Sample records for addresses gsa privacy

  1. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to [email protected] or send to: GSA Privacy Act Officer (CIB), General...

  2. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to [email protected] or send to: GSA Privacy Act Officer (CIB), General...

  3. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to [email protected] or send to: GSA Privacy Act Officer (CIB), General...

  4. 41 CFR 105-64.111 - What is GSA's policy on directives that may conflict with this part?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.111 What is GSA's policy on directives that may conflict with this part? These rules take... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is GSA's policy on...

  5. 41 CFR 105-64.111 - What is GSA's policy on directives that may conflict with this part?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.111 What is GSA's policy on directives that may conflict with this part? These rules take... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is GSA's policy on...

  6. 41 CFR 105-64.106 - What is GSA's policy on information accuracy in a system of records?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.106 What is GSA's policy on information accuracy in a system of records? System managers... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is GSA's policy on...

  7. 41 CFR 105-64.106 - What is GSA's policy on information accuracy in a system of records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.106 What is GSA's policy on information accuracy in a system of records? System managers... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is GSA's policy on...

  8. 41 CFR 105-64.102 - What is GSA's policy on disclosure of information in a system of records?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.102 What is GSA's policy on disclosure of information in a system of records? No... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is GSA's policy on...

  9. 41 CFR 105-64.102 - What is GSA's policy on disclosure of information in a system of records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.102 What is GSA's policy on disclosure of information in a system of records? No... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is GSA's policy on...

  10. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.108 How does...

  11. 41 CFR 105-64.107 - What standards of conduct apply to employees with privacy-related responsibilities?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.107 What standards of conduct apply to employees with privacy... training requirements. All such employees will follow GSA orders HCO 9297.1 GSA Data Release Policy, HCO...

  12. 41 CFR 101-26.206 - GSA assistance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PROGRAM 26.2-Federal Requisitioning System § 101-26.206 GSA assistance. Agency field activities should... addresses of GSA regional offices are listed in each of the volumes of the GSA Supply Catalog. Agency....206 Section 101-26.206 Public Contracts and Property Management Federal Property Management...

  13. 41 CFR 101-26.206 - GSA assistance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... PROGRAM 26.2-Federal Requisitioning System § 101-26.206 GSA assistance. Agency field activities should... addresses of GSA regional offices are listed in each of the volumes of the GSA Supply Catalog. Agency....206 Section 101-26.206 Public Contracts and Property Management Federal Property Management...

  14. 41 CFR 101-26.206 - GSA assistance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PROGRAM 26.2-Federal Requisitioning System § 101-26.206 GSA assistance. Agency field activities should... addresses of GSA regional offices are listed in each of the volumes of the GSA Supply Catalog. Agency....206 Section 101-26.206 Public Contracts and Property Management Federal Property Management...

  15. 41 CFR 101-26.206 - GSA assistance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PROGRAM 26.2-Federal Requisitioning System § 101-26.206 GSA assistance. Agency field activities should... addresses of GSA regional offices are listed in each of the volumes of the GSA Supply Catalog. Agency....206 Section 101-26.206 Public Contracts and Property Management Federal Property Management...

  16. 41 CFR 101-26.206 - GSA assistance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... PROGRAM 26.2-Federal Requisitioning System § 101-26.206 GSA assistance. Agency field activities should... addresses of GSA regional offices are listed in each of the volumes of the GSA Supply Catalog. Agency....206 Section 101-26.206 Public Contracts and Property Management Federal Property Management...

  17. 41 CFR 105-64.103 - What is GSA's policy on collecting and using information in a system of records?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.103 What is GSA's policy on collecting and using information in a system of records... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is GSA's policy on...

  18. 41 CFR 105-64.103 - What is GSA's policy on collecting and using information in a system of records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.103 What is GSA's policy on collecting and using information in a system of records... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is GSA's policy on...

  19. 41 CFR 105-64.109 - How does GSA handle other agencies' records?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.109 How does...

  20. 41 CFR 105-64.109 - How does GSA handle other agencies' records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.109 How does...

  1. 78 FR 22880 - Privacy Act of 1974; Notice of cancellation of System of Record Notice (SORN)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-17

    ... Administration (GSA). ACTION: Withdrawal of GSA/GOV-8 Excluded Parties List System (EPLS) System of Record Notice... Services Administration (GSA), is canceling the following system of record notice: GSA/GOV-8 Excluded... or email the GSA Privacy Act Officer: telephone 202-208-1317; email [email protected]gov...

  2. 41 CFR 105-64.107 - What standards of conduct apply to employees with privacy-related responsibilities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... conduct apply to employees with privacy-related responsibilities? 105-64.107 Section 105-64.107 Public... SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.107 What standards of conduct apply to employees with privacy...

  3. 41 CFR 105-64.107 - What standards of conduct apply to employees with privacy-related responsibilities?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... conduct apply to employees with privacy-related responsibilities? 105-64.107 Section 105-64.107 Public... SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.107 What standards of conduct apply to employees with privacy...

  4. 78 FR 20108 - Privacy Act of 1974; Notice of Revised System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-03

    ...; Notice of Revised System of Records AGENCY: General Services Administration. ACTION: Notice of a revised Privacy Act system of records. SUMMARY: GSA reviewed its Privacy Act systems to ensure that they are relevant, necessary, accurate, up-to-date, and covered by the appropriate legal or regulatory authority...

  5. 78 FR 79457 - Privacy Act of 1974; Notice of an Updated System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-30

    ...] Privacy Act of 1974; Notice of an Updated System of Records AGENCY: General Services Administration. ACTION: Notice. SUMMARY: The U.S. General Services Administration (GSA) reviewed its Privacy Act systems... legal or regulatory authority. DATES: Effective date: January 29, 2014. FOR FURTHER INFORMATION CONTACT...

  6. For telehealth to succeed, privacy and security risks must be identified and addressed.

    PubMed

    Hall, Joseph L; McGraw, Deven

    2014-02-01

    The success of telehealth could be undermined if serious privacy and security risks are not addressed. For example, sensors that are located in a patient's home or that interface with the patient's body to detect safety issues or medical emergencies may inadvertently transmit sensitive information about household activities. Similarly, routine data transmissions from an app or medical device, such as an insulin pump, may be shared with third-party advertisers. Without adequate security and privacy protections for underlying telehealth data and systems, providers and patients will lack trust in the use of telehealth solutions. Although some federal and state guidelines for telehealth security and privacy have been established, many gaps remain. No federal agency currently has authority to enact privacy and security requirements to cover the telehealth ecosystem. This article examines privacy risks and security threats to telehealth applications and summarizes the extent to which technical controls and federal law adequately address these risks. We argue for a comprehensive federal regulatory framework for telehealth, developed and enforced by a single federal entity, the Federal Trade Commission, to bolster trust and fully realize the benefits of telehealth.

  7. Policy recommendations for addressing privacy challenges associated with cell-based research and interventions.

    PubMed

    Ogbogu, Ubaka; Burningham, Sarah; Ollenberger, Adam; Calder, Kathryn; Du, Li; El Emam, Khaled; Hyde-Lay, Robyn; Isasi, Rosario; Joly, Yann; Kerr, Ian; Malin, Bradley; McDonald, Michael; Penney, Steven; Piat, Gayle; Roy, Denis-Claude; Sugarman, Jeremy; Vercauteren, Suzanne; Verhenneman, Griet; West, Lori; Caulfield, Timothy

    2014-02-03

    The increased use of human biological material for cell-based research and clinical interventions poses risks to the privacy of patients and donors, including the possibility of re-identification of individuals from anonymized cell lines and associated genetic data. These risks will increase as technologies and databases used for re-identification become affordable and more sophisticated. Policies that require ongoing linkage of cell lines to donors' clinical information for research and regulatory purposes, and existing practices that limit research participants' ability to control what is done with their genetic data, amplify the privacy concerns. To date, the privacy issues associated with cell-based research and interventions have not received much attention in the academic and policymaking contexts. This paper, arising out of a multi-disciplinary workshop, aims to rectify this by outlining the issues, proposing novel governance strategies and policy recommendations, and identifying areas where further evidence is required to make sound policy decisions. The authors of this paper take the position that existing rules and norms can be reasonably extended to address privacy risks in this context without compromising emerging developments in the research environment, and that exceptions from such rules should be justified using a case-by-case approach. In developing new policies, the broader framework of regulations governing cell-based research and related areas must be taken into account, as well as the views of impacted groups, including scientists, research participants and the general public. This paper outlines deliberations at a policy development workshop focusing on privacy challenges associated with cell-based research and interventions. The paper provides an overview of these challenges, followed by a discussion of key themes and recommendations that emerged from discussions at the workshop. The paper concludes that privacy risks associated with cell

  8. Policy recommendations for addressing privacy challenges associated with cell-based research and interventions

    PubMed Central

    2014-01-01

    Background The increased use of human biological material for cell-based research and clinical interventions poses risks to the privacy of patients and donors, including the possibility of re-identification of individuals from anonymized cell lines and associated genetic data. These risks will increase as technologies and databases used for re-identification become affordable and more sophisticated. Policies that require ongoing linkage of cell lines to donors’ clinical information for research and regulatory purposes, and existing practices that limit research participants’ ability to control what is done with their genetic data, amplify the privacy concerns. Discussion To date, the privacy issues associated with cell-based research and interventions have not received much attention in the academic and policymaking contexts. This paper, arising out of a multi-disciplinary workshop, aims to rectify this by outlining the issues, proposing novel governance strategies and policy recommendations, and identifying areas where further evidence is required to make sound policy decisions. The authors of this paper take the position that existing rules and norms can be reasonably extended to address privacy risks in this context without compromising emerging developments in the research environment, and that exceptions from such rules should be justified using a case-by-case approach. In developing new policies, the broader framework of regulations governing cell-based research and related areas must be taken into account, as well as the views of impacted groups, including scientists, research participants and the general public. Summary This paper outlines deliberations at a policy development workshop focusing on privacy challenges associated with cell-based research and interventions. The paper provides an overview of these challenges, followed by a discussion of key themes and recommendations that emerged from discussions at the workshop. The paper concludes that

  9. 41 CFR 101-30.603 - GSA Supply Catalog.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603 GSA Supply Catalog. (a) The GSA Supply... GSA Supply Catalog contains all necessary information for ordering from the GSA Federal Supply Service...

  10. 41 CFR 101-30.603 - GSA Supply Catalog.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603 GSA Supply Catalog. (a) The GSA Supply... GSA Supply Catalog contains all necessary information for ordering from the GSA Federal Supply Service...

  11. 41 CFR 101-30.603 - GSA Supply Catalog.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603 GSA Supply Catalog. (a) The GSA Supply... GSA Supply Catalog contains all necessary information for ordering from the GSA Federal Supply Service...

  12. 41 CFR 101-30.603 - GSA Supply Catalog.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603 GSA Supply Catalog. (a) The GSA Supply... GSA Supply Catalog contains all necessary information for ordering from the GSA Federal Supply Service...

  13. 41 CFR 101-30.603 - GSA Supply Catalog.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30.6-GSA Section of the Federal Supply Catalog § 101-30.603 GSA Supply Catalog. (a) The GSA Supply... GSA Supply Catalog contains all necessary information for ordering from the GSA Federal Supply Service...

  14. 76 FR 56762 - Privacy Act of 1974; Notice of Updated Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-14

    ... 1974; Notice of Updated Systems of Records AGENCY: General Services Administration. ACTION: Updated Notice. SUMMARY: The General Services Administration (GSA) reviewed its Privacy Act systems to ensure that they are relevant, necessary, accurate, up- to-date, covered by the appropriate legal or...

  15. Student Privacy versus Campus Safety: Has Recent Legislation Compromised Privacy Rights?

    ERIC Educational Resources Information Center

    van der Kaay, Christopher D.

    This study highlights major legislation addressing campus safety and crime reporting and discusses its impact on a student's right to privacy. The 1974 Family Educational Rights and Privacy Act, commonly referred to as the "Buckley Amendment," was among the first pieces of legislation to address the notion of student privacy and confidentiality.…

  16. 41 CFR 105-54.401 - Reports on GSA Federal Advisory Committees.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... fiscal year report to the Congress. Instructions for preparing GSA's submission are provided by the GSA... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Reports on GSA Federal... Services Administration 54-ADVISORY COMMITTEE MANAGEMENT 54.4-Reports § 105-54.401 Reports on GSA Federal...

  17. 41 CFR 105-54.401 - Reports on GSA Federal Advisory Committees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... fiscal year report to the Congress. Instructions for preparing GSA's submission are provided by the GSA... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Reports on GSA Federal... Services Administration 54-ADVISORY COMMITTEE MANAGEMENT 54.4-Reports § 105-54.401 Reports on GSA Federal...

  18. 41 CFR 105-54.401 - Reports on GSA Federal Advisory Committees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... fiscal year report to the Congress. Instructions for preparing GSA's submission are provided by the GSA... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Reports on GSA Federal... Services Administration 54-ADVISORY COMMITTEE MANAGEMENT 54.4-Reports § 105-54.401 Reports on GSA Federal...

  19. 41 CFR 105-54.401 - Reports on GSA Federal Advisory Committees.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... fiscal year report to the Congress. Instructions for preparing GSA's submission are provided by the GSA... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Reports on GSA Federal... Services Administration 54-ADVISORY COMMITTEE MANAGEMENT 54.4-Reports § 105-54.401 Reports on GSA Federal...

  20. 41 CFR 105-54.401 - Reports on GSA Federal Advisory Committees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... fiscal year report to the Congress. Instructions for preparing GSA's submission are provided by the GSA... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Reports on GSA Federal... Services Administration 54-ADVISORY COMMITTEE MANAGEMENT 54.4-Reports § 105-54.401 Reports on GSA Federal...

  1. 41 CFR 101-1.4902-2053 - GSA Form 2053, Agency Consolidated Requirements for GSA Regulations and Other External Issuances.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...-2053 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.49-Illustrations of Forms § 101-1.4902-2053 GSA... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA Form 2053, Agency...

  2. GSA's Green Proving Ground: Identifying, Testing and Evaluating Innovative Technologies (Presentation)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kandt, A.; Lowell, M.

    2012-05-01

    GSA's Green Proving Ground (GPG) program utilizes GSA's real estate portfolio to test and evaluate innovative and underutilized sustainable building technologies and practices. Findings are used to support the development of GSA performance specifications and inform decision making within GSA, other federal agencies, and the real estate industry. The program aims to drive innovation in environmental performance in federal buildings and help lead market transformation through deployment of new technologies.

  3. 41 CFR 105-64.406 - How will my appeal be handled?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Administration 64-GSA PRIVACY ACT RULES 64.4-Amending Records § 105-64.406 How will my appeal be handled? The GSA Privacy Act Officer will consult with legal counsel and appropriate GSA officials concerning your appeal. If they decide to reject your appeal, the Privacy Act Officer will provide the Deputy Administrator...

  4. 41 CFR 105-60.403 - Appeal within GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services...) An appeal must be in writing and include a brief statement of the reasons he or she thinks GSA should... circumstances. GSA will process appeals of denials of expedited processing as soon as possible after receiving...

  5. 41 CFR 101-27.504 - Notice to GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Notice to GSA. 101-27.504 Section 101-27.504 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 27-INVENTORY MANAGEMENT 27.5-Return of GSA...

  6. 76 FR 68759 - GSA Approves Renewal of North American Numbering Council Charter Through September 23, 2013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-07

    ... American Numbering Council Charter Through September 23, 2013 AGENCY: Federal Communications Commission... announcing GSA's approval of the renewal of the North American Numbering Council charter through September 23... American Numbering Council charter. DATES: Renewed through September 23, 2013. ADDRESSES: Competition...

  7. Biobanking and Privacy in India.

    PubMed

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India. © 2016 American Society of Law, Medicine & Ethics.

  8. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  9. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  10. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  11. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  12. 77 FR 9659 - General Services Administration Acquisition Regulation; Information Collection; GSA Mentor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-17

    ... Services Administration Acquisition Regulation; Information Collection; GSA Mentor-Prot[eacute]g[eacute... collection concerning the GSA Mentor-Prot[eacute]g[eacute] Program, General Service Administration...- 0286, GSA Mentor-Prot[eacute]g[eacute] Program by any of the following methods: Regulations.gov : http...

  13. Plug-Load Control and Behavioral Change Research in GSA Office Buildings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Metzger, I.; Cutler, D.; Sheppy, M.

    2012-10-01

    The U.S. General Services Administration (GSA) owns and leases over 354 million square feet (ft2) of space in over 9,600 buildings [1]. GSA is a leader among federal agencies in aggressively pursuing energy efficiency (EE) opportunities for its facilities and installing renewable energy (RE) systems to provide heating, cooling, and power to these facilities. According to several energy assessments of GSA's buildings conducted by the National Renewable Energy Laboratory (NREL), plug-loads account for approximately 21% of the total electricity consumed within a standard GSA Region 3 office building. This study aims to provide insight on how to effectively manage plug-loadmore » energy consumption and attain higher energy and cost savings for plug-loads. As GSA improves the efficiency of its building stock, plug-loads will become an even greater portion of its energy footprint.« less

  14. 45 CFR 12a.5 - Real property reported excess to GSA.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Real property reported excess to GSA. 12a.5 Section 12a.5 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION USE OF FEDERAL REAL PROPERTY TO ASSIST THE HOMELESS § 12a.5 Real property reported excess to GSA. (a) Each landholding agency must submit a report to GSA of...

  15. 41 CFR 101-25.203 - Centralized purchases by GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Centralized purchases by...-Interagency Purchase Assignments § 101-25.203 Centralized purchases by GSA. GSA will exclusively, or with specified limited exceptions, make purchases and contracts on a continuing basis for articles and services...

  16. The Potential to Promote Resilience: Piloting a Minority Stress-Informed, GSA-Based, Mental Health Promotion Program for LGBTQ Youth

    PubMed Central

    Heck, Nicholas C.

    2015-01-01

    This article describes the results of a pilot study to determine the feasibility and acceptability of a mental health promotion program that was developed to address minority stressors and promote coping skills among lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth. It was hypothesized that the program would be feasible to implement within the context of a gay-straight alliance (GSA) and that GSA members would find the program acceptable (e.g., educational, enjoyable, helpful, and relevant). Participants included ten members of a high school GSA in the northeastern United States. The program sessions were delivered during GSA meetings. The first session emphasized the identification of minority and general stressors, which was followed by a discussion of coping strategies. The remaining sessions emphasized the development of cognitive coping, affect regulation, and problem-solving skills. After each session, participants completed a 13-item feedback form. Ten items assessed acceptability and three open-ended items allowed participants to provide constructive feedback. Although the program was feasible to implement within the GSA setting, attendance at the sessions was variable. Those who attended the sessions reported them to be enjoyable, informative, relevant to their lives, and potentially helpful for other LGBTQ students. After revising the program, future research is needed to investigate its dissemination potential and determine whether the program can disrupt the minority stress-psychiatric distress relationship. PMID:26366425

  17. The Potential to Promote Resilience: Piloting a Minority Stress-Informed, GSA-Based, Mental Health Promotion Program for LGBTQ Youth.

    PubMed

    Heck, Nicholas C

    2015-09-01

    This article describes the results of a pilot study to determine the feasibility and acceptability of a mental health promotion program that was developed to address minority stressors and promote coping skills among lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth. It was hypothesized that the program would be feasible to implement within the context of a gay-straight alliance (GSA) and that GSA members would find the program acceptable (e.g., educational, enjoyable, helpful, and relevant). Participants included ten members of a high school GSA in the northeastern United States. The program sessions were delivered during GSA meetings. The first session emphasized the identification of minority and general stressors, which was followed by a discussion of coping strategies. The remaining sessions emphasized the development of cognitive coping, affect regulation, and problem-solving skills. After each session, participants completed a 13-item feedback form. Ten items assessed acceptability and three open-ended items allowed participants to provide constructive feedback. Although the program was feasible to implement within the GSA setting, attendance at the sessions was variable. Those who attended the sessions reported them to be enjoyable, informative, relevant to their lives, and potentially helpful for other LGBTQ students. After revising the program, future research is needed to investigate its dissemination potential and determine whether the program can disrupt the minority stress-psychiatric distress relationship.

  18. Aircraft Engine Thrust Estimator Design Based on GSA-LSSVM

    NASA Astrophysics Data System (ADS)

    Sheng, Hanlin; Zhang, Tianhong

    2017-08-01

    In view of the necessity of highly precise and reliable thrust estimator to achieve direct thrust control of aircraft engine, based on support vector regression (SVR), as well as least square support vector machine (LSSVM) and a new optimization algorithm - gravitational search algorithm (GSA), by performing integrated modelling and parameter optimization, a GSA-LSSVM-based thrust estimator design solution is proposed. The results show that compared to particle swarm optimization (PSO) algorithm, GSA can find unknown optimization parameter better and enables the model developed with better prediction and generalization ability. The model can better predict aircraft engine thrust and thus fulfills the need of direct thrust control of aircraft engine.

  19. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C... operation of a system of records using commercial information technology services or information technology...

  20. a Gsa-Svm Hybrid System for Classification of Binary Problems

    NASA Astrophysics Data System (ADS)

    Sarafrazi, Soroor; Nezamabadi-pour, Hossein; Barahman, Mojgan

    2011-06-01

    This paperhybridizesgravitational search algorithm (GSA) with support vector machine (SVM) and made a novel GSA-SVM hybrid system to improve the classification accuracy in binary problems. GSA is an optimization heuristic toolused to optimize the value of SVM kernel parameter (in this paper, radial basis function (RBF) is chosen as the kernel function). The experimental results show that this newapproach can achieve high classification accuracy and is comparable to or better than the particle swarm optimization (PSO)-SVM and genetic algorithm (GA)-SVM, which are two hybrid systems for classification.

  1. 48 CFR 552.219-75 - GSA Mentor-Protégé Program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false GSA Mentor-ProtégÃ....219-75 GSA Mentor-Protégé Program. As prescribed in 519.7017(a), insert the following clause: GSA Mentor-ProtéGé Program (SEP 2009) (a) Prime contractors, including small businesses, are encouraged to...

  2. 41 CFR 101-27.209-1 - GSA stock items.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA stock items. 101-27.209-1 Section 101-27.209-1 Public Contracts and Property Management Federal Property Management...-Management of Shelf-Life Materials § 101-27.209-1 GSA stock items. Shelf-life items that meet the criteria...

  3. 41 CFR 105-64.803 - How will my appeal be handled?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.803 How will my appeal be handled? The Privacy Act Officer will consult with legal counsel and the appropriate GSA officials concerning your appeal. The decision will be made by the Senior Agency Official for Privacy. The decision will be sent...

  4. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  5. 32 CFR Appendix D to Part 310 - Provisions of the Privacy Act From Which a General or Specific Exemption May Be Claimed

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... evaluation materials used by the Armed Forces. Yes No (l)(1) Records stored in GSA records centers. Yes No (l... 32 National Defense 2 2011-07-01 2011-07-01 false Provisions of the Privacy Act From Which a General or Specific Exemption May Be Claimed D Appendix D to Part 310 National Defense Department of...

  6. 41 CFR 105-64.601 - Procedures for establishing system of records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Services Administration 64-GSA PRIVACY ACT RULES 64.6-Establishing or Revising Systems of Records in GSA... proposed new or revised system of records: (a) Before establishing a new or revising an existing system of... provide to the GSA Privacy Act Officer a proposal describing and justifying the new system or revision. (b...

