Case Study

    SciTech Connect

    Chang, R.; Hayter, S.; Hotchkiss, E.; Pless, S.; Sielcken, J.; Smith-Larney, C.

    2014-10-01

    The federal government is mandated with improving efficiency of buildings, incorporating renewable energy, and achieving net-zero energy operations where possible. These challenges led GSA to consider aligning historic preservation renovations with net-zero energy goals. The Wayne N. Aspinall Federal Building and U.S. Courthouse (Aspinall Courthouse), in Grand Junction, Colorado, is an example of a renovation project that aimed to accomplish both historic preservation and net-zero energy goals.

  15. On genomics, kin, and privacy

    PubMed Central

    Telenti, Amalio; Ayday, Erman; Hubaux, Jean Pierre

    2014-01-01

    The storage of greater numbers of exomes or genomes raises the question of loss of privacy for the individual and for families if genomic data are not properly protected. Access to genome data may result from a personal decision to disclose, or from gaps in protection. In either case, revealing genome data has consequences beyond the individual, as it compromises the privacy of family members. Increasing availability of genome data linked or linkable to metadata through online social networks and services adds one additional layer of complexity to the protection of genome privacy.  The field of computer science and information technology offers solutions to secure genomic data so that individuals, medical personnel or researchers can access only the subset of genomic information required for healthcare or dedicated studies. PMID:25254097

  16. 39 CFR 262.5 - Systems (Privacy).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a... comparison of: (1) A Postal Service automated system of records with an automated system of records...

  17. 39 CFR 262.5 - Systems (Privacy).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a... comparison of: (1) A Postal Service automated system of records with an automated system of records...

  18. 39 CFR 262.5 - Systems (Privacy).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a... comparison of: (1) A Postal Service automated system of records with an automated system of records...

  19. 39 CFR 262.5 - Systems (Privacy).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a... comparison of: (1) A Postal Service automated system of records with an automated system of records...

  20. Privacy Regulations and Employee Record Keeping.

    ERIC Educational Resources Information Center

    Ledvinka, James

    1986-01-01

    Reviews the laws governing access to employee records including the U.S. Constitution, especially the Fourth and Fifth Amendments of the Bill of Rights; the National Labor Relations Act; the Privacy Act of 1974; state privacy statutes; and common-law privacy protections from court opinions. Recommendations for management actions are included. (EM)

  1. Sexiled: Privacy Acquisition Strategies of College Roommates

    ERIC Educational Resources Information Center

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  2. Effective Management of Information Security and Privacy

    ERIC Educational Resources Information Center

    Anderson, Alicia

    2006-01-01

    No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…

  3. Pass the Cookies and Uphold the Privacy.

    ERIC Educational Resources Information Center

    Guenther, Kim

    2001-01-01

    Considers how privacy issues related to online profiling affect library patrons and what librarians should do to protect them. Discusses the need for a privacy policy and provides guidelines from the OECD (Organisation for Economic Cooperation and Development) privacy statement generator that can be adapted for libraries. (LRW)

  4. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  5. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  6. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 5 2013-04-01 2013-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  7. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 5 2011-04-01 2011-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  8. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  9. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 5 2014-04-01 2014-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  10. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 5 2012-04-01 2012-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  11. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  12. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  13. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  14. 75 FR 22577 - Proposed Privacy Policy Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... COMMISSION Proposed Privacy Policy Statement AGENCY: U.S. Election Assistance Commission. ACTION: Notice and request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99-...

  15. 39 CFR 262.5 - Systems (Privacy).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 39 Postal Service 1 2011-07-01 2011-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION RECORDS AND INFORMATION MANAGEMENT DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing information about individuals,...

  16. Digression and Value Concatenation to Enable Privacy-Preserving Regression

    PubMed Central

    Li, Xiao-Bai; Sarkar, Sumit

    2015-01-01

    Regression techniques can be used not only for legitimate data analysis, but also to infer private information about individuals. In this paper, we demonstrate that regression trees, a popular data-analysis and data-mining technique, can be used to effectively reveal individuals’ sensitive data. This problem, which we call a “regression attack,” has not been addressed in the data privacy literature, and existing privacy-preserving techniques are not appropriate in coping with this problem. We propose a new approach to counter regression attacks. To protect against privacy disclosure, our approach introduces a novel measure, called digression, which assesses the sensitive value disclosure risk in the process of building a regression tree model. Specifically, we develop an algorithm that uses the measure for pruning the tree to limit disclosure of sensitive data. We also propose a dynamic value-concatenation method for anonymizing data, which better preserves data utility than a user-defined generalization scheme commonly used in existing approaches. Our approach can be used for anonymizing both numeric and categorical data. An experimental study is conducted using real-world financial, economic and healthcare data. The results of the experiments demonstrate that the proposed approach is very effective in protecting data privacy while preserving data quality for research and analysis. PMID:26752802

  17. Privacy and security of patient data in the pathology laboratory

    PubMed Central

    Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904

  18. HIPAA Privacy 101: essentials for case management practice.

    PubMed

    DiBenedetto, Deborah V

    2003-01-01

    The Health Insurance Portability and Accountability Act (HIPAA) has significant impact on the delivery of healthcare in the United States. The Administrative Simplification (AS) requirements of HIPAA are aimed at reducing administrative costs and burdens in the healthcare industry. The core components of HIPAA's AS requirements address healthcare transactions, code sets, security, unique identifiers, and privacy of health information. HIPAA's privacy standard limits the nonconsensual use and release of private health information, gives patients new rights to access their medical records and to know who else has accessed them, restricts most disclosure of health information to the minimum needed for the intended purpose, establishes new criminal and civil sanctions for improper use or disclosure, and establishes new requirements for access to records by researchers and others. This article focuses on HIPAA's privacy requirements as related to case management of workers compensation populations, the treatment of protected health information, and how case managers can ensure they provide appropriate services while navigating the requirements of HIPAA's privacy standard. PMID:12555039

  19. Privacy and security of patient data in the pathology laboratory.

    PubMed

    Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904

  20. Privacy Policy | Smokefree.gov

    Cancer.gov

    The National Cancer Institute (NCI) respects the privacy of users of its Web sites. This is why we have taken the time to disclose our privacy policy and information collection practices. NCI does not disclose, give, sell, or transfer any personal information about visitors unless required to do so by law. NCI automatically collects a limited amount of information about the use of Web sites for statistical purposes, that is, to measure the numbers of visitors. This information may be helpful when considering changes that improve our web sites for future visitors.

  1. Conformance Verification of Privacy Policies

    NASA Astrophysics Data System (ADS)

    Fu, Xiang

    Web applications are both the consumers and providers of information. To increase customer confidence, many websites choose to publish their privacy protection policies. However, policy conformance is often neglected. We propose a logic based framework for formally specifying and reasoning about the implementation of privacy protection by a web application. A first order extension of computation tree logic is used to specify a policy. A verification paradigm, built upon a static control/data flow analysis, is presented to verify if a policy is satisfied.

  2. Intelligence, Dataveillance, and Information Privacy

    NASA Astrophysics Data System (ADS)

    Mace, Robyn R.

    The extent and scope of intelligence activities are expanding in response to technological and economic transformations of the past decades. Intelligence efforts involving aggregated data from multiple public and private sources combined with past abuses of domestic intelligence functions have generated significant concerns among privacy advocates and citizens about the protection of individual civil liberties and information privacy from corporate and governmental misuse. In the information age, effective regulation and oversight are key components in the legitimacy and success of government domestic intelligence activities.