  7. Privacy Questions from Practicing School Nurses

    ERIC Educational Resources Information Center

    Bergren, Martha Dewey

    2004-01-01

    This Question and Answer (Q&A) article addresses practice issues related to school health records and school nursing documentation that were posed by school nurses in the field. Specifically, the questions addressed concern the following: education records, medication privacy issues, sharing of sensitive health information, privacy of…

  8. Hidden drivers of low-dose pharmaceutical pollutant mixtures revealed by the novel GSA-QHTS screening method

    PubMed Central

    Rodea-Palomares, Ismael; Gonzalez-Pleiter, Miguel; Gonzalo, Soledad; Rosal, Roberto; Leganes, Francisco; Sabater, Sergi; Casellas, Maria; Muñoz-Carpena, Rafael; Fernández-Piñas, Francisca

    2016-01-01

    The ecological impacts of emerging pollutants such as pharmaceuticals are not well understood. The lack of experimental approaches for the identification of pollutant effects in realistic settings (that is, low doses, complex mixtures, and variable environmental conditions) supports the widespread perception that these effects are often unpredictable. To address this, we developed a novel screening method (GSA-QHTS) that couples the computational power of global sensitivity analysis (GSA) with the experimental efficiency of quantitative high-throughput screening (QHTS). We present a case study where GSA-QHTS allowed for the identification of the main pharmaceutical pollutants (and their interactions), driving biological effects of low-dose complex mixtures at the microbial population level. The QHTS experiments involved the integrated analysis of nearly 2700 observations from an array of 180 unique low-dose mixtures, representing the most complex and data-rich experimental mixture effect assessment of main pharmaceutical pollutants to date. An ecological scaling-up experiment confirmed that this subset of pollutants also affects typical freshwater microbial community assemblages. Contrary to our expectations and challenging established scientific opinion, the bioactivity of the mixtures was not predicted by the null mixture models, and the main drivers that were identified by GSA-QHTS were overlooked by the current effect assessment scheme. Our results suggest that current chemical effect assessment methods overlook a substantial number of ecologically dangerous chemical pollutants and introduce a new operational framework for their systematic identification. PMID:27617294

  9. Privacy Preserving Nearest Neighbor Search

    NASA Astrophysics Data System (ADS)

    Shaneck, Mark; Kim, Yongdae; Kumar, Vipin

    Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privacy laws (e.g. HIPAA) or policies. Privacy preserving data mining techniques have been developed to address this issue by providing mechanisms to mine the data while giving certain privacy guarantees. In this chapter we address the issue of privacy preserving nearest neighbor search, which forms the kernel of many data mining applications. To this end, we present a novel algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data. We show how this algorithm can be used in three important data mining algorithms, namely LOF outlier detection, SNN clustering, and kNN classification. We prove the security of these algorithms under the semi-honest adversarial model, and describe methods that can be used to optimize their performance. Keywords: Privacy Preserving Data Mining, Nearest Neighbor Search, Outlier Detection, Clustering, Classification, Secure Multiparty Computation

  10. 32 CFR 644.393 - Final report of excess to GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Final report of excess to GSA. 644.393 Section 644.393 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE HANDBOOK Disposal Predisposal Action § 644.393 Final report of excess to GSA. Where a...

  11. 32 CFR 644.393 - Final report of excess to GSA.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 4 2011-07-01 2011-07-01 false Final report of excess to GSA. 644.393 Section 644.393 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE HANDBOOK Disposal Predisposal Action § 644.393 Final report of excess to GSA. Where a...

  12. GSA-1/ARG1 protects root gravitropism in Arabidopsis under ammonium stress.

    PubMed

    Zou, Na; Li, Baohai; Chen, Hao; Su, Yanhua; Kronzucker, Herbert J; Xiong, Liming; Baluška, František; Shi, Weiming

    2013-10-01

    Gravitropism plays a critical role in plant growth and development, plant stability and acclimation to changes in water and nutrient availability. Ammonium (NH4(+)) is well known to have profound effects on root growth, but its impacts on gravitropism are poorly understood. To determine which genes are essential for the maintenance of root gravitropism under NH4(+) stress, we isolated and identified an NH4 (+)-sensitive mutant, gsa-1 (gravitropism sensitive to ammonium-1), in Arabidopsis thaliana, using an agar plate root reorientation assay. We found that, under NH4(+) stress, gsa-1 displayed increased loss of root gravitropism. Gene cloning and sequencing revealed that gsa-1 contains a G to C transversion mutation at the highly conserved 5'-GT splice position of intron 10 of ARG1 (ALTERED RESPONSE TO GRAVITY1), known to participate in the transduction of the root gravity signal. Genetic complement tests established the locus of GSA-1/ARG1 and its role in resistance to NH4 (+) inhibition on root gravitropism. GSA-1/ARG1 is required for normal AUX1 expression and basipetal auxin transport in root apices. In addition, PIN-FORMED2 (PIN2) is proposed as a target in the reduction of root gravitropism under NH4(+) stress, a response which can be antagonized by the GSA-1/ARG1-dependent pathway. These results suggest that GSA-1/ARG1 protects root gravitropism in Arabidopsis thaliana under ammonium stress. © 2013 The Authors. New Phytologist © 2013 New Phytologist Trust.

  13. 77 FR 31016 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Mentor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-24

    ... Services Administration Acquisition Regulation; Submission for OMB Review; GSA Mentor-Prot[eacute]g[eacute... collection concerning the GSA Mentor-Prot[eacute]g[eacute] Program, General Service Administration... Collection 3090- 0286, GSA Mentor-Prot[eacute]g[eacute] Program by any of the following methods: Regulations...

  14. 75 FR 13131 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Advantage...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ... Services Administration Acquisition Regulation; Submission for OMB Review; GSA Advantage![reg] and... requirement regarding GSA Advantage![reg] and Electronic Commerce-FACNET. A request for public comments was..., Washington, DC 20405. Please cite OMB Control No. 3090-00XX, GSA Advantage![reg] and Electronic Commerce...

  15. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... agency forces a GSA customer to move? 102-85.215 Section 102-85.215 Public Contracts and Property... PROPERTY 85-PRICING POLICY FOR OCCUPANCY IN GSA SPACE Continued Occupancy, Relocation and Forced Moves § 102-85.215 What if another customer agency forces a GSA customer to move? If a GSA customer agency, or...

  16. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... agency forces a GSA customer to move? 102-85.215 Section 102-85.215 Public Contracts and Property... PROPERTY 85-PRICING POLICY FOR OCCUPANCY IN GSA SPACE Continued Occupancy, Relocation and Forced Moves § 102-85.215 What if another customer agency forces a GSA customer to move? If a GSA customer agency, or...

  17. 41 CFR 102-85.215 - What if another customer agency forces a GSA customer to move?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... agency forces a GSA customer to move? 102-85.215 Section 102-85.215 Public Contracts and Property... PROPERTY 85-PRICING POLICY FOR OCCUPANCY IN GSA SPACE Continued Occupancy, Relocation and Forced Moves § 102-85.215 What if another customer agency forces a GSA customer to move? If a GSA customer agency, or...

  18. Challenges created by data dissemination and access restrictions when attempting to address community concerns: individual privacy versus public wellbeing.

    PubMed

    Colquhoun, Amy; Aplin, Laura; Geary, Janis; Goodman, Karen J; Hatcher, Juanita

    2012-05-08

    Population health data are vital for the identification of public health problems and the development of public health strategies. Challenges arise when attempts are made to disseminate or access anonymised data that are deemed to be potentially identifiable. In these situations, there is debate about whether the protection of an individual's privacy outweighs potentially beneficial public health initiatives developed using potentially identifiable information. While these issues have an impact at planning and policy levels, they pose a particular dilemma when attempting to examine and address community concerns about a specific health problem. Research currently underway in northern Canadian communities on the frequency of Helicobacter pylori infection and associated diseases, such as stomach cancer, is used in this article to illustrate the challenges that data controls create on the ability of researchers and health officials to address community concerns. Barriers are faced by public health professionals and researchers when endeavouring to address community concerns; specifically, provincial cancer surveillance departments and community-driven participatory research groups face challenges related to data release or access that inhibit their ability to effectively address community enquiries. The resulting consequences include a limited ability to address misinformation or to alleviate concerns when dealing with health problems in small communities. The development of communication tools and building of trusting relationships are essential components of a successful investigation into community health concerns. It may also be important to consider that public wellbeing may outweigh the value of individual privacy in these situations. As such, a re-evaluation of data disclosure policies that are applicable in these circumstances should be considered.

  19. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.

    PubMed

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-09-10

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one.

  20. Privacy Breach Analysis in Social Networks

    NASA Astrophysics Data System (ADS)

    Nagle, Frank

    This chapter addresses various aspects of analyzing privacy breaches in social networks. We first review literature that defines three types of privacy breaches in social networks: interactive, active, and passive. We then survey the various network anonymization schemes that have been constructed to address these privacy breaches. After exploring these breaches and anonymization schemes, we evaluate a measure for determining the level of anonymity inherent in a network graph based on its topological structure. Finally, we close by emphasizing the difficulty of anonymizing social network data while maintaining usability for research purposes and offering areas for future work.

  1. GSA committees: Progress through service the Annual Program Committee

    USGS Publications Warehouse

    Costa, J.E.

    2007-01-01

    The GSA's Annual Program Committee (APC) is directly responsible for the GSA's meeting and other responsibilities especially before the main event. It decides on the locations, the number and content of the technical sessions, annual membership surveys, hospitality for the guests, field trips and more. In addition, it pays significant attention to creative thinking about geoscience discoveries and directions as well as identify new and emerging areas of earth science. APC is also looking for new ideas, approaches and directions.

  2. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees

    PubMed Central

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-01-01

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417

  3. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching programs...

  4. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching programs...

  5. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching programs...

  6. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching programs...

  7. 41 CFR 105-64.110 - When may GSA establish computer matching programs?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... computer matching programs? 105-64.110 Section 105-64.110 Public Contracts and Property Management Federal... GSA establish computer matching programs? (a) System managers will establish computer matching... direction of the GSA Data Integrity Board that will be established when and if computer matching programs...

  8. 77 FR 38064 - Public Buildings Service; Information Collection; GSA Form 3453, Application/Permit for Use of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-26

    ... Buildings Service; Information Collection; GSA Form 3453, Application/Permit for Use of Space in Public Buildings and Grounds AGENCY: Public Buildings Service, GSA. ACTION: Notice of request for comments... regarding GSA Form 3453, Application/Permit for Use of Space in Public Buildings and Grounds. Public...

  9. Story Lab: Student Data Privacy

    ERIC Educational Resources Information Center

    Herold, Benjamin

    2015-01-01

    Student data privacy is an increasingly high-profile--and controversial--issue that touches schools and families across the country. There are stories to tell in virtually every community. About three dozen states have passed legislation addressing student data privacy in the past two years, and eight different proposals were floating around…

  10. 77 FR 5020 - General Services Administration Acquisition Regulation; Information Collection; GSA Form 527...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-01

    ... GENERAL SERVICES ADMINISTRATION [OMB Control No. 3090-0007; Docket 2011-0001; Sequence 12] General Services Administration Acquisition Regulation; Information Collection; GSA Form 527, Contractor's Qualifications and Financial Information AGENCY: Office of the Chief Finance Officer, GSA. ACTION: Notice of...

  11. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...-347) directs agencies to conduct reviews of how privacy issues are considered when purchasing or... a PIA to effectively address privacy factors. Guidance is provided at http://www.doncio.navy.mil. (f...

  12. The Challenges of Seeking Security While Respecting Privacy

    NASA Astrophysics Data System (ADS)

    Kantor, Paul B.; Lesk, Michael E.

    Security is a concern for persons, organizations, and nations. For the individual members of organizations and nations, personal privacy is also a concern. The technologies for monitoring electronic communication are at the same time tools to protect security and threats to personal privacy. Participants in this workshop address the interrelation of personal privacy and national or societal security, from social, technical and legal perspectives. The participants represented industry, the academy and the United States Government. The issues addressed have become, if anything, even more pressing today than they were when the conference was held.

  13. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A single...

  14. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A single...

  15. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A single...

  16. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property... GSA's responsibilities for Federal aviation management? Under OMB Circular A-126, “Improving the.../omb), GSA's chief responsibilities for Federal aviation management are to maintain— (a) A single...

  17. 76 FR 63896 - Federal Acquisition Regulation; Privacy Training, 2010-013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-14

    ... Acquisition Regulation; Privacy Training, 2010-013 AGENCY: Department of Defense (DoD), General Services... contractors to complete training that addresses the protection of privacy, in accordance with the Privacy Act... Regulation (FAR) to add a new subpart 24.3, entitled ``Privacy Training,'' and related clause to ensure that...

  18. TELECOMMUNICATIONS. GSA Action Needed to Realize Benefits of Metropolitan Area Acquisition Program

    DTIC Science & Technology

    2002-04-01

    Reform, House of RepresentativesApril 2002 TELECOMMUNICATIONS GSA Action Needed to Realize Benefits of Metropolitan Area Acquisition Programa GAO-02...Needed to Realize Benefits of Metropolitan Area Acquisition Program Contract Number Grant Number Program Element Number Author(s) Project Number...TELECOMMUNICATIONS GSA Action Needed to Realize Benefits of Metropolitan Area Acquisition Program This is a test for developing highlights for a GAO report

  19. Availability and quality of mobile health app privacy policies.

    PubMed

    Sunyaev, Ali; Dehling, Tobias; Taylor, Patrick L; Mandl, Kenneth D

    2015-04-01

    Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35,000 mHealth apps are available for iOS and Android. Of the 600 most commonly used apps, only 183 (30.5%) had privacy policies. Average policy length was 1755 (SD 1301) words with a reading grade level of 16 (SD 2.9). Two thirds (66.1%) of privacy policies did not specifically address the app itself. Our findings show that currently mHealth developers often fail to provide app privacy policies. The privacy policies that are available do not make information privacy practices transparent to users, require college-level literacy, and are often not focused on the app itself. Further research is warranted to address why privacy policies are often absent, opaque, or irrelevant, and to find a remedy. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  20. The Regulatory Framework for Privacy and Security

    NASA Astrophysics Data System (ADS)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  1. Patient privacy in the genomic era.

    PubMed

    Raisaro, Jean Louis; Ayday, Erman; Hubaux, Jean-Pierre

    2014-05-07

    According to many scientists and clinicians, genomics is taking on a key role in the field of medicine. Impressive advances in genome sequencing have opened the way to a variety of revolutionary applications in modern healthcare. In particular, the increasing understanding of the human genome, and of its relation to diseases and response to treatments brings promise of improvements in better preventive and personalized medicine. However, this progress raises important privacy and ethical concerns that need to be addressed. Indeed, each genome is the ultimate identifier of its owner and, due to its nature, it contains highly personal and privacy-sensitive data. In this article, after summarizing recent advances in genomics, we discuss some important privacy issues associated with human genomic information and methods put in place to address them.

  2. 41 CFR 102-117.35 - What are the advantages and disadvantages of using GSA's tender of service?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and disadvantages of using GSA's tender of service? 102-117.35 Section 102-117.35 Public Contracts and...-117.35 What are the advantages and disadvantages of using GSA's tender of service? (a) It is an... damage claims. (b) It is a disadvantage to use GSA's tender of service when: (1) You want an agreement...

  3. 75 FR 25904 - Privacy Act of 1974; as Amended; Proposed Alteration to an Existing Privacy Act System of Records...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-10

    ... SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974; as Amended; Proposed Alteration to an Existing Privacy Act System of Records, Housekeeping Changes, and New Routine Uses AGENCY: Social Security..., Social Security number (SSN), date of birth, address, and other relevant information about persons who...

  4. 77 FR 15759 - Information Collection; Federal Management Regulation; GSA Form 3040, State Agency Monthly...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ...] Information Collection; Federal Management Regulation; GSA Form 3040, State Agency Monthly Donation Report of... regarding GSA Form 3040, State Agency Monthly Donation Report of Surplus Property. Public comments are..., State Agency Monthly Donation Report of Surplus Personal Property by any of the following methods...

  5. Privacy in the Genomic Era

    PubMed Central

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  6. Privacy in the Genomic Era.

    PubMed

    Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W; Fellay, Jacques; Gunter, Carl A; Hubaux, Jean-Pierre; Malin, Bradley A; Wang, Xiaofeng

    2015-09-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.

  7. 41 CFR 101-1.4902 - GSA forms.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA forms. 101-1.4902 Section 101-1.4902 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.49-Illustrations of Forms § 101-1.4902...

  8. Privacy-preserving backpropagation neural network learning.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2009-10-01

    With the development of distributed computing environment , many learning problems now have to deal with distributed input data. To enhance cooperations in learning, it is important to address the privacy concern of each data holder by extending the privacy preservation notion to original learning algorithms. In this paper, we focus on preserving the privacy in an important learning model, multilayer neural networks. We present a privacy-preserving two-party distributed algorithm of backpropagation which allows a neural network to be trained without requiring either party to reveal her data to the other. We provide complete correctness and security analysis of our algorithms. The effectiveness of our algorithms is verified by experiments on various real world data sets.

  9. 78 FR 25414 - Privacy Act of 1974, System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-01

    ..., Chief Information Security Officer--Chief Privacy Officer. USAID-008 System name: Personnel Security and... inquires in writing to the USAID Chief Privacy Officer, 2733 Crystal Drive, 11th Floor, Arlington, VA 22202... alterations. ADDRESSES: You may submit comments: Paper Comments Fax: (703) 666-1466. Mail: Chief Privacy...

  10. 77 FR 16066 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-19

    ... addressing Privacy Act amendment appeals; and minor modifications throughout the notice to reflect the name... DEPARTMENT OF JUSTICE [CPCLO Order No. 004-2012] Privacy Act of 1974; System of Records AGENCY: United States Department of Justice. ACTION: Modified system of records. SUMMARY: Pursuant to the Privacy...

  11. 41 CFR 102-75.145 - Is GSA required to review each report of excess?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... landholding agency, in writing, whether the report is acceptable or other information is needed within 15... review each report of excess? 102-75.145 Section 102-75.145 Public Contracts and Property Management... Is GSA required to review each report of excess? Yes, GSA must review each report of excess to...

  12. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA holder...

  13. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA holder...

  14. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA holder...

  15. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA holder...

  16. 48 CFR 339.7001 - Request for approval to make an award to other than a GSA BPA holder.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... make an award to other than a GSA BPA holder. 339.7001 Section 339.7001 Federal Acquisition Regulations... Services 339.7001 Request for approval to make an award to other than a GSA BPA holder. The Contracting... micro-purchase threshold, that obtaining the required services from a source other than a GSA BPA holder...

  17. 41 CFR 102-2.115 - What kinds of non-regulatory material does GSA publish outside of the FMR?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What kinds of non-regulatory material does GSA publish outside of the FMR? 102-2.115 Section 102-2.115 Public Contracts and....115 What kinds of non-regulatory material does GSA publish outside of the FMR? As GSA converts the...

  18. Extending SQL to Support Privacy Policies

    NASA Astrophysics Data System (ADS)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  19. Pre-Capture Privacy for Small Vision Sensors.

    PubMed

    Pittaluga, Francesco; Koppal, Sanjeev Jagannatha

    2017-11-01

    The next wave of micro and nano devices will create a world with trillions of small networked cameras. This will lead to increased concerns about privacy and security. Most privacy preserving algorithms for computer vision are applied after image/video data has been captured. We propose to use privacy preserving optics that filter or block sensitive information directly from the incident light-field before sensor measurements are made, adding a new layer of privacy. In addition to balancing the privacy and utility of the captured data, we address trade-offs unique to miniature vision sensors, such as achieving high-quality field-of-view and resolution within the constraints of mass and volume. Our privacy preserving optics enable applications such as depth sensing, full-body motion tracking, people counting, blob detection and privacy preserving face recognition. While we demonstrate applications on macro-scale devices (smartphones, webcams, etc.) our theory has impact for smaller devices.

  20. Achieving network level privacy in Wireless Sensor Networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2010-01-01

    Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.

  1. Achieving Network Level Privacy in Wireless Sensor Networks†

    PubMed Central

    Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2010-01-01

    Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks. PMID:22294881

  2. 41 CFR 105-60.403 - Appeal within GSA.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Appeal within GSA. 105-60.403 Section 105-60.403 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services...

  3. 41 CFR 105-60.403 - Appeal within GSA.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Appeal within GSA. 105-60.403 Section 105-60.403 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services...

  4. 41 CFR 105-60.403 - Appeal within GSA.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Appeal within GSA. 105-60.403 Section 105-60.403 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services...

  5. 41 CFR 105-60.403 - Appeal within GSA.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Appeal within GSA. 105-60.403 Section 105-60.403 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services...

  6. 5 CFR 1830.2 - Requirements for making Privacy Act requests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Requirements for making Privacy Act requests. 1830.2 Section 1830.2 Administrative Personnel OFFICE OF SPECIAL COUNSEL PRIVACY § 1830.2 Requirements for making Privacy Act requests. (a) How made and addressed. A request for OSC records under the...

  7. A proposed legal framework for addressing privacy for patient controlled health records in pediatrics.

    PubMed

    Bourgeois, Fabienne; Taylor, Patrick; Mandl, Kenneth

    2006-01-01

    Patient controlled health records(PCHRs) provide widespread and flexible access to integrated medical information. Unique legal challenges arise where the patient is a minor. Variations in laws and statutes concerning minor's rights to privacy and confidentiality, and institutions' local interpretations of them, need to be integrated in the principles governing PCHRs. We propose a legal framework to guide the development of access policies for PCHRs to ensure appropriate privacy and confidentiality protection surrounding minors.

  8. 77 FR 5252 - Federal Travel Regulation; GSA E-Gov Travel Service (ETS) Transition to E-Gov Travel Service 2...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-02

    ... Travel Regulation; GSA E-Gov Travel Service (ETS) Transition to E-Gov Travel Service 2 (ETS2) AGENCY... (QMC), at [email protected]gov or (703) 605-2151. SUPPLEMENTARY INFORMATION: The Federal Travel...-GOV TRAVEL SERVICE GSA Bulletin ETS 12-01 TO: Heads of Federal Agencies SUBJECT: GSA E-Gov Travel...

  9. Disentangling privacy from property: toward a deeper understanding of genetic privacy.

    PubMed

    Suter, Sonia M

    2004-04-01

    connoting commodification, disaggregation, and arms-length dealings, can negatively affect the self and harm these relationships. This Article concludes that a deeper understanding of genetic privacy calls for remedies for privacy violations that address dignitary harm and breach of trust, as opposed to market harms, as the property model suggests.

  10. High School Gay-Straight Alliances (GSAs) and Young Adult Well-Being: An Examination of GSA Presence, Participation, and Perceived Effectiveness

    PubMed Central

    Toomey, Russell B.; Ryan, Caitlin; Diaz, Rafael M.; Russell, Stephen T.