  3. Privacy-enhanced electronic mail

    NASA Astrophysics Data System (ADS)

    Bishop, Matt

    1990-06-01

    The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.

  4. 15 CFR Appendix A to Part 4 - Freedom of Information Public Inspection Facilities, and Addresses for Requests for Records Under...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Freedom of Information Public Inspection Facilities, and Addresses for Requests for Records Under the Freedom of Information Act and Privacy Act, and Requests for Correction or Amendment Under the Privacy Act A Appendix A to Part 4 Commerce and Foreign Trade Office of the Secretary...

  5. The development of specifications and discussion of business models for ensuring speech privacy in the healthcare industry

    NASA Astrophysics Data System (ADS)

    Lavallee, Timothy; Good, Kenneth; Sykes, David

    2005-09-01

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was developed, among other reasons, to hold healthcare providers accountable for the privacy of patient's personal and medical information. It includes language addressing the need for ``reasonable safeguards'' for speech privacy and oral communication in a healthcare setting. After 50 years of development, speech privacy science and mechanisms are well understood. However, current specifications cannot be directly applied and are not specifically written to address the application of the current acoustical knowledgebase to the health care industry's need for compliance. This is a discussion of the state of existing privacy technology and specifications; the ability and availability of mechanisms currently in the health care industry as a possible route for implementation of the regulation; the state of development of specification to address specifically the industry's needs; and a potential business model for implementation.

  6. Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges.

    PubMed

    Sajid, Anam; Abbas, Haider

    2016-06-01

    The widespread deployment and utility of Wireless Body Area Networks (WBAN's) in healthcare systems required new technologies like Internet of Things (IoT) and cloud computing, that are able to deal with the storage and processing limitations of WBAN's. This amalgamation of WBAN-based healthcare systems to cloud-based healthcare systems gave rise to serious privacy concerns to the sensitive healthcare data. Hence, there is a need for the proactive identification and effective mitigation mechanisms for these patient's data privacy concerns that pose continuous threats to the integrity and stability of the healthcare environment. For this purpose, a systematic literature review has been conducted that presents a clear picture of the privacy concerns of patient's data in cloud-assisted healthcare systems and analyzed the mechanisms that are recently proposed by the research community. The methodology used for conducting the review was based on Kitchenham guidelines. Results from the review show that most of the patient's data privacy techniques do not fully address the privacy concerns and therefore require more efforts. The summary presented in this paper would help in setting research directions for the techniques and mechanisms that are needed to address the patient's data privacy concerns in a balanced and light-weight manner by considering all the aspects and limitations of the cloud-assisted healthcare systems. PMID:27155893

  7. Comprehensive quantitative analysis on privacy leak behavior.

    PubMed

    Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan

    2013-01-01

    Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects. PMID:24066046

  8. Comprehensive Quantitative Analysis on Privacy Leak Behavior

    PubMed Central

    Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan

    2013-01-01

    Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects. PMID:24066046

  9. Privacy and data security in E-health: requirements from the user's perspective.

    PubMed

    Wilkowska, Wiktoria; Ziefle, Martina

    2012-09-01

    In this study two currently relevant aspects of using medical assistive technologies were addressed-security and privacy. In a two-step empirical approach that used focus groups (n = 19) and a survey (n = 104), users' requirements for the use of medical technologies were collected and evaluated. Specifically, we focused on the perceived importance of data security and privacy issues. Outcomes showed that both security and privacy aspects play an important role in the successful adoption of medical assistive technologies in the home environment. In particular, analysis of data with respect to gender, health-status and age (young, middle-aged and old users) revealed that females and healthy adults require, and insist on, the highest security and privacy standards compared with males and the ailing elderly. PMID:23011814

  10. Education, Technology, and Individual Privacy.

    ERIC Educational Resources Information Center

    Grayson, Lawrence P.

    1978-01-01

    Modern technological devices, along with advances in the behavioral sciences, can threaten the privacy of students. Technology that can reveal innermost thoughts and motives, or can change basic values and behaviors, must be used judiciously and only by qualified professionals under strictly controlled conditions. (Author)

  11. Panel: RFID Security and Privacy

    NASA Astrophysics Data System (ADS)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  12. The Privacy Act of 1974.

    ERIC Educational Resources Information Center

    O'Reilly, James T.

    This report describes the possible impact of the comprehensive Privacy Act of 1974, which went into effect on 27 September 1975. Specifically, the implications of the act for limitation of disclosure, federal information collection, individual access, private suits; criminal provisions; and exceptions to the provisions of the law are detailed. In…

  13. 78 FR 46256 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code...

  14. Privacy and Security: A Bibliography.

    ERIC Educational Resources Information Center

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  15. Privacy-protecting video surveillance

    NASA Astrophysics Data System (ADS)

    Wickramasuriya, Jehan; Alhazzazi, Mohanned; Datt, Mahesh; Mehrotra, Sharad; Venkatasubramanian, Nalini

    2005-02-01

    Forms of surveillance are very quickly becoming an integral part of crime control policy, crisis management, social control theory and community consciousness. In turn, it has been used as a simple and effective solution to many of these problems. However, privacy-related concerns have been expressed over the development and deployment of this technology. Used properly, video cameras help expose wrongdoing but typically come at the cost of privacy to those not involved in any maleficent activity. This work describes the design and implementation of a real-time, privacy-protecting video surveillance infrastructure that fuses additional sensor information (e.g. Radio-frequency Identification) with video streams and an access control framework in order to make decisions about how and when to display the individuals under surveillance. This video surveillance system is a particular instance of a more general paradigm of privacy-protecting data collection. In this paper we describe in detail the video processing techniques used in order to achieve real-time tracking of users in pervasive spaces while utilizing the additional sensor data provided by various instrumented sensors. In particular, we discuss background modeling techniques, object tracking and implementation techniques that pertain to the overall development of this system.

  16. Facebook: When Education Meets Privacy

    ERIC Educational Resources Information Center

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  17. College and University Privacy Leadership

    ERIC Educational Resources Information Center

    Showalter, Rodney J.

    2009-01-01

    Beginning in the late 1990s, international corporations began hiring Chief Privacy Officers (CPOs). By 2002, large universities responded to this trend by creating this distinct position or modifying an existing job description to include CPO responsibilities. While not every registrar assumes the role of CPO, increasing practical and legislative…

  18. Providing Source-Location Privacy in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Li, Yun; Ren, Jian

    Wireless sensor networks (WSN) have been widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized detection, interception and and even node capture. Privacy is becoming one of the major issues that jeopardize the successful deployment and survivability of wireless sensor networks. While confidentiality of the message can be ensured through content encryption, it is much more difficult to adequately address the source-location privacy. For WSN, source-location privacy service is further complicated by the fact that the sensor nodes consist of low-cost and low-power radio devices, computationally intensive cryptographic algorithms (such as public-key cryptosystems) and large scale broadcasting-based protocols are not suitable for WSN. In this paper, we propose a two-step routing strategy for the messages to be routed from the actual source node to the SINK node through either a single, or multiple, randomly selected intermediate node(s) away from the source node so that it is to make it infeasible for the adversaries to trace back to the source node through hop-by-hop routing analysis. In the first protocol, the messages will be routed to a single intermediate node. This scheme can provide very good local source-location privacy. We also propose routing through multiple randomly selected intermediate nodes based on angle and quadrant to further improve the performance and security. While providing source-location privacy for WSN, our simulation results demonstrate that the proposed schemes are very efficient in energy consumption, and transmission latency. The proposed schemes can also assurance high message delivery ratio. Therefore, they can be used for many practical applications.