    2011-01-01

    Gay-Straight Alliances (GSAs) are student-led, school-based clubs that aim to provide a safe environment in the school context for lesbian, gay, bisexual, and transgender (LGBT) students, as well as their straight allies. The present study examines the potential for GSAs to support positive youth development and to reduce associations among LGBT-specific school victimization and negative young adult well-being. The sample includes 245 LGBT young adults, ages 21–25, who retrospectively reported on the presence of a GSA in their high school, their participation in their school’s GSA, and their perceptions of whether or not their GSA was effective in improving school safety. Findings revealed that the presence of a GSA, participation in a GSA, and perceived GSA effectiveness in promoting school safety were differentially associated with young adult well-being and in some cases, buffered the negative association between LGBT-specific school victimization and well-being. Implications for future research and schools are discussed. PMID:22102782

  11. From Data Privacy to Location Privacy

    NASA Astrophysics Data System (ADS)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  12. Privacy in Educational Use of Social Media in the U.S.

    ERIC Educational Resources Information Center

    Marek, Michael W.; Skrabut, Stan

    2017-01-01

    Few scholarly publications have addressed in detail the question of student privacy when using social media for classroom educational activities. This study combined qualitative and conceptual methodologies to explore the implications of privacy law on learning activities, using the strict Family Educational Rights Privacy Act (FERPA) in the…

  13. 41 CFR 102-118.395 - How long will GSA take to respond to a waiver request?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION TRANSPORTATION 118-TRANSPORTATION PAYMENT AND AUDIT Prepayment Audits of Transportation Services Waivers from Mandatory Prepayment Audit § 102-118.395 How long will GSA take to respond to a waiver request? GSA will...

  14. An overview of human genetic privacy.

    PubMed

    Shi, Xinghua; Wu, Xintao

    2017-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed, not only for individuals but also for their families. In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data. We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions. © 2016 New York Academy of Sciences.

  15. An overview of human genetic privacy

    PubMed Central

    Shi, Xinghua; Wu, Xintao

    2016-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed, not only for individuals but also for their families. In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data. We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions. PMID:27626905

  16. 41 CFR 102-37.125 - What are some donations that do not require GSA's approval?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are some donations... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Holding Agency § 102-37.125 What are some donations that do not require GSA's approval? (a) Some donations of surplus property that do not require GSA's...

  17. 41 CFR 102-37.125 - What are some donations that do not require GSA's approval?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What are some donations... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Holding Agency § 102-37.125 What are some donations that do not require GSA's approval? (a) Some donations of surplus property that do not require GSA's...

  18. 41 CFR 102-37.125 - What are some donations that do not require GSA's approval?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What are some donations... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Holding Agency § 102-37.125 What are some donations that do not require GSA's approval? (a) Some donations of surplus property that do not require GSA's...

  19. 41 CFR 102-37.125 - What are some donations that do not require GSA's approval?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What are some donations... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Holding Agency § 102-37.125 What are some donations that do not require GSA's approval? (a) Some donations of surplus property that do not require GSA's...

  20. 41 CFR 102-37.125 - What are some donations that do not require GSA's approval?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What are some donations... PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Holding Agency § 102-37.125 What are some donations that do not require GSA's approval? (a) Some donations of surplus property that do not require GSA's...

  1. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-22

    ... FOIA/Privacy Points of Contact are found at: http://www.dla.mil/foia-privacy/foia_poc.aspx . FOR FURTHER INFORMATION CONTACT: Ms. Jody Sinkler, 703-767-5045. SUPPLEMENTARY INFORMATION: DLA Address...

  2. GSA's Green Proving Ground: Identifying, Testing and Evaluating Innovative Technologies; Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kandt, A.; Lowell, M.

    2012-05-01

    This paper will provide an overview of the GPG program and its objectives as well as a summary and status update of the 16 technologies selected for enhanced testing and evaluation in 2011. The federal government's General Services Administration's (GSA) Public Buildings Service (PBS) acquires space on behalf of the federal government through new construction and leasing, and acts as a caretaker for federal properties across the country. PBS owns or leases 9,624 assets and maintains an inventory of more than 370.2 million square feet of workspace, and as such has enormous potential for implementing energy efficient and renewable energymore » technologies to reduce energy and water use and associated emissions. The Green Proving Ground (GPG) program utilizes GSA's real estate portfolio to test and evaluate innovative and underutilized sustainable building technologies and practices. Findings are used to support the development of GSA performance specifications and inform decision making within GSA, other federal agencies, and the real estate industry. The program aims to drive innovation in environmental performance in federal buildings and help lead market transformation through deployment of new technologies. In 2011, the GPG program selected 16 technologies or practices for rigorous testing and evaluation. Evaluations are currently being performed in collaboration with the Department of Energy's National Laboratories, and a steady stream of results will be forthcoming throughout 2012. This paper will provide an overview of the GPG program and its objectives as well as a summary and status update of the 16 technologies selected for enhanced testing and evaluation in 2011. Lastly, it provides a general overview of the 2012 program.« less

  3. NPDES Permit for General Services Administration (GSA) West Heating Plant

    EPA Pesticide Factsheets

    Under National Pollutant Discharge Elimination System permit number DC0000035, General Services Administration (GSA) West Heating Plant is authorized to discharge from a facility to receiving waters named Rock Creek.

  4. 76 FR 20343 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-12

    ... systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed action will... Air Force's notices for systems of records subject to the Privacy Act of 1974 (5 U.S.C. 552a), as... CONTACT address above. The proposed systems reports, as required by 5 U.S.C. 552a(r) of the Privacy Act...

  5. 77 FR 39494 - Submission for OMB Review; Federal Management Regulation; GSA Form 3040, State Agency Monthly...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-03

    ...] Submission for OMB Review; Federal Management Regulation; GSA Form 3040, State Agency Monthly Donation Report... collection requirement regarding GSA Form 3040, State Agency Monthly Donation Report of Surplus Property. A... Information Collection 3090- 0112, State Agency Monthly Donation Report of Surplus Personal Property by any of...

  6. Privacy and disclosure in psychoanalysis.

    PubMed

    Kantrowitz, Judy L

    2009-08-01

    The tension between privacy and disclosure in psychoanalysis operates in various ways in analyst, supervisee, and supervisor. Analysts need to maintain the privacy of their patients by keeping their material confidential; they also need to know and share their own internal conscious conflicts to be able to discover unconscious conflicts and their characterological ramifications. Clinical writing is one vehicle for the exploration, discovery, and communication of transference-countertransference issues and other conflicts stimulated by clinical work, but it does not provide the perspective that comes from sharing with another person. Telling a trusted colleague what we think and feel in relation to our patients and ourselves enables us to see our blind spots, as well as providing perspective and affect containment in our work. Mutuality in peer supervision tends to reduce the transference. The special problems of privacy and disclosure in psychoanalytic training are addressed, as are the ways the analyst's belief in maintaining privacy may affect the analytic process and therapeutic relationship.

  7. 32 CFR 701.101 - Privacy program terms and definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... from a project on privacy issues, identifying and resolving the privacy risks, and approval by a...

  8. 78 FR 79460 - Notification of GSA Strategic Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-30

    ...] Notification of GSA Strategic Plan AGENCY: Office of the Chief Financial Officer, U.S. General Services..., Office of the Chief Financial Officer, 1800 F Street NW., Washington, DC 20405. FOR FURTHER INFORMATION... Officer, Office of the Chief Financial Officer. [FR Doc. 2013-31168 Filed 12-27-13; 8:45 am] BILLING CODE...

  9. DQC Comments on the Posted Recommendations Regarding Data Security and Privacy Protections

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2010

    2010-01-01

    The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…

  10. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ....C. 2473 (2003); Federal Records Act, 44 U.S.C. 3101 (2003); Chief Financial Officers Act of 1990 205.... ADDRESSES: Patti F. Stockman, Privacy Act Officer, Office of the Chief Information Officer, National... Information Officer. NASA 10CFMR SYSTEM NAME: Core Financial Management Records. SECURITY CLASSIFICATION: This...

  11. Comparative Approaches to Biobanks and Privacy.

    PubMed

    Rothstein, Mark A; Knoppers, Bartha Maria; Harrell, Heather L

    2016-03-01

    Laws in the 20 jurisdictions studied for this project display many similar approaches to protecting privacy in biobank research. Although few have enacted biobank-specific legislation, many countries address biobanking within other laws. All provide for some oversight mechanisms for biobank research, even though the nature of that oversight varies between jurisdictions. Most have some sort of controlled access system in place for research with biobank specimens. While broad consent models facilitate biobanking, countries without national or federated biobanks have been slow to adopt broad consent. International guidelines have facilitated sharing and generally take a proportional risk approach, but many countries have provisions guiding international sharing and a few even limit international sharing. Although privacy laws may not prohibit international collaborations, the multi-prong approach to privacy unique to each jurisdiction can complicate international sharing. These symposium issues can serve as a resource for explaining the sometimes intricate privacy laws in each studied jurisdiction, outlining the key issues with regards to privacy and biobanking, and serving to describe a framework for the process of harmonization of privacy laws. © 2016 American Society of Law, Medicine & Ethics.

  12. 41 CFR 102-34.220 - What does GSA do if it learns of unofficial use of a Government motor vehicle?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What does GSA do if it learns of unofficial use of a Government motor vehicle? 102-34.220 Section 102-34.220 Public Contracts....220 What does GSA do if it learns of unofficial use of a Government motor vehicle? GSA reports the...

  13. 41 CFR 102-34.220 - What does GSA do if it learns of unofficial use of a Government motor vehicle?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What does GSA do if it learns of unofficial use of a Government motor vehicle? 102-34.220 Section 102-34.220 Public Contracts....220 What does GSA do if it learns of unofficial use of a Government motor vehicle? GSA reports the...

  14. GSA-PCA: gene set generation by principal component analysis of the Laplacian matrix of a metabolic network

    PubMed Central

    2012-01-01

    Background Gene Set Analysis (GSA) has proven to be a useful approach to microarray analysis. However, most of the method development for GSA has focused on the statistical tests to be used rather than on the generation of sets that will be tested. Existing methods of set generation are often overly simplistic. The creation of sets from individual pathways (in isolation) is a poor reflection of the complexity of the underlying metabolic network. We have developed a novel approach to set generation via the use of Principal Component Analysis of the Laplacian matrix of a metabolic network. We have analysed a relatively simple data set to show the difference in results between our method and the current state-of-the-art pathway-based sets. Results The sets generated with this method are semi-exhaustive and capture much of the topological complexity of the metabolic network. The semi-exhaustive nature of this method has also allowed us to design a hypergeometric enrichment test to determine which genes are likely responsible for set significance. We show that our method finds significant aspects of biology that would be missed (i.e. false negatives) and addresses the false positive rates found with the use of simple pathway-based sets. Conclusions The set generation step for GSA is often neglected but is a crucial part of the analysis as it defines the full context for the analysis. As such, set generation methods should be robust and yield as complete a representation of the extant biological knowledge as possible. The method reported here achieves this goal and is demonstrably superior to previous set analysis methods. PMID:22876834

  15. Evaluating Common Privacy Vulnerabilities in Internet Service Providers

    NASA Astrophysics Data System (ADS)

    Kotzanikolaou, Panayiotis; Maniatis, Sotirios; Nikolouzou, Eugenia; Stathopoulos, Vassilios

    Privacy in electronic communications receives increased attention in both research and industry forums, stemming from both the users' needs and from legal and regulatory requirements in national or international context. Privacy in internet-based communications heavily relies on the level of security of the Internet Service Providers (ISPs), as well as on the security awareness of the end users. This paper discusses the role of the ISP in the privacy of the communications. Based on real security audits performed in national-wide ISPs, we illustrate privacy-specific threats and vulnerabilities that many providers fail to address when implementing their security policies. We subsequently provide and discuss specific security measures that the ISPs can implement, in order to fine-tune their security policies in the context of privacy protection.

  16. 41 CFR 105-60.305-3 - GSA records available without charge.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General...-Availability of Opinions, Orders, Policies, Interpretations, Manuals, and Instructions § 105-60.305-3 GSA...

  17. 41 CFR 105-60.305-3 - GSA records available without charge.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General...-Availability of Opinions, Orders, Policies, Interpretations, Manuals, and Instructions § 105-60.305-3 GSA...

  18. 41 CFR 102-83.45 - Where may Executive agencies find guidance on appealing GSA's decisions and recommendations...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... agencies find guidance on appealing GSA's decisions and recommendations concerning delineated areas? 102-83... System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 83-LOCATION OF SPACE Location of Space... recommendations concerning delineated areas? GSA's PBS provides guidance in its Customer Guide to Real Property on...

  19. 78 FR 34264 - Technical Corrections to the HIPAA Privacy, Security, and Enforcement Rules

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-07

    ...-AA03 Technical Corrections to the HIPAA Privacy, Security, and Enforcement Rules AGENCY: Office for... corrections address certain inadvertent errors and omissions in the HIPAA Privacy, Security, and Enforcement... (HHS or ``the Department'') published a final rule to implement changes to the HIPAA Privacy, Security...

  20. 41 CFR 102-2.85 - What are the reasons for writing to GSA about FMR deviations?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are the reasons for... MANAGEMENT REGULATION SYSTEM Regulation System Deviations § 102-2.85 What are the reasons for writing to GSA... clarification from GSA as to whether statutes, Executive orders, or other controlling policies, which may not be...

  1. Privacy-preserving heterogeneous health data sharing.

    PubMed

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-05-01

    Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis.

  2. 78 FR 38017 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ... at the Defense Privacy and Civil Liberties Office Web site at http://dpclo.defense.gov/privacy/SORNs... media.'' * * * * * Safeguards: Delete entry and replace with ``Electronic data files reside in.... Individuals should provide full name, Social Security Number, current address and telephone number and, if...

  3. Should There Be an Expectation of Privacy in the Library? Online Treasures

    ERIC Educational Resources Information Center

    Balas, Janet L.

    2005-01-01

    Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…

  4. 76 FR 13617 - Office of Federal High-Performance Green Buildings (OFHPGB); Notice of GSA Bulletin OFHPGB 2011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-14

    ...-Performance Green Buildings (OFHPGB); Notice of GSA Bulletin OFHPGB 2011-OGP-1 AGENCY: Office of.... Procedures Bulletins regarding the Office of Federal High-Performance Green Building are located on the... Washington, DC 20405 OFFICE OF FEDERAL HIGH-PERFORMANCE GREEN BUILDINGS GSA Bulletin 2011-OGP-1 TO: Heads of...

  5. 41 CFR 101-30.603-2 - GSA Supply Catalog.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA Supply Catalog. 101-30.603-2 Section 101-30.603-2 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 30-FEDERAL CATALOG SYSTEM 30...

  6. Performance Comparison of Two Gene Set Analysis Methods for Genome-wide Association Study Results: GSA-SNP vs i-GSEA4GWAS.

    PubMed

    Kwon, Ji-Sun; Kim, Jihye; Nam, Dougu; Kim, Sangsoo

    2012-06-01

    Gene set analysis (GSA) is useful in interpreting a genome-wide association study (GWAS) result in terms of biological mechanism. We compared the performance of two different GSA implementations that accept GWAS p-values of single nucleotide polymorphisms (SNPs) or gene-by-gene summaries thereof, GSA-SNP and i-GSEA4GWAS, under the same settings of inputs and parameters. GSA runs were made with two sets of p-values from a Korean type 2 diabetes mellitus GWAS study: 259,188 and 1,152,947 SNPs of the original and imputed genotype datasets, respectively. When Gene Ontology terms were used as gene sets, i-GSEA4GWAS produced 283 and 1,070 hits for the unimputed and imputed datasets, respectively. On the other hand, GSA-SNP reported 94 and 38 hits, respectively, for both datasets. Similar, but to a lesser degree, trends were observed with Kyoto Encyclopedia of Genes and Genomes (KEGG) gene sets as well. The huge number of hits by i-GSEA4GWAS for the imputed dataset was probably an artifact due to the scaling step in the algorithm. The decrease in hits by GSA-SNP for the imputed dataset may be due to the fact that it relies on Z-statistics, which is sensitive to variations in the background level of associations. Judicious evaluation of the GSA outcomes, perhaps based on multiple programs, is recommended.

  7. Framework for objective evaluation of privacy filters

    NASA Astrophysics Data System (ADS)

    Korshunov, Pavel; Melle, Andrea; Dugelay, Jean-Luc; Ebrahimi, Touradj

    2013-09-01

    Extensive adoption of video surveillance, affecting many aspects of our daily lives, alarms the public about the increasing invasion into personal privacy. To address these concerns, many tools have been proposed for protection of personal privacy in image and video. However, little is understood regarding the effectiveness of such tools and especially their impact on the underlying surveillance tasks, leading to a tradeoff between the preservation of privacy offered by these tools and the intelligibility of activities under video surveillance. In this paper, we investigate this privacy-intelligibility tradeoff objectively by proposing an objective framework for evaluation of privacy filters. We apply the proposed framework on a use case where privacy of people is protected by obscuring faces, assuming an automated video surveillance system. We used several popular privacy protection filters, such as blurring, pixelization, and masking and applied them with varying strengths to people's faces from different public datasets of video surveillance footage. Accuracy of face detection algorithm was used as a measure of intelligibility (a face should be detected to perform a surveillance task), and accuracy of face recognition algorithm as a measure of privacy (a specific person should not be identified). Under these conditions, after application of an ideal privacy protection tool, an obfuscated face would be visible as a face but would not be correctly identified by the recognition algorithm. The experiments demonstrate that, in general, an increase in strength of privacy filters under consideration leads to an increase in privacy (i.e., reduction in recognition accuracy) and to a decrease in intelligibility (i.e., reduction in detection accuracy). Masking also shows to be the most favorable filter across all tested datasets.

  8. ACHP | News | ACHP Considers Program Comment for Select GSA Repairs and

    Science.gov Websites

    ) legislation has provided GSA with significant stewardship opportunities for its historic public buildings . However, the rigid spending deadline associated with the legislation has prompted the need for this

  9. 41 CFR 102-192.90 - What must we include in our annual mail management report to GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... our annual mail management report to GSA? 102-192.90 Section 102-192.90 Public Contracts and Property... annual mail management report to GSA? Your annual report must— (a) Identify your agency mail manager; in... person serving in this role. (b) State the total amounts paid to each service provider during the...

  10. Privacy-preserving heterogeneous health data sharing

    PubMed Central

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-01-01

    Objective Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. Methods The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. Results We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. Limitation The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Conclusions Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis. PMID:23242630

  11. 41 CFR 300-80.4 - How many test programs may be authorized by GSA throughout the government?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 4 2010-07-01 2010-07-01 false How many test programs may be authorized by GSA throughout the government? 300-80.4 Section 300-80.4 Public Contracts and... TEST PROGRAMS § 300-80.4 How many test programs may be authorized by GSA throughout the government? No...

  12. Amazon Business And GSA Advantage: A Comparative Analysis

    DTIC Science & Technology

    2017-12-01

    training for businesses or a customer -ordering guide; however, the site does offer a help center where businesses and users can submit questions...Electronic Offer FAR Federal Acquisition Regulation FAS Federal Acquisition Service FASA Federal Acquisition Streamlining Act FGO Field Grade Officer...component of GSA Advantage, is an online procurement tool that allows customers to request quotes for (1) commercial supplies and services under

  13. Privacy and Property in the Biobank Context

    PubMed Central

    2010-01-01

    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is all about and aim for a fruitful perspective on the issues of property and privacy rights in the context of biobanking. This paper argues that the limits and handling of private matters is determined in specific social relations. The crucial point is thus to determine which information and activities are or are not the legitimate concern of others. Privacy and property rights should be seen as balanced by duties, that is as inherently relational interests extending into the public sphere, rather than to see these rights as the control of an object—for instance the participant’s biobank material. PMID:20799053

  14. 41 CFR 105-60.305-4 - GSA records available at a fee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services..., Orders, Policies, Interpretations, Manuals, and Instructions § 105-60.305-4 GSA records available at a...

  15. 41 CFR 105-60.305-4 - GSA records available at a fee.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services..., Orders, Policies, Interpretations, Manuals, and Instructions § 105-60.305-4 GSA records available at a...

  16. 41 CFR 102-36.395 - How may GSA assist us in disposing of foreign excess personal property?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false How may GSA assist us in disposing of foreign excess personal property? 102-36.395 Section 102-36.395 Public Contracts and Property... Handling Foreign Excess Personal Property § 102-36.395 How may GSA assist us in disposing of foreign excess...

  17. 41 CFR 102-36.395 - How may GSA assist us in disposing of foreign excess personal property?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How may GSA assist us in disposing of foreign excess personal property? 102-36.395 Section 102-36.395 Public Contracts and Property... Handling Foreign Excess Personal Property § 102-36.395 How may GSA assist us in disposing of foreign excess...

  18. 41 CFR 101-26.305 - Submission of orders to GSA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Submission of orders to GSA. 101-26.305 Section 101-26.305 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 26-PROCUREMENT...

  19. LEA in Private: A Privacy and Data Protection Framework for a Learning Analytics Toolbox

    ERIC Educational Resources Information Center

    Steiner, Christina M.; Kickmeier-Rust, Michael D.; Albert, Dietrich

    2016-01-01

    To find a balance between learning analytics research and individual privacy, learning analytics initiatives need to appropriately address ethical, privacy, and data protection issues. A range of general guidelines, model codes, and principles for handling ethical issues and for appropriate data and privacy protection are available, which may…

  20. 76 FR 34650 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... The agenda is expected to include the following items: --Cloud Security and Privacy Panel discussion on addressing security and privacy for different types of cloud computing, --Presentation from...

  1. 41 CFR 102-117.340 - What other types of assistance may GSA provide agencies in dealing with regulatory bodies?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... assistance may GSA provide agencies in dealing with regulatory bodies? 102-117.340 Section 102-117.340 Public... MANAGEMENT REGULATION TRANSPORTATION 117-TRANSPORTATION MANAGEMENT Representation Before Regulatory Body... bodies? (a) GSA has oversight of all public utilities used by the Federal Government including...

  2. 41 CFR 102-117.340 - What other types of assistance may GSA provide agencies in dealing with regulatory bodies?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... assistance may GSA provide agencies in dealing with regulatory bodies? 102-117.340 Section 102-117.340 Public... MANAGEMENT REGULATION TRANSPORTATION 117-TRANSPORTATION MANAGEMENT Representation Before Regulatory Body... bodies? (a) GSA has oversight of all public utilities used by the Federal Government including...

  3. 5 CFR 6701.104 - Prohibited purchases of real estate by certain GSA employees involved in the acquisition or...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Prohibited purchases of real estate by certain GSA employees involved in the acquisition or disposal of real estate. 6701.104 Section 6701.104... OF THE GENERAL SERVICES ADMINISTRATION § 6701.104 Prohibited purchases of real estate by certain GSA...

  4. 5 CFR 6701.104 - Prohibited purchases of real estate by certain GSA employees involved in the acquisition or...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Prohibited purchases of real estate by certain GSA employees involved in the acquisition or disposal of real estate. 6701.104 Section 6701.104... OF THE GENERAL SERVICES ADMINISTRATION § 6701.104 Prohibited purchases of real estate by certain GSA...

  5. 5 CFR 6701.104 - Prohibited purchases of real estate by certain GSA employees involved in the acquisition or...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Prohibited purchases of real estate by certain GSA employees involved in the acquisition or disposal of real estate. 6701.104 Section 6701.104... OF THE GENERAL SERVICES ADMINISTRATION § 6701.104 Prohibited purchases of real estate by certain GSA...