  19. Public Perspectives of Mobile Phones' Effects on Healthcare Quality and Medical Data Security and Privacy: A 2-Year Nationwide Survey.

    PubMed

    Richardson, Joshua E; Ancker, Jessica S

    2015-01-01

    Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician's electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized. PMID:26958246

  20. Public Perspectives of Mobile Phones’ Effects on Healthcare Quality and Medical Data Security and Privacy: A 2-Year Nationwide Survey

    PubMed Central

    Richardson, Joshua E.; Ancker, Jessica S.

    2015-01-01

    Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician’s electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized. PMID:26958246

  1. Using global sensitivity analysis to understand higher order interactions in complex models: an application of GSA on the Revised Universal Soil Loss Equation (RUSLE) to quantify model sensitivity and implications for ecosystem services management in Costa Rica

    NASA Astrophysics Data System (ADS)

    Fremier, A. K.; Estrada Carmona, N.; Harper, E.; DeClerck, F.

    2011-12-01

    Appropriate application of complex models to estimate system behavior requires understanding the influence of model structure and parameter estimates on model output. To date, most researchers perform local sensitivity analyses, rather than global, because of computational time and quantity of data produced. Local sensitivity analyses are limited in quantifying the higher order interactions among parameters, which could lead to incomplete analysis of model behavior. To address this concern, we performed a GSA on a commonly applied equation for soil loss - the Revised Universal Soil Loss Equation. USLE is an empirical model built on plot-scale data from the USA and the Revised version (RUSLE) includes improved equations for wider conditions, with 25 parameters grouped into six factors to estimate long-term plot and watershed scale soil loss. Despite RUSLE's widespread application, a complete sensitivity analysis has yet to be performed. In this research, we applied a GSA to plot and watershed scale data from the US and Costa Rica to parameterize the RUSLE in an effort to understand the relative importance of model factors and parameters across wide environmental space. We analyzed the GSA results using Random Forest, a statistical approach to evaluate parameter importance accounting for the higher order interactions, and used Classification and Regression Trees to show the dominant trends in complex interactions. In all GSA calculations the management of cover crops (C factor) ranks the highest among factors (compared to rain-runoff erosivity, topography, support practices, and soil erodibility). This is counter to previous sensitivity analyses where the topographic factor was determined to be the most important. The GSA finding is consistent across multiple model runs, including data from the US, Costa Rica, and a synthetic dataset of the widest theoretical space. The three most important parameters were: Mass density of live and dead roots found in the upper inch

  2. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  3. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  4. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Model privacy form and... Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of... content requirements of §§ 160.6 and 160.7 of this part, although use of the model privacy form is...

  5. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  6. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  7. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  8. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  9. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  10. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  11. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  12. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  13. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  14. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  15. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the...

  16. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  17. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  18. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  19. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  20. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  1. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  2. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  3. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendixA of this part, consistent with the instructions in...

  4. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  5. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  6. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  7. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  8. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  9. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  10. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  11. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  12. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  13. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  14. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  15. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  16. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  17. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  18. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  19. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 13 Business Credit and Assistance 1 2013-01-01 2013-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  20. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  1. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  2. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 13 Business Credit and Assistance 1 2014-01-01 2014-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  3. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section 332.2 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form...

  4. META-GSA: Combining Findings from Gene-Set Analyses across Several Genome-Wide Association Studies

    PubMed Central

    Rosenberger, Albert; Friedrichs, Stefanie; Amos, Christopher I.; Brennan, Paul; Fehringer, Gordon; Heinrich, Joachim; Hung, Rayjean J.; Muley, Thomas; Müller-Nurasyid, Martina; Risch, Angela; Bickeböller, Heike

    2015-01-01

    Introduction Gene-set analysis (GSA) methods are used as complementary approaches to genome-wide association studies (GWASs). The single marker association estimates of a predefined set of genes are either contrasted with those of all remaining genes or with a null non-associated background. To pool the p-values from several GSAs, it is important to take into account the concordance of the observed patterns resulting from single marker association point estimates across any given gene set. Here we propose an enhanced version of Fisher’s inverse χ2-method META-GSA, however weighting each study to account for imperfect correlation between association patterns. Simulation and Power We investigated the performance of META-GSA by simulating GWASs with 500 cases and 500 controls at 100 diallelic markers in 20 different scenarios, simulating different relative risks between 1 and 1.5 in gene sets of 10 genes. Wilcoxon’s rank sum test was applied as GSA for each study. We found that META-GSA has greater power to discover truly associated gene sets than simple pooling of the p-values, by e.g. 59% versus 37%, when the true relative risk for 5 of 10 genes was assume to be 1.5. Under the null hypothesis of no difference in the true association pattern between the gene set of interest and the set of remaining genes, the results of both approaches are almost uncorrelated. We recommend not relying on p-values alone when combining the results of independent GSAs. Application We applied META-GSA to pool the results of four case-control GWASs of lung cancer risk (Central European Study and Toronto/Lunenfeld-Tanenbaum Research Institute Study; German Lung Cancer Study and MD Anderson Cancer Center Study), which had already been analyzed separately with four different GSA methods (EASE; SLAT, mSUMSTAT and GenGen). This application revealed the pathway GO0015291 “transmembrane transporter activity” as significantly enriched with associated genes (GSA-method: EASE, p = 0

  5. Privacy information management for video surveillance

    NASA Astrophysics Data System (ADS)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  6. The functional hepatic volume assessed by 99mTc-GSA hepatic scintigraphy.

    PubMed

    Wu, J; Ishikawa, N; Takeda, T; Tanaka, Y; Pan, X Q; Sato, M; Todoroki, T; Hatakeyama, R; Itai, Y

    1995-11-01

    The accuracy of measurement of the functional hepatic volume by single photon emission computed tomography (SPECT) with 99mTc-galactosyl serum albumin (99mTc-GAS) was evaluated. 99mTc-GSA planar scintigraphic images were obtained dynamically and the hepatic SPECT imaging was then performed in 25 patients with hepatobiliary tumors. The patients were divided into 4 groups with normal hepatic function, and mild, moderate and severe hepatic dysfunction. The functional hepatic volume determined by SPECT was compared with the morphological hepatic volume determined by compute tomography. The ratio of the hepatic volumes obtained by the two methods was calculated. The mean hepatic volume ratio was 96.6 +/- 2.3% in the normal hepatic function group and 95.9 +/- 2.2% in the mild dysfunction group (n.s.). In both the moderate and severe hepatic dysfunction groups, the hepatic volume ratio was smaller than that in the normal group (87.9 +/- 5.2%, p < 0.0001, and 71.9 +/- 7.6%, p < 0.0001, respectively). There was a linear correlation between the hepatic volume ration and various indices of reserve hepatic function, such as LHL15 (r = 0.83, p < 0.0001), HH15(r = 0.74, p < 0.0001), and ICG15 (r = 0.75, p < 0.0005). These results indicate that the hepatic volume ratio is proportional to the severity of hepatic dysfunction, and suggest that the functional hepatic volume measured with 99mTc-GSA faithfully reflects the functioning hepatocyte mass. 99mTc-GSA scintigraphy and hepatic SPECT therefore provide information regarding global and regional reserve hepatic function. PMID:8770291

  7. 76 FR 19307 - Privacy Act of 1974; Amendment of Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-07

    ...In accordance with the Privacy Act of 1974, as amended, the U.S. Department of Agriculture (USDA) is amending an existing Forest Service Privacy Act system of records, USDA/FS-3, Uniform Allowance...