  6. 5 CFR 6701.104 - Prohibited purchases of real estate by certain GSA employees involved in the acquisition or...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Prohibited purchases of real estate by certain GSA employees involved in the acquisition or disposal of real estate. 6701.104 Section 6701.104... OF THE GENERAL SERVICES ADMINISTRATION § 6701.104 Prohibited purchases of real estate by certain GSA...

  7. Leveraging Lighting for Energy Savings: GSA Northwest/Artic Region

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2016-01-01

    Case study describes how the Northwest/Arctic Region branch of the General Services Administration (GSA) improved safety and energy efficiency in its Fairbanks Federal Building parking garage used by federal employees, U.S. Marshals, and the District Court. A 74% savings was realized by replacing 220 high-pressure sodium fixtures with 220 light-emitting diode fixtures.

  8. 41 CFR 102-85.195 - Does GSA provide special services?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Does GSA provide special services? 102-85.195 Section 102-85.195 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 85-PRICING POLICY FOR...

  9. 41 CFR 105-62.103 - Access to GSA-originated materials.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Administration 62-DOCUMENT SECURITY AND DECLASSIFICATION 62.1-Classified Materials § 105-62.103 Access to GSA..., provided that: (1) A written determination is made by the Administrator of General Services that such... element having classification jurisdiction for such information or material makes a written determination...

  10. 41 CFR 105-64.101 - Who is responsible for enforcing these rules?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.101 Who is responsible for enforcing these rules? GSA Heads of Services and Staff Offices and Regional Administrators are...

  11. 41 CFR 105-64.101 - Who is responsible for enforcing these rules?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.101 Who is responsible for enforcing these rules? GSA Heads of Services and Staff Offices and Regional Administrators are...

  12. 41 CFR 105-64.601 - Procedures for establishing system of records.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... establishing system of records. 105-64.601 Section 105-64.601 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.6-Establishing or Revising Systems of Records in GSA...

  13. 41 CFR 105-64.601 - Procedures for establishing system of records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... establishing system of records. 105-64.601 Section 105-64.601 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.6-Establishing or Revising Systems of Records in GSA...

  14. 41 CFR 105-64.601 - Procedures for establishing system of records.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... establishing system of records. 105-64.601 Section 105-64.601 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.6-Establishing or Revising Systems of Records in GSA...

  15. 41 CFR 105-64.601 - Procedures for establishing system of records.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... establishing system of records. 105-64.601 Section 105-64.601 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.6-Establishing or Revising Systems of Records in GSA...

  16. 76 FR 10010 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-23

    ... inventory of records systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: The...: The Department of the Air Force systems of records notices subject to the Privacy Act of 1974, (5 U.S... 78150-7412 and at Military Personnel Sections at Air Force Installations. Official mailing addresses are...

  17. Teaching Information Privacy in Marketing Courses: Key Educational Issues for Principles of Marketing and Elective Marketing Courses

    ERIC Educational Resources Information Center

    Peltier, James W.; Milne, George R.; Phelps, Joseph E.; Barrett, Jennifer T.

    2010-01-01

    An "information privacy gap" exists in marketing education, with little research addressing the state of information privacy and how appropriate privacy strategies and tactics should be communicated to students. The primary purpose of this article is to provide educators an understanding of information privacy and how they can incorporate this…

  18. Privacy, technology, and norms: the case of Smart Meters.

    PubMed

    Horne, Christine; Darras, Brice; Bean, Elyse; Srivastava, Anurag; Frickel, Scott

    2015-05-01

    Norms shift and emerge in response to technological innovation. One such innovation is Smart Meters - components of Smart Grid energy systems capable of minute-to-minute transmission of consumer electricity use information. We integrate theory from sociological research on social norms and privacy to examine how privacy threats affect the demand for and expectations of norms that emerge in response to new technologies, using Smart Meters as a test case. Results from three vignette experiments suggest that increased threats to privacy created by Smart Meters are likely to provoke strong demand for and expectations of norms opposing the technology and that the strength of these normative rules is at least partly conditional on the context. Privacy concerns vary little with actors' demographic characteristics. These findings contribute to theoretical understanding of norm emergence and have practical implications for implementing privacy protections that effectively address concerns of electricity users. Copyright © 2014 Elsevier Inc. All rights reserved.

  19. Overview of Privacy in Social Networking Sites (SNS)

    NASA Astrophysics Data System (ADS)

    Powale, Pallavi I.; Bhutkar, Ganesh D.

    2013-07-01

    Social Networking Sites (SNS) have become an integral part of communication and life style of people in today's world. Because of the wide range of services offered by SNSs mostly for free of cost, these sites are attracting the attention of all possible Internet users. Most importantly, users from all age groups have become members of SNSs. Since many of the users are not aware of the data thefts associated with information sharing, they freely share their personal information with SNSs. Therefore, SNSs may be used for investigating users' character and social habits by familiar or even unknown persons and agencies. Such commercial and social scenario, has led to number of privacy and security threats. Though, all major issues in SNSs need to be addressed, by SNS providers, privacy of SNS users is the most crucial. And therefore, in this paper, we have focused our discussion on "privacy in SNSs". We have discussed different ways of Personally Identifiable Information (PII) leakages from SNSs, information revelation to third-party domains without user consent and privacy related threats associated with such information sharing. We expect that this comprehensive overview on privacy in SNSs will definitely help in raising user awareness about sharing data and managing their privacy with SNSs. It will also help SNS providers to rethink about their privacy policies.

  20. 41 CFR 101-26.306 - Planned requisitioning for GSA stock items.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Planned requisitioning for GSA stock items. 101-26.306 Section 101-26.306 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 26...

  1. 41 CFR 105-60.305-3 - GSA records available without charge.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false GSA records available without charge. 105-60.305-3 Section 105-60.305-3 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General...

  2. 41 CFR 105-60.305-3 - GSA records available without charge.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false GSA records available without charge. 105-60.305-3 Section 105-60.305-3 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General...

  3. 41 CFR 105-60.305-3 - GSA records available without charge.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false GSA records available without charge. 105-60.305-3 Section 105-60.305-3 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General...

  4. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How does GSA safeguard personal information? 105-64.108 Section 105-64.108 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General...

  5. Achieving Optimal Privacy in Trust-Aware Social Recommender Systems

    NASA Astrophysics Data System (ADS)

    Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail

    Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.

  6. 75 FR 69988 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-16

    ... Administration (GSA) for inclusion in GSA's List of Parties Excluded from Federal Procurements and Nonprocurement... (FRS), toll free, at 1-800-877-8339. Individuals with disabilities can obtain this document in an...

  7. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  8. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration of...

  9. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration of...

  10. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration of...

  11. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 37-DONATION OF SURPLUS PERSONAL PROPERTY Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration of...

  12. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or for...

  13. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or for...

  14. 41 CFR 102-41.205 - Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... forfeited distilled spirits, wine, and beer to GSA for disposal? 102-41.205 Section 102-41.205 Public..., and Beer § 102-41.205 Do we report all forfeited distilled spirits, wine, and beer to GSA for disposal? (a) Yes, except do not report distilled spirits, wine, and beer not fit for human consumption or for...

  15. Sorted Index Numbers for Privacy Preserving Face Recognition

    NASA Astrophysics Data System (ADS)

    Wang, Yongjin; Hatzinakos, Dimitrios

    2009-12-01

    This paper presents a novel approach for changeable and privacy preserving face recognition. We first introduce a new method of biometric matching using the sorted index numbers (SINs) of feature vectors. Since it is impossible to recover any of the exact values of the original features, the transformation from original features to the SIN vectors is noninvertible. To address the irrevocable nature of biometric signals whilst obtaining stronger privacy protection, a random projection-based method is employed in conjunction with the SIN approach to generate changeable and privacy preserving biometric templates. The effectiveness of the proposed method is demonstrated on a large generic data set, which contains images from several well-known face databases. Extensive experimentation shows that the proposed solution may improve the recognition accuracy.

  16. 77 FR 17460 - Multistakeholder Process To Develop Consumer Data Privacy Codes of Conduct

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-26

    .... 120214135-2203-02] RIN 0660-XA27 Multistakeholder Process To Develop Consumer Data Privacy Codes of Conduct... request for public comments on the multistakeholder process to develop consumer data privacy codes of...-multistakeholder-process without change. All personal identifying information (for example, name, address...

  17. HIPAA Privacy 101: essentials for case management practice.

    PubMed

    DiBenedetto, Deborah V

    2003-01-01

    The Health Insurance Portability and Accountability Act (HIPAA) has significant impact on the delivery of healthcare in the United States. The Administrative Simplification (AS) requirements of HIPAA are aimed at reducing administrative costs and burdens in the healthcare industry. The core components of HIPAA's AS requirements address healthcare transactions, code sets, security, unique identifiers, and privacy of health information. HIPAA's privacy standard limits the nonconsensual use and release of private health information, gives patients new rights to access their medical records and to know who else has accessed them, restricts most disclosure of health information to the minimum needed for the intended purpose, establishes new criminal and civil sanctions for improper use or disclosure, and establishes new requirements for access to records by researchers and others. This article focuses on HIPAA's privacy requirements as related to case management of workers compensation populations, the treatment of protected health information, and how case managers can ensure they provide appropriate services while navigating the requirements of HIPAA's privacy standard.

  18. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  19. Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Burghardt, Thorben; Buchmann, Erik; Müller, Jens; Böhm, Klemens

    Location based services (LBS) let people retrieve and share information related to their current position. Examples are Google Latitude or Panoramio. Since LBS share user-related content, location information etc., they put user privacy at risk. Literature has proposed various privacy mechanisms for LBS. However, it is unclear which mechanisms humans really find useful, and how they make use of them. We present a user study that addresses these issues. To obtain realistic results, we have implemented a geotagging application on the web and on GPS cellphones, and our study participants use this application in their daily lives. We test five privacy mechanisms that differ in the awareness, mental effort and degree of informedness required from the users. Among other findings, we have observed that in situations where a single simple mechanism does not meet all privacy needs, people want to use simple and sophisticated mechanisms in combination. Further, individuals are concerned about the privacy of others, even when they do not value privacy for themselves.

  20. Users or Students? Privacy in University MOOCS.

    PubMed

    Jones, Meg Leta; Regner, Lucas

    2016-10-01

    Two terms, student privacy and Massive Open Online Courses, have received a significant amount of attention recently. Both represent interesting sites of change in entrenched structures, one educational and one legal. MOOCs represent something college courses have never been able to provide: universal access. Universities not wanting to miss the MOOC wave have started to build MOOC courses and integrate them into the university system in various ways. However, the design and scale of university MOOCs create tension for privacy laws intended to regulate information practices exercised by educational institutions. Are MOOCs part of the educational institutions these laws and policies aim to regulate? Are MOOC users students whose data are protected by aforementioned laws and policies? Many university researchers and faculty members are asked to participate as designers and instructors in MOOCs but may not know how to approach the issues proposed. While recent scholarship has addressed the disruptive nature of MOOCs, student privacy generally, and data privacy in the K-12 system, we provide an in-depth description and analysis of the MOOC phenomenon and the privacy laws and policies that guide and regulate educational institutions today. We offer privacy case studies of three major MOOC providers active in the market today to reveal inconsistencies among MOOC platform and the level and type of legal uncertainty surrounding them. Finally, we provide a list of organizational questions to pose internally to navigate the uncertainty presented to university MOOC teams.

  1. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What information must FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration of...

  2. 5 CFR 6701.103 - Prohibited purchases of property sold by GSA.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Prohibited purchases of property sold by... STANDARDS OF ETHICAL CONDUCT FOR EMPLOYEES OF THE GENERAL SERVICES ADMINISTRATION § 6701.103 Prohibited purchases of property sold by GSA. (a) General prohibition. Except as provided in paragraphs (b) and (c) of...

  3. General Separations Area (GSA) Groundwater Flow Model Update: Hydrostratigraphic Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bagwell, L.; Bennett, P.; Flach, G.

    2017-02-21

    This document describes the assembly, selection, and interpretation of hydrostratigraphic data for input to an updated groundwater flow model for the General Separations Area (GSA; Figure 1) at the Department of Energy’s (DOE) Savannah River Site (SRS). This report is one of several discrete but interrelated tasks that support development of an updated groundwater model (Bagwell and Flach, 2016).

  4. 41 CFR 102-192.170 - What are GSA's responsibilities in mail management?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are GSA's responsibilities in mail management? 102-192.170 Section 102-192.170 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION ADMINISTRATIVE...

  5. Assessing the privacy policies in mobile personal health records.

    PubMed

    Zapata, Belén Cruz; Hernández Niñirola, Antonio; Fernández-Alemán, José Luis; Toval, Ambrosio

    2014-01-01

    The huge increase in the number and use of smartphones and tablets has led health service providers to take an interest in mHealth. Popular mobile app markets like Apple App Store or Google Play contain thousands of health applications. Although mobile personal health records (mPHRs) have a number of benefits, important challenges appear in the form of adoption barriers. Security and privacy have been identified as part of these barriers and should be addressed. This paper analyzes and assesses a total of 24 free mPHRs for Android and iOS. Characteristics regarding privacy and security were extracted from the HIPAA. The results show important differences in both the mPHRs and the characteristics analyzed. A questionnaire containing six questions concerning privacy policies was defined. Our questionnaire may assist developers and stakeholders to evaluate the security and privacy of their mPHRs.

  6. Privacy Awareness: A Means to Solve the Privacy Paradox?

    NASA Astrophysics Data System (ADS)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  7. Simple Peer-to-Peer SIP Privacy

    NASA Astrophysics Data System (ADS)

    Koskela, Joakim; Tarkoma, Sasu

    In this paper, we introduce a model for enhancing privacy in peer-to-peer communication systems. The model is based on data obfuscation, preventing intermediate nodes from tracking calls, while still utilizing the shared resources of the peer network. This increases security when moving between untrusted, limited and ad-hoc networks, when the user is forced to rely on peer-to-peer schemes. The model is evaluated using a Host Identity Protocol-based prototype on mobile devices, and is found to provide good privacy, especially when combined with a source address hiding scheme. The contribution of this paper is to present the model and results obtained from its use, including usability considerations.

  8. 19. INTERIOR, 'CHILLER NO. 2' (G.S.A. PHOTOCOPY, N.D.) (4 x ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. INTERIOR, 'CHILLER NO. 2' (G.S.A. PHOTOCOPY, N.D.) (4 x 5 NEGATIVE) - U.S. General Services Administration, Central Heating Plant, C & D Streets between Twelfth & Thirteenth Streets Southwest, Washington, District of Columbia, DC

  9. 41 CFR 102-36.210 - Why must we report excess personal property to GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... paid for with taxpayers' money, thus minimizing new procurement costs. Reporting excess personal property to GSA helps assure that the information on available excess personal property is accessible and...

  10. 41 CFR 102-36.210 - Why must we report excess personal property to GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... paid for with taxpayers' money, thus minimizing new procurement costs. Reporting excess personal property to GSA helps assure that the information on available excess personal property is accessible and...

  11. 41 CFR 102-36.210 - Why must we report excess personal property to GSA?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... paid for with taxpayers' money, thus minimizing new procurement costs. Reporting excess personal property to GSA helps assure that the information on available excess personal property is accessible and...

  12. 41 CFR 102-36.210 - Why must we report excess personal property to GSA?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... paid for with taxpayers' money, thus minimizing new procurement costs. Reporting excess personal property to GSA helps assure that the information on available excess personal property is accessible and...

  13. 41 CFR 102-36.210 - Why must we report excess personal property to GSA?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... paid for with taxpayers' money, thus minimizing new procurement costs. Reporting excess personal property to GSA helps assure that the information on available excess personal property is accessible and...

  14. PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems.

    PubMed

    Xu, Chang; Lu, Rongxing; Wang, Huaxiong; Zhu, Liehuang; Huang, Cheng

    2017-03-03

    Air pollution has become one of the most pressing environmental issues in recent years. According to a World Health Organization (WHO) report, air pollution has led to the deaths of millions of people worldwide. Accordingly, expensive and complex air-monitoring instruments have been exploited to measure air pollution. Comparatively, a vehicle sensing system (VSS), as it can be effectively used for many purposes and can bring huge financial benefits in reducing high maintenance and repair costs, has received considerable attention. However, the privacy issues of VSS including vehicles' location privacy have not been well addressed. Therefore, in this paper, we propose a new privacy-preserving data aggregation scheme, called PAVS, for VSS. Specifically, PAVS combines privacy-preserving classification and privacy-preserving statistics on both the mean E(·) and variance Var(·), which makes VSS more promising, as, with minimal privacy leakage, more vehicles are willing to participate in sensing. Detailed analysis shows that the proposed PAVS can achieve the properties of privacy preservation, data accuracy and scalability. In addition, the performance evaluations via extensive simulations also demonstrate its efficiency.

  15. Image feature extraction in encrypted domain with privacy-preserving SIFT.

    PubMed

    Hsu, Chao-Yung; Lu, Chun-Shien; Pei, Soo-Chang

    2012-11-01

    Privacy has received considerable attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario where the server is resource-abundant, and is capable of finishing the designated tasks. It is envisioned that secure media applications with privacy preservation will be treated seriously. In view of the fact that scale-invariant feature transform (SIFT) has been widely adopted in various fields, this paper is the first to target the importance of privacy-preserving SIFT (PPSIFT) and to address the problem of secure SIFT feature extraction and representation in the encrypted domain. As all of the operations in SIFT must be moved to the encrypted domain, we propose a privacy-preserving realization of the SIFT method based on homomorphic encryption. We show through the security analysis based on the discrete logarithm problem and RSA that PPSIFT is secure against ciphertext only attack and known plaintext attack. Experimental results obtained from different case studies demonstrate that the proposed homomorphic encryption-based privacy-preserving SIFT performs comparably to the original SIFT and that our method is useful in SIFT-based privacy-preserving applications.

  16. 76 FR 23646 - Privacy Act of 1974, as Amended; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-27

    ... notice contained incorrect addresses. FOR FURTHER INFORMATION CONTACT: Dale Underwood, Privacy Act Officer, Department of the Treasury, (202)-622-0874 ( dale[email protected] ). Correction In the...

  17. Case of disclosure of HIV status helps to clarify privacy law in Ontario.

    PubMed

    Lang, Renée

    2008-07-01

    A judge in the Ontario Superior Court of Justice has dismissed a breach of privacy suit on the basis that the plaintiff failed to prove that the disclosure of his HIV status had caused him harm. The judgment set out guidelines for how future claims of breach of privacy should be addressed.

  18. 41 CFR 105-60.305-4 - GSA records available at a fee.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false GSA records available at a fee. 105-60.305-4 Section 105-60.305-4 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services...

  19. 41 CFR 105-60.305-4 - GSA records available at a fee.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false GSA records available at a fee. 105-60.305-4 Section 105-60.305-4 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services...

  20. 41 CFR 105-60.305-4 - GSA records available at a fee.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false GSA records available at a fee. 105-60.305-4 Section 105-60.305-4 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General Services...

  1. Biobanking Research and Privacy Laws in the United States.

    PubMed

    Harrell, Heather L; Rothstein, Mark A

    2016-03-01

    Privacy is protected in biobank-based research in the US primarily by the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and the Federal Policy for Protection of Human Subjects (Common Rule). Neither rule, however, was created to function in the unique context of biobank research, and therefore neither applies to all biobank-based research. Not only is it challenging to determine when the HIPAA Privacy Rule or the Common Rule apply, but these laws apply different standards to protect privacy. In addition, many other federal and state laws may be applicable to a particular biobank, researcher, or project. US law also does not directly address international sharing of data or specimens outside of the EU-US Safe Harbor Agreement, which only applies to receipt of data by certain US entities from EU countries, and is in the process of revision. Although new rules would help clarify privacy protections in biobanking, any implemented changes should be studied to determine the sufficiency of the protections as well as its ability to facilitate or hinder international collaborations. © 2016 American Society of Law, Medicine & Ethics.

  2. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  3. Genetic privacy.

    PubMed

    Sankar, Pamela

    2003-01-01

    During the past 10 years, the number of genetic tests performed more than tripled, and public concern about genetic privacy emerged. The majority of states and the U.S. government have passed regulations protecting genetic information. However, research has shown that concerns about genetic privacy are disproportionate to known instances of information misuse. Beliefs in genetic determinacy explain some of the heightened concern about genetic privacy. Discussion of the debate over genetic testing within families illustrates the most recent response to genetic privacy concerns.

  4. Privacy and data security in E-health: requirements from the user's perspective.

    PubMed

    Wilkowska, Wiktoria; Ziefle, Martina

    2012-09-01

    In this study two currently relevant aspects of using medical assistive technologies were addressed-security and privacy. In a two-step empirical approach that used focus groups (n = 19) and a survey (n = 104), users' requirements for the use of medical technologies were collected and evaluated. Specifically, we focused on the perceived importance of data security and privacy issues. Outcomes showed that both security and privacy aspects play an important role in the successful adoption of medical assistive technologies in the home environment. In particular, analysis of data with respect to gender, health-status and age (young, middle-aged and old users) revealed that females and healthy adults require, and insist on, the highest security and privacy standards compared with males and the ailing elderly.

  5. Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges.

    PubMed

    Sajid, Anam; Abbas, Haider

    2016-06-01

    The widespread deployment and utility of Wireless Body Area Networks (WBAN's) in healthcare systems required new technologies like Internet of Things (IoT) and cloud computing, that are able to deal with the storage and processing limitations of WBAN's. This amalgamation of WBAN-based healthcare systems to cloud-based healthcare systems gave rise to serious privacy concerns to the sensitive healthcare data. Hence, there is a need for the proactive identification and effective mitigation mechanisms for these patient's data privacy concerns that pose continuous threats to the integrity and stability of the healthcare environment. For this purpose, a systematic literature review has been conducted that presents a clear picture of the privacy concerns of patient's data in cloud-assisted healthcare systems and analyzed the mechanisms that are recently proposed by the research community. The methodology used for conducting the review was based on Kitchenham guidelines. Results from the review show that most of the patient's data privacy techniques do not fully address the privacy concerns and therefore require more efforts. The summary presented in this paper would help in setting research directions for the techniques and mechanisms that are needed to address the patient's data privacy concerns in a balanced and light-weight manner by considering all the aspects and limitations of the cloud-assisted healthcare systems.

  6. Comparison of Tc-99m GSA scintigraphy and CT volumetry for evaluation in portal vein embolization.

    PubMed

    Kono, Yumiko; Kariya, Shuji; Komemushi, Atsushi; Nakatani, Miyuki; Yoshida, Rie Yagi; Suzuki, Satoshi; Ha-Kawa, Sung Kil; Utsunomiya, Keita; Ueno, Yasuhiro; Satoi, Sohei; Kaibori, Masaki; Kon, Masanori; Tanigawa, Noboru

    2014-08-01

    To determine the correlation of the rate of change of each future remnant liver (FRL) before and after portal vein embolization (PVE), by CT volumetry and Tc-99m galactosyl human serum albumin scintigraphy (GSA scintigraphy). From December 2007 to July 2012, ten patients underwent PVE before hepatic resection. CT volumetry and GSA scintigraphy were performed before and after PVE. The FRL was divided at Cantlie's line for CT volumetry, and volume change rates before and after PVE were calculated. The maximum removal rate (Rmax) was calculated using a radiopharmacokinetic model in GSA scintigraphy. The FRL Rmax change rates before and after PVE were calculated. The correlation between the volume change rates and the Rmax change rates was analyzed. The FRL volume change rate was 1.28 ± 0.26 (mean ± SD); the FRL hypertrophied in all patients significantly (p = 0.005). The FRL Rmax change rate was 1.66 ± 0.75; excluding one patient, there was significant FRL Rmax increase (p = 0.022). Although both increased significantly, no correlation between the volume change rate and the Rmax change rate was observed. No correlation was observed between the FRL volume rate and the Rmax rate.