  8. Genetic privacy: orthodoxy or oxymoron?

    PubMed Central

    Sommerville, A; English, V

    1999-01-01

    In this paper we question whether the concept of "genetic privacy" is a contradiction in terms. And, if so, whether the implications of such a conclusion, inevitably impact on how society comes to perceive privacy and responsibility generally. Current law and ethical discourse place a high value on self-determination and the rights of individuals. In the medical sphere, the recognition of patient "rights" has resulted in health professionals being given clear duties of candour and frankness. Dilemmas arise, however, when patients decline to know relevant information or, knowing it, refuse to share it with others who may also need to know. This paper considers the notions of interconnectedness and responsibility to others which are brought to the fore in the genetic sphere and which challenge the primacy afforded to personal autonomy. It also explores the extent to which an individual's perceived moral obligations can or should be enforced. PMID:10226920

  9. Privacy and security in teleradiology.

    PubMed

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. PMID:19914020

  10. Fictional privacy among Facebook users.

    PubMed

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures. PMID:23045871

  11. Trust and Privacy in Healthcare

    NASA Astrophysics Data System (ADS)

    Singleton, Peter; Kalra, Dipak

    This paper considers issues of trust and privacy in healthcare around increased data-sharing through Electronic Health Records (EHRs). It uses a model structured around different aspects of trust in the healthcare organisation’s reasons for greater data-sharing and their ability to execute EHR projects, particularly any associated confidentiality controls. It reflects the individual’s personal circumstances and attitude to use of health records.

  12. Patient Privacy: A Consumer Protection Approach

    PubMed Central

    Brannigan, Vincent M.

    1983-01-01

    In the United States, a “Constitutional Analysis” of medical data privacy has been so far unsuccessful in obtaining significant protection. Statutory protection has evolved primarily to protect the citizen against the state, not to vindicate the privacy interest of the individual. A “Consumer Protection” approach rather than a right to privacy approach can be used to develop a coherent, practical approach to the needs of various parties in the health care system in the U.S.

  13. 77 FR 27756 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ...In accordance with the Privacy Act of 1974, as amended (Privacy Act), the Department of Education (Department) deletes one system of records from its existing inventory of systems of records subject to the Privacy...

  14. A Progress Report on Information Privacy and Data Security.

    ERIC Educational Resources Information Center

    Salton, Gerard

    1980-01-01

    Describes the role of information privacy in modern society, examines recent legal cases to illustrate how privacy cases are adjudicated and to identify the limits of available privacy protection, and raises issues regarding techniques for insuring data confidentiality. (FM)

  15. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    PubMed

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs. PMID:25552240

  16. Image feature extraction in encrypted domain with privacy-preserving SIFT.

    PubMed

    Hsu, Chao-Yung; Lu, Chun-Shien; Pei, Soo-Chang

    2012-11-01

    Privacy has received considerable attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario where the server is resource-abundant, and is capable of finishing the designated tasks. It is envisioned that secure media applications with privacy preservation will be treated seriously. In view of the fact that scale-invariant feature transform (SIFT) has been widely adopted in various fields, this paper is the first to target the importance of privacy-preserving SIFT (PPSIFT) and to address the problem of secure SIFT feature extraction and representation in the encrypted domain. As all of the operations in SIFT must be moved to the encrypted domain, we propose a privacy-preserving realization of the SIFT method based on homomorphic encryption. We show through the security analysis based on the discrete logarithm problem and RSA that PPSIFT is secure against ciphertext only attack and known plaintext attack. Experimental results obtained from different case studies demonstrate that the proposed homomorphic encryption-based privacy-preserving SIFT performs comparably to the original SIFT and that our method is useful in SIFT-based privacy-preserving applications. PMID:22711774

  17. Managing Your Private and Public Data: Bringing Down Inference Attacks Against Your Privacy

    NASA Astrophysics Data System (ADS)

    Salamatian, Salman; Zhang, Amy; du Pin Calmon, Flavio; Bhamidipati, Sandilya; Fawaz, Nadia; Kveton, Branislav; Oliveira, Pedro; Taft, Nina

    2015-10-01

    We propose a practical methodology to protect a user's private data, when he wishes to publicly release data that is correlated with his private data, in the hope of getting some utility. Our approach relies on a general statistical inference framework that captures the privacy threat under inference attacks, given utility constraints. Under this framework, data is distorted before it is released, according to a privacy-preserving probabilistic mapping. This mapping is obtained by solving a convex optimization problem, which minimizes information leakage under a distortion constraint. We address practical challenges encountered when applying this theoretical framework to real world data. On one hand, the design of optimal privacy-preserving mechanisms requires knowledge of the prior distribution linking private data and data to be released, which is often unavailable in practice. On the other hand, the optimization may become untractable and face scalability issues when data assumes values in large size alphabets, or is high dimensional. Our work makes three major contributions. First, we provide bounds on the impact on the privacy-utility tradeoff of a mismatched prior. Second, we show how to reduce the optimization size by introducing a quantization step, and how to generate privacy mappings under quantization. Third, we evaluate our method on three datasets, including a new dataset that we collected, showing correlations between political convictions and TV viewing habits. We demonstrate that good privacy properties can be achieved with limited distortion so as not to undermine the original purpose of the publicly released data, e.g. recommendations.

  18. Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Burghardt, Thorben; Buchmann, Erik; Müller, Jens; Böhm, Klemens

    Location based services (LBS) let people retrieve and share information related to their current position. Examples are Google Latitude or Panoramio. Since LBS share user-related content, location information etc., they put user privacy at risk. Literature has proposed various privacy mechanisms for LBS. However, it is unclear which mechanisms humans really find useful, and how they make use of them. We present a user study that addresses these issues. To obtain realistic results, we have implemented a geotagging application on the web and on GPS cellphones, and our study participants use this application in their daily lives. We test five privacy mechanisms that differ in the awareness, mental effort and degree of informedness required from the users. Among other findings, we have observed that in situations where a single simple mechanism does not meet all privacy needs, people want to use simple and sophisticated mechanisms in combination. Further, individuals are concerned about the privacy of others, even when they do not value privacy for themselves.

  19. The Need for Privacy and the Application of Privacy to the Day Care Setting.

    ERIC Educational Resources Information Center

    Jacobs, Ellen

    This paper, focusing on young children's need for privacy, describes a study conducted to determine the manner in which children in day care centers resolve the problem of reduced space and time for privacy. A pilot study revealed that children displayed three privacy seeking behaviors: (1) verbal and nonverbal territorial behavior (use or defense…

  20. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... Station, National Aeronautics and Space Administration, Sandusky, OH 44870. Location 14 MSFC Michoud... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records Appendices AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Revisions of NASA Appendices to Privacy Act System...

  1. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... Aeronautics and Space Administration is issuing public notice of its proposal to significantly alter a... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of proposed revisions to an existing Privacy Act system...

  2. 77 FR 26027 - Privacy Act: Notification of a New Privacy Act System of Records, Veterans Homelessness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ... Maintaining Records About Individuals,'' July 25, 1994 (59 FR 37914). Authority: 5 U.S.C. 552a 88 Stat. 1896... URBAN DEVELOPMENT Privacy Act: Notification of a New Privacy Act System of Records, Veterans... Housing and Urban Development (HUD) proposes to establish a new Privacy Act of 1974 (5 U.S.C. 552a)...