  7. Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection.

    PubMed

    Chen, Hsuan-Ting; Chen, Wenghong

    2015-01-01

    Sampling 515 college students, this study investigates how privacy protection, including profile visibility, self-disclosure, and friending, are influenced by privacy concerns and efficacy regarding one's own ability to manage privacy settings, a factor that researchers have yet to give a great deal of attention to in the context of social networking sites (SNSs). The results of this study indicate an inconsistency in adopting strategies to protect privacy, a disconnect from limiting profile visibility and friending to self-disclosure. More specifically, privacy concerns lead SNS users to limit their profile visibility and discourage them from expanding their network. However, they do not constrain self-disclosure. Similarly, while self-efficacy in privacy management encourages SNS users to limit their profile visibility, it facilitates self-disclosure. This suggests that if users are limiting their profile visibility and constraining their friending behaviors, it does not necessarily mean they will reduce self-disclosure on SNSs because these behaviors are predicted by different factors. In addition, the study finds an interaction effect between privacy concerns and self-efficacy in privacy management on friending. It points to the potential problem of increased risk-taking behaviors resulting from high self-efficacy in privacy management and low privacy concerns.

  8. Will you accept the government's friend request? Social networks and privacy concerns.

    PubMed

    Siegel, David A

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  9. 41 CFR 101-26.503 - Multiple award schedule purchases made by GSA supply distribution facilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... facilities are responsible for quickly and economically providing customers with frequently needed common-use... is an important way in which GSA supply distribution facilities meet this responsibility. [60 FR...

  10. Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction

    NASA Astrophysics Data System (ADS)

    Hsu, Chao-Yung; Lu, Chun-Shien; Pei, Soo-Chang

    2011-02-01

    Privacy has received much attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario, where the server is resource-abundant and is capable of finishing the designated tasks, it is envisioned that secure media retrieval and search with privacy-preserving will be seriously treated. In view of the fact that scale-invariant feature transform (SIFT) has been widely adopted in various fields, this paper is the first to address the problem of secure SIFT feature extraction and representation in the encrypted domain. Since all the operations in SIFT must be moved to the encrypted domain, we propose a homomorphic encryption-based secure SIFT method for privacy-preserving feature extraction and representation based on Paillier cryptosystem. In particular, homomorphic comparison is a must for SIFT feature detection but is still a challenging issue for homomorphic encryption methods. To conquer this problem, we investigate a quantization-like secure comparison strategy in this paper. Experimental results demonstrate that the proposed homomorphic encryption-based SIFT performs comparably to original SIFT on image benchmarks, while preserving privacy additionally. We believe that this work is an important step toward privacy-preserving multimedia retrieval in an environment, where privacy is a major concern.

  11. 41 CFR 101-26.309 - Cancellation of orders for GSA stock items.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Cancellation of orders for GSA stock items. 101-26.309 Section 101-26.309 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 26-PROCUREMENT SOURCES AND PROGRAM 26.3...

  12. Stratospheric Transparency: Perspectives on Internet Privacy

    ERIC Educational Resources Information Center

    Hauck, Rita M.

    2009-01-01

    As a parent of teenagers in the 1980s, I recall a concern of the intrusion by MTV into our home. After futile attempts to block the program, my spouse and I set out to convince our sons of its intrusion. Our challenge was miniscule when compared to the Internet privacy issues of today. This paper addresses such challenges and proposes some…

  13. Discovering Privacy--or the Lack Thereof

    ERIC Educational Resources Information Center

    Pomykalski, James J.

    2017-01-01

    Many IS courses address the issues of ethical decision making and privacy through full course or section of a larger course. In this paper, the author discusses the development of a series of activities in an IS2010.07 course. The primary purpose of these activities is to raise awareness by the students of issues dealing with the collection,…

  14. [Mental Health Centers, in regard to professional confidentiality and privacy].

    PubMed

    Catanesi, Roberto; Carabellese, Felice

    2012-01-01

    Maintaining privacy in the complex operative reality of public psychiatric services is not easy. Many operational doubts arise and psychiatrists encounter difficulties in application of the privacy norms, partly due to the clinical and treatment peculiarities of the psychiatric domain and partly to organizational and structural limits. The risk addressed in this work is that the apparent complexity of the privacy norms may be perceived by psychiatrists in the public sector simply as a further bureaucratization of the doctor-patient relationship rather than as an opportunity to institute greater safeguards of patients' rights. Hence, the Authors aim to clarify the key points of the law, integrating them with the classic issues of confidentiality, in order to outline the goals, provide suggestions as to how best to adapt practice to conform to these norms, and highlight ways to simplify procedures. The Authors conclude by expressing the hope that the principles embodied in the privacy norms may become an integral part of the cultural heritage of territorial psychiatric services.

  15. 41 CFR 102-192.100 - How do we submit our annual mail management report to GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION... annual reports using the GSA web-based Electronic Performance Support Tool (EPST). Agency mail managers...

  16. 41 CFR 102-192.170 - What are GSA's responsibilities in mail management?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... guidance and assistance to Federal agencies to ensure economical and efficient records management. 44 U.S.C. § 2901(2) and (4) (C) define the processing of mail by Federal agencies as part of records management. In... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What are GSA's...

  17. 41 CFR 102-192.170 - What are GSA's responsibilities in mail management?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... guidance and assistance to Federal agencies to ensure economical and efficient records management. 44 U.S.C. § 2901(2) and (4) (C) define the processing of mail by Federal agencies as part of records management. In... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What are GSA's...

  18. Will You Accept the Government's Friend Request? Social Networks and Privacy Concerns

    PubMed Central

    Siegel, David A.

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim. PMID:24312236

  19. Deriving a Set of Privacy Specific Heuristics for the Assessment of PHRs (Personal Health Records).

    PubMed

    Furano, Riccardo F; Kushniruk, Andre; Barnett, Jeff

    2017-01-01

    With the emergence of personal health record (PHR) platforms becoming more widely available, this research focused on the development of privacy heuristics to assess PHRs regarding privacy. Existing sets of heuristics are typically not application specific and do not address patient-centric privacy as a main concern prior to undergoing PHR procurement. A set of privacy specific heuristics were developed based on a scoping review of the literature. An internet-based commercially available, vendor specific PHR application was evaluated using the derived set of privacy specific heuristics. The proposed set of privacy specific derived heuristics is explored in detail in relation to ISO 29100. The assessment of the internet-based commercially available, vendor specific PHR application indicated numerous violations. These violations were noted within the study. It is argued that the new derived privacy heuristics should be used in addition to Nielsen's well-established set of heuristics. Privacy specific heuristics could be used to assess PHR portal system-level privacy mechanisms in the procurement process of a PHR application and may prove to be a beneficial form of assessment to prevent the selection of a PHR platform with a poor privacy specific interface design.

  20. 41 CFR 102-33.40 - What are GSA's responsibilities for Federal aviation management?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... developing policy for managing Government aircraft; and (c) A management information system to collect... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What are GSA's responsibilities for Federal aviation management? 102-33.40 Section 102-33.40 Public Contracts and Property...

  1. 41 CFR 102-71.20 - What definitions apply to GSA's real property policies?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... planning, engineering, architectural work, and other similar actions. Carpool means a group of two or more... tested in accordance with the American Society for Testing and Materials, Test E 84, Surface Burning... space in a facility under GSA's custody and control. Occupant Emergency Plan means procedures developed...

  2. 41 CFR 102-71.20 - What definitions apply to GSA's real property policies?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... planning, engineering, architectural work, and other similar actions. Carpool means a group of two or more... tested in accordance with the American Society for Testing and Materials, Test E 84, Surface Burning... space in a facility under GSA's custody and control. Occupant Emergency Plan means procedures developed...

  3. 77 FR 37685 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-22

    ... familiar with the data privacy- related issues addressed by small to medium enterprises; and 3. Other... within or outside the agency. In certain circumstances, DHS may share this information on a case-by-case...

  4. 78 FR 3971 - Children's Online Privacy Protection Rule

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-17

    ...The Commission amends the Children's Online Privacy Protection Rule (``COPPA Rule'' or ``Rule''), consistent with the requirements of the Children's Online Privacy Protection Act, to clarify the scope of the Rule and strengthen its protections for children's personal information, in light of changes in online technology since the Rule went into effect in April 2000. The final amended Rule includes modifications to the definitions of operator, personal information, and Web site or online service directed to children. The amended Rule also updates the requirements set forth in the notice, parental consent, confidentiality and security, and safe harbor provisions, and adds a new provision addressing data retention and deletion.

  5. Informational privacy and the public's health: the Model State Public Health Privacy Act.

    PubMed

    Gostin, L O; Hodge, J G; Valdiserri, R O

    2001-09-01

    Protecting public health requires the acquisition, use, and storage of extensive health-related information about individuals. The electronic accumulation and exchange of personal data promises significant public health benefits but also threatens individual privacy; breaches of privacy can lead to individual discrimination in employment, insurance, and government programs. Individuals concerned about privacy invasions may avoid clinical or public health tests, treatments, or research. Although individual privacy protections are critical, comprehensive federal privacy protections do not adequately protect public health data, and existing state privacy laws are inconsistent and fragmented. The Model State Public Health Privacy Act provides strong privacy safeguards for public health data while preserving the ability of state and local public health departments to act for the common good.

  6. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy.

    PubMed

    Mulligan, Deirdre K; Koopman, Colin; Doty, Nick

    2016-12-28

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy's disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy's essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy's multiple uses across multiple contexts.This article is part of the themed issue 'The ethical impact of data science'. © 2016 The Author(s).

  7. ENVIRONMENTAL ASSESSMENT OF A WASTE-TO-ENERGY PROCESS: GSA/PENTAGON CO-FIRED BOILER TESTS

    EPA Science Inventory

    Midwest Research Institute (MRI), in conjuction with the General Services Administration (GSA) and the National Center for Resource Recovery (NCRR), conducted a series of emission tests at the Virginia Heating and Refrigeration Plant (VHRP) in Arlington, Virginia (this plant prov...

  8. Biodegradation of 2,4'-dichlorobiphenyl, a congener of polychlorinated biphenyl, by Pseudomonas isolates GSa and GSb.

    PubMed

    Gayathri, D; Shobha, K J

    2015-08-01

    Bioegradation of 2,4'-dichlorobiphenyl (2,4 CB), by two isolates of Pseudomonas (GSa and GSb) was compared using GC-MS. Transformer oil polluted soil was used for the isolation of 2,4 CB degrading bacteria. GC-MS analysis of the solvent extracts obtained from Pseudomonas sp. GSa spent culture indicated the presence of Phenol 2,6-bis (1,1-dimethyl)-4-methyl (C15H24O). Further, the enzyme analysis of the cell free extracts showed the presence of 2,4'-dichlorobiphenyl dehalogenase (CBD), 2,4'-dichlorobiphenyl-NADPH-oxido-reductase (2,4 CBOR) and 2,3-dihydroxybiphenyl-NADPH-oxido-reductase (2,3 DHOR) with specific activity of 6.00, 0.4 and 0.22 pmol/min/mg of protein, suggesting that dechlorination as an important step during 2,4 CB catabolism. Further, the cell free extract of GSb showed only 2,4'-dichlorobiphenyl-NADPH-oxido-reductase (2,4 CBOR) and 2,3-dihydroxybiphenyl-NADPH-oxido-reductase (2,3 DHOR), with specific activity of 0.3 and 0.213 μmol/min/mg of protein, suggesting attack on non-chlorinated aromatic ring of 2,4 CB, releasing chlorinated intermediates which are toxic to the environment. Although, both the isolated bacteria (GSa and GSb) belong to Pseudomonas spp., they exhibited different metabolic potential.

  9. 41 CFR 102-192.95 - Why does GSA require annual mail management reports?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... under the Federal Records Act, especially with regards to sharing best practices, training, standards... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Why does GSA require annual mail management reports? 102-192.95 Section 102-192.95 Public Contracts and Property Management...

  10. 41 CFR 102-192.95 - Why does GSA require annual mail management reports?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... under the Federal Records Act, especially with regards to sharing best practices, training, standards... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Why does GSA require annual mail management reports? 102-192.95 Section 102-192.95 Public Contracts and Property Management...

  11. 41 CFR 102-192.95 - Why does GSA require annual mail management reports?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... under the Federal Records Act, especially with regards to sharing best practices, training, standards... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Why does GSA require annual mail management reports? 102-192.95 Section 102-192.95 Public Contracts and Property Management...

  12. 41 CFR 102-192.95 - Why does GSA require annual mail management reports?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... under the Federal Records Act, especially with regards to sharing best practices, training, standards... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Why does GSA require annual mail management reports? 102-192.95 Section 102-192.95 Public Contracts and Property Management...

  13. 41 CFR 102-192.95 - Why does GSA require annual mail management reports?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... under the Federal Records Act, especially with regards to sharing best practices, training, standards... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Why does GSA require annual mail management reports? 102-192.95 Section 102-192.95 Public Contracts and Property Management...

  14. Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency

    NASA Astrophysics Data System (ADS)

    Mohaisen, Abedelaziz; Jho, Nam-Su; Hong, Dowon; Nyang, Daehun

    Privacy preserving association rule mining algorithms have been designed for discovering the relations between variables in data while maintaining the data privacy. In this article we revise one of the recently introduced schemes for association rule mining using fake transactions (FS). In particular, our analysis shows that the FS scheme has exhaustive storage and high computation requirements for guaranteeing a reasonable level of privacy. We introduce a realistic definition of privacy that benefits from the average case privacy and motivates the study of a weakness in the structure of FS by fake transactions filtering. In order to overcome this problem, we improve the FS scheme by presenting a hybrid scheme that considers both privacy and resources as two concurrent guidelines. Analytical and empirical results show the efficiency and applicability of our proposed scheme.

  15. 75 FR 1788 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Form 1364...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-13

    ... being offered for lease to house Federal agencies. In the past, GSA also used a 1364A which requested..., offerors' design and construction fees). A request for public comments was published in the Federal...

  16. Privacy-Enhancing Technologies for the Internet

    DTIC Science & Technology

    1997-01-01

    http://www.communities.com/paper/swamp.html 7 David Chaum , ``Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms,’’ Communications of...the ACM, February 1981, vol. 24 no. 2. http://www.eskimo.com/~weidai/mix-net.txt 8 David Chaum , ``Blind Signatures for Untraceable Payments...Privacy-enhancing technologies for the Internet Ian Goldberg David Wagner Eric Brewer University of California, Berkeley {iang,daw,brewer

  17. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-109)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  18. 78 FR 64230 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-28

    ... the data privacy- related issues addressed by small- to medium-sized enterprises; and 3. Other... information on a case-by-case basis as required by law or as necessary for a specific purpose, as described in...

  19. Privacy-preserving methods to retrieve origin-destination information from connect vehicles.

    DOT National Transportation Integrated Search

    2013-01-01

    This report investigates technical approaches to address privacy concerns associated with two innovative : applications enabled by connected vehicle systems, i.e., origin-destination (OD) flow measurement and differentiated : congestion pricing. The ...

  20. Privacy-preserving methods to retrieve origin-destination information from connected vehicles.

    DOT National Transportation Integrated Search

    2013-01-01

    This report investigates technical approaches to address privacy concerns associated with two innovative : applications enabled by connected vehicle systems, i.e., origin-destination (OD) flow measurement and differentiated : congestion pricing. The ...

  1. 41 CFR 101-26.505-7 - GSA assistance in selection of furniture and furnishings.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true GSA assistance in... Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND..., upon request, furnish agencies with information on the types, styles, finishes, coverings, and colors...

  2. Aspinall Courthouse: GSA's Historic Preservation and Net-Zero Renovation Case Study

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chang, R.; Hayter, S.; Hotchkiss, E.

    2014-10-01

    The federal government is mandated with improving efficiency of buildings, incorporating renewable energy, and achieving net-zero energy operations where possible. These challenges led GSA to consider aligning historic preservation renovations with net-zero energy goals. The Wayne N. Aspinall Federal Building and U.S. Courthouse (Aspinall Courthouse), in Grand Junction, Colorado, is an example of a renovation project that aimed to accomplish both historic preservation and net-zero energy goals.

  3. Supporting multi-state collaboration on privacy and security to foster health IT and health information exchange.

    PubMed

    Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C

    2008-11-06

    As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.

  4. Gay-Straight Alliance (GSA) Members' Engagement with Sex Education in Canadian High Schools

    ERIC Educational Resources Information Center

    Lapointe, Alicia

    2014-01-01

    This paper offers an examination of gay-straight alliance (GSA) members' engagement with sex education, sexual health, and prejudice and discrimination in Canadian public high schools. It explores how five students' (four straight and one gay-identifying) participation in GSAs served as a springboard for learning about and challenging stereotypes;…

  5. GSA Advisors' Self-Efficacy Related to LGBT Youth of Color and Transgender Youth

    ERIC Educational Resources Information Center

    Poteat, V. Paul; Scheer, Jillian R.

    2016-01-01

    Gay-Straight Alliances (GSAs) serve lesbian, gay, bisexual, transgender (LGBT) and heterosexual youth from diverse backgrounds. Although some attention has been given to youth members in general, little attention has been given to adult advisors. Among 47 GSA advisors from 33 high schools (39 cisgender female, 8 cisgender male), the authors…

  6. Mothers' Concerns for Personal Safety and Privacy While Breastfeeding: An Unexplored Phenomenon.

    PubMed

    Rosen-Carole, Casey; Allen, Katherine; Fagnano, Maria; Dozier, Ann; Halterman, Jill

    2018-04-01

    Preliminary qualitative research in upstate NY shows new mothers are worried about safety while breastfeeding. Little is known regarding prevalence of these concerns and their effect on breastfeeding outcomes. (1) Determine frequency of breastfeeding safety and privacy concerns; (2) Explore their association with breastfeeding outcomes. Mothers were surveyed immediately and 1-month postpartum about breastfeeding goals; both surveys addressed privacy and safety concerns at home, work, and in public. Outcome data included breastfeeding intent, exclusivity, and duration. Breastfeeding/non-breastfeeding mothers were compared using Chi-square and multivariate analyses. A total of 279 women enrolled. Of these 82.8% initiated breastfeeding; at 1-month 72% provided any breast milk, and 44% were exclusively breastfeeding. About 99% felt safe breastfeeding at home; 25% reported privacy concerns; and 5% felt "vulnerable or unsafe" while breastfeeding. At 1-month, 49% agreed there was a safe place to breastfeed/express milk at work (20% unsure). Non-breastfeeding mothers expressed more safety concerns outside home/at work: 18% breastfeeding versus 28% non-breastfeeding outside home; 27% breastfeeding versus 40% non-breastfeeding at work. Nearly 54% who reported feeling vulnerable/unsafe with breastfeeding initiated breastfeeding, compared with 86% not reporting this concern (p = 0.008). Fewer women initiating breastfeeding reported vulnerability/safety (3% breastfeeding versus 14% non-breastfeeding, p = 0.008) or privacy (22% breastfeeding versus 40% non-breastfeeding, p = 0.19) concerns. Associations held after controlling for age, race, parity, insurance, geography, and marital-status. Significant associations between initiation, privacy, and safety concerns did not extend to duration or exclusivity. Many breastfeeding women reported safety and privacy concerns, especially outside the home and at work, which may influence breastfeeding initiation. Further study

  7. Utilization of community pharmacy space to enhance privacy: a qualitative study.

    PubMed

    Hattingh, H Laetitia; Emmerton, Lynne; Ng Cheong Tin, Pascale; Green, Catherine

    2016-10-01

    Community pharmacists require access to consumers' information about their medicines and health-related conditions to make informed decisions regarding treatment options. Open communication between consumers and pharmacists is ideal although consumers are only likely to disclose relevant information if they feel that their privacy requirements are being acknowledged and adhered to. This study sets out to explore community pharmacy privacy practices, experiences and expectations and the utilization of available space to achieve privacy. Qualitative methods were used, comprising a series of face-to-face interviews with 25 pharmacists and 55 pharmacy customers in Perth, Western Australia, between June and August 2013. The use of private consultation areas for certain services and sensitive discussions was supported by pharmacists and consumers although there was recognition that workflow processes in some pharmacies may need to change to maximize the use of private areas. Pharmacy staff adopted various strategies to overcome privacy obstacles such as taking consumers to a quieter part of the pharmacy, avoiding exposure of sensitive items through packaging, lowering of voices, interacting during pharmacy quiet times and telephoning consumers. Pharmacy staff and consumers regularly had to apply judgement to achieve the required level of privacy. Management of privacy can be challenging in the community pharmacy environment, and on-going work in this area is important. As community pharmacy practice is increasingly becoming more involved in advanced medication and disease state management services with unique privacy requirements, pharmacies' layouts and systems to address privacy challenges require a proactive approach. © 2015 The Authors. Health Expectations Published by John Wiley & Sons Ltd.

  8. Children's Privacy in the Big Data Era: Research Opportunities.

    PubMed

    Montgomery, Kathryn C; Chester, Jeff; Milosevic, Tijana

    2017-11-01

    This article focuses on the privacy implications of advertising on social media, mobile apps, and games directed at children. Academic research on children's privacy has primarily focused on the safety risks involved in sharing personal information on the Internet, leaving market forces (such as commercial data collection) as a less discussed aspect of children's privacy. Yet, children's privacy in the digital era cannot be fully understood without examining marketing practices, especially in the context of "big data." As children increasingly consume content on an ever-expanding variety of digital devices, media and advertising industries are creating new ways to track their behaviors and target them with personalized content and marketing messages based on individual profiles. The advent of the so-called Internet of Things, with its ubiquitous sensors, is expanding these data collection and profiling practices. These trends raise serious concerns about digital dossiers that could follow young people into adulthood, affecting their access to education, employment, health care, and financial services. Although US privacy law provides some safeguards for children younger than 13 years old online, adolescents are afforded no such protections. Moreover, scholarship on children and privacy continues to lag behind the changes taking place in global media, advertising, and technology. This article proposes collaboration among researchers from a range of fields that will enable cross-disciplinary studies addressing not only the developmental issues related to different age groups but also the design of digital media platforms and the strategies used to influence young people. Copyright © 2017 by the American Academy of Pediatrics.

  9. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-071] Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy... training associated with [[Page 40516

  10. 76 FR 39392 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ....regulations.gov . Follow the instructions for submitting comments. Mail: Federal Docket Management System...: Mr. Leroy Jones, Department of the Army, Privacy Office, U.S. Army Records Management and... address, counselor's phone number and email, documentary evidence, affidavits, information from individual...