  3. Privacy Challenges for Wireless Medical Devices

    SciTech Connect

    Lagesse, Brent J

    2010-01-01

    Implantable medical devices are becoming more pervasive as new technologies increase their reliability and safety. Furthermore, these devices are becoming increasingly reliant on wireless communication for interaction with the device. Such technologies have the potential to leak information that could be utilized by an attacker to threaten the lives of patients. Privacy of patient information is essential; however, this information is not the only privacy issue that must be considered. In this paper, we discuss why information privacy is insufficient for protecting patients from some attacks and how information regarding the presence of individual devices can leak vulnerabilities. Furthermore, we examine existing privacy enhancing algorithms and discuss their applicability to implantable medical devices.

  4. Customer privacy on UK healthcare websites.

    PubMed

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality. PMID:16954055

  5. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration...

  6. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration...

  7. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration...

  8. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration...

  9. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration...

  10. 41 CFR 102-34.335 - How do I submit information to the General Services Administration (GSA) for the Federal Fleet...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... information to the General Services Administration (GSA) for the Federal Fleet Report (FFR)? 102-34.335... (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 34-MOTOR VEHICLE MANAGEMENT Federal Fleet Report... Fleet Report (FFR)? (a) Annually, agencies must submit to GSA the information needed to produce the...

  11. Proposed draft document for GSA office waste removal and procurement of densified refuse derived fuel for use as a supplemental fuel in GAS operated boilers

    NASA Astrophysics Data System (ADS)

    Campbell, J. A.

    1981-09-01

    A contract specifying waste collection and disposal from buildings managed by Government Services Administration (GSA) in the Washington, D. C. area and the production and delivery of pelletized fuel for burning with coal in one or two GSA steam generating plants is given.

  12. Contract and beyond GEMnet status and accomplishments: GSA's energy and maintenance network

    SciTech Connect

    Piette, Mary Ann; Kinney, Satkartar; Levi, Mark; McBride, David; May, Stephen

    2002-05-01

    The U.S. General Services Administration Pacific Rim Region (Region 9), manages over 20 million gross square feet of federally owned office space, plus additional leased office space, for the federal government in California, Nevada, Arizona, Hawaii and the Pacific territories. To assist in this real estate management the Pacific Rim Region is developing the GSA Energy and Maintenance Network, or GEMnet. GEMnet is a collection of information technology initiatives, including remote monitoring and control to reduce operational costs by improving energy efficiency, reducing peak demand, and optimizing maintenance in buildings. Ultimately the various systems use a common database platform. This paper describes the status and plans for GEMnet, focusing on how it compares with related monitoring and information technology currently used in nonresidential buildings. This paper will also report on recent activities within the GEMnet purview, demand-shedding and retro-commissioning. For example, two large GSA office buildings in the San Francisco Bay Area participated in the California Independent System Operator (ISO) demand relief program (DRP) during the summer of 2001, shedding nearly 1 MW when called upon. In conjunction with the fielding of GEMnet related programs, a series of retro-commissioning projects is being implemented, scoped to the needs of particular buildings. Details on the BAS retro-commissioning at one building is presented.

  13. Recurrent hepatitis C after living donor liver transplantation detected by Tc-99m GSA liver scintigraphy.

    PubMed

    Kaibori, Masaki; Ha-Kawa, Sang Kil; Uchida, Yoichiro; Ishizaki, Morihiko; Hijikawa, Takeshi; Saito, Takamichi; Imamura, Atsushi; Hirohara, Junko; Uemura, Yoshiko; Tanaka, Koichi; Kamiyama, Yasuo

    2006-11-01

    Recurrence of hepatitis C virus (HCV) after living donor liver transplantation was investigated using technetium-99m- diethylenetriaminepentaacetic acid-galactosyl human serum albumin (Tc-99m-GSA) liver scintigraphy. Four patients with decompensated cirrhosis due to HCV infection were retrospectively reviewed in this study. Scintigraphy was performed to determine the hepatic uptake ratio of the tracer corrected for disappearance from the blood, as well as the maximal removal rate of the tracer by hepatocytes, as parameters of hepatic functional reserve. In all patients, serum HCV ribonucleic acid (RNA) was detected 3 months after transplantation. The corrected hepatic uptake ratio and removal rate showed little change after transplantation in two patients without the recurrence of HCV infection. In another two patients, these levels were decreased at 3 months after transplantation. In one patient, recurrent HCV infection was diagnosed by confirmatory histologic examination at 12 months after transplantation. In the other patient, both levels declined further at 8 months. Although treatment was initiated with a combination of interferon plus ribavirin, this patient died of progressive hepatic failure. In conclusion, a decrease in scintigraphic parameters at 3 months after transplantation suggests recurrent HCV infection affecting the graft. Tc-99m-GSA liver scintigraphy is a useful noninvasive method for evaluating graft functional reserve. PMID:16977504

  14. GSA's Teacher Advocate Program - getting teachers to be advocates for Earth Science

    NASA Astrophysics Data System (ADS)

    Lewis, G. B.

    2011-12-01

    After parents, teachers are they most influential people when it comes to students leaning about their world. However, when it comes to Earth science, the vast majority of our teachers have little to no Earth science training and lack the resources to run exciting and challenging classes on Earth science topics for their students. The Geological Society of America (GSA) is committed to reversing that trend by developing easy to use resources and training teachers on how to use them in their classrooms. Through a program called the Teacher Advocate Program (TAP), GSA has already had teachers using Earth science materials with over 6 million students (1.3 million a year). Formally established in 2003, TAP aims to raise the number of teachers who are advocates for geoscience in their classrooms, schools and school districts by providing those teachers with: Low cost teaching resources that provide them with teaching notes, teaching materials (images, models etc) and usable class room activities. Low cost training opportunities for teachers on how to use TAP materials. In-field experiences for teachers to provide them with teaching materials and insights.

  15. Awards and Addresses Summary

    PubMed Central

    2008-01-01

    Each year at the annual ASHG meeting, addresses are given in honor of the society and a number of award winners. A summary of each of these addresses is given below. On the next pages, we have printed the Presidential Address and the addresses for the William Allan Award. The other addresses, accompanied by pictures of the speakers, can be found at www.ashg.org.

  16. 76 FR 44033 - Privacy Act of 1974, as Amended; Notice of a New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-22

    ... data, educational, business, or volunteer affiliation. AUTHORITY FOR MAINTENANCE OF THE SYSTEM... when no longer needed for agency business. SYSTEM MANAGER AND ADDRESS: Policy official is the Director... Office of the Secretary Privacy Act of 1974, as Amended; Notice of a New System of Records AGENCY:...

  17. 75 FR 15441 - Privacy Act of 1974; Report of an Altered System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-29

    ...In accordance with the requirements of the Privacy Act of 1974, the Health Resources and Services Administration (HRSA) is publishing notice of a proposal to alter the system of records for Health Professions Planning and Evaluation (SORN 09-15-0046; 63FR14124). The purpose of these alterations is to change the name, to update addresses, authority for maintenance, to improve clarity......

  18. 77 FR 29596 - Privacy Act of 1974; Revision and Republication of Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-18

    ..., phone number. Authority for maintenance of the system: 5 U.S.C. Part III, is the authority for the... stored in file folders. Extracts of these records, including tax ID number, address, and phone number... COMMISSION Privacy Act of 1974; Revision and Republication of Systems of Records AGENCY: Consumer...