  11. Altered states: state health privacy laws and the impact of the Federal Health Privacy Rule.

    PubMed

    Pritts, Joy L

    2002-01-01

    Although the Federal Health Privacy Rule has evened out some of the inconsistencies between states' health privacy laws, gaps in protection still remain. Furthermore, the Federal Rule contains some lax standards for the disclosure of health information. State laws can play a vital role in filling these gaps and strengthening the protections afforded health information. By enacting legislation that has higher privacy-protective standards than the Federal Health Privacy Rule, states can play three important roles. First, because they can directly regulate entities that are beyond HHS's mandate, states can afford their citizens a broader degree of privacy protection than the Federal Health Privacy Rule. Second, by having state health privacy laws, states can enforce privacy protections at the local level. Finally, action by the states can positively influence health privacy policies at the federal level by raising the standard as to what constitutes sufficient privacy protection. High privacy protections imposed by states may serve as the standard for comprehensive federal legislation, if and when Congress reconsiders the issue. So far, states' reactions to the Federal Privacy Rule have been mixed. Only time will tell whether states will assume the mantle of leadership on health privacy or relinquish their role as the primary protectors of health information.

  12. 41 CFR 102-192.100 - How do we submit our annual mail management report to GSA?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... ADMINISTRATIVE PROGRAMS 192-MAIL MANAGEMENT Reporting Requirements § 102-192.100 How do we submit our annual mail... annual reports using the GSA web-based Electronic Performance Support Tool (EPST). Agency mail managers...

  13. 41 CFR 102-192.100 - How do we submit our annual mail management report to GSA?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... ADMINISTRATIVE PROGRAMS 192-MAIL MANAGEMENT Reporting Requirements § 102-192.100 How do we submit our annual mail... annual reports using the GSA web-based Electronic Performance Support Tool (EPST). Agency mail managers...

  14. 41 CFR 102-192.100 - How do we submit our annual mail management report to GSA?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... ADMINISTRATIVE PROGRAMS 192-MAIL MANAGEMENT Reporting Requirements § 102-192.100 How do we submit our annual mail... annual reports using the GSA web-based Electronic Performance Support Tool (EPST). Agency mail managers...

  15. 41 CFR 102-192.100 - How do we submit our annual mail management report to GSA?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... ADMINISTRATIVE PROGRAMS 192-MAIL MANAGEMENT Reporting Requirements § 102-192.100 How do we submit our annual mail... annual reports using the GSA web-based Electronic Performance Support Tool (EPST). Agency mail managers...

  16. Second thoughts about privacy, safety and deception

    NASA Astrophysics Data System (ADS)

    Sorell, Tom; Draper, Heather

    2017-07-01

    In this paper, we point out some difficulties with interpreting three of five principles formulated at a retreat on robot ethics sponsored by the Arts and Humanities Council and the Engineering and Physical Sciences Research Council. We also attempt to iron out some conflicts between the principles. Some of the difficulties arise from the way that the autonomy of robot users - their capacity to live by their own choices - can be a goal in the design of care robots. We discuss (a) problems for Principle 2 that arise from competing legal and philosophical understandings of privacy; (b) a tension between privacy and safety (Principles 2 and 3) and (c) some scepticism about the application of Principle 4, which addresses robot design that might result in the deception of vulnerable users.

  17. Privacy Protection Versus Cluster Detection in Spatial Epidemiology

    PubMed Central

    Olson, Karen L.; Grannis, Shaun J.; Mandl, Kenneth D.

    2006-01-01

    Objectives. Patient data that includes precise locations can reveal patients’ identities, whereas data aggregated into administrative regions may preserve privacy and confidentiality. We investigated the effect of varying degrees of address precision (exact latitude and longitude vs the center points of zip code or census tracts) on detection of spatial clusters of cases. Methods. We simulated disease outbreaks by adding supplementary spatially clustered emergency department visits to authentic hospital emergency department syndromic surveillance data. We identified clusters with a spatial scan statistic and evaluated detection rate and accuracy. Results. More clusters were identified, and clusters were more accurately detected, when exact locations were used. That is, these clusters contained at least half of the simulated points and involved few additional emergency department visits. These results were especially apparent when the synthetic clustered points crossed administrative boundaries and fell into multiple zip code or census tracts. Conclusions. The spatial cluster detection algorithm performed better when addresses were analyzed as exact locations than when they were analyzed as center points of zip code or census tracts, particularly when the clustered points crossed administrative boundaries. Use of precise addresses offers improved performance, but this practice must be weighed against privacy concerns in the establishment of public health data exchange policies. PMID:17018828

  18. Privacy protection versus cluster detection in spatial epidemiology.

    PubMed

    Olson, Karen L; Grannis, Shaun J; Mandl, Kenneth D

    2006-11-01

    Patient data that includes precise locations can reveal patients' identities, whereas data aggregated into administrative regions may preserve privacy and confidentiality. We investigated the effect of varying degrees of address precision (exact latitude and longitude vs the center points of zip code or census tracts) on detection of spatial clusters of cases. We simulated disease outbreaks by adding supplementary spatially clustered emergency department visits to authentic hospital emergency department syndromic surveillance data. We identified clusters with a spatial scan statistic and evaluated detection rate and accuracy. More clusters were identified, and clusters were more accurately detected, when exact locations were used. That is, these clusters contained at least half of the simulated points and involved few additional emergency department visits. These results were especially apparent when the synthetic clustered points crossed administrative boundaries and fell into multiple zip code or census tracts. The spatial cluster detection algorithm performed better when addresses were analyzed as exact locations than when they were analyzed as center points of zip code or census tracts, particularly when the clustered points crossed administrative boundaries. Use of precise addresses offers improved performance, but this practice must be weighed against privacy concerns in the establishment of public health data exchange policies.

  19. EPA and GSA Webinar: E Scrap Management, Computers for Learning and the Federal Green Challenge

    EPA Pesticide Factsheets

    EPA and the General Services Administration (GSA) are hosting a webinar on May 2, 2018. Topics will include policies and procedures on E Scrap management, a review of the Computers For Leaning Program, and benefits of joining the Federal Green Challenge.

  20. The Health Insurance Portability and Accountability Act Privacy Rule: a practical guide for researchers.

    PubMed

    Gunn, Patrick P; Fremont, Allen M; Bottrell, Melissa; Shugarman, Lisa R; Galegher, Jolene; Bikson, Tora

    2004-04-01

    The Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule, intended to address potential threats to patient privacy posed by the computerization and standardization of medical records, provides a new floor level of federal protection for health information in all 50 states. In most cases, compliance with the Privacy Rule was required as of April 2003. Yet considerable confusion and concern remain about the Privacy Rule and the specific changes it requires in the way healthcare providers, health plans, and others use, maintain, and disclose health information. Researchers worry that the Privacy Rule could hinder their access to health information needed to conduct their research. In this article, we explain how the final version of the Privacy Rule governs disclosure of health information, assess implications of the Privacy Rule for research, and offer practical suggestions for researchers who require access to health information. The Privacy Rule is fundamentally changing the way that healthcare providers, health plans, and others use, maintain, and disclose health information and the steps that researchers must take to obtain health data. The Privacy Rule requires researchers who seek access to identifiable health information to obtain written authorization from subjects, or, alternatively, to demonstrate that their research protocols meet certain Privacy Rule requirements that permit access without written authorization. To ensure continued access to data, researchers will need to work more closely than before with healthcare providers, health plans, and other institutions that generate and maintain health information.

  1. Trajectory data privacy protection based on differential privacy mechanism

    NASA Astrophysics Data System (ADS)

    Gu, Ke; Yang, Lihao; Liu, Yongzhi; Liao, Niandong

    2018-05-01

    In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.

  2. SAFETY, SECURITY, HYGIENE AND PRIVACY IN MIGRANT FARMWORKER HOUSING

    PubMed Central

    Arcury, Thomas A.; Weir, Maria M.; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F.; Bischoff, Werner E.; Quandt, Sara A.

    2013-01-01

    Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed. PMID:22776578

  3. δ-dependency for privacy-preserving XML data publishing.

    PubMed

    Landberg, Anders H; Nguyen, Kinh; Pardede, Eric; Rahayu, J Wenny

    2014-08-01

    An ever increasing amount of medical data such as electronic health records, is being collected, stored, shared and managed in large online health information systems and electronic medical record systems (EMR) (Williams et al., 2001; Virtanen, 2009; Huang and Liou, 2007) [1-3]. From such rich collections, data is often published in the form of census and statistical data sets for the purpose of knowledge sharing and enabling medical research. This brings with it an increasing need for protecting individual people privacy, and it becomes an issue of great importance especially when information about patients is exposed to the public. While the concept of data privacy has been comprehensively studied for relational data, models and algorithms addressing the distinct differences and complex structure of XML data are yet to be explored. Currently, the common compromise method is to convert private XML data into relational data for publication. This ad hoc approach results in significant loss of useful semantic information previously carried in the private XML data. Health data often has very complex structure, which is best expressed in XML. In fact, XML is the standard format for exchanging (e.g. HL7 version 3(1)) and publishing health information. Lack of means to deal directly with data in XML format is inevitably a serious drawback. In this paper we propose a novel privacy protection model for XML, and an algorithm for implementing this model. We provide general rules, both for transforming a private XML schema into a published XML schema, and for mapping private XML data to the new privacy-protected published XML data. In addition, we propose a new privacy property, δ-dependency, which can be applied to both relational and XML data, and that takes into consideration the hierarchical nature of sensitive data (as opposed to "quasi-identifiers"). Lastly, we provide an implementation of our model, algorithm and privacy property, and perform an experimental analysis

  4. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    PubMed

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  5. Privacy enhanced group communication in clinical environment

    NASA Astrophysics Data System (ADS)

    Li, Mingyan; Narayanan, Sreeram; Poovendran, Radha

    2005-04-01

    Privacy protection of medical records has always been an important issue and is mandated by the recent Health Insurance Portability and Accountability Act (HIPAA) standards. In this paper, we propose security architectures for a tele-referring system that allows electronic group communication among professionals for better quality treatments, while protecting patient privacy against unauthorized access. Although DICOM defines the much-needed guidelines for confidentiality of medical data during transmission, there is no provision in the existing medical security systems to guarantee patient privacy once the data has been received. In our design, we address this issue by enabling tracing back to the recipient whose received data is disclosed to outsiders, using watermarking technique. We present security architecture design of a tele-referring system using a distributed approach and a centralized web-based approach. The resulting tele-referring system (i) provides confidentiality during the transmission and ensures integrity and authenticity of the received data, (ii) allows tracing of the recipient who has either distributed the data to outsiders or whose system has been compromised, (iii) provides proof of receipt or origin, and (iv) can be easy to use and low-cost to employ in clinical environment.

  6. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    PubMed

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  7. Protecting Children's Online Privacy.

    ERIC Educational Resources Information Center

    Kresses, Mamie

    2001-01-01

    Discuss provisions of new federal Children's Online Privacy Protection Act that principals should know to protect student privacy on the Internet. Also discusses relevant provisions of the Family Educational Rights and Privacy Act. (PKP)

  8. Space in Space: Designing for Privacy in the Workplace

    NASA Technical Reports Server (NTRS)

    Akin, Jonie

    2015-01-01

    Privacy is cultural, socially embedded in the spatial, temporal, and material aspects of the lived experience. Definitions of privacy are as varied among scholars as they are among those who fight for their personal rights in the home and the workplace. Privacy in the workplace has become a topic of interest in recent years, as evident in discussions on Big Data as well as the shrinking office spaces in which people work. An article in The New York Times published in February of this year noted that "many companies are looking to cut costs, and one way to do that is by trimming personal space". Increasingly, organizations ranging from tech start-ups to large corporations are downsizing square footage and opting for open-office floorplans hoping to trim the budget and spark creative, productive communication among their employees. The question of how much is too much to trim when it comes to privacy, is one that is being actively addressed by the National Aeronautics and Space Administration (NASA) as they explore habitat designs for future space missions. NASA recognizes privacy as a design-related stressor impacting human health and performance. Given the challenges of sustaining life in an isolated, confined, and extreme environment such as Mars, NASA deems it necessary to determine the acceptable minimal amount for habitable volume for activities requiring at least some level of privacy in order to support optimal crew performance. Ethnographic research was conducted in 2013 to explore perceptions of privacy and privacy needs among astronauts living and working in space as part of a long-distance, long-duration mission. The allocation of space, or habitable volume, becomes an increasingly complex issue in outer space due to the costs associated with maintaining an artificial, confined environment bounded by limitations of mass while located in an extreme environment. Privacy in space, or space in space, provides a unique case study of the complex notions of

  9. 75 FR 35028 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-21

    ... 20552 and 1625 Eye Street, NW., Washington, DC 20006. categories of individuals covered by the system... are protected by restricted access procedures, including user identifications and passwords. Only FHFA... regular mail address is: Privacy Act Officer, Federal Housing Finance Agency, 1625 Eye Street, NW...

  10. 78 FR 31907 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID: USA-2013-0015] Privacy Act of 1974.... Aaron Siegel, Alternate OSD Federal Register Liaison Officer, Department of Defense. A0190-47 DAPM-ACC..., classification, progress reports, victim/witness' full name, address and telephone number, victim impact...

  11. Context-Aware Generative Adversarial Privacy

    NASA Astrophysics Data System (ADS)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  12. Privacy and Security Issues Surrounding the Protection of Data Generated by Continuous Glucose Monitors.

    PubMed

    Britton, Katherine E; Britton-Colonnese, Jennifer D

    2017-03-01

    Being able to track, analyze, and use data from continuous glucose monitors (CGMs) and through platforms and apps that communicate with CGMs helps achieve better outcomes and can advance the understanding of diabetes. The risks to patients' expectation of privacy are great, and their ability to control how their information is collected, stored, and used is virtually nonexistent. Patients' physical security is also at risk if adequate cybersecurity measures are not taken. Currently, data privacy and security protections are not robust enough to address the privacy and security risks and stymies the current and future benefits of CGM and the platforms and apps that communicate with them.

  13. Privacy and Security Issues Surrounding the Protection of Data Generated by Continuous Glucose Monitors

    PubMed Central

    Britton, Katherine E.; Britton-Colonnese, Jennifer D.

    2017-01-01

    Being able to track, analyze, and use data from continuous glucose monitors (CGMs) and through platforms and apps that communicate with CGMs helps achieve better outcomes and can advance the understanding of diabetes. The risks to patients’ expectation of privacy are great, and their ability to control how their information is collected, stored, and used is virtually nonexistent. Patients’ physical security is also at risk if adequate cybersecurity measures are not taken. Currently, data privacy and security protections are not robust enough to address the privacy and security risks and stymies the current and future benefits of CGM and the platforms and apps that communicate with them. PMID:28264188

  14. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... American National Red Cross property (generally blood plasma and related medical materials) originally... (GSA) is responsible for supervising and directing the disposal of surplus personal property. In... property is surplus to the needs of the Government; (b) Allocates and transfers surplus property on a fair...

  15. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... American National Red Cross property (generally blood plasma and related medical materials) originally... (GSA) is responsible for supervising and directing the disposal of surplus personal property. In... property is surplus to the needs of the Government; (b) Allocates and transfers surplus property on a fair...

  16. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... American National Red Cross property (generally blood plasma and related medical materials) originally... (GSA) is responsible for supervising and directing the disposal of surplus personal property. In... property is surplus to the needs of the Government; (b) Allocates and transfers surplus property on a fair...

  17. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... American National Red Cross property (generally blood plasma and related medical materials) originally... (GSA) is responsible for supervising and directing the disposal of surplus personal property. In... property is surplus to the needs of the Government; (b) Allocates and transfers surplus property on a fair...

  18. 41 CFR 102-37.90 - What are GSA's responsibilities in the donation of surplus property?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... American National Red Cross property (generally blood plasma and related medical materials) originally... (GSA) is responsible for supervising and directing the disposal of surplus personal property. In... property is surplus to the needs of the Government; (b) Allocates and transfers surplus property on a fair...

  19. Protecting genetic privacy.

    PubMed

    Roche, P A; Annas, G J

    2001-05-01

    This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.

  20. Digression and Value Concatenation to Enable Privacy-Preserving Regression.

    PubMed

    Li, Xiao-Bai; Sarkar, Sumit

    2014-09-01

    Regression techniques can be used not only for legitimate data analysis, but also to infer private information about individuals. In this paper, we demonstrate that regression trees, a popular data-analysis and data-mining technique, can be used to effectively reveal individuals' sensitive data. This problem, which we call a "regression attack," has not been addressed in the data privacy literature, and existing privacy-preserving techniques are not appropriate in coping with this problem. We propose a new approach to counter regression attacks. To protect against privacy disclosure, our approach introduces a novel measure, called digression , which assesses the sensitive value disclosure risk in the process of building a regression tree model. Specifically, we develop an algorithm that uses the measure for pruning the tree to limit disclosure of sensitive data. We also propose a dynamic value-concatenation method for anonymizing data, which better preserves data utility than a user-defined generalization scheme commonly used in existing approaches. Our approach can be used for anonymizing both numeric and categorical data. An experimental study is conducted using real-world financial, economic and healthcare data. The results of the experiments demonstrate that the proposed approach is very effective in protecting data privacy while preserving data quality for research and analysis.

  1. Privacy and security of patient data in the pathology laboratory.

    PubMed

    Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.

  2. Privacy and security of patient data in the pathology laboratory

    PubMed Central

    Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904

  3. Balancing Health Information Exchange and Privacy Governance from a Patient-Centred Connected Health and Telehealth Perspective.

    PubMed

    Kuziemsky, Craig E; Gogia, Shashi B; Househ, Mowafa; Petersen, Carolyn; Basu, Arindam

    2018-04-22

     Connected healthcare is an essential part of patient-centred care delivery. Technology such as telehealth is a critical part of connected healthcare. However, exchanging health information brings the risk of privacy issues. To better manage privacy risks we first need to understand the different patterns of patient-centred care in order to tailor solutions to address privacy risks.  Drawing upon published literature, we develop a business model to enable patient-centred care via telehealth. The model identifies three patient-centred connected health patterns. We then use the patterns to analyse potential privacy risks and possible solutions from different types of telehealth delivery.  Connected healthcare raises the risk of unwarranted access to health data and related invasion of privacy. However, the risk and extent of privacy issues differ according to the pattern of patient-centred care delivery and the type of particular challenge as they enable the highest degree of connectivity and thus the greatest potential for privacy breaches.  Privacy issues are a major concern in telehealth systems and patients, providers, and administrators need to be aware of these privacy issues and have guidance on how to manage them. This paper integrates patient-centred connected health care, telehealth, and privacy risks to provide an understanding of how risks vary across different patterns of patient-centred connected health and different types of telehealth delivery. Georg Thieme Verlag KG Stuttgart.

  4. Identity management and privacy languages technologies: Improving user control of data privacy

    NASA Astrophysics Data System (ADS)

    García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz

    The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.

  5. Patient Perceptions About Data Sharing & Privacy: Insights from ActionADE.

    PubMed

    Small, Serena S; Peddie, David; Ackerley, Christine; Hohl, Corinne M; Balka, Ellen

    2017-01-01

    Information communication technologies (ICTs) may improve health delivery by enhancing informational continuity of care and enabling secondary use of health data including public health surveillance and research. ICTs also introduce concerns related to privacy. In this paper, we examine and address this tension in the context of the development and implementation of a novel platform that will enable the documentation and communication of patient-specific ADE information, titled ActionADE. We explored privacy concerns qualitatively from the perspective of patients. Our findings will inform a series of recommendations for system design that seek to balance the need to both share and protect personal health information.

  6. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    PubMed

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  7. 76 FR 18145 - Privacy Act of 1974; New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-01

    ... to include final determinations; billing information to include payment delinquencies; case notes... delinquencies; and case notes. Information collected includes the individual's name, address, telephone number... outside USDA, and so have some impact on privacy of individuals, they are either necessary for carrying...

  8. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy

    PubMed Central

    Koopman, Colin; Doty, Nick

    2016-01-01

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy’s disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy’s essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy’s multiple uses across multiple contexts. This article is part of the themed issue ‘The ethical impact of data science’. PMID:28336797

  9. 78 FR 38303 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-26

    ....regulations.gov as they are received without change, including any personal identifiers or contact information. FOR FURTHER INFORMATION CONTACT: Mr. Leroy Jones, Department of the Army, Privacy Office, U.S. Army... published in the Federal Register and are available from the address in FOR FURTHER INFORMATION CONTACT or...

  10. 41 CFR 102-84.50 - May the GSA Form 1166 be used to report information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false May the GSA Form 1166 be used to report information? 102-84.50 Section 102-84.50 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION REAL PROPERTY 84...

  11. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?

    PubMed Central

    Dhir, Amandeep; Torsheim, Torbjørn; Pallesen, Ståle; Andreassen, Cecilie S.

    2017-01-01

    Selfies, or self-portraits, are often taken and shared on social media for online self-presentation reasons, which are considered essential for the psychosocial development and well-being of people in today’s culture. Despite the growing popularity and widespread sharing of selfies in the online space, little is known about how privacy concerns moderate selfie behavior. In addition to this, it is also not known whether privacy concerns across age and gender groups influence selfie behavior. To address this timely issue, a survey assessing common selfie behaviors, that is, frequency of taking (individual and group selfies), editing (cropping and filtering), and posting selfies online, and social media privacy concerns (over personal data being accessed and misused by third parties) was conducted. The web-survey was administered to 3,763 Norwegian social media users, ranging from 13 to 50 years, with a preponderance of women (n = 2,509, 66.7%). The present study investigated the impact of privacy concerns on selfie behaviors across gender and age groups (adolescent, young adult, and adult) by use of the structural equation modeling approach. The results suggest that young adults have greater privacy concerns compared to adolescents and adults. Females have greater privacy concerns than males. Greater privacy concerns among female social media users were linked to lower engagement in selfie behavior, but privacy concerns did not influence selfie behavior in the case of male adolescents and young adults. Overall, privacy concerns were more consistently and inversely related to selfie behavior (taking and posting) among females than males. The study results have theoretical as well as practical implications for both researchers and policy makers. PMID:28588530

  12. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?

    PubMed

    Dhir, Amandeep; Torsheim, Torbjørn; Pallesen, Ståle; Andreassen, Cecilie S

    2017-01-01

    Selfies, or self-portraits, are often taken and shared on social media for online self-presentation reasons, which are considered essential for the psychosocial development and well-being of people in today's culture. Despite the growing popularity and widespread sharing of selfies in the online space, little is known about how privacy concerns moderate selfie behavior. In addition to this, it is also not known whether privacy concerns across age and gender groups influence selfie behavior. To address this timely issue, a survey assessing common selfie behaviors, that is, frequency of taking (individual and group selfies), editing (cropping and filtering), and posting selfies online, and social media privacy concerns (over personal data being accessed and misused by third parties) was conducted. The web-survey was administered to 3,763 Norwegian social media users, ranging from 13 to 50 years, with a preponderance of women ( n = 2,509, 66.7%). The present study investigated the impact of privacy concerns on selfie behaviors across gender and age groups (adolescent, young adult, and adult) by use of the structural equation modeling approach. The results suggest that young adults have greater privacy concerns compared to adolescents and adults. Females have greater privacy concerns than males. Greater privacy concerns among female social media users were linked to lower engagement in selfie behavior, but privacy concerns did not influence selfie behavior in the case of male adolescents and young adults. Overall, privacy concerns were more consistently and inversely related to selfie behavior (taking and posting) among females than males. The study results have theoretical as well as practical implications for both researchers and policy makers.

  13. Privacy and Library Records

    ERIC Educational Resources Information Center

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  14. The ultimate physical limits of privacy

    NASA Astrophysics Data System (ADS)

    Ekert, Artur; Renner, Renato

    2014-03-01

    Among those who make a living from the science of secrecy, worry and paranoia are just signs of professionalism. Can we protect our secrets against those who wield superior technological powers? Can we trust those who provide us with tools for protection? Can we even trust ourselves, our own freedom of choice? Recent developments in quantum cryptography show that some of these questions can be addressed and discussed in precise and operational terms, suggesting that privacy is indeed possible under surprisingly weak assumptions.

  15. The ultimate physical limits of privacy.

    PubMed

    Ekert, Artur; Renner, Renato

    2014-03-27

    Among those who make a living from the science of secrecy, worry and paranoia are just signs of professionalism. Can we protect our secrets against those who wield superior technological powers? Can we trust those who provide us with tools for protection? Can we even trust ourselves, our own freedom of choice? Recent developments in quantum cryptography show that some of these questions can be addressed and discussed in precise and operational terms, suggesting that privacy is indeed possible under surprisingly weak assumptions.

  16. Privacy and Data Protection in Japan.

    ERIC Educational Resources Information Center

    Srinivasan, Srinija

    1992-01-01

    Discussion of individual rights and privacy in Japan focuses on the Privacy Protection Act, which acknowledges the threat posed by government databases to the individual's right of privacy. Characteristics of the Japanese legal system are described, origins of privacy in Japanese law are examined, and privacy and government databases are…

  17. Privacy and occupational health services

    PubMed Central

    Heikkinen, A; Launis, V; Wainwright, P; Leino‐Kilpi, H

    2006-01-01

    Privacy is a key ethical principle in occupational health services. Its importance is emphasised in several laws, in ethical codes of conduct as well as in the literature, yet there is only very limited empirical research on privacy in the occupational health context. Conceptual questions on privacy in the occupational health context are discussed. The baseline assumption is that, in this context, privacy cannot be approached and examined only from the employee's (an individual) vantage point but the employer's (a group) point of view must also be taken into account, and that the concept has several dimensions (physical, social, informational and psychological). Even though privacy is a basic human need, there is no universally accepted definition of the concept and no consensus on whether an organisation can have privacy in the same way as people do. Many of the challenges surrounding privacy in the context of occupational health seem to be associated with the dual loyalties of occupational health professionals towards the employee and employer and with their simultaneous duties of disseminating and protecting information (informational privacy). Privacy is thus not an absolute value, but more research is needed to understand its multidimensional nature in the context of occupational health. PMID:16943333

  18. 78 FR 22522 - Privacy Act of 1974: New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-16

    ... Privacy Act of 1974 (5 U.S.C. 552a), as amended, titled ``Biometric Verification System (CSOSA-20).'' This... Biometric Verification System allows individuals under supervision to electronically check-in for office... determination. ADDRESSES: You may submit written comments, identified by ``Biometric Verification System, CSOSA...

  19. Driving toward guiding principles: a goal for privacy, confidentiality, and security of health information.

    PubMed

    Buckovich, S A; Rippen, H E; Rozen, M J

    1999-01-01

    As health care moves from paper to electronic data collection, providing easier access and dissemination of health information, the development of guiding privacy, confidentiality, and security principles is necessary to help balance the protection of patients' privacy interests against appropriate information access. A comparative review and analysis was done, based on a compilation of privacy, confidentiality, and security principles from many sources. Principles derived from ten identified sources were compared with each of the compiled principles to assess support level, uniformity, and inconsistencies. Of 28 compiled principles, 23 were supported by at least 50 percent of the sources. Technology could address at least 12 of the principles. Notable consistencies among the principles could provide a basis for consensus for further legislative and organizational work. It is imperative that all participants in our health care system work actively toward a viable resolution of this information privacy debate.

  20. Privacy and security compliance in the E-healthcare marketplace.

    PubMed

    Lutes, M

    2000-03-01

    Complying with security and privacy regulations proposed by HHS in response to the Health Insurance Portability and Accountability Act (HIPAA) will require healthcare managers to address both internal and external business interactions and initiatives. The proposed regulations mandate certain procedures regarding administration, physical safeguards, technical security for data integrity and confidentiality, and technical security against unauthorized access. In particular, the proposed regulations require organizations to contractually ensure that vendors adhere to the regulations. Healthcare organizations also must implement training procedures for staff members who have contact with protected health information and designate a privacy officer to guard against improper disclosure of such information. Documented policies for organizational decision making are vital to an organization's efforts to implement procedures for compliance with the regulations.

  1. 76 FR 3113 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-19

    ... Force's notices for systems of records subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended... Center; major commands; field operating agencies; Military Personnel Sections at Air Force installations... mailing addresses are published as an appendix to the Air Force's compilation of systems of records...

  2. Ensuring Privacy When Integrating Patient-Based Datasets: New Methods and Developments in Record Linkage.

    PubMed

    Brown, Adrian P; Ferrante, Anna M; Randall, Sean M; Boyd, James H; Semmens, James B

    2017-01-01

    In an era where the volume of structured and unstructured digital data has exploded, there has been an enormous growth in the creation of data about individuals that can be used for understanding and treating disease. Joining these records together at an individual level provides a complete picture of a patient's interaction with health services and allows better assessment of patient outcomes and effectiveness of treatment and services. Record linkage techniques provide an efficient and cost-effective method to bring individual records together as patient profiles. These linkage procedures bring their own challenges, especially relating to the protection of privacy. The development and implementation of record linkage systems that do not require the release of personal information can reduce the risks associated with record linkage and overcome legal barriers to data sharing. Current conceptual and experimental privacy-preserving record linkage (PPRL) models show promise in addressing data integration challenges. Enhancing and operationalizing PPRL protocols can help address the dilemma faced by some custodians between using data to improve quality of life and dealing with the ethical, legal, and administrative issues associated with protecting an individual's privacy. These methods can reduce the risk to privacy, as they do not require personally identifying information to be shared. PPRL methods can improve the delivery of record linkage services to the health and broader research community.

  3. Ensuring Privacy When Integrating Patient-Based Datasets: New Methods and Developments in Record Linkage

    PubMed Central

    Brown, Adrian P.; Ferrante, Anna M.; Randall, Sean M.; Boyd, James H.; Semmens, James B.

    2017-01-01

    In an era where the volume of structured and unstructured digital data has exploded, there has been an enormous growth in the creation of data about individuals that can be used for understanding and treating disease. Joining these records together at an individual level provides a complete picture of a patient’s interaction with health services and allows better assessment of patient outcomes and effectiveness of treatment and services. Record linkage techniques provide an efficient and cost-effective method to bring individual records together as patient profiles. These linkage procedures bring their own challenges, especially relating to the protection of privacy. The development and implementation of record linkage systems that do not require the release of personal information can reduce the risks associated with record linkage and overcome legal barriers to data sharing. Current conceptual and experimental privacy-preserving record linkage (PPRL) models show promise in addressing data integration challenges. Enhancing and operationalizing PPRL protocols can help address the dilemma faced by some custodians between using data to improve quality of life and dealing with the ethical, legal, and administrative issues associated with protecting an individual’s privacy. These methods can reduce the risk to privacy, as they do not require personally identifying information to be shared. PPRL methods can improve the delivery of record linkage services to the health and broader research community. PMID:28303240

  4. 41 CFR 101-6.2103 - What programs and activities of GSA are subject to these regulations?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true What programs and... Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS...? The Administrator publishes in the Federal Register a list of GSA's programs and activities that are...

  5. Privacy information management for video surveillance

    NASA Astrophysics Data System (ADS)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  6. Integration of the work-related online aftercare intervention 'GSA-online plus' (healthy and without stress at the workplace) into clinical practice: study protocol for an implementation study.

    PubMed

    Zwerenz, Rüdiger; Böhme, Katja; Wirth, Astrid; Labitzke, Nicole; Pachtchenko, Sergei; Beutel, Manfred E

    2018-05-02

    In a previous RCT we established the efficacy of the psychodynamic online aftercare programme 'GSA-Online' ('Health Training Stress Management at the Workplace') for rehabilitants with work-related stress facing return to work after long-term sickness absence. The purpose of this trial is to implement it into routine care. The study is performed in rehabilitation clinics with patients of different medical indications (psychosomatic, orthopedic and cardiological diseases). Rehabilitants get access to the study platform during inpatient medical rehabilitation. 'GSA-Online plus' integrates exploratory and motivational videos on the web application to familiarize potential participants and motivate them to follow through with it. In the 12-week writing intervention, patients write weekly online diary entries, answered by anonymous online therapists within 24 h. Primary outcome measures are the recommendation rate of 'GSA-Online plus' and participation rates of the rehabilitants. As secondary outcomes, psychological symptoms, overall satisfaction, helpfulness of the therapeutic feedback and utilization of 'GSA-Online plus' will be analysed exploratory along with the course of weekly ratings of well-being and work ability. Meanwhile many clinical trials and meta-analysis prove that internet-based interventions are effective. This study will add insights on the dissemination and implementation of efficacious, evidence-based online treatments into medical practice. We expect a successful implementation of 'GSA-Online plus' in the clinical routine of the rehabilitation clinics. The focus of evaluation is on acceptance of the programme, both by the physicians in charge and the patients. In the future 'GSA-Online plus' could be implemented as a routine aftercare programme for rehabilitation inpatients with occupational stress. The trial was retrospectively registered on 6th January 2017 at ClinicalTrials.gov (Trial Registration number: ClinicalTrials Gov ID NCT03019718 ).

  7. Privacy and Technology: Folk Definitions and Perspectives

    PubMed Central

    Kwasny, Michelle N.; Caine, Kelly E.; Rogers, Wendy A.; Fisk, Arthur D.

    2017-01-01

    In this paper we present preliminary results from a study of individual differences in privacy beliefs, as well as relate folk definitions of privacy to extant privacy theory. Focus groups were conducted with young adults aged 18–28 and older adults aged 65–75. Participants first shared their individual definitions of privacy, followed by a discussion of privacy in six scenarios chosen to represent a range of potentially invasive situations. Taken together, Westin’s and Altman’s theories of privacy accounted for both younger and older adults’ ideas about privacy, however, neither theory successfully accounted for findings across all age and gender groups. Whereas males tended to think of privacy in terms of personal needs and convenience, females focused more on privacy in terms of others, respecting privacy rights, and safety. Older adults tended to be more concerned about privacy of space rather than information privacy. Initial results reinforce the notion that targeting HCI design to the user population, even with respect to privacy, is critically important. PMID:29057397

  8. 41 CFR 102-118.530 - Will GSA instruct my agency's disbursing offices to offset unpaid TSP billings?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION TRANSPORTATION 118-TRANSPORTATION PAYMENT AND AUDIT Claims and Appeal Procedures... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Will GSA instruct my...

  9. Privacy Act Statement

    EPA Pesticide Factsheets

    Any information you provide to the Environmental Protection Agency’s (EPA) Suspension and Debarment Program will be governed by the Privacy Act and will be included in the EPA Debarment and Suspension Files, a Privacy Act system of records.

  10. A smart-card-enabled privacy preserving E-prescription system.

    PubMed

    Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

    2004-03-01

    Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.

  11. Partitioning-based mechanisms under personalized differential privacy.

    PubMed

    Li, Haoran; Xiong, Li; Ji, Zhanglong; Jiang, Xiaoqian

    2017-05-01

    Differential privacy has recently emerged in private statistical aggregate analysis as one of the strongest privacy guarantees. A limitation of the model is that it provides the same privacy protection for all individuals in the database. However, it is common that data owners may have different privacy preferences for their data. Consequently, a global differential privacy parameter may provide excessive privacy protection for some users, while insufficient for others. In this paper, we propose two partitioning-based mechanisms, privacy-aware and utility-based partitioning, to handle personalized differential privacy parameters for each individual in a dataset while maximizing utility of the differentially private computation. The privacy-aware partitioning is to minimize the privacy budget waste, while utility-based partitioning is to maximize the utility for a given aggregate analysis. We also develop a t -round partitioning to take full advantage of remaining privacy budgets. Extensive experiments using real datasets show the effectiveness of our partitioning mechanisms.

  12. Partitioning-based mechanisms under personalized differential privacy

    PubMed Central

    Li, Haoran; Xiong, Li; Ji, Zhanglong; Jiang, Xiaoqian

    2017-01-01

    Differential privacy has recently emerged in private statistical aggregate analysis as one of the strongest privacy guarantees. A limitation of the model is that it provides the same privacy protection for all individuals in the database. However, it is common that data owners may have different privacy preferences for their data. Consequently, a global differential privacy parameter may provide excessive privacy protection for some users, while insufficient for others. In this paper, we propose two partitioning-based mechanisms, privacy-aware and utility-based partitioning, to handle personalized differential privacy parameters for each individual in a dataset while maximizing utility of the differentially private computation. The privacy-aware partitioning is to minimize the privacy budget waste, while utility-based partitioning is to maximize the utility for a given aggregate analysis. We also develop a t-round partitioning to take full advantage of remaining privacy budgets. Extensive experiments using real datasets show the effectiveness of our partitioning mechanisms. PMID:28932827

  13. Location Privacy in RFID Applications

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  14. Ethics and Privacy.

    ERIC Educational Resources Information Center

    Brewer, Erin; Eastmond, Nick; Geertsen, Reed; Johnson, Doug; Lewandowski, Judith; Yeaman, Andrew R. J.

    2003-01-01

    Contains four articles covering trends and issues on ethics and privacy in instructional technology, including: considerations for assessing ethical issues; what schools must do to develop ethical behaviors in students; a privacy primer for educators; and manufacturing technophopia. Each article contains references. (MES)

  15. A review of privacy and usability issues in mobile health systems: Role of external factors.

    PubMed

    Katusiime, Jane; Pinkwart, Niels

    2017-10-01

    The increased penetration of mobile devices has created opportunities in the health sector and led to emerging of mobile health systems. As much as the mobile health systems have registered tremendous progress, they have been faced with privacy and usability issues. Due to the sensitivity of health information, there is an ethical need to equip mobile health systems with adequate privacy measures. However, these systems should also be useable by the intended users. Even though many researchers are working on solutions, the issues still persist. External factors such as cultural differences have also contributed to the issues, yet they have been under researched. In this article, we conduct a systematic literature review of 22 articles, categorize and present privacy and usability issues and possible solutions. We then discuss the relevance and implications of external factors to the findings on privacy and usability. We end with recommendations to address these external factors.

  16. Quantifying Differential Privacy under Temporal Correlations

    PubMed Central

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-01-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective. PMID:28883711

  17. Quantifying Differential Privacy under Temporal Correlations.

    PubMed

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-04-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time . We call it temporal privacy leakage . Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective.

  18. 75 FR 20298 - Privacy Act Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ... Part 200 RIN 0430-AA03 Privacy Act Regulations AGENCY: Recovery Accountability and Transparency Board... amend the Board's regulations implementing the Privacy Act of 1974 (Privacy Act), as amended. This proposed rule would exempt certain systems of records from certain sections of the Privacy Act. These...

  19. More Than Defense in Daily Experience of Privacy: The Functions of Privacy in Digital and Physical Environments

    PubMed Central

    Lombardi, Debora Benedetta; Ciceri, Maria Rita

    2016-01-01

    The purpose of the current study was to investigate the experience of privacy, focusing on its functional role in personal well-being. A sample (N = 180) comprised subjects between 18 and 50 years of age were asked to spontaneously provide accounts of their experiences with privacy and answer close-ended questions to acquire a description of a daily experience of privacy. The results showed the importance attributed to the function of privacy related to the “defense from social threats”, and the twofold function of privacy related to an “achieved state of privacy”, in the terms of both “system maintenance” and “system development”. The results also shed light on the role of the environment in shaping one’s experience of privacy. Specifically, the participants recognized more easily the function of defense from threats related to seeking privacy while interacting in digital environments, whereas they seemed to benefit from positive functions related to an achieved state of privacy in physical environments. The findings sustain the notion of privacy as a supportive condition for some psychological processes involved in the positive human functioning and confirm previous studies conducted on the role of privacy in human well-being. PMID:27247696

  20. 77 FR 37002 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-20

    ....S.C. 552a), as amended, have been published in the Federal Register and are available from the address in FOR FURTHER INFORMATION CONTACT. The proposed system report, as required by U.S.C. 552a(r) of... record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This proposed...

  1. Policy forum. Data, privacy, and the greater good.

    PubMed

    Horvitz, Eric; Mulligan, Deirdre

    2015-07-17

    Large-scale aggregate analyses of anonymized data can yield valuable results and insights that address public health challenges and provide new avenues for scientific discovery. These methods can extend our knowledge and provide new tools for enhancing health and wellbeing. However, they raise questions about how to best address potential threats to privacy while reaping benefits for individuals and to society as a whole. The use of machine learning to make leaps across informational and social contexts to infer health conditions and risks from nonmedical data provides representative scenarios for reflections on directions with balancing innovation and regulation. Copyright © 2015, American Association for the Advancement of Science.

  2. Children's Online Privacy.

    ERIC Educational Resources Information Center

    Aidman, Amy

    2000-01-01

    The first federal Internet privacy law (the Children's Online Privacy Protection Act) provides safeguards for children by regulating collection of their personal information. Unfortunately, teens are not protected. Legislation is pending to protect children from online marketers such as ZapMe! Interactive technologies require constant vigilance.…

  3. Information Privacy Revealed

    ERIC Educational Resources Information Center

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  4. Privacy protection for HealthGrid applications.

    PubMed

    Claerhout, B; De Moor, G J E

    2005-01-01

    This contribution aims at introducing the problem of privacy protection in e-Health and at describing a number of existing privacy enhancing techniques (PETs). The recognition that privacy constitutes a fundamental right is gradually entering public awareness. Because healthcare-related data are susceptible to being abused for many obvious reasons, public apprehension about privacy has focused on medical data. Public authorities have become convinced of the need to enforce privacy protection and make considerable efforts for promoting through privacy protection legislation the deployment of PETs. Based on the study of the specific features of Grid technology, ways in which PET services could be integrated in the HealthGrid are being analyzed. Grid technology aims at removing barriers between local and remote resources. The privacy and legal issues raised by the HealthGrid are caused by the transparent interchange and processing of sensitive medical information. PET technology has already proven its usefulness for privacy protection in health-related marketing and research data collection. While this paper does not describe market-ready solutions for privacy protection in the HealthGrid, it puts forward several cases in which the Grid may benefit from PETs. Early integration of privacy protection services into the HealthGrid can lead to a synergy that is beneficial for the development of the HealthGrid itself.

  5. The Need for Privacy and the Application of Privacy to the Day Care Setting.

    ERIC Educational Resources Information Center

    Jacobs, Ellen

    This paper, focusing on young children's need for privacy, describes a study conducted to determine the manner in which children in day care centers resolve the problem of reduced space and time for privacy. A pilot study revealed that children displayed three privacy seeking behaviors: (1) verbal and nonverbal territorial behavior (use or defense…

  6. A compressive sensing based secure watermark detection and privacy preserving storage framework.

    PubMed

    Qia Wang; Wenjun Zeng; Jun Tian

    2014-03-01

    Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service, such as the cloud. In this paper, we identify a cloud computing application scenario that requires simultaneously performing secure watermark detection and privacy preserving multimedia data storage. We then propose a compressive sensing (CS)-based framework using secure multiparty computation (MPC) protocols to address such a requirement. In our framework, the multimedia data and secret watermark pattern are presented to the cloud for secure watermark detection in a CS domain to protect the privacy. During CS transformation, the privacy of the CS matrix and the watermark pattern is protected by the MPC protocols under the semi-honest security model. We derive the expected watermark detection performance in the CS domain, given the target image, watermark pattern, and the size of the CS matrix (but without the CS matrix itself). The correctness of the derived performance has been validated by our experiments. Our theoretical analysis and experimental results show that secure watermark detection in the CS domain is feasible. Our framework can also be extended to other collaborative secure signal processing and data-mining applications in the cloud.

  7. Re-Assessing Green Building Performance: A Post Occupancy Evaluation of 22 GSA Buildings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fowler, Kimberly M.; Rauch, Emily M.; Henderson, Jordan W.

    2010-06-01

    2nd report on the performance of GSA's sustainably designed buildings. The purpose of this study was to provide an overview of measured whole building performance as it compares to GSA and industry baselines. The PNNL research team found the data analysis illuminated strengths and weaknesses of individual buildings as well as the portfolio of buildings. This section includes summary data, observations that cross multiple performance metrics, discussion of lessons learned from this research, and opportunities for future research. The summary of annual data for each of the performance metrics is provided in Table 25. The data represent 1 year ofmore » measurements and are not associated with any specific design features or strategies. Where available, multiple years of data were examined and there were minimal significant differences between the years. Individually focused post occupancy evaluation (POEs) would allow for more detailed analysis of the buildings. Examining building performance over multiple years could potentially offer a useful diagnostic tool for identifying building operations that are in need of operational changes. Investigating what the connection is between the building performance and the design intent would offer potential design guidance and possible insight into building operation strategies. The 'aggregate operating cost' metric used in this study represents the costs that were available for developing a comparative industry baseline for office buildings. The costs include water utilities, energy utilities, general maintenance, grounds maintenance, waste and recycling, and janitorial costs. Three of the buildings that cost more than the baseline in Figure 45 have higher maintenance costs than the baseline, and one has higher energy costs. Given the volume of data collected and analyzed for this study, the inevitable request is for a simple answer with respect to sustainably designed building performance. As previously stated, compiling

  8. 77 FR 57015 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2012-OS-0104] 32 CFR Part 319 Privacy... the records in another Privacy Act system of records. DIA is updating the DIA Privacy Act Program by... its Privacy Programs. DoD expects no opposition to the changes and no significant adverse comments...

  9. Employee Privacy Rights: A Management Guide.

    ERIC Educational Resources Information Center

    Shepard, Ira Michael; Olsen, Harry

    Employee privacy rights are considered, along with practical problems and permissible parameters of employer activity. Included is a state-by-state analysis of the status of workplace privacy. Definitions are offered of "invasion of privacy," with attention to four types of privacy invasions: (1) placing someone in a "false light," (2) the public…

  10. 41 CFR 102-118.440 - What are the postpayment audit responsibilities and roles of the GSA Audit Division?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... audit responsibilities and roles of the GSA Audit Division? 102-118.440 Section 102-118.440 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION TRANSPORTATION 118-TRANSPORTATION PAYMENT AND AUDIT Postpayment Transportation Audits...

  11. The differing privacy concerns regarding exchanging electronic medical records of internet users in Taiwan.

    PubMed

    Hwang, Hsin-Ginn; Han, Hwai-En; Kuo, Kuang-Ming; Liu, Chung-Feng

    2012-12-01

    This study explores whether Internet users have different privacy concerns regarding the information contained in electronic medical records (EMRs) according to gender, age, occupation, education, and EMR awareness. Based on the Concern for Information Privacy (CFIP) scale developed by Smith and colleagues in 1996, we conducted an online survey using 15 items in four dimensions, namely, collection, unauthorized access, secondary use, and errors, to investigate Internet users' concerns regarding the privacy of EMRs under health information exchanges (HIE). We retrieved 213 valid questionnaires. The results indicate that the respondents had substantial privacy concerns regarding EMRs and their educational level and EMR awareness significantly influenced their privacy concerns regarding unauthorized access and secondary use of EMRs. This study recommends that the Taiwanese government organizes a comprehensive EMR awareness campaign, emphasizing unauthorized access and secondary use of EMRs. Additionally, to cultivate the public's understanding of EMRs, the government should employ various media, especially Internet channels, to promote EMR awareness, thereby enabling the public to accept the concept and use of EMRs. People who are highly educated and have superior EMR awareness should be given a comprehensive explanation of how hospitals protect patients' EMRs from unauthorized access and secondary use to address their concerns. Thus, the public can comprehend, trust, and accept the use of EMRs, reducing their privacy concerns, which should facilitate the future implementation of HIE.