  19. 76 FR 35963 - Disclosure of Information; Privacy Act Regulations; Notice and Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-21

    ... CORPORATION 12 CFR Parts 309 and 310 RIN 3064-AD83 Disclosure of Information; Privacy Act Regulations; Notice... disclosure of information and the PA, as amended. In taking this action the FDIC's goal is to avoid potential... to correct addresses and other matters that have changed since the FDIC's rules involving...

  20. 77 FR 13388 - Treasury Inspector General for Tax Administration; Privacy Act of 1974: Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-06

    ... Treasury Inspector General for Tax Administration; Privacy Act of 1974: Computer Matching Program AGENCY... conduct of TIGTA's computer matching program. DATES: Effective Date: April 5, 2012. ADDRESSES: Comments or... Administration, (202) 622-4068. SUPPLEMENTARY INFORMATION: TIGTA's computer matching program assists in...

  1. 75 FR 42453 - Office of Child Support Enforcement; Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-21

    ... HUMAN SERVICES Administration for Children and Families Office of Child Support Enforcement; Privacy Act... Enforcement, Administration for Children and Families, 370 L'Enfant Promenade, SW., 4th Floor East, Washington, DC 20447. Comments received will be available for public inspection at this address from 9 a.m. to...

  2. 76 FR 56762 - Privacy Act of 1974; Notice of Updated Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-14

    ... or other entity of the United States Government is a party before a court or administrative body. b... AND ADDRESS: Office of the Chief People Officer (C), Office of Human Capital Management (CH), General... ADMINISTRATION Privacy Act of 1974; Notice of Updated Systems of Records AGENCY: General Services...

  3. 77 FR 60475 - Meeting of the Compact Council for the National Crime Prevention and Privacy Compact

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-03

    ... Federal Bureau of Investigation Meeting of the Compact Council for the National Crime Prevention and Privacy Compact AGENCY: Federal Bureau of Investigation, DOJ. ACTION: Meeting notice. SUMMARY: The purpose... address this session of the Council should notify the Federal Bureau Of Investigation......

  4. 76 FR 66326 - Meeting of the Compact Council for the National Crime Prevention and Privacy Compact

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-26

    ... Federal Bureau of Investigation Meeting of the Compact Council for the National Crime Prevention and Privacy Compact AGENCY: Federal Bureau of Investigation. ACTION: Meeting notice. SUMMARY: The purpose of... address this session of the Council should notify the Federal Bureau Of......

  5. The Need for Continuing Education on Rapidly Changing Business Issues: Internet Privacy as a Telling Example.

    ERIC Educational Resources Information Center

    Bozman, Carl S.; Pettit-O'Malley, Kathy L.

    2002-01-01

    A survey of 75 business faculty revealed that 80% spent less than 3 hours per year covering Internet privacy issues. There was a discrepancy between self-perceptions of their knowledge of the issues and their ability to answer questions about them. Better-informed faculty were not those who spent the most time addressing the issues. (Contains 22…

  6. Privacy-Preserving Location-Based Services

    ERIC Educational Resources Information Center

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  7. A Deontological View of the Privacy Debate.

    ERIC Educational Resources Information Center

    Wilson, Alan

    The mass media are at odds with the public on issues concerning privacy, i.e., issues concerning whether private information about a person should be printed in a newspaper or magazine. In a 1982 survey, one journalist/respondent said his or her newspaper "almost always" favored the public's right to know over a person's right to privacy.…

  8. 75 FR 37287 - Privacy Act Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-29

    ... April 19, 2010 (75 FR 20298) for a public comment period to end on June 18, 2010. This rule amends the... criminal law enforcement duties. (2) From subsection (c)(4) and (d) because notification would alert a... regulations implementing the Privacy Act of 1974 (Privacy Act), Public Law 93-579, 5 U.S.C. 552a. This...

  9. 77 FR 19095 - Privacy Act; Implementation; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ... (77 FR 15595-15596), Department of Defense published a direct final rule titled Privacy Act... In the direct final rule (FR Doc. 2012-6170) published on March 16, 2012 (77 FR 15595-15596), make... of the Secretary 32 CFR Part 322 Privacy Act; Implementation; Correction AGENCY: Office of...

  10. 78 FR 69551 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... as follows: PART 319--DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM 0 1. The authority citation for 32 CFR part 319 continues to read as follows: Authority: Pub. L. 93-579, 88 Stat. 1896 (5 U.S.C. 552a). 0... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency,...

  11. 78 FR 69550 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ...: PART 319--DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM 0 1. The authority citation for 32 CFR part 319 continues to read as follows: Authority: Pub. L. 93-579, 88 Stat. 1896 (5 U.S.C. 552a). 0 2. Section 319.13... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency,...

  12. 76 FR 51869 - Privacy Act Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-19

    ... regulation on the Privacy Act at 12 CFR part 1204 (74 FR 33907 (July 14, 2009)). The final regulation... / Friday, August 19, 2011 / Rules and Regulations#0;#0; ] FEDERAL HOUSING FINANCE AGENCY 12 CFR Part 1204 RIN 2590-AA46 Privacy Act Implementation AGENCY: Federal Housing Finance Agency. ACTION: Interim...

  13. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  14. Reconsidering the Right to Privacy in Canada

    ERIC Educational Resources Information Center

    Shade, Leslie Regan

    2008-01-01

    This article argues that post-September 11 political debates and legislation around security necessitates a reconsideration of a right to privacy in Canada. It looks at the proposal for a Canadian Charter of Privacy Rights promoted by Senator Sheila Finestone in the late 1990s and the current challenges of emergent material technologies…

  15. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  16. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  17. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 1 2014-10-01 2014-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  18. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  19. Protecting Privacy in Computerized Medical Information.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Office of Technology Assessment.

    This report analyzes the implications of computerized medical information and the challenges it brings to individual privacy. The report examines the nature of the privacy interest in health care information and the current state of the law protecting that information; the nature of proposals to computerize health care information and the…

  20. 77 FR 15591 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is deleting... makes nonsubstantive changes to the Defense Intelligence Agency Privacy Program rules. These...

  1. 77 FR 57013 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is updating the Defense Intelligence Agency Privacy Act Program, by adding the (k)(2) exemption to...

  2. 76 FR 49661 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ...The Defense Logistics Agency (DLA) is updating the DLA Privacy Act Program Rules by updating the language of the (k)(2) exemption. The update of the exemption will more accurately describe the basis for exempting the records. The Privacy Act system of records notice, S500.20, entitled ``Defense Logistics Agency Criminal Incident Reporting System Records'', has already been published on June 8,......

  3. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL INDIAN GAMING COMMISSION, DEPARTMENT OF THE INTERIOR GAMING LICENSES AND BACKGROUND INVESTIGATIONS FOR KEY EMPLOYEES AND PRIMARY MANAGEMENT OFFICIALS BACKGROUND INVESTIGATIONS FOR PRIMARY MANAGEMENT OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice....

  4. The Press, Privacy, and Community Mores.

    ERIC Educational Resources Information Center

    Glasser, Theodore L.

    Because of judicial indifference and legislative inaction, the conflict between the right of privacy and the freedom of the press is no closer to a resolution than it was a century ago. William Prosser's reduction of the common law of privacy into four separate torts has not solved the problem. The concept of "newsworthiness" has not been helpful…

  5. Information Parents Must Know about Online Privacy.

    ERIC Educational Resources Information Center

    Markell, Ginny

    2000-01-01

    Presents four tips to help parents monitor whether website operators are complying with the 1988 Children's Online Privacy Protection Act: look for privacy policies on children's websites; determine if they ask for parental consent to collect personal information; regularly monitor information being sent to children; and determine if web operators…

  6. Just in Time Research: Privacy Practices

    ERIC Educational Resources Information Center

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  7. Privacy and Ethics in Undergraduate GIS Curricula

    ERIC Educational Resources Information Center

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  8. 78 FR 12298 - Privacy Act of 1974; System of Records-School Participation Division Complaints Tracking System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-22

    ... Privacy Act of 1974; System of Records--School Participation Division Complaints Tracking System AGENCY... proposing to add a new system of records entitled ``School Participation Division Complaints Tracking System... result of public comment or OMB review. ] ADDRESSES: Address all comments about the School...

  9. Performance-Oriented Privacy-Preserving Data Integration

    SciTech Connect

    Pon, R K; Critchlow, T

    2004-09-15

    Current solutions to integrating private data with public data have provided useful privacy metrics, such as relative information gain, that can be used to evaluate alternative approaches. Unfortunately, they have not addressed critical performance issues, especially when the public database is very large. The use of hashes and noise yields better performance than existing techniques while still making it difficult for unauthorized entities to distinguish which data items truly exist in the private database. As we show here, leveraging the uncertainty introduced by collisions caused by hashing and the injection of noise, we present a technique for performing a relational join operation between a massive public table and a relatively smaller private one.

  10. The private adolescent: privacy needs of adolescents in hospitals.

    PubMed

    Hutton, Alison

    2002-02-01

    This report is based on an interpretative study that explored the meaning of space to adolescents in the hospital environment. Through designing their own adolescent ward and discussing their designs in an interview, participants articulated their spatial needs in the ward environment. This paper addresses the private space issues of the adolescent patient in the ward environment. Issues that are discussed include the use of the telephone, the bathroom, and the bedroom, and additional facilities needed to enhance privacy in the ward. PMID:11891498

  11. Protecting privacy in a clinical data warehouse.

    PubMed

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. PMID:25301198

  12. Re-Assessing Green Building Performance: A Post Occupancy Evaluation of 22 GSA Buildings

    SciTech Connect

    Fowler, Kimberly M.; Rauch, Emily M.; Henderson, Jordan W.; Kora, Angela R.

    2010-06-01

    2nd report on the performance of GSA's sustainably designed buildings. The purpose of this study was to provide an overview of measured whole building performance as it compares to GSA and industry baselines. The PNNL research team found the data analysis illuminated strengths and weaknesses of individual buildings as well as the portfolio of buildings. This section includes summary data, observations that cross multiple performance metrics, discussion of lessons learned from this research, and opportunities for future research. The summary of annual data for each of the performance metrics is provided in Table 25. The data represent 1 year of measurements and are not associated with any specific design features or strategies. Where available, multiple years of data were examined and there were minimal significant differences between the years. Individually focused post occupancy evaluation (POEs) would allow for more detailed analysis of the buildings. Examining building performance over multiple years could potentially offer a useful diagnostic tool for identifying building operations that are in need of operational changes. Investigating what the connection is between the building performance and the design intent would offer potential design guidance and possible insight into building operation strategies. The 'aggregate operating cost' metric used in this study represents the costs that were available for developing a comparative industry baseline for office buildings. The costs include water utilities, energy utilities, general maintenance, grounds maintenance, waste and recycling, and janitorial costs. Three of the buildings that cost more than the baseline in Figure 45 have higher maintenance costs than the baseline, and one has higher energy costs. Given the volume of data collected and analyzed for this study, the inevitable request is for a simple answer with respect to sustainably designed building performance. As previously stated, compiling the

  13. CT/99mTc-GSA SPECT fusion images demonstrate functional differences between the liver lobes

    PubMed Central

    Sumiyoshi, Tatsuaki; Shima, Yasuo; Tokorodani, Ryoutarou; Okabayashi, Takehiro; Kozuki, Akihito; Hata, Yasuhiro; Noda, Yoshihiro; Murata, Yoriko; Nakamura, Toshio; Uka, Kiminori

    2013-01-01

    AIM: To evaluate the functional differences between the 2 liver lobes in non-cirrhotic patients by using computed tomography/99mTc-galactosyl human serum albumin (CT/99mTc-GSA) single-photon emission computed tomography (SPECT) fusion images. METHODS: Between December 2008 and March 2012, 264 non-cirrhotic patients underwent preoperative liver function assessment using CT/99mTc-GSA SPECT fusion images. Of these, 30 patients, in whom the influence of a tumor on the liver parenchyma was estimated to be negligible, were selected. Specifically, the selected patients were required to meet either of the following criteria: (1) the presence of an extrahepatic tumor; or (2) presence of a single small intrahepatic tumor. These 30 patients were retrospectively analyzed to calculate the percentage volume (%Volume) and the percentage function (%Function) of each lobe. The ratio between the %Function and %Volume (function-to-volume ratio) of each lobe was also calculated, and the ratios were compared between the 2 lobes. Furthermore, the correlations between the function-to-volume ratio and each of 2 liver parameters [lobe volume and diameter ratio of the left portal vein to the right portal vein (LPV-to-RPV diameter ratio)] were investigated. RESULTS: The median values of %Volume and %Function were 62.6% and 67.1% in the right lobe, with %Function being significantly higher than %Volume (P < 0.01). The median values of %Volume and %Function were 31.0% and 28.7% in the left lobe, with %Function being significantly lower than %Volume (P < 0.01). The function-to-volume ratios of the right lobe (1.04-1.14) were significantly higher than those of the left lobe (0.74-0.99) (P < 0.01). The function-to-volume ratio showed no significant correlation between the lobe volume in either lobe. In contrast, the function-to-volume ratio showed significant correlations with the LPV-to-RPV diameter ratio in both lobes (right lobe: negative correlation, rs = -0.37, P = 0.048; left lobe: positive

  14. 41 CFR 102-118.260 - Must my agency send all quotations, tenders, or contracts with a TSP to GSA?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Regulation parts 102-117 and 102-118 (41 CFR parts 102-117 and 102-118), and the TSP(s) hold(s) the required... execution to—General Services Administration, Transportation Audit Division (QMCA), Crystal Plaza 4, Room 300, 2200 Crystal Drive, Arlington, VA 22202, www.gsa.gov/transaudits. (b) Tenders must be...

  15. 41 CFR 102-118.260 - Must my agency send all quotations, tenders, or contracts with a TSP to GSA?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Regulation parts 102-117 and 102-118 (41 CFR parts 102-117 and 102-118), and the TSP(s) hold(s) the required... execution to—General Services Administration, Transportation Audit Division (QMCA), Crystal Plaza 4, Room 300, 2200 Crystal Drive, Arlington, VA 22202, www.gsa.gov/transaudits. (b) Tenders must be...

  16. 41 CFR 102-118.260 - Must my agency send all quotations, tenders, or contracts with a TSP to GSA?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Regulation parts 102-117 and 102-118 (41 CFR parts 102-117 and 102-118), and the TSP(s) hold(s) the required... execution to—General Services Administration, Transportation Audit Division (QMCA), Crystal Plaza 4, Room 300, 2200 Crystal Drive, Arlington, VA 22202, www.gsa.gov/transaudits. (b) Tenders must be...

  17. 41 CFR 102-118.440 - What are the postpayment audit responsibilities and roles of the GSA Audit Division?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... effectiveness in the audit of freight or passenger transportation payments, and review related fiscal and... audit responsibilities and roles of the GSA Audit Division? 102-118.440 Section 102-118.440 Public... MANAGEMENT REGULATION TRANSPORTATION 118-TRANSPORTATION PAYMENT AND AUDIT Postpayment Transportation...

  18. 41 CFR 102-118.440 - What are the postpayment audit responsibilities and roles of the GSA Audit Division?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... effectiveness in the audit of freight or passenger transportation payments, and review related fiscal and... audit responsibilities and roles of the GSA Audit Division? 102-118.440 Section 102-118.440 Public... MANAGEMENT REGULATION TRANSPORTATION 118-TRANSPORTATION PAYMENT AND AUDIT Postpayment Transportation...

  19. 41 CFR 102-118.440 - What are the postpayment audit responsibilities and roles of the GSA Audit Division?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... effectiveness in the audit of freight or passenger transportation payments, and review related fiscal and... audit responsibilities and roles of the GSA Audit Division? 102-118.440 Section 102-118.440 Public... MANAGEMENT REGULATION TRANSPORTATION 118-TRANSPORTATION PAYMENT AND AUDIT Postpayment Transportation...

  20. 41 CFR 102-118.440 - What are the postpayment audit responsibilities and roles of the GSA Audit Division?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... effectiveness in the audit of freight or passenger transportation payments, and review related fiscal and... audit responsibilities and roles of the GSA Audit Division? 102-118.440 Section 102-118.440 Public... MANAGEMENT REGULATION TRANSPORTATION 118-TRANSPORTATION PAYMENT AND AUDIT Postpayment Transportation...

  1. 41 CFR 102-118.440 - What are the postpayment audit responsibilities and roles of the GSA Audit Division?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... effectiveness in the audit of freight or passenger transportation payments, and review related fiscal and... audit responsibilities and roles of the GSA Audit Division? 102-118.440 Section 102-118.440 Public... MANAGEMENT REGULATION TRANSPORTATION 118-TRANSPORTATION PAYMENT AND AUDIT Postpayment Transportation...

  2. 48 CFR 52.211-4 - Availability for Examination of Specifications Not Listed in the GSA Index of Federal...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Examination of Specifications Not Listed in the GSA Index of Federal Specifications, Standards and Commercial... Specifications, Standards and Commercial Item Descriptions. As prescribed in 11.204(d), insert a provision... Index of Federal Specifications, Standards and Commercial Item Descriptions (JUN 1988)...

  3. 5 CFR 6701.104 - Prohibited purchases of real estate by certain GSA employees involved in the acquisition or...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Prohibited purchases of real estate by certain GSA employees involved in the acquisition or disposal of real estate. 6701.104 Section 6701.104... OF THE GENERAL SERVICES ADMINISTRATION § 6701.104 Prohibited purchases of real estate by certain...

  4. 5 CFR 6701.104 - Prohibited purchases of real estate by certain GSA employees involved in the acquisition or...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Prohibited purchases of real estate by certain GSA employees involved in the acquisition or disposal of real estate. 6701.104 Section 6701.104... OF THE GENERAL SERVICES ADMINISTRATION § 6701.104 Prohibited purchases of real estate by certain...

  5. 5 CFR 6701.104 - Prohibited purchases of real estate by certain GSA employees involved in the acquisition or...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Prohibited purchases of real estate by certain GSA employees involved in the acquisition or disposal of real estate. 6701.104 Section 6701.104 Administrative Personnel GENERAL SERVICES ADMINISTRATION SUPPLEMENTAL STANDARDS OF ETHICAL CONDUCT FOR EMPLOYEES OF THE GENERAL...

  6. 5 CFR 6701.104 - Prohibited purchases of real estate by certain GSA employees involved in the acquisition or...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Prohibited purchases of real estate by certain GSA employees involved in the acquisition or disposal of real estate. 6701.104 Section 6701.104... OF THE GENERAL SERVICES ADMINISTRATION § 6701.104 Prohibited purchases of real estate by certain...

  7. 41 CFR 102-73.85 - Can agencies with independent statutory authority to lease space have GSA perform the leasing...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Can agencies with independent statutory authority to lease space have GSA perform the leasing functions? 102-73.85 Section 102-73.85 Public Contracts and Property Management Federal Property Management Regulations...

  8. 41 CFR 102-73.85 - Can agencies with independent statutory authority to lease space have GSA perform the leasing...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Can agencies with independent statutory authority to lease space have GSA perform the leasing functions? 102-73.85 Section 102-73.85 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  9. 41 CFR 102-75.155 - What happens if GSA determines that the report of excess is insufficient?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... determines that the report of excess is insufficient? 102-75.155 Section 102-75.155 Public Contracts and... REGULATION REAL PROPERTY 75-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.155 What happens if GSA determines that the report of excess is insufficient? Where...

  10. 41 CFR 102-75.155 - What happens if GSA determines that the report of excess is insufficient?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... determines that the report of excess is insufficient? 102-75.155 Section 102-75.155 Public Contracts and... REGULATION REAL PROPERTY 75-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.155 What happens if GSA determines that the report of excess is insufficient? Where...

  11. 41 CFR 102-75.155 - What happens if GSA determines that the report of excess is insufficient?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... determines that the report of excess is insufficient? 102-75.155 Section 102-75.155 Public Contracts and... REGULATION REAL PROPERTY 75-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.155 What happens if GSA determines that the report of excess is insufficient? Where...

  12. 41 CFR 102-75.155 - What happens if GSA determines that the report of excess is insufficient?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... determines that the report of excess is insufficient? 102-75.155 Section 102-75.155 Public Contracts and... REGULATION REAL PROPERTY 75-REAL PROPERTY DISPOSAL Utilization of Excess Real Property Examination for Acceptability § 102-75.155 What happens if GSA determines that the report of excess is insufficient? Where...

  13. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What is the scope and philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5...) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 71-GENERAL § 102-71.5 What is the scope and philosophy of...

  14. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is the scope and philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5...) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 71-GENERAL § 102-71.5 What is the scope and philosophy of...

  15. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is the scope and philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5...) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 71-GENERAL § 102-71.5 What is the scope and philosophy of...

  16. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What is the scope and philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5...) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 71-GENERAL § 102-71.5 What is the scope and philosophy of...

  17. 41 CFR 102-71.5 - What is the scope and philosophy of the General Services Administration's (GSA) real property...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What is the scope and philosophy of the General Services Administration's (GSA) real property policies? 102-71.5 Section 102-71.5...) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 71-GENERAL § 102-71.5 What is the scope and philosophy of...

  18. 5 CFR 6701.104 - Prohibited purchases of real estate by certain GSA employees involved in the acquisition or...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Prohibited purchases of real estate by certain GSA employees involved in the acquisition or disposal of real estate. 6701.104 Section 6701.104... OF THE GENERAL SERVICES ADMINISTRATION § 6701.104 Prohibited purchases of real estate by certain...

  19. 41 CFR 102-118.260 - Must my agency send all quotations, tenders, or contracts with a TSP to GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Regulation parts 102-117 and 102-118 (41 CFR parts 102-117 and 102-118), and the TSP(s) hold(s) the required... execution to—General Services Administration, Transportation Audit Division (QMCA), Crystal Plaza 4, Room 300, 2200 Crystal Drive, Arlington, VA 22202, www.gsa.gov/transaudits. (b) Tenders must be...

  20. 41 CFR 102-33.350 - Do we need approval from GSA to replace aircraft parts by exchange or sale?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Do we need approval from GSA to replace aircraft parts by exchange or sale? 102-33.350 Section 102-33.350 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 33-MANAGEMENT...