  12. Ethics and Privacy Implications of Using the Internet and Social Media to Recruit Participants for Health Research: A Privacy-by-Design Framework for Online Recruitment

    PubMed Central

    Cyr, Alaina B; Arbuckle, Luk; Ferris, Lorraine E

    2017-01-01

    Background The Internet and social media offer promising ways to improve the reach, efficiency, and effectiveness of recruitment efforts at a reasonable cost, but raise unique ethical dilemmas. We describe how we used social media to recruit cancer patients and family caregivers for a research study, the ethical issues we encountered, and the strategies we developed to address them. Objective Drawing on the principles of Privacy by Design (PbD), a globally recognized standard for privacy protection, we aimed to develop a PbD framework for online health research recruitment. Methods We proposed a focus group study on the dietary behaviors of cancer patients and their families, and the role of Web-based dietary self-management tools. Using an established blog on our hospital website, we proposed publishing a recruitment post and sharing the link on our Twitter and Facebook pages. The Research Ethics Board (REB) raised concern about the privacy risks associated with our recruitment strategy; by clicking on a recruitment post, an individual could inadvertently disclose personal health information to third-party companies engaged in tracking online behavior. The REB asked us to revise our social media recruitment strategy with the following questions in mind: (1) How will you inform users about the potential for privacy breaches and their implications? and (2) How will you protect users from privacy breaches or inadvertently sharing potentially identifying information about themselves? Results Ethical guidelines recommend a proportionate approach to ethics assessment, which advocates for risk mitigation strategies that are proportional to the magnitude and probability of risks. We revised our social media recruitment strategy to inform users about privacy risks and to protect their privacy, while at the same time meeting our recruitment objectives. We provide a critical reflection of the perceived privacy risks associated with our social media recruitment strategy and

  13. Privacy in Social Networks: A Survey

    NASA Astrophysics Data System (ADS)

    Zheleva, Elena; Getoor, Lise

    In this chapter, we survey the literature on privacy in social networks. We focus both on online social networks and online affiliation networks. We formally define the possible privacy breaches and describe the privacy attacks that have been studied. We present definitions of privacy in the context of anonymization together with existing anonymization techniques.

  14. What was privacy?

    PubMed

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  15. Privacy Expectations in Online Contexts

    ERIC Educational Resources Information Center

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  16. No privacy for all? Serious failings in the HHS medical records regulations.

    PubMed

    Sobel, Richard

    2002-01-01

    The Bush administration surprised many by the approval without major revisions of the Clinton administration's HHS medical records regulations, despite heavy lobbying from the health industry. Though these "privacy rules" are supposed to protect patient confidentiality, what has gone unmentioned are the regulations' major lapses that breach informed consent and confidentiality. Recently issued "clarifications" of the regulations reveal that they do not prevent unconsented access to sensitive medical information by marketers, health plans, health care clearinghouses, and law enforcement. These problems with the regulations constitute a serious breach of patient privacy, endangering the doctor-patient relationship and potentially driving up health care costs, and need to be addressed.

  17. 41 CFR 102-192.90 - What must we include in our annual mail management report to GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What must we include in our annual mail management report to GSA? 102-192.90 Section 102-192.90 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  18. 41 CFR 105-64.204 - Can parents and guardians obtain access to records?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.2-Access to Records § 105-64.204 Can parents and guardians obtain access to records? If you are the parent or guardian of a minor, or of a...

  19. 41 CFR 105-64.204 - Can parents and guardians obtain access to records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.2-Access to Records § 105-64.204 Can parents and guardians obtain access to records? If you are the parent or guardian of a minor, or of a...

  20. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  1. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  2. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  3. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  4. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  5. Biobank research and the right to privacy.

    PubMed

    Ursin, Lars Oystein

    2008-01-01

    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants in biobank research might have to privacy, it is argued that their interests should be related to the specific context of the provision and reception of health care that participation in biobank research is connected with. Rather than just granting participants an exclusive right to or ownership of their health information, which must be waived in order to make biobank research possible, the privacy aspect of health information should be viewed in light of the moral rights and duties that accompany any involvement in a research based system of health services.

  6. Preempting genetic discrimination and assaults on privacy: report of a symposium.

    PubMed

    Shinaman, Aileen; Bain, Lisa J; Shoulson, Ira

    2003-08-01

    At a symposium in June, 2002, biomedical researchers, clinicians, legal experts, policymakers, and representatives of the insurance industry and the advocacy community gathered to address issues of genetic privacy and discrimination; and to identify research, legal, and policy gaps needing to be filled. They concluded that over the next decade, as more genetic information becomes available and the public becomes more aware of individual risks, concerns about privacy and discrimination will become increasingly important. Documented cases of genetic discrimination are rare and largely anecdotal, yet individuals with genetic conditions harbor significant fears about discrimination. Current laws enacted to protect individuals from workplace and insurance discrimination offer some measure of protection, but leave many unfilled gaps. Moreover, the use of genetic information in potentially discriminatory ways is not limited to employment and insurability. Existing laws do little to protect people seeking life, disability, or long-term care insurance. And the courts have used genetic information in a wide variety of cases including paternity, criminal, and tort (personal injury) cases. Genetic information that might jeopardize an individual's right to privacy may also be obtained in the course of research studies, including through the collection of DNA and tissue samples. The insurance industry, State and Federal agencies, and the advocacy community are all making efforts to address some of these gaps through legislation and education of clinicians, the public, and policy makers. Copyright 2003 Wiley-Liss, Inc.

  7. Support and Dissemination of Teacher-Authored Lesson Plans: a Digital Library for Earth System Education (DLESE) and Geological Society of America (GSA) Collaboration

    NASA Astrophysics Data System (ADS)

    Devaul, H.; Pandya, R. E.; McLelland, C. V.

    2003-12-01

    The Digital Library for Earth System Education (www.dlese.org) and the Geological Society of America (www.geosociety.org) are working together to publish and disseminate teacher-authored Earth science lesson plans. DLESE is a community-based effort involving teachers, students, and scientists working together to create a library of educational resources and services to support Earth system science education. DLESE offers free access to electronic resources including lesson plans, maps, images, data sets, visualizations, and assessment activities. A number of thematic collections have recently been accessioned, which has substantially increased library holdings. Working in concert with GSA, a non-profit organization dedicated to the advancement of the geosciences, small-scale resource creators such as classroom teachers without access to a web server can also share educational resources of their own design. Following a two-step process, lesson plans are submitted to the GSA website, reviewed and posted to the K-12 resource area: http://www.geosociety.org/educate/resources.htm. These resources are also submitted to the DLESE Community Collection using a simple cataloging tool. In this way resources are available to other teachers via the GSA website as well as via the DLESE collection. GSA provides a template for lesson plan developers which assists in providing the necessary information to help users find and understand the intent of the activity when searching in DLESE. This initial effort can serve as a prototype for important services allowing individual community members to contribute their work to DLESE with little technical overhead.

  8. ACHP | Web Site Privacy Policy

    Science.gov Websites

    Search skip specific nav links Home arrow About ACHP arrow Web Site Privacy Policy ACHP Web Site Privacy be used after its purpose has been fulfilled. For questions on our Web site privacy policy, please contact the Web manager. Updated October 2, 2006 Return to Top

  9. 41 CFR 105-64.201 - How do I get access to my records?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Administration 64-GSA PRIVACY ACT RULES 64.2-Access to Records § 105-64.201 How do I get access to my records... guardians may obtain access to records of minors or when a court has determined that the individual of...

  10. 41 CFR 105-64.201 - How do I get access to my records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Administration 64-GSA PRIVACY ACT RULES 64.2-Access to Records § 105-64.201 How do I get access to my records... guardians may obtain access to records of minors or when a court has determined that the individual of...

  11. Customer privacy on UK healthcare websites.

    PubMed

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  12. Toward practicing privacy

    PubMed Central

    Dwork, Cynthia; Pottenger, Rebecca

    2013-01-01

    Private data analysis—the useful analysis of confidential data—requires a rigorous and practicable definition of privacy. Differential privacy, an emerging standard, is the subject of intensive investigation in several diverse research communities. We review the definition, explain its motivation, and discuss some of the challenges to bringing this concept to practice. PMID:23243088

  13. Meeting the Privacy Requirements for the Development of a Multi-Centre Patient Registry in Canada: The Rick Hansen Spinal Cord Injury Registry

    PubMed Central

    Noonan, Vanessa K.; Thorogood, Nancy P.; Joshi, Phalgun B.; Fehlings, Michael G.; Craven, B. Catharine; Linassi, Gary; Fourney, Daryl R.; Kwon, Brian K.; Bailey, Christopher S.; Tsai, Eve C.; Drew, Brian M.; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F.

    2013-01-01

    Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. PMID:23968640

  14. Meeting the privacy requirements for the development of a multi-centre patient registry in Canada: the Rick Hansen Spinal Cord Injury Registry.

    PubMed

    Noonan, Vanessa K; Thorogood, Nancy P; Joshi, Phalgun B; Fehlings, Michael G; Craven, B Catharine; Linassi, Gary; Fourney, Daryl R; Kwon, Brian K; Bailey, Christopher S; Tsai, Eve C; Drew, Brian M; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F

    2013-05-01

    Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. Copyright © 2013 Longwoods Publishing.

  15. Public Perspectives of Mobile Phones' Effects on Healthcare Quality and Medical Data Security and Privacy: A 2-Year Nationwide Survey.

    PubMed

    Richardson, Joshua E; Ancker, Jessica S

    2015-01-01

    Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician's electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized.

  16. 76 FR 44332 - Privacy Act of 1974; Notice of Updated Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-25

    ... are safeguarded in accordance with the requirements of the Privacy Act, the Computer Security Act, and... Security Numbers, birth dates and credit card numbers or other banking information, and (2) contract... bidders and buyers, including, but not limited to, names, phone numbers, addresses, Social Security...

  17. Advertising and Invasion of Privacy.

    ERIC Educational Resources Information Center

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  18. Locking it down: The privacy and security of mobile medication apps.

    PubMed

    Grindrod, Kelly; Boersema, Jonathan; Waked, Khrystine; Smith, Vivian; Yang, Jilan; Gebotys, Catherine

    2017-01-01

    To explore the privacy and security of free medication applications (apps) available to Canadian consumers. The authors searched the Canadian iTunes store for iOS apps and the Canadian Google Play store for Android apps related to medication use and management. Using an Apple iPad Air 2 and a Google Nexus 7 tablet, 2 reviewers generated a list of apps that met the following inclusion criteria: free, available in English, intended for consumer use and related to medication management. Using a standard data collection form, 2 reviewers independently coded each app for the presence/absence of passwords, the storage of personal health information, a privacy statement, encryption, remote wipe and third-party sharing. A Cohen's Kappa statistic was used to measure interrater agreement. Of the 184 apps evaluated, 70.1% had no password protection or sign-in system. Personal information, including name, date of birth and gender, was requested by 41.8% (77/184) of apps. Contact information, such as address, phone number and email, was requested by 25% (46/184) of apps. Finally, personal health information, other than medication name, was requested by 89.1% (164/184) of apps. Only 34.2% (63/184) of apps had a privacy policy in place. Most free medication apps offer very limited authentication and privacy protocols. As a result, the onus currently falls on patients to input information in these apps selectively and to be aware of the potential privacy issues. Until more secure systems are built, health care practitioners cannot fully support patients wanting to use such apps.

  19. Privacy, Trainee Rights, and Accountability in Radiology Education.

    PubMed

    Pfeifer, Cory M

    2017-06-01

    Academic radiologists commonly hold multiple simultaneous roles within the landscape of physician training. This paper analyzes theoretical scenarios describing relationships between medical students, residents, and physician educators in radiology. The scenarios presented involve medical student supervision, radiology resident recruitment, and resident termination with respect to relevant ethical, regulatory, and legal considerations. Legal precedents and the medical social contract are addressed. The Family Educational Rights and Privacy Act defines a framework for the privacy practices of medical schools, but it does not confer individual rights. Resident physicians rarely win wrongful termination lawsuits. Physician educators are ethically bound to act in the best interest of society. Courts have ruled that medicine is intended to be a self-regulatory profession. Such a power requires that physicians remain accountable to the public while providing a fair learning environment for medical trainees. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  20. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-27

    ... DEPARTMENT OF AGRICULTURE Office of the Secretary Privacy Act: Revision of Privacy Act Systems of.... SUMMARY: Notice is hereby given that the United States Department of Agriculture (USDA) proposes to revise... from participating in SNAP. Dated: December 14, 2010. Thomas J. Vilsack, Secretary of Agriculture...

  1. 75 FR 6032 - Property Obtained Through the Use of Charge Cards; Notice of GSA Bulletin FMR B-25

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-05

    ...: Notice of a bulletin. SUMMARY: This notice announces GSA Federal Management Regulation (FMR) Bulletin B... Policy, Office of Travel, Transportation and Asset Management, at (202) 501- 1777. Please cite Bulletin... streamlining procurement of needed items, the property obtained in this way presents special management and...

  2. 5 CFR 6701.104 - Prohibited purchases of real estate by certain GSA employees involved in the acquisition or...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Prohibited purchases of real estate by... Administrative Personnel GENERAL SERVICES ADMINISTRATION SUPPLEMENTAL STANDARDS OF ETHICAL CONDUCT FOR EMPLOYEES OF THE GENERAL SERVICES ADMINISTRATION § 6701.104 Prohibited purchases of real estate by certain GSA...

  3. A multimethod approach to examining usability of Web privacy polices and user agents for specifying privacy preferences.

    PubMed

    Proctor, Robert W; Vu, Kim-Phuong L

    2007-05-01

    Because all research methods have strengths and weaknesses, a multimethod approach often provides the best way to understand human behavior in applied settings. We describe how a multimethod approach was employed in a series of studies designed to examine usability issues associated with two aspects of online privacy: comprehension of privacy policies and configuration of privacy preferences for an online user agent. Archival research, user surveys, data mining, quantitative observations, and controlled experiments each yielded unique findings that, together, contributed to increased understanding of online-privacy issues for users. These findings were used to evaluate the accessibility of Web privacy policies to computer-literate users, determine whether people can configure user agents to achieve specific privacy goals, and discover ways in which the usability of those agents can be improved.

  4. Sharing health-related data: a privacy test?

    PubMed Central

    Dyke, Stephanie OM; Dove, Edward S; Knoppers, Bartha M

    2016-01-01

    Greater sharing of potentially sensitive data raises important ethical, legal and social issues (ELSI), which risk hindering and even preventing useful data sharing if not properly addressed. One such important issue is respecting the privacy-related interests of individuals whose data are used in genomic research and clinical care. As part of the Global Alliance for Genomics and Health (GA4GH), we examined the ELSI status of health-related data that are typically considered ‘sensitive’ in international policy and data protection laws. We propose that ‘tiered protection’ of such data could be implemented in contexts such as that of the GA4GH Beacon Project to facilitate responsible data sharing. To this end, we discuss a Data Sharing Privacy Test developed to distinguish degrees of sensitivity within categories of data recognised as ‘sensitive’. Based on this, we propose guidance for determining the level of protection when sharing genomic and health-related data for the Beacon Project and in other international data sharing initiatives. PMID:27990299

  5. Mapping Health Data: Improved Privacy Protection With Donut Method Geomasking

    PubMed Central

    Hampton, Kristen H.; Fitch, Molly K.; Allshouse, William B.; Doherty, Irene A.; Gesink, Dionne C.; Leone, Peter A.; Serre, Marc L.; Miller, William C.

    2010-01-01

    A major challenge in mapping health data is protecting patient privacy while maintaining the spatial resolution necessary for spatial surveillance and outbreak identification. A new adaptive geomasking technique, referred to as the donut method, extends current methods of random displacement by ensuring a user-defined minimum level of geoprivacy. In donut method geomasking, each geocoded address is relocated in a random direction by at least a minimum distance, but less than a maximum distance. The authors compared the donut method with current methods of random perturbation and aggregation regarding measures of privacy protection and cluster detection performance by masking multiple disease field simulations under a range of parameters. Both the donut method and random perturbation performed better than aggregation in cluster detection measures. The performance of the donut method in geoprivacy measures was at least 42.7% higher and in cluster detection measures was less than 4.8% lower than that of random perturbation. Results show that the donut method provides a consistently higher level of privacy protection with a minimal decrease in cluster detection performance, especially in areas where the risk to individual geoprivacy is greatest. PMID:20817785

  6. Mapping health data: improved privacy protection with donut method geomasking.

    PubMed

    Hampton, Kristen H; Fitch, Molly K; Allshouse, William B; Doherty, Irene A; Gesink, Dionne C; Leone, Peter A; Serre, Marc L; Miller, William C

    2010-11-01

    A major challenge in mapping health data is protecting patient privacy while maintaining the spatial resolution necessary for spatial surveillance and outbreak identification. A new adaptive geomasking technique, referred to as the donut method, extends current methods of random displacement by ensuring a user-defined minimum level of geoprivacy. In donut method geomasking, each geocoded address is relocated in a random direction by at least a minimum distance, but less than a maximum distance. The authors compared the donut method with current methods of random perturbation and aggregation regarding measures of privacy protection and cluster detection performance by masking multiple disease field simulations under a range of parameters. Both the donut method and random perturbation performed better than aggregation in cluster detection measures. The performance of the donut method in geoprivacy measures was at least 42.7% higher and in cluster detection measures was less than 4.8% lower than that of random perturbation. Results show that the donut method provides a consistently higher level of privacy protection with a minimal decrease in cluster detection performance, especially in areas where the risk to individual geoprivacy is greatest.

  7. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  8. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  9. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  10. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  11. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  12. Ethics and Privacy Implications of Using the Internet and Social Media to Recruit Participants for Health Research: A Privacy-by-Design Framework for Online Recruitment.

    PubMed

    Bender, Jacqueline Lorene; Cyr, Alaina B; Arbuckle, Luk; Ferris, Lorraine E

    2017-04-06

    The Internet and social media offer promising ways to improve the reach, efficiency, and effectiveness of recruitment efforts at a reasonable cost, but raise unique ethical dilemmas. We describe how we used social media to recruit cancer patients and family caregivers for a research study, the ethical issues we encountered, and the strategies we developed to address them. Drawing on the principles of Privacy by Design (PbD), a globally recognized standard for privacy protection, we aimed to develop a PbD framework for online health research recruitment. We proposed a focus group study on the dietary behaviors of cancer patients and their families, and the role of Web-based dietary self-management tools. Using an established blog on our hospital website, we proposed publishing a recruitment post and sharing the link on our Twitter and Facebook pages. The Research Ethics Board (REB) raised concern about the privacy risks associated with our recruitment strategy; by clicking on a recruitment post, an individual could inadvertently disclose personal health information to third-party companies engaged in tracking online behavior. The REB asked us to revise our social media recruitment strategy with the following questions in mind: (1) How will you inform users about the potential for privacy breaches and their implications? and (2) How will you protect users from privacy breaches or inadvertently sharing potentially identifying information about themselves? Ethical guidelines recommend a proportionate approach to ethics assessment, which advocates for risk mitigation strategies that are proportional to the magnitude and probability of risks. We revised our social media recruitment strategy to inform users about privacy risks and to protect their privacy, while at the same time meeting our recruitment objectives. We provide a critical reflection of the perceived privacy risks associated with our social media recruitment strategy and the appropriateness of the risk

  13. User Privacy in RFID Networks

    NASA Astrophysics Data System (ADS)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  14. 41 CFR 102-118.25 - Does GSA still require my agency to submit its overall transportation policies for approval?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION TRANSPORTATION 118-TRANSPORTATION PAYMENT AND AUDIT General Introduction... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Does GSA still require...

  15. 41 CFR 102-118.445 - Must my agency pay for a postpayment audit when using the GSA Audit Division?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... postpayment audit when using the GSA Audit Division? 102-118.445 Section 102-118.445 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION TRANSPORTATION 118-TRANSPORTATION PAYMENT AND AUDIT Postpayment Transportation Audits § 102-118...

  16. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule. Except...

  17. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  18. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  19. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  20. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  1. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule. Except...

  2. 41 CFR 101-26.505-3 - Requests to procure similar items from sources other than GSA supply sources.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Requests to procure... Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 26-PROCUREMENT SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26...

  3. 41 CFR 102-72.95 - What are the requirements for obtaining a security delegation of authority from GSA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the requirements for obtaining a security delegation of authority from GSA? An Executive agency may... PBS. The delegation may be granted where the requesting agency demonstrates a compelling need for the delegated authority and the delegation is not inconsistent with the authorities of any other law enforcement...

  4. Public Perspectives of Mobile Phones’ Effects on Healthcare Quality and Medical Data Security and Privacy: A 2-Year Nationwide Survey

    PubMed Central

    Richardson, Joshua E.; Ancker, Jessica S.

    2015-01-01

    Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician’s electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized. PMID:26958246

  5. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  6. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  7. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  8. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  9. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  10. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...

  11. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...

  12. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  13. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  14. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  15. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  16. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...

  17. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  18. 75 FR 45674 - Privacy Act of 1974, as Amended; System of Records Notices

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-03

    ... invasion of personal privacy by requiring Federal agencies to disseminate any record of identifiable personal information in a manner that assures that such action is for a necessary and lawful purpose, that... agency compliance with the FOIA. In this role, OGIS will capture and address systematic problems in FOIA...

  19. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 5 2012-04-01 2012-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  20. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 5 2014-04-01 2014-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  1. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 5 2011-04-01 2011-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  2. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 5 2013-04-01 2013-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  3. 78 FR 69551 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is proposing to update the DIA Privacy... Privacy Program rules that will exempt applicable Department records and/or material from certain portions...

  4. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  5. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  6. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  7. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 4 Accounts 1 2014-01-01 2013-01-01 true Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  8. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  9. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  10. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  11. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 4 Accounts 1 2013-01-01 2013-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  12. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  13. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P, S-AM, AND S-ID Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except...

  14. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  15. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  16. 48 CFR 52.224-2 - Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act of...

  17. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  18. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  19. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 4 Accounts 1 2014-01-01 2013-01-01 true Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  20. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 4 Accounts 1 2012-01-01 2012-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  1. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  2. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  3. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 4 Accounts 1 2013-01-01 2013-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  4. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  5. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 4 Accounts 1 2011-01-01 2011-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  6. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  7. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  8. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  9. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  10. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  11. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  12. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  13. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  14. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  15. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 4 Accounts 1 2012-01-01 2012-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  16. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  17. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 4 Accounts 1 2011-01-01 2011-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  18. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  19. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  20. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  1. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  2. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  3. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  4. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  5. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  6. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  7. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  8. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  9. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  10. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  11. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  12. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  13. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  14. 6 CFR 1002.3 - Privacy Act requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Privacy Act requests. 1002.3 Section 1002.3 Domestic Security PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 1002.3 Privacy Act requests. (a) Requests to determine if you are the subject of a record. You may...

  15. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  16. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 1 2014-10-01 2014-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy...

  17. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy...

  18. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy...

  19. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy...

  20. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy...