Science.gov

Sample records for adult privacy policy

  1. Privacy Policy | Smokefree 60+

    Cancer.gov

    The National Cancer Institute (NCI) respects the privacy of users of its websites. This is why we have taken the time to disclose our privacy policy and information collection practices. NCI does not disclose, give, sell, or transfer any personal information about visitors unless required to do so by law. NCI automatically collects a limited amount of information about the use of websites for statistical purposes — that is, to measure the numbers of visitors. This information may be helpful when considering changes that improve our websites for future visitors.

  2. EGRP Privacy Policy & Disclaimers

    Cancer.gov

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  3. 75 FR 22577 - Proposed Privacy Policy Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... COMMISSION Proposed Privacy Policy Statement AGENCY: U.S. Election Assistance Commission. ACTION: Notice and request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99-...

  4. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  5. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  6. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  7. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  8. MedlinePlus: Privacy Policy

    MedlinePlus

    ... are available at: http://www.addthis.com/privacy . Go.USA.Gov and Bit.ly NLM uses the Go.USA.gov and Bit.ly URL shortening services. ... shortened URLs. The analytics data is provided by Go.USA.Gov and Bit.ly. This data does ...

  9. Privacy policies for health social networking sites.

    PubMed

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data.

  10. Privacy policies for health social networking sites

    PubMed Central

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data. PMID:23599228

  11. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect...

  12. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect...

  13. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect...

  14. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect...

  15. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect...

  16. Availability and quality of mobile health app privacy policies.

    PubMed

    Sunyaev, Ali; Dehling, Tobias; Taylor, Patrick L; Mandl, Kenneth D

    2015-04-01

    Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35,000 mHealth apps are available for iOS and Android. Of the 600 most commonly used apps, only 183 (30.5%) had privacy policies. Average policy length was 1755 (SD 1301) words with a reading grade level of 16 (SD 2.9). Two thirds (66.1%) of privacy policies did not specifically address the app itself. Our findings show that currently mHealth developers often fail to provide app privacy policies. The privacy policies that are available do not make information privacy practices transparent to users, require college-level literacy, and are often not focused on the app itself. Further research is warranted to address why privacy policies are often absent, opaque, or irrelevant, and to find a remedy.

  17. Obtaining P3P Privacy Policies for Composite Services

    PubMed Central

    Sun, Yi; Huang, Zhiqiu; Ke, Changbo

    2014-01-01

    With the development of web services technology, web services have changed from single to composite services. Privacy protection in composite services is becoming an important issue. P3P (platform for privacy preferences) is a privacy policy language which was designed for single web services. It enables service providers to express how they will deal with the privacy information of service consumers. In order to solve the problem that P3P cannot be applied to composite services directly, we propose a method to obtain P3P privacy policies for composite services. In this method, we present the definitions of Purpose, Recipient, and Retention elements as well as Optional and Required attributes for P3P policies of composite services. We also provide an instantiation to illustrate the feasibility of the method. PMID:25126609

  18. Obtaining P3P privacy policies for composite services.

    PubMed

    Sun, Yi; Huang, Zhiqiu; Ke, Changbo

    2014-01-01

    With the development of web services technology, web services have changed from single to composite services. Privacy protection in composite services is becoming an important issue. P3P (platform for privacy preferences) is a privacy policy language which was designed for single web services. It enables service providers to express how they will deal with the privacy information of service consumers. In order to solve the problem that P3P cannot be applied to composite services directly, we propose a method to obtain P3P privacy policies for composite services. In this method, we present the definitions of Purpose, Recipient, and Retention elements as well as Optional and Required attributes for P3P policies of composite services. We also provide an instantiation to illustrate the feasibility of the method.

  19. Is Privacy Reserved for Adults? Children's Rights at the Public Library.

    ERIC Educational Resources Information Center

    Hildebrand, Janet

    1991-01-01

    Argues that the library has a responsibility to provide access to materials and ensure absolute privacy for children in the same manner as it does for adults. Attention this issue has received is discussed and policies formed at the Contra Costa County Library in California are described. Sources for further reading and listening are suggested.…

  20. Assessing the privacy policies in mobile personal health records.

    PubMed

    Zapata, Belén Cruz; Hernández Niñirola, Antonio; Fernández-Alemán, José Luis; Toval, Ambrosio

    2014-01-01

    The huge increase in the number and use of smartphones and tablets has led health service providers to take an interest in mHealth. Popular mobile app markets like Apple App Store or Google Play contain thousands of health applications. Although mobile personal health records (mPHRs) have a number of benefits, important challenges appear in the form of adoption barriers. Security and privacy have been identified as part of these barriers and should be addressed. This paper analyzes and assesses a total of 24 free mPHRs for Android and iOS. Characteristics regarding privacy and security were extracted from the HIPAA. The results show important differences in both the mPHRs and the characteristics analyzed. A questionnaire containing six questions concerning privacy policies was defined. Our questionnaire may assist developers and stakeholders to evaluate the security and privacy of their mPHRs.

  1. A Content Analysis of Library Vendor Privacy Policies: Do They Meet Our Standards?

    ERIC Educational Resources Information Center

    Magi, Trina J.

    2010-01-01

    Librarians have a long history of protecting user privacy, but they have done seemingly little to understand or influence the privacy policies of library resource vendors that increasingly collect user information through Web 2.0-style personalization features. After citing evidence that college students value privacy, this study used content…

  2. Autonomy and Privacy in Clinical Laboratory Science Policy and Practice.

    PubMed

    Leibach, Elizabeth Kenimer

    2014-01-01

    Rapid advancements in diagnostic technologies coupled with growth in testing options and choices mandate the development of evidence-based testing algorithms linked to the care paths of the major chronic diseases and health challenges encountered most frequently. As care paths are evaluated, patient/consumers become partners in healthcare delivery. Clinical laboratory scientists find themselves firmly embedded in both quality improvement and clinical research with an urgent need to translate clinical laboratory information into knowledge required by practitioners and patient/consumers alike. To implement this patient-centered care approach in clinical laboratory science, practitioners must understand their roles in (1) protecting patient/consumer autonomy in the healthcare informed consent process and (2) assuring patient/consumer privacy and confidentiality while blending quality improvement study findings with protected health information. A literature review, describing the current ethical environment, supports a consultative role for clinical laboratory scientists in the clinical decision-making process and suggests guidance for policy and practice regarding the principle of autonomy and its associated operational characteristics: informed consent and privacy.

  3. Adult Education and Public Policy

    ERIC Educational Resources Information Center

    Fay, Francis A.

    1972-01-01

    Author discussed American public's shifts in values and priorities" and suggests that adult educators become involved in 'real politique'" in order to help form public policy in the future. (Author/SP)

  4. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    PubMed

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  5. Enforcement of Privacy Policies over Multiple Online Social Networks for Collaborative Activities

    NASA Astrophysics Data System (ADS)

    Wu, Zhengping; Wang, Lifeng

    Our goal is to tend to develop an enforcement architecture of privacy policies over multiple online social networks. It is used to solve the problem of privacy protection when several social networks build permanent or temporary collaboration. Theoretically, this idea is practical, especially due to more and more social network tend to support open source framework “OpenSocial”. But as we known different social network websites may have the same privacy policy settings based on different enforcement mechanisms, this would cause problems. In this case, we have to manually write code for both sides to make the privacy policy settings enforceable. We can imagine that, this is a huge workload based on the huge number of current social networks. So we focus on proposing a middleware which is used to automatically generate privacy protection component for permanent integration or temporary interaction of social networks. This middleware provide functions, such as collecting of privacy policy of each participant in the new collaboration, generating a standard policy model for each participant and mapping all those standard policy to different enforcement mechanisms of those participants.

  6. Determining the privacy policy deficiencies of health ICT applications through semi-formal modelling.

    PubMed

    Croll, Peter R

    2011-02-01

    To ensure that patient confidentiality is securely maintained, health ICT applications that contain sensitive personal information demand comprehensive privacy policies. Determining the adequacy of these policies to meet legal conformity together with clinical users and patient expectation is demanding in practice. Organisations and agencies looking to analyse their Privacy and Security policies can benefit from guidance provided by outside entities such as the Privacy Office of their State or Government together with law firms and ICT specialists. The advice given is not uniform and often open to different interpretations. Of greater concern is the possibility of overlooking any important aspects that later result in a data breach. Based on three case studies, this paper considers whether a more formal approach to privacy analysis could be taken that would help identify the full coverage of a Privacy Impact Analysis and determine the deficiencies with an organisation's current policies and approach. A diagrammatic model showing the relationships between Confidentiality, Privacy, Trust, Security and Safety is introduced. First the validity of this model is determined by mapping it against the real-world case studies taken from three healthcare services that depend on ICT. Then, by using software engineering methods, a formal mapping of the relationships is undertaken to identify a full set of policies needed to satisfy the model. How effective this approach may prove as a generic method for deriving a comprehensive set of policies in health ICT applications is finally discussed.

  7. A software platform to analyse the ethical issues of electronic patient privacy policy: the S3P example.

    PubMed

    Mizani, M A; Baykal, N

    2007-12-01

    Paper-based privacy policies fail to resolve the new changes posed by electronic healthcare. Protecting patient privacy through electronic systems has become a serious concern and is the subject of several recent studies. The shift towards an electronic privacy policy introduces new ethical challenges that cannot be solved merely by technical measures. Structured Patient Privacy Policy (S3P) is a software tool assuming an automated electronic privacy policy in an electronic healthcare setting. It is designed to simulate different access levels and rights of various professionals involved in healthcare in order to assess the emerging ethical problems. The authors discuss ethical issues concerning electronic patient privacy policies that have become apparent during the development and application of S3P.

  8. Globalisation, Transnational Policies and Adult Education

    ERIC Educational Resources Information Center

    Milana, Marcella

    2012-01-01

    Globalisation, transnational policies and adult education--This paper examines policy documents produced by the United Nations Educational, Scientific and Cultural Organization (UNESCO) and the European Union (EU) in the field of adult education and learning. Both these entities address adult education as an explicit object of policy. This paper…

  9. Recommendations and Privacy Requirements for a Bring-Your-Own-Device User Policy and Agreement

    DTIC Science & Technology

    2015-03-01

    establishes the USMC’s policy regarding acceptable use of personally-owned mobile devices within the BYOD program. This BYOD agreement aims to...AND PRIVACY REQUIREMENTS FOR A BRING-YOUR-OWN-DEVICE USER POLICY AND AGREEMENT by Chad R. Wedel Andrew T. Michalowicz March 2015 Thesis...author and do not reflect the official policy or position of the Department of Defense or the U.S. Govemment. IRB Protocol number NIA 12a

  10. Fusion Center Privacy Policies: Does One Size Fit All

    DTIC Science & Technology

    2009-12-01

    access to, among others, Regional Information Sharing System (RISS) Automated Trusted Information Exchange (ATIX), SIPRNet, the National Criminal...basis for the fusion center. These are all basic questions that merely skim the tip of the iceberg as far as privacy and civil liberty protections...credit history, financial information, account numbers, cellular telephone, voice over Internet protocol or landline telephone numbers, biometric

  11. Policy Review on Adult Learning: The Adult Non-Formal Education Policy of Mali, West Africa

    ERIC Educational Resources Information Center

    Gadio, Moussa

    2011-01-01

    This article focuses on the issue of policy development for adult learning in Mali, West Africa. On January 2007, the Malian government adopted the "Adult Non-formal Education Policy Document," which was intended to regulate the adult learning sector and federate the actions of policy makers, adult education providers, and adult…

  12. Fixing Broken Doors: Strategies for Drafting Privacy Policies Young People Can Understand

    ERIC Educational Resources Information Center

    Micheti, Anca; Burkell, Jacquelyn; Steeves, Valerie

    2010-01-01

    The goal of this project is to identify guidelines for privacy policies that children and teens can accurately interpret with relative ease. A three-pronged strategy was used to achieve this goal. First, an analysis of the relevant literature on reading was undertaken to identify the document features that affect comprehension. Second, focus…

  13. International Policies on Sharing Genomic Research Results with Relatives: Approaches to Balancing Privacy with Access.

    PubMed

    Branum, Rebecca; Wolf, Susan M

    2015-01-01

    Returning genetic research results to relatives raises complex issues. In order to inform the U.S. debate, this paper analyzes international law and policies governing the sharing of genetic research results with relatives and identifies key themes and lessons. The laws and policies from other countries demonstrate a range of approaches to balancing individual privacy and autonomy with family access for health benefit, offering important lessons for further development of approaches in the United States.

  14. International Policies on Sharing Genomic Research Results with Relatives: Approaches to Balancing Privacy with Access

    PubMed Central

    Branum, Rebecca; Wolf, Susan M.

    2015-01-01

    Returning genetic research results to raises complex issues. In order to inform the U.S. debate, this paper analyzes international law and policies governing the sharing of genetic research results with relatives and identifies key themes and lessons. The laws and policies from other countries demonstrate a range of approaches to balancing individual privacy and autonomy with family access for health benefit, offering important lessons for further development of approaches in the United States. PMID:26479568

  15. Development of a privacy and security policy framework for a multistate comparative effectiveness research network.

    PubMed

    Kim, Katherine K; McGraw, Deven; Mamo, Laura; Ohno-Machado, Lucila

    2013-08-01

    Comparative effectiveness research (CER) conducted in distributed research networks (DRNs) is subject to different state laws and regulations as well as institution-specific policies intended to protect privacy and security of health information. The goal of the Scalable National Network for Effectiveness Research (SCANNER) project is to develop and demonstrate a scalable, flexible technical infrastructure for DRNs that enables near real-time CER consistent with privacy and security laws and best practices. This investigation began with an analysis of privacy and security laws and state health information exchange (HIE) guidelines applicable to SCANNER participants from California, Illinois, Massachusetts, and the Federal Veteran's Administration. A 7-member expert panel of policy and technical experts reviewed the analysis and gave input into the framework during 5 meetings held in 2011-2012. The state/federal guidelines were applied to 3 CER use cases: safety of new oral hematologic medications; medication therapy management for patients with diabetes and hypertension; and informational interventions for providers in the treatment of acute respiratory infections. The policy framework provides flexibility, beginning with a use-case approach rather than a one-size-fits-all approach. The policies may vary depending on the type of patient data shared (aggregate counts, deidentified, limited, and fully identified datasets) and the flow of data. The types of agreements necessary for a DRN may include a network-level and data use agreements. The need for flexibility in the development and implementation of policies must be balanced with responsibilities of data stewardship.

  16. Privacy and social implications of distinct sensing approaches to implementing smart homes for older adults.

    PubMed

    Demiris, George

    2009-01-01

    Two distinct approaches to smart home design, namely Distributed Direct Sensing (DDS) and Infrastructure Mediated Sensing (IMS), have distinguishing features and implications resulting from their implementation. These two distinct smart home approaches have not been directly compared pertaining to their technical performance or their acceptance by the end users. It is also unclear what the perceived privacy and obtrusiveness concerns are when it comes to the implementation of these two different approaches in homes. The study presented here aimed to evaluate acceptance of these two sensing approaches by older adults and assess the perceived privacy and obtrusiveness concerns and ultimately define their social implications.

  17. Policy and Structure in English Adult Education

    ERIC Educational Resources Information Center

    Small, N. J.

    1975-01-01

    A historical perspective on policy and structure as set out in the major reports, official documents, and legislation contributes a great deal to understanding the present position of adult education in England. (Author/BP)

  18. Personal privacy, public benefits, and biobanks: A conjoint analysis of policy priorities and public perceptions.

    PubMed

    Pullman, Daryl; Etchegary, Holly; Gallagher, Katherine; Hodgkinson, Kathlene; Keough, Montgomery; Morgan, David; Street, Catherine

    2011-09-26

    PURPOSE:: To assess the public's perception of biobank research and the relative importance they place on concerns for privacy and confidentiality, when compared with other key variables when considering participation in biobank research. METHODS:: Conjoint analysis of three key attributes (research focus, research beneficiary, and privacy and confidentiality) under conditions of either blanket or specific consent. RESULTS:: Although the majority of our participants described themselves as private individuals, they consistently ranked privacy and confidentiality as the least important of the variables they considered. The potential beneficiary of proposed research ranked the highest under conditions of both blanket and specific consent. When completing the conjoint task under conditions of blanket consent, participants tended to act more altruistically. CONCLUSION:: The public tend to view biobanks as public goods designed primarily for public benefit. As such they tend to act altruistically with respect to the potential benefits that might accrue from research using biobanked samples. Participants expressed little concern about informational risks (i.e., privacy and confidentiality) should they choose to participate. The manner in which policy priorities are framed could impact participant value preferences with regard to a number of governance issues in biobanking.

  19. Globalisation, transnational policies and adult education

    NASA Astrophysics Data System (ADS)

    Milana, Marcella

    2012-12-01

    Globalisation, transnational policies and adult education - This paper examines policy documents produced by the United Nations Educational, Scientific and Cultural Organization (UNESCO) and the European Union (EU) in the field of adult education and learning. Both these entities address adult education as an explicit object of policy. This paper investigates how globalisation processes are constructed as policy problems when these transnational political agents propose adult education as a response. The author's main argument is that while UNESCO presents the provision of adult education as a means for governments worldwide to overcome disadvantages experienced by their own citizenry, the EU institutionalises learning experiences as a means for governments to sustain regional economic growth and political expansion. After reviewing the literature on globalisation to elucidate the theories that inform current understanding of contemporary economic, political, cultural and ecological changes as political problems, she presents the conceptual and methodological framework of her analysis. The author then examines the active role played by UNESCO and the EU in promoting adult education as a policy objective at transnational level, and unpacks the specific problem "representations" that are substantiated by these organisations. She argues that UNESCO and EU processes assign specific values and meanings to globalisation, and that these reflect a limited understanding of the complexity of globalisation. Finally, she considers two of the effects produced by these problem representations.

  20. Older adults' privacy considerations for vision based recognition methods of eldercare applications.

    PubMed

    Demiris, George; Oliver, Debra Parker; Giger, Jarod; Skubic, Marjorie; Rantz, Marilyn

    2009-01-01

    This study aims to explore older adults' privacy considerations for technology based monitoring applications in eldercare that use video systems. It specifically aims to introduce alternative vision based tools and identify whether distorting or "anonymizing" captured images affect older adults' privacy concerns and willingness to allow such an application to be installed in their residence. Ten residents of an independent retirement community were recruited to participate in a series of scenarios. Each scenario involved a daily activity such as sitting in the living room and having a visitor, or preparing a snack. These sessions were video-recorded using different image processing and extraction approaches. Follow-up in-depth interviews with participants were conducted after a demonstration of the captured images. Findings indicate that shape extraction can alleviate privacy concerns associated with the use of cameras. Participants expressed no privacy concerns with silhouette images and emphasized the importance of anonymity in the video sequences. They furthermore expressed the desire to control system operation by being able to turn a vision-based system off and on, and also determine who has access to the collected information.

  1. [Family caregiver issues: gender, privacy, and public policy perspectives].

    PubMed

    Lee, I; Chou, Fan-Hao; Chen, Chung-Hey

    2011-04-01

    Due to the phenomenon of Taiwan'saging population has made, long-term care has become an issue of increasingly emphasized importance. According to the statistics, the family takes responsibility for most long-term care duties and more than 70% of primary family caregivers are female. In the past, because of gender-based divisions of labor and gender role expectations made, it was taken for granted that females would be the socially preferred family caregivers. Those men who devoting in themselves to such work were regarded as a rare precious. As such, family care signified entailed different life experiences for males and females. Over the years, amendments to the civil code have recognized family care contributions, and the allowance for caregivers underlines that care responsibilities have shifted away from the family to society. Traditional gender divisions of labor today are significantly more blurred; family structures have become smaller in size; female labor in the workplace has increased; and ten-year long-term care plans and long-term care insurance have been successively implemented. These transformations will make labor outsourcing more and more popular and transform family care from a private problem to a pubic policy issue. In the future, family caregivers require consideration and support on a sustained basis. It is also important to improve and monitor the quality of care services. Nurses, the major professional members of long-term care teams, should be concerned over the issue of family care while providing nursing care. They should include family caregivers in the care plan so that they can make sure that patients receive comprehensive and constant care in order to enhance the overall quality of nursing care.

  2. Development, Regional Training Policy and Adult Education.

    ERIC Educational Resources Information Center

    Scheffknecht, J. J.

    Interest in a regional and local approach to vocational training and adult education is increasing throughout the member nations of the Council of Europe. This is largely a result of the changing European economic order and the new internationalization of industrial strategies. Particularly needed is a targeted local and regional policy for the…

  3. Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies

    PubMed Central

    Fernández-Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    Background Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information. Objective To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. Methods We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. Results The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users’ accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Conclusions Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low. PMID:22917868

  4. Prospects for Adult Literacy Policy in British Columbia.

    ERIC Educational Resources Information Center

    Darville, Richard

    1989-01-01

    Intended to assist in the formulation of effective policies for adult literacy in British Columbia, this paper reviews the current discussion of adult literacy policy and programming across Canada. It also reviews existing policies in Canada and in British Columbia, in education ministries, and in other ministries with interests and activities…

  5. Debating Global Polity, Policy Crossing, and Adult Education

    ERIC Educational Resources Information Center

    Milana, Marcella

    2015-01-01

    This article revisits the concept of "global polity" as a useful conceptual tool for studying public policy development in adult education. First, it describes the relations between polity, policy, and praxis and how these are addressed in adult education research. Then, it reviews how policy is conceptualized in terms of material and…

  6. Navigating State and Federal Student Privacy Laws to Design Educationally Sound Parental Notice Policies

    ERIC Educational Resources Information Center

    Baker, Thomas R.

    2008-01-01

    This chapter describes the relationship between federal student privacy laws and state privacy laws, and identifies the changes in the federal law over the last ten years affecting disclosure to parents of college students. Recent litigation on health emergencies is outlined and the limited rights of college students not yet eighteen years of age…

  7. Policies to Promote Adult Education and Postsecondary Alignment

    ERIC Educational Resources Information Center

    Strawn, Julie

    2007-01-01

    This Policy Brief is intended to help the National Commission on Adult Literacy consider state and federal policy strategies that hold promise for increasing the number of lower-skilled adults, including those with limited English skills, who earn postsecondary credentials that can open the door to family-supporting jobs and careers. It examines…

  8. Educating Older Adults: Discourses, Ideologies & Policies 1999-2005

    ERIC Educational Resources Information Center

    Tobias, Robert

    2006-01-01

    This article tells the story of policies relevant to education, ageism and older adults between 1999 and 2005. It follows an article published in a previous "New Zealand Journal of Adult Learning" that described and critiqued policy developments between the 1980s and 2001. The story is located in the context of ongoing historical…

  9. Policy to Performance Toolkit: Transitioning Adults to Opportunity

    ERIC Educational Resources Information Center

    Alamprese, Judith A.; Limardo, Chrys

    2012-01-01

    The "Policy to Performance Toolkit" is designed to provide state adult education staff and key stakeholders with guidance and tools to use in developing, implementing, and monitoring state policies and their associated practices that support an effective state adult basic education (ABE) to postsecondary education and training transition…

  10. Closing the Barn Door: The Effect of Parental Supervision on Canadian Children's Online Privacy

    ERIC Educational Resources Information Center

    Steeves, Valerie; Webster, Cheryl

    2008-01-01

    Empirical data from a large sample of Canadian youth aged 13 to 17 years suggest that, although the current privacy policy framework is having a positive effect on the extent to which young people are complying with the types of behavior promoted by adults as privacy protective, its primary focus on parental supervision is inadequate to fully…

  11. Research That Counts: OECD Statistics and "Policy Entrepreneurs" Impacting on Australian Adult Literacy and Numeracy Policy

    ERIC Educational Resources Information Center

    Black, Stephen; Yasukawa, Keiko

    2016-01-01

    This paper analyses research that has impacted on Australia's most recent national policy document on adult literacy and numeracy, the National Foundation Skills Strategy (NFSS). The paper draws in part on Lingard's 2013 paper, "The impact of research on education policy in an era of evidence-based policy", in which he outlines the…

  12. Adult Literacy: Images, Accounts and the Policy Process.

    ERIC Educational Resources Information Center

    Darville, Richard

    1989-01-01

    Discusses a literacy research project that aims to produce a critical review of existing policy-related knowledge about adult literacy and illiteracy. Reports on the major themes of this review. (JOW)

  13. Older adult perceptions of smart home technologies: implications for research, policy & market innovations in healthcare.

    PubMed

    Coughlin, J; D'Ambrosio, L A; Reimer, B; Pratt, M R

    2007-01-01

    Advances in information communications technology and related computational power are providing a wide array of systems and related services that form the basis of smart home technologies to support the health, safety and independence of older adults. While these technologies offer significant benefits to older people and their families, they are also transforming older adults into lead adopters of a new 24/7 lifestyle of being monitored, managed, and, at times, motivated, to maintain their health and wellness. To better understand older adult perceptions of smart home technologies and to inform future research a workshop and focus group was conducted with 30 leaders in aging advocacy and aging services from 10 northeastern states. Participants expressed support of technological advance along with a variety of concerns that included usability, reliability, trust, privacy, stigma, accessibility and affordability. Participants also observed that there is a virtual absence of a comprehensive market and policy environment to support either the consumer or the diffusion of these technologies. Implications for research, policy and market innovation are discussed.

  14. Challenges for Policy and Standards for Adult and Higher Education

    ERIC Educational Resources Information Center

    Wheelan, Belle S.

    2016-01-01

    This chapter addresses educational policy as a force that contemporary adult education would be required to reckon with from the point of view of an accreditor. It identifies the issues and projects shifts that are currently taking place in higher education policy at the national, state, and regional levels.

  15. Adult Individual Criminal Records and the News Media: Inherent Problems for Access and Privacy.

    ERIC Educational Resources Information Center

    Wright, Jay B.

    Public access to criminal records, facilitated by the use of computerized information storage and retrieval systems, sometimes appears to infringe on individual rights of privacy. Examples may be cited to show that the records compiled on individuals do not always present an accurate picture, due to factual inaccuracies, incomplete information, or…

  16. Building Sustainable Adult Literacy Provision: A Review of International Trends in Adult Literacy Policy and Programs

    ERIC Educational Resources Information Center

    McKenna, Rosa; Fitzpatrick, Lynne

    2004-01-01

    This document summarizes an extensive study of policies and practices in adult literacy and adult basic education in a number of countries undertaken by Rosa McKenna and Lynne Fitzpatrick. The original study contains considerably greater detail and analyses issues on a country-by-country basis. The countries studied--Canada, the Republic of…

  17. Policy Implications of Gallup Data on Adult Employed Workers.

    ERIC Educational Resources Information Center

    Hoyt, Kenneth B.

    1989-01-01

    Discusses results of a survey of 735 working adults concerning their perceptions of the relevance of their education to their work. Policy implications drawn from this survey include (1) rethink reform; (2) strengthen ties between education and work; (3) college is not for everyone; (4) motivate with recognition; and (5) begin planning early. (CH)

  18. Adult Education--The Legislative and Policy Environment.

    ERIC Educational Resources Information Center

    Haddad, Sergio, Ed.

    The 10 studies in this volume present a sampling of policy and legislation relating to adult learning in various parts of the world. The articles resulted from an international research project conducted at the UNESCO Institute for Education in conjunction with the University of Florence. They were written by the following contributors: Robb Mason…

  19. Theme with Variations: Social Policy, Community Care and Adult Education.

    ERIC Educational Resources Information Center

    Lavender, Peter

    1990-01-01

    Changes in British social policy regarding community health care has implications for local education agency (LEA) providers of adult continuing education. LEAs will either have a role in providing staff training and other learning opportunities, will be forced to provide cheaper forms of community care, or will be ignored altogether. (SK)

  20. Professional Development for Adult Education Instructors. State Policy Update.

    ERIC Educational Resources Information Center

    Tolbert, Michelle

    This State Policy Update provides background on professional development (PD) in adult education. Section 2 describes survey methods used to document how states funded and designed their PD systems. Section 3 reviews data collected by the survey of state PD systems, highlighting PD activities in Kentucky, New York, Oregon, and Tennessee. It…

  1. Public Records--Access, Privacy, and Public Policy: A Discussion Paper.

    ERIC Educational Resources Information Center

    Gellman, Robert

    1995-01-01

    Reviews policy issues surrounding decisions by governments to make available or to withhold information from government files that can be linked to identifiable individuals. Outlines the debate over access to public records, identifies policies that impact on disclosure decisions, and discusses options and approaches to address access and privacy…

  2. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section 332.2 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form...

  3. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the...

  4. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  5. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  6. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  7. Universal Individualism and Constructions of the Adult Student in Scottish Adult Education Policy

    ERIC Educational Resources Information Center

    Galloway, Vernon

    2005-01-01

    This article argues that adult education policy in Scotland has been constructed, in particular ways which resonate with significant cultural themes, lending them a currency which appeals to a deep sense of identity. Using the theme of universal individualism, the paper considers how ideas of community and education have been used to maintain the…

  8. Pass the Cookies and Uphold the Privacy.

    ERIC Educational Resources Information Center

    Guenther, Kim

    2001-01-01

    Considers how privacy issues related to online profiling affect library patrons and what librarians should do to protect them. Discusses the need for a privacy policy and provides guidelines from the OECD (Organisation for Economic Cooperation and Development) privacy statement generator that can be adapted for libraries. (LRW)

  9. Reinterpreting Lifelong Learning: Meanings of Adult Education Policy in Portugal, 1999-2010

    ERIC Educational Resources Information Center

    Guimaraes, Paula

    2013-01-01

    This article analyses Portugal's adult education policy between 1999 and 2010. Our empirical material consists of Portuguese as well as supranational policy documents. We use a theoretical framework which distinguishes three models of public policy, with different views on the roles of public policy and of education: (1) participative…

  10. Elements d'une Politique en Education des Adultes 1970, II (Elements of an Adult Education Policy, 1970, II).

    ERIC Educational Resources Information Center

    Canadian Inst. for Adult Education, Montreal (Quebec).

    Based on a work paper on adult and continuing education policy formation for Quebec, this document modifies and supplements recommendations on the unemployed and other high priority clientele groups, adult education content and methodology, the training of adult educators, responsibilities of sponsoring bodies (including the mass media), Federal…

  11. Digital Privacy: Toward a New Politics and Discursive Practice.

    ERIC Educational Resources Information Center

    Doty, Philip

    2001-01-01

    Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…

  12. Policy Silos and Red Ochre Men: An Examination of a Decade of Adult Literacy Policy and Program Development in Australia

    ERIC Educational Resources Information Center

    Searle, Jean

    2004-01-01

    This article reports on some of the data gathered for an Australian research project which investigated "What does the past tell us about adult literacy and numeracy policy, provision and practice?" First, the key national and some state policies which have informed program development in Australia will be outlined in order to highlight…

  13. De Facto Language Policy in Legislation Defining Adult Basic Education in the United States

    ERIC Educational Resources Information Center

    Vanek, Jenifer

    2016-01-01

    This paper investigates the impact of differing interpretation of federal education policy in three different states. The policy, the Workforce Investment Act Title II, has defined the services provided for adult English language learners (ELLs) enrolled in Adult Basic Education programs in the United States since it was passed in 1998. At the…

  14. A Policy Analysis of Adult Literacy Education in India: Across the Two National Policy Reviews of 1968 and 1986.

    ERIC Educational Resources Information Center

    Bhola, H. S.

    There have been few, if any, significant changes in educational policy regarding the provision of adult literacy education in India over the past two decades. The changes that have taken place in India's adult literacy programs have occurred in the realm of technology rather than ideology, thereby supporting a continuity in the existing…

  15. The Impact of Irish Policy and Legislation on How Adults with Learning Disabilities Make Choices

    ERIC Educational Resources Information Center

    Carey, Eileen; Griffiths, Colin

    2016-01-01

    This paper reflects the impact of policy and legislation in the context of how adults with learning disabilities make choices. Following an overview of policies which have improved choice for people with learning disability in the United Kingdom, this paper reviews "choice" in current Irish policy and legislation. This paper, while…

  16. Bridging Canadian Adult Second Language Education and Essential Skills Policies: Approach with Caution

    ERIC Educational Resources Information Center

    Gibb, Tara L.

    2008-01-01

    Employing critical discourse analysis (CDA), this paper examines the attempt to bridge a Canadian adult second language policy with an employment skills policy. The result is a third policy intended to improve language education and employment skills training for immigrants. The analysis reveals that the knowledge economy and human capital theory…

  17. Customer privacy on UK healthcare websites.

    PubMed

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  18. Technology, Privacy, and Electronic Freedom of Speech.

    ERIC Educational Resources Information Center

    McDonald, Frances M.

    1986-01-01

    Explores five issues related to technology's impact on privacy and access to information--regulation and licensing of the press, electronic surveillance, invasion of privacy, copyright, and policy-making and regulation. The importance of First Amendment rights and civil liberties in forming a coherent national information policy is stressed.…

  19. Location Privacy

    NASA Astrophysics Data System (ADS)

    Meng, Xiaofeng; Chen, Jidong

    With rapid development of sensor and wireless mobile devices, it is easy to access mobile users' location information anytime and anywhere. On one hand, LBS is becoming more and more valuable and important. On the other hand, location privacy issues raised by such applications have also gained more attention. However, due to the specificity of location information, traditional privacy-preserving techniques in data publishing cannot be used. In this chapter, we will introduce location privacy, and analyze the challenges of location privacy-preserving, and give a survey of existing work including the system architecture, location anonymity and query processing.

  20. 16 CFR 313.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual...

  1. 12 CFR 716.5 - Annual privacy notice to members required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Annual privacy notice to members required. 716... UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.5 Annual privacy... members that accurately reflects your privacy policies and practices not less than annually during...

  2. 12 CFR 332.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Delivering privacy and opt out notices. 332.9... GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt...

  3. 17 CFR 160.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Annual privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during...

  4. 12 CFR 716.5 - Annual privacy notice to members required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Annual privacy notice to members required. 716... UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.5 Annual privacy... members that accurately reflects your privacy policies and practices not less than annually during...

  5. 16 CFR 313.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during...

  6. 17 CFR 160.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Initial privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual...

  7. 16 CFR 313.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during...

  8. 16 CFR 313.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during...

  9. 16 CFR 313.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual...

  10. 13 CFR 102.21 - Agency employees responsible for the Privacy Act of 1974.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... policies relating to information privacy such as the Privacy Act and the E-Government Act of 2002. (d) Chief, Freedom of Information/Privacy Acts (FOI/PA) Office oversees and implements the record access... ADMINISTRATION RECORD DISCLOSURE AND PRIVACY Protection of Privacy and Access to Individual Records Under...

  11. Recognition of Prior Learning as a Technique for Fabricating the Adult Learner: A Genealogical Analysis on Swedish Adult Education Policy

    ERIC Educational Resources Information Center

    Andersson, Per; Fejes, Andreas

    2005-01-01

    This article focuses on the recognition of prior learning and the figure of thought it represents in Swedish policy on adult education. It can be seen as a technique for governing the adult learner and a way of fabricating the subject. We are tracing this thought back in time to see how it has changed and what it consists of. The material analysed…

  12. Connecting Research, Policy, and Practice. Review of Adult Learning and Literacy, Volume 7

    ERIC Educational Resources Information Center

    Comings, John, Ed.; Garner, Barbara, Ed.; Smith, Christine, Ed.

    2007-01-01

    "Review of Adult Learning and Literacy: Connecting Research, Policy, and Practice, Volume 7" is the newest volume in a series of annual publications of the National Center for the Study of Adult Learning and Literacy (NCSALL) that address major issues, the latest research, and the best practices in the field of adult literacy and…

  13. Evidence-Based Policy-Making: The Usability of the Eurostat Adult Education Survey

    ERIC Educational Resources Information Center

    Boeren, Ellen

    2014-01-01

    This article reflects on European education policy which is driven by benchmarks and indicators. While the European benchmark on adult lifelong learning participation--15% to be achieved by 2020--is measured by the Labour Force Survey, the Eurostat Adult Education Survey (AES) was designed to better understand the topic of adult lifelong learning…

  14. The Regulatory Framework for Privacy and Security

    NASA Astrophysics Data System (ADS)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  15. Children's Privacy and Children's Copyright

    EPA Pesticide Factsheets

    This document establishes the policy for protecting the privacy of children on the EPA public access website and the EPA Intranet and also establishes policy on copyright issues related to works created by and submitted to EPA by children both online and offline.

  16. To Shape the Future: Towards a Framework for Adult Education Social Policy Research and Action.

    ERIC Educational Resources Information Center

    Quigley, B. Allan

    1993-01-01

    Compares three social policy models (market, progressive-liberal-welfare, social redistribution); links them to adult education models (vocational-behaviorist, liberal-humanist-progressive, liberatory/social reconstruction) and to sociological theories (structural functionalism and conflict theory). (SK)

  17. 32 CFR 310.5 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM DoD Policy § 310.5 Policy. It is DoD policy that: (a) The privacy of an individual is a personal... unwarranted invasions of their privacy. (2) The legal rights of individuals, as guaranteed by Federal...

  18. Privacy and Security of Criminal History Information. An Analysis of Privacy Issues.

    ERIC Educational Resources Information Center

    Trubow, George B.

    Policies and issues associated with the privacy and security of criminal history information are presented. The first chapter discusses general concepts regarding privacy and security of criminal justice information, including definitions of basic terms, considerations of interests requiring attention when developing policy, relevance of fair…

  19. An Analysis of NCAA Division 1 Student Athlete Social Media Use, Privacy Management, and Perceptions of Social Media Policies

    ERIC Educational Resources Information Center

    Snyder, Eric M.

    2013-01-01

    The intercollegiate athletic subculture knows very little about how social media policies are perceived by students-athletes. Athletic department administrators, conference commissioners, and the National Collegiate Athletic Association (NCAA) who are in charge of creating new policies lack any meaningful data to help understand or negotiate new…

  20. Privacy Act

    EPA Pesticide Factsheets

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  1. What was privacy?

    PubMed

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  2. Adult and Community Education Policy in Aotearoa New Zealand 2000-2014: Neoliberal Influences?

    ERIC Educational Resources Information Center

    Leach, Linda

    2014-01-01

    Changes in tertiary education policy in Aotearoa New Zealand in the last decade have impacted on adult and community education (ACE). Marginalized and understood as non-formal education at the turn of the century, ACE is now part of the "tertiary landscape". It is explicitly steered by education policy, its role severely narrowed, its…

  3. Adult Education in the Limpopo Province of South Africa: Challenges for Policy Implementation

    ERIC Educational Resources Information Center

    Zeelen, J.; Rampedi, M.; de Jong, G.

    2011-01-01

    In this article we report and reflect on a study about the problems encountered in the implementation of adult education policies in the Limpopo province of South Africa. We used the model of intergovernmental policy implementation of Van Horn and Van Meter as a theoretical framework. We reflect on this study and link the findings with more recent…

  4. Global, Regional and Local Influences on Adult Literacy Policy in England

    ERIC Educational Resources Information Center

    Hamilton, Mary

    2014-01-01

    This paper explores the relationship between global, regional and local influences on adult literacy policy and practice in the UK through a discourse analysis of policy-related texts. The analysis is framed by theoretical perspectives from literacy studies and socio-material theory. The paper identifies a number of specific features in the UK…

  5. Social Network Privacy via Evolving Access Control

    NASA Astrophysics Data System (ADS)

    di Crescenzo, Giovanni; Lipton, Richard J.

    We study the problem of limiting privacy loss due to data shared in a social network, where the basic underlying assumptions are that users are interested in sharing data and cannot be assumed to constantly follow appropriate privacy policies. Note that if these two assumptions do not hold, social network privacy is theoretically very easy to achieve; for instance, via some form of access control and confidentiality transformation on the data.

  6. What's Going On? An Overview of Adult Education Policies in Spain

    ERIC Educational Resources Information Center

    Lucio-Villegas, Emilio

    2012-01-01

    In this paper, I attempt to present the state of adult education in Spain. Adult education in Spain is not unlike that of other countries in Europe in that it focuses on the policies and practices of lifelong learning rather than on the perspectives of people and communities. However, Spain has two specific characteristics that are distinctive…

  7. Adult Education and the Challenges of Regional Development: Policy and Sustainability in North Denmark

    ERIC Educational Resources Information Center

    Rasmussen, Palle; Staugaard, Hans Jørgen

    2016-01-01

    Adult education is governed at many levels--internationally, nationally and locally. The authors of this paper look at the challenges, structures and practices of adult education policy at the local level, more specifically in North Denmark (Northern Jutland), one of the five administrative regions of the Danish nation-state. In many ways, the…

  8. The Board of Education and Policy for Adult Education up to the Second World War.

    ERIC Educational Resources Information Center

    Marriott, Stuart

    1998-01-01

    Summarizes the attempts by the Board of Education in England to develop policy in relation to adult education and "further education" as a whole that began in 1909 and ended by World War II. Identifies the emergence of modern adult education stemming from developments in municipal evening schools and the university extension movement.…

  9. Literacy for the Twenty-First Century: Research, Policy, Practices, and the National Adult Literacy Survey.

    ERIC Educational Resources Information Center

    Smith, M. Cecil, Ed.

    This book focuses on results from secondary analyses of the National Adult Literacy Survey (NALS) and implications of these analyses for policy, practice, and further research on adult literacy. Part I contains an introduction and three additional chapters that provide a substantive summary of the NALS and its purposes: "Introduction: Adult…

  10. Impact of Attendance Policy on Adult College Learners

    ERIC Educational Resources Information Center

    Carr, Tracinal S.

    2014-01-01

    This qualitative evaluation focused on the problem of student attrition at a northern California college, its attendance policy, the policy's impact on previous students' decisions to persist in school, and on administrators' attempts to increase retention. The purpose for this study was to evaluate the participants' perceptions about their…

  11. Adult Literacy: Monitoring and Evaluation for Practice and Policy

    ERIC Educational Resources Information Center

    Wagner, Daniel A.

    2008-01-01

    With the advent of the UN Literacy Decade launched in 2003, there is increased emphasis on monitoring and evaluation of adult literacy around the globe. The present paper presents an overview of the main approaches that have been taken to measure adult literacy within and across countries. A particular focus of the present review is to compare and…

  12. Globalisation, Southern Europe and European Adult Education Policy

    ERIC Educational Resources Information Center

    Borg, Carmel; Mayo, Peter

    2008-01-01

    In this article, the authors define some of the most evident features of globalisation from below, which they distinguish from hegemonic globalisation, and draw out its implications for adult education. They draw out the implications for European adult education that emerge from the different features of these two types of globalisations. They…

  13. Footprints near the Surf: Individual Privacy Decisions in Online Contexts

    ERIC Educational Resources Information Center

    McDonald, Aleecia M.

    2010-01-01

    As more people seek the benefits of going online, more people are exposed to privacy risks from their time online. With a largely unregulated Internet, self-determination about privacy risks must be feasible for people from all walks of life. Yet in many cases decisions are either not obvious or not accessible. As one example, privacy policies are…

  14. Invited Papers on Privacy: Law, Ethics, and Technology.

    ERIC Educational Resources Information Center

    American Federation of Information Processing Societies, Montvale, NJ.

    These four papers were presented as background at a national symposium exploring the relationships among law, ethics, and technology as they relate to the individual's informational privacy. George B. Trubow's "The Development and Status of 'Informational Privacy' Law and Policy in the United States" discusses privacy as it relates to the…

  15. 12 CFR 332.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Initial privacy notice to consumers required... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear...

  16. 12 CFR 332.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Annual privacy notice to customers required... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.5 Annual privacy notice to customers required. (a)(1) General rule. You must provide a clear...

  17. 12 CFR 332.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Information to be included in privacy notices... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.6 Information to be included in privacy notices. (a) General rule. The initial, annual and revised...

  18. 12 CFR 332.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Initial privacy notice to consumers required... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear...

  19. 12 CFR 332.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Initial privacy notice to consumers required... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear...

  20. Adult Literacy, Numeracy and Language: Policy, Practice and Research

    ERIC Educational Resources Information Center

    Tett, Lyn, Ed.; Hamilton, Mary, Ed.; Hillier, Yvonne, Ed.

    2006-01-01

    This book explores the social practice of literacy, numeracy and language and its implications for teaching and learning adult basic skills. Leading international experts argue that literacy, numeracy and language are more than just a set of skills or techniques, but are shaped by the social and cultural context within which they are taking place;…

  1. Patient privacy and social media.

    PubMed

    Hader, Amy L; Brown, Evan D

    2010-08-01

    Healthcare providers using social media must remain mindful of professional boundaries and patients' privacy rights. Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics.

  2. 76 FR 59073 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-23

    ...: Consistent with the Privacy Act (PA), the Central Intelligence Agency (CIA) has undertaken and completed a... clearly reflect the current CIA organizational structure and policies and practices, and to eliminate... Act (PA), the CIA has undertaken and completed a review of its public PA regulations. As a result...

  3. Privacy in the Genomic Era.

    PubMed

    Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W; Fellay, Jacques; Gunter, Carl A; Hubaux, Jean-Pierre; Malin, Bradley A; Wang, Xiaofeng

    2015-09-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.

  4. Privacy in the Genomic Era

    PubMed Central

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  5. Support for indoor tanning policies among young adult women who indoor tan.

    PubMed

    Mays, Darren; Murphy, Sarah E; Bubly, Rachel; Atkins, Michael B; Tercyak, Kenneth P

    2016-12-01

    The purpose of this study to examine support for indoor tanning policies and correlates of policy support among young adult women who indoor tan. Non-Hispanic white women ages 18-30 who indoor tanned in the past year (n = 356, M 23.3 age, SD 3.1) recruited in the Washington, DC area from 2013 to 2016 completed measures of indoor tanning behaviors, attitudes, perceptions, beliefs, and policy support. Most women in the sample supported policies to prevent children under the age of 18 from indoor tanning (74.0 %) and stronger warnings about the risks of indoor tanning on tanning devices (77.6 %); only 10.1 % supported a total ban. In multivariable analyses, support for individual indoor tanning policies varied by demographics (e.g., age), frequent indoor tanning behavior, indoor tanning beliefs, and risk perceptions. Non-Hispanic white young adult women who indoor tan, the primary consumers of indoor tanning, and a high-risk population, largely support indoor tanning prevention policies implemented by many state governments and those currently under review for national enactment. Given low levels of support for a total indoor tanning ban, support for other potential policies (e.g., increasing the minimum age to 21) should be investigated to inform future steps to reduce indoor tanning and the associated health risks.

  6. Will our children be healthy adults? Applying science to public health policy.

    PubMed

    Law, Catherine

    2010-12-01

    Cardiovascular disease is predicted to be a leading cause of death and disability worldwide for the foreseeable future. Observational studies link a variety of prevalent early life experiences (for example, smoking in pregnancy, child poverty) to increased risk of adult cardiovascular disease. Experimental animal studies suggest plausible causal relationships. However, there has been little consideration of how to use this wealth of information to benefit children's futures. Policy documents have drawn on research evidence to recognise that early experience influences life chances, the development of human capital, and long-term health. This has led to a general policy emphasis on prevention and early intervention. To date, there are few examples of the evidence base being useful in shaping specific policies, despite potential to do so, and some examples of policy misunderstanding of science. Minor changes to the perspectives of epidemiological research in this area might greatly increase the potential for evidence-based policy.

  7. Standards for health information technology to ensure adolescent privacy.

    PubMed

    Blythe, Margaret J; Del Beccaro, Mark A

    2012-11-01

    Privacy and security of health information is a basic expectation of patients. Despite the existence of federal and state laws safeguarding the privacy of health information, health information systems currently lack the capability to allow for protection of this information for minors. This policy statement reviews the challenges to privacy for adolescents posed by commercial health information technology systems and recommends basic principles for ideal electronic health record systems. This policy statement has been endorsed by the Society for Adolescent Health and Medicine.

  8. Review of Adult Learning and Literacy, Volume 6. Connecting Research, Policy and Practice: A Project of the National Center for the Study of Adult Learning and Literacy

    ERIC Educational Resources Information Center

    Comings, John, Ed.; Garner, Barbara, Ed.; Smith, Cristine, Ed.

    2006-01-01

    "Review of Adult Learning and Literacy: Connecting Research, Policy, and Practice, Volume 6," is the newest volume in a series of annual publications of the National Center for the Study of Adult Learning and Literacy (NCSALL) that address major issues, the latest research, and the best practices in the field of adult literacy and…

  9. From Data Privacy to Location Privacy

    NASA Astrophysics Data System (ADS)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  10. Accountability in Teenage Dating Violence: A Comparative Examination of Adult Domestic Violence and Juvenile Justice Systems Policies

    ERIC Educational Resources Information Center

    Zosky, Diane L.

    2010-01-01

    Unlike in the adult criminal justice system, where domestic violence policies hold perpetrators accountable for their violence, the juvenile justice system rarely addresses teenage dating violence. Although the adult criminal justice system has pursued policies toward intimate partner violence grounded on a "zero tolerance" ideology, the juvenile…

  11. Intergenerational Transfers to Adult Children in Europe: Do Social Policies Matter?

    ERIC Educational Resources Information Center

    Brandt, Martina; Deindl, Christian

    2013-01-01

    Understanding the role of social policies in intergenerational transfers from old to young people is especially important in times of population aging. This paper focuses on the influences of social expenditures and social services on financial support and on practical help from older parents to their adult children based on the first two waves…

  12. Education Community Dialogue towards Building a Policy Agenda for Adult Education: Reflections Drawn from Experience

    ERIC Educational Resources Information Center

    Hirano, Tatiana Lotierzo; Giannecchini, Laura; Magalhaes, Giovanna Mode; Munhoz, Fabiola; Croso, Camilla

    2013-01-01

    In this article, we share the experience of the "Amplifying Voices" initiative. Held by the Latin American Campaign for the Right to Education (CLADE) within the scope of public policy advocacy, "Amplifying Voices" applies the principles of consultation and dialogue in youth and adult education communities, aiming at a stronger…

  13. Universal Basic Education in Nigeria: Adult Literacy Practice and Policy Reform Needs

    ERIC Educational Resources Information Center

    Kazeem, Kolawole; Oduaran, Akpovire

    2006-01-01

    Innovative policies and practices in mainstreaming adult education on the basis of UNESCO's model of Education for All (EFA) among member states take different forms. In Nigeria, EFA has been conceptualised as the Universal Basic Education (UBE) programme. UBE has dominated some of the major political options that governments have had to make in…

  14. Physical Interventions for Adults with Intellectual Disabilities: Survey of Use, Policy, Training and Monitoring

    ERIC Educational Resources Information Center

    Deveau, Roy; McGill, Peter

    2009-01-01

    Background: Perceived problems around the use of physical intervention (PI) to manage challenging behaviour have led to UK initiatives to encourage policy development and accredited training. However, information on PI use and the impact of these initiatives remains limited. Method: Adult residential services within an English region were sent a…

  15. Adult Literacy and Public Policy: Report of an International Seminar (Toronto, Ontario, Canada, February 1988).

    ERIC Educational Resources Information Center

    Darville, Richard

    1988-01-01

    This report on a seminar on adult literacy and public policy aims to make available for discussion current significant issues in the relationship between literacy and the economy, including matters that extend well beyond the institutional boundaries of the economy. This document summarizes a presentation by Jarl Bengtsson, Head of the Centre for…

  16. The Preference for Privacy: In Search of the Social Locations of Privacy Orientations.

    ERIC Educational Resources Information Center

    Gandy, Oscar H., Jr.

    A study was conducted to develop some understanding of how social experience might be related to public expectations of rights to privacy. A telephone questionnaire was developed which sought information about respondent knowledge, attitudes, and behavior regarding privacy and personal information. A national survey of adults over the age of 18…

  17. Rite of passage? Why young adults become uninsured and how new policies can help.

    PubMed

    Collins, Sara R; Schoen, Cathy; Tenney, Katie; Doty, Michelle M; Ho, Alice

    2005-05-01

    Young adults (ages 19 to 29) are one of the largest and fastest-growing segments of the U.S. population without health insurance: more than 13 million lacked coverage in 2003, an increase of 2.2 million since 2000. Young adults often lose coverage under their parents' policies at age 19, or when they graduate from high school or college. Nearly two of five college graduates and one-half of high school graduates who do not go on to college will be uninsured for a period during the first year after graduation. Three policy changes could extend coverage to uninsured young adults and prevent others from losing it: extending eligibility for dependents under private coverage through age 23; extending eligibility for Medicaid and the State Children's Health Insurance Program to age 23; and ensuring that colleges and universities require full-and part-time students to have insurance, and that they offer coverage to both.

  18. Bureaucratic Response to Policy Change: Implementation of Adult Education Policy in Norway

    ERIC Educational Resources Information Center

    Engesbak, Heidi; Stubbe, Tor Arne

    2008-01-01

    Our main concern was to investigate the implementation of the new "Education Act", giving adults the statutory right to complete upper secondary education. Referring to a "top-down" and a "bottom-up" perspective we have investigated how the representatives of the county authorities (the bureaucrats) interpret and…

  19. Adult Dental Health Survey 2009: implications of findings for clinical practice and oral health policy.

    PubMed

    Watt, R G; Steele, J G; Treasure, E T; White, D A; Pitts, N B; Murray, J J

    2013-01-01

    This is the final paper in a series reporting on the results of the 2009 Adult Dental Health Survey. Since 1968 national adult surveys have been repeated every decade with broadly similar methods providing a unique overview of trends in oral health over a 40-year period. This paper aims to explore the implications for dentists and oral health policy of the key results from the Adult Dental Health Survey 2009. Although repeat, cross-sectional, epidemiological surveys provide very valuable data on trends in disease patterns, they do not provide answers to test causal relationships and therefore cannot identify the causes for the significant improvements in oral health over the last 40 years. Evidence would indicate, however, that broad societal shifts in population norms and behaviours, combined with changes in clinical diagnostic criteria, treatment planning and clinical procedures are the main reasons for the changes that have taken place. Key implications of the survey results include the need to monitor, support and maintain the good state of oral health of the increasing proportion of younger adults with relatively simple treatment needs. A smaller number of young and middle aged adults but a significant proportion of older adults will have far more complex treatment needs requiring advanced restorative and periodontal care. Future oral health policy will need to address oral health inequalities, encourage skill mix and promote and facilitate the dental profession to deliver appropriate and high quality care relevant to the needs of their local population.

  20. Privacy and human behavior in the age of information.

    PubMed

    Acquisti, Alessandro; Brandimarte, Laura; Loewenstein, George

    2015-01-30

    This Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and behavioral sciences: people's uncertainty about the consequences of privacy-related behaviors and their own preferences over those consequences; the context-dependence of people's concern, or lack thereof, about privacy; and the degree to which privacy concerns are malleable—manipulable by commercial and governmental interests. Organizing our discussion by these themes, we offer observations concerning the role of public policy in the protection of privacy in the information age.

  1. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security.... The program is no longer in operation within the Transportation Security Administration and associated..., Privacy Policy and Compliance, TSA-36, Transportation Security Administration, 601 South 12th......

  2. Privacy and security in Pennsylvania: ensuring privacy and security of health information exchange in Pennsylvania.

    PubMed

    Marshall, Glen F; Gillespie, William; Fox, Steven J

    2009-01-01

    Though HIPAA addresses privacy and security on a nationwide basis, state laws and regulations vary. This paper describes the landscape for privacy and security in Pennsylvania and its key elements. It addresses common myths and misunderstandings and provides an overview of what is actually required to provide needed protections privacy policies from government and the stakeholders; risk analysis and management; and technical and non-technical means to enforce policies and mitigate risks. Also covered are the enablers, barriers and key recommendations for the future.

  3. Formal Methods for Privacy

    DTIC Science & Technology

    2009-09-01

    Against a vast and rich canvas of diverse types of privacy rights and violations, we argue technology’s dual role in privacy : new technologies raise...new threats to privacy rights and new technologies can help preserve privacy . Formal methods, as just one class of technology , can be applied to...differs from what a teenager thinks, and vice versa [18]. New technologies give rise to new privacy concerns. Warren and Brandeis’s 1890 seminal paper

  4. Users or Students? Privacy in University MOOCS.

    PubMed

    Jones, Meg Leta; Regner, Lucas

    2016-10-01

    Two terms, student privacy and Massive Open Online Courses, have received a significant amount of attention recently. Both represent interesting sites of change in entrenched structures, one educational and one legal. MOOCs represent something college courses have never been able to provide: universal access. Universities not wanting to miss the MOOC wave have started to build MOOC courses and integrate them into the university system in various ways. However, the design and scale of university MOOCs create tension for privacy laws intended to regulate information practices exercised by educational institutions. Are MOOCs part of the educational institutions these laws and policies aim to regulate? Are MOOC users students whose data are protected by aforementioned laws and policies? Many university researchers and faculty members are asked to participate as designers and instructors in MOOCs but may not know how to approach the issues proposed. While recent scholarship has addressed the disruptive nature of MOOCs, student privacy generally, and data privacy in the K-12 system, we provide an in-depth description and analysis of the MOOC phenomenon and the privacy laws and policies that guide and regulate educational institutions today. We offer privacy case studies of three major MOOC providers active in the market today to reveal inconsistencies among MOOC platform and the level and type of legal uncertainty surrounding them. Finally, we provide a list of organizational questions to pose internally to navigate the uncertainty presented to university MOOC teams.

  5. The role of adult education and learning policy in fostering societal sustainability

    NASA Astrophysics Data System (ADS)

    Milana, Marcella; Rasmussen, Palle; Holford, John

    2016-10-01

    The idea of "sustainability" as a core value has slowly permeated policy and practice at governmental and institutional levels, in public and private policy. However, at times when social and economic crises have revealed the fragility of existing institutions and policies, it is important to consider how sustainability is - and could be - integrated into educational policies. In this theoretical contribution to a special issue on "Societal sustainability", the authors draw on available literature and knowledge. They begin their paper by summarising the conditions under which the concept of "sustainability" entered political discourse in the early 1970s and outline how it has influenced educational research. They then introduce the longstanding debate about the relative role of tradition (in terms of traditional cultural and social order) and change (in terms of efforts to provide learning opportunities for everyone) in adult education. Finally, they argue for a rethinking of the ontology of sustainability: this, they suggest, can shed new light on its relationships with adult education and learning and social justice.

  6. Rite of passage? Why young adults become uninsured and how new policies can help.

    PubMed

    Collins, Sara R; Schoen, Cathy; Tenney, Katie; Doty, Michelle M; Ho, Alice

    2004-05-01

    Young adults (ages 19 to 29) are one of the largest and fastest-growing segments of the population without health insurance in the United States. Young adults often lose coverage under their parents' policies at age 19, or when they graduate from high school or college. Nearly two of five college graduates and one-half of high school graduates who do not go on to college will endure a time without health insurance in the first year after graduation. Three policy changes could extend coverage to uninsured young adults and prevent others from losing coverage: extending eligibility for dependents under private coverage through age 23; extending eligibility for Medicaid/CHIP public coverage to age 23; and ensuring that colleges and universities require full-time and part-time students to have insurance, and that they offer coverage to both. Young adults are a relatively low-cost population to insure, and keeping them in insurance pools may lower the average costs of group coverage.

  7. Minimizing Air Pollution Exposure: A Practical Policy to Protect Vulnerable Older Adults from Death and Disability

    PubMed Central

    Woodward, Nick; Levine, Morgan

    2015-01-01

    Air pollution causes an estimated 200,000 deaths per year in the United States alone. Older adults are at greater risk of mortality caused by air pollution. Here we quantify the number of older adult facilities in Los Angeles County that are exposed to high levels of traffic derived air pollution, and propose policy solutions to reduce pollution exposure to this vulnerable subgroup. Distances between 20,362 intersections and 858 elder care facilities were estimated, and roads or highways within 500 of facilities were used to estimate traffic volume exposure. Of the 858 facilities, 54 were located near at least one major roadway, defined as a traffic volume over 100,000 cars/day. These 54 facilities house approximately 6,000 older adults. Following standards established for schools, we recommend legislation mandating the placement of new elder care facilities a minimum of 500 feet from major roadways in order to reduce unnecessary mortality risk from pollution exposure. PMID:26640413

  8. A multimethod approach to examining usability of Web privacy polices and user agents for specifying privacy preferences.

    PubMed

    Proctor, Robert W; Vu, Kim-Phuong L

    2007-05-01

    Because all research methods have strengths and weaknesses, a multimethod approach often provides the best way to understand human behavior in applied settings. We describe how a multimethod approach was employed in a series of studies designed to examine usability issues associated with two aspects of online privacy: comprehension of privacy policies and configuration of privacy preferences for an online user agent. Archival research, user surveys, data mining, quantitative observations, and controlled experiments each yielded unique findings that, together, contributed to increased understanding of online-privacy issues for users. These findings were used to evaluate the accessibility of Web privacy policies to computer-literate users, determine whether people can configure user agents to achieve specific privacy goals, and discover ways in which the usability of those agents can be improved.

  9. Accountability in teenage dating violence: a comparative examination of adult domestic violence and juvenile justice systems policies.

    PubMed

    Zosky, Diane L

    2010-10-01

    Unlike in the adult criminal justice system, where domestic violence policies hold perpetrators accountable for their violence, the juvenile justice system rarely addresses teenage dating violence. Although the adult criminal justice system has pursued policies toward intimate partner violence grounded on a "zero tolerance" ideology, the juvenile justice system was originally founded on an ideology of "child saving" to rehabilitate youths and divert them from the justice system. The implication of policy disparity between the adult criminal justice system and the juvenile justice system may be one contributing reason why teenage dating violence has received a different societal response than adult domestic violence. This article, a comparative examination of juvenile justice and domestic violence policies, reveals very different histories, philosophies, and trajectories of policy development. Teenage dating violence may be "falling through the cracks" between two policy approaches. Perhaps the juvenile justice system could find a balanced approach to adopting the philosophy of zero tolerance or holding teenage perpetrators accountable for their choice to use violence, as the adult criminal justice system does, while at the same time maintaining the "rehabilitative" philosophy of the original juvenile justice policies.

  10. Researching Adult Education Policy in the Context of an Emerging Global Political Economy: The Case of South Africa.

    ERIC Educational Resources Information Center

    Groener, Zelda

    An study investigated ways in which the political and economic development (PED) agendas of international organizations (IOs) permeated or pervaded PED agendas of the South African government's adult education and training policies. Policy documents of IOs were main data sources, and the richest data sources were country strategy papers written by…

  11. Literacy, Knowledge and Development: South-South Policy Dialogue on Quality Education for Adults and Young People

    ERIC Educational Resources Information Center

    Singh, Madhu, Ed.; Castro Mussot, Luz-Maria, Ed.

    2007-01-01

    This publication contains the results of the conference "South-South Policy Dialogue on Quality Education for Adults and Young People" that took place in Mexico City in 2005. Articles were written by participants who presented their national programmes from the governmental perspective, which were reflected in the literacy policies, but…

  12. Riding the Waves of Policy? The Case of Basic Skills in Adult and Community Learning in England

    ERIC Educational Resources Information Center

    Hodgson, Ann; Edward, Sheila; Gregson, Maggie

    2007-01-01

    This paper draws on data from secondary sources and in-depth interviews to explore the question: What is the impact of policy on teaching, learning, assessment and inclusion in Adult and Community Learning (ACL) "Skills for Life" (SfL) provision? In particular, it focuses on the government's use of five policy-steering…

  13. Policies of Adult Education in Portugal and France: The European Agenda of Validation of Non-Formal and Informal Learning

    ERIC Educational Resources Information Center

    Cavaco, C.; Lafont, P.; Pariat, M.

    2014-01-01

    This article analyses the influence of the European Union's educational policies on the implementation of devices for the recognition and the validation of informal and non-formal learning within public policies on education and training for adults in European Union Member States. Portugal and France are taken as examples. The European Union's…

  14. State Policies Affecting the "Adult Re-Entry Pipeline" in Postsecondary Education: Results of a Fifty-State Inventory

    ERIC Educational Resources Information Center

    Boeke, Marianne; Zis, Stacey; Ewell, Peter

    2011-01-01

    With support from the Bill and Melinda Gates Foundation, the National Center for Higher Education Management Systems (NCHEMS) is engaged in a two year project centered on state policies that foster student progression and success in the "adult re-entry pipeline." The adult re-entry pipeline consists of the many alternative pathways to…

  15. Privacy-protecting video surveillance

    NASA Astrophysics Data System (ADS)

    Wickramasuriya, Jehan; Alhazzazi, Mohanned; Datt, Mahesh; Mehrotra, Sharad; Venkatasubramanian, Nalini

    2005-02-01

    Forms of surveillance are very quickly becoming an integral part of crime control policy, crisis management, social control theory and community consciousness. In turn, it has been used as a simple and effective solution to many of these problems. However, privacy-related concerns have been expressed over the development and deployment of this technology. Used properly, video cameras help expose wrongdoing but typically come at the cost of privacy to those not involved in any maleficent activity. This work describes the design and implementation of a real-time, privacy-protecting video surveillance infrastructure that fuses additional sensor information (e.g. Radio-frequency Identification) with video streams and an access control framework in order to make decisions about how and when to display the individuals under surveillance. This video surveillance system is a particular instance of a more general paradigm of privacy-protecting data collection. In this paper we describe in detail the video processing techniques used in order to achieve real-time tracking of users in pervasive spaces while utilizing the additional sensor data provided by various instrumented sensors. In particular, we discuss background modeling techniques, object tracking and implementation techniques that pertain to the overall development of this system.

  16. Do U.S. states' socioeconomic and policy contexts shape adult disability?

    PubMed

    Montez, Jennifer Karas; Hayward, Mark D; Wolf, Douglas A

    2017-04-01

    Growing disparities in adult mortality across U.S. states point to the importance of assessing disparities in other domains of health. Here, we estimate state-level differences in disability, and draw on the WHO socio-ecological framework to assess the role of ecological factors in explaining these differences. Our study is based on data from 5.5 million adults aged 25-94 years in the 2010-2014 waves of the American Community Survey. Disability is defined as difficulty with mobility, independent living, self-care, vision, hearing, or cognition. We first provide estimates of age-standardized and age-specific disability prevalence by state. We then estimate multilevel models to assess how states' socioeconomic and policy contexts shape the probability of having a disability. Age-standardized disability prevalence differs markedly by state, from 12.9% in North Dakota and Minnesota to 23.5% in West Virginia. Disability was lower in states with stronger economic output, more income equality, longer histories of tax credits for low-income workers, and higher cigarette taxes (for middle-age women), net of individuals' socio-demographic characteristics. States' socioeconomic and policy contexts appear particularly important for older adults. Findings underscore the importance of socio-ecological influences on disability.

  17. The Privacy Jungle:On the Market for Data Protection in Social Networks

    NASA Astrophysics Data System (ADS)

    Bonneau, Joseph; Preibusch, Sören

    We have conducted the first thorough analysis of the market for privacy practices and policies in online social networks. From an evaluation of 45 social networking sites using 260 criteria we find that many popular assumptions regarding privacy and social networking need to be revisited when considering the entire ecosystem instead of only a handful of well-known sites. Contrary to the common perception of an oligopolistic market, we find evidence of vigorous competition for new users. Despite observing many poor security practices, there is evidence that social network providers are making efforts to implement privacy enhancing technologies with substantial diversity in the amount of privacy control offered. However, privacy is rarely used as a selling point, even then only as auxiliary, nondecisive feature. Sites also failed to promote their existing privacy controls within the site. We similarly found great diversity in the length and content of formal privacy policies, but found an opposite promotional trend: though almost all policies are not accessible to ordinary users due to obfuscating legal jargon, they conspicuously vaunt the sites' privacy practices. We conclude that the market for privacy in social networks is dysfunctional in that there is significant variation in sites' privacy controls, data collection requirements, and legal privacy policies, but this is not effectively conveyed to users. Our empirical findings motivate us to introduce the novel model of a privacy communication game, where the economically rational choice for a site operator is to make privacy control available to evade criticism from privacy fundamentalists, while hiding the privacy control interface and privacy policy to maximize sign-up numbers and encourage data sharing from the pragmatic majority of users.

  18. 75 FR 32372 - Information Privacy and Innovation in the Internet Economy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... in the Internet Economy AGENCY: National Telecommunications and Information Administration, U.S... between privacy policy and innovation in the Internet economy.\\1\\ In addition, the Department announced... Public Review of Privacy Policy and Innovation in the Internet Economy, Launches Internet Policy...

  19. Privacy and security in teleradiology.

    PubMed

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  20. Privacy Concerns Related to the Collection of Personal Information Under the Personal Identify Verification (PIV) Program

    DTIC Science & Technology

    2008-03-01

    entities (such as marketers or other businesses). Citibank and MNBA, for example, both specifically state in their privacy policies that all... Citibank . (2004). Citigroup privacy promise for consumers. Retrieved May 10, 2005, from http://www.citibank.hu/privacy/index.htm Clarke, R. (2001, April

  1. Aligning the Effective Use of Student Data with Student Privacy and Security Laws

    ERIC Educational Resources Information Center

    Winnick, Steve; Coleman, Art; Palmer, Scott; Lipper, Kate; Neiditz, Jon

    2011-01-01

    This legal and policy guidance provides a summary framework for state policymakers as they work to use longitudinal data to improve student achievement while also protecting the privacy and security of individual student records. Summarizing relevant federal privacy and security laws, with a focus on the Family Educational Records and Privacy Act…

  2. Is Privacy at Risk when Commercial Websites Target Primary School Children? A Case Study in Korea

    ERIC Educational Resources Information Center

    Kim, Sora; Yi, Soon-Hyung

    2010-01-01

    This study discusses privacy risk factors when commercial web sites target primary school children in Korea. Specifically, the authors examined types of personal information required for membership subscriptions and whether privacy policies at commercial sites for children abide by privacy guidelines. A total of 159 commercial sites targeting…

  3. 12 CFR 332.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Annual privacy notice to customers required... Annual privacy notice to customers required. (a)(1) General rule. You must provide a clear and conspicuous notice to customers that accurately reflects your privacy policies and practices not less...

  4. 12 CFR 216.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Annual privacy notice to customers required... Annual privacy notice to customers required. (a)(1) General rule. You must provide a clear and conspicuous notice to customers that accurately reflects your privacy policies and practices not less...

  5. 32 CFR 318.4 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE THREAT REDUCTION AGENCY PRIVACY PROGRAM § 318.4 Policy. (a) It is DTRA policy that: (1) The personal privacy of an individual shall be respected and protected. Personal information shall be...

  6. Privacy Act Statement

    EPA Pesticide Factsheets

    Any information you provide to the Environmental Protection Agency’s (EPA) Suspension and Debarment Program will be governed by the Privacy Act and will be included in the EPA Debarment and Suspension Files, a Privacy Act system of records.

  7. Privacy and Library Records

    ERIC Educational Resources Information Center

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  8. Adult education and the challenges of regional development: Policy and sustainability in North Denmark

    NASA Astrophysics Data System (ADS)

    Rasmussen, Palle; Staugaard, Hans Jørgen

    2016-10-01

    Adult education is governed at many levels - internationally, nationally and locally. The authors of this paper look at the challenges, structures and practices of adult education policy at the local level, more specifically in North Denmark (Northern Jutland), one of the five administrative regions of the Danish nation-state. In many ways, the current educational challenges in this remote region of Europe are similar to what can be observed worldwide and especially in countries which are generally considered welfare states. The authors see the growing social and educational divide between the region's peripheral areas and its largest city centre as a major challenge - for society as a whole and for adult education in particular. It is from this perspective that the authors describe the present structures of adult education in the region and the strategies employed by local authorities and educational institutions. This is followed by an evaluation of both structures and efforts in terms of their ability to cope with the challenges.

  9. Tweens' Conceptions of Privacy Online: Implications for Educators

    ERIC Educational Resources Information Center

    Davis, Katie; James, Carrie

    2013-01-01

    There is considerable debate about young people's concern for privacy today, given their frequent use of social media to share information and other content about themselves and others. While researchers have investigated the online privacy practices of teens and emerging adults, relatively little is known about the attitudes and behaviors of…

  10. Adult Education/Lifelong Learning Policies in Greece in the Early 2010s: Influences from European Education Policy and National Practices

    ERIC Educational Resources Information Center

    Prokou, Eleni

    2014-01-01

    This article argues that adult education/lifelong learning policies in Greece, as these are expressed by law 3879/2010 "Development of Lifelong Learning and Other Provisions," have the characteristics of the "statist" model of lifelong learning in Europe, namely strong governmental control and centralization. However, there are…

  11. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  12. Older Adults (and Oral Health)

    MedlinePlus

    ... form does not collect any actual information. External Web Site Policy This graphic notice ( ) means that you ... Contact Us Viewers and Players Site Map FOIA Web Policies Privacy Policy National Institute of Dental and ...

  13. New Technology "Clouds" Student Data Privacy

    ERIC Educational Resources Information Center

    Krueger, Keith R.; Moore, Bob

    2015-01-01

    As technology has leaped forward to provide valuable learning tools, parents and policy makers have begun raising concerns about the privacy of student data that schools and systems have. Federal laws are intended to protect students and their families but they have not and will never be able to keep up with rapidly evolving technology. School…

  14. Privacy Concerns Keep Some Young Americans from Sexual Health Services

    MedlinePlus

    ... html Privacy Concerns Keep Some Young Americans From Sexual Health Services Survey reveals reluctance of teens, young adults ... Recent Health News Related MedlinePlus Health Topics Teen Sexual Health About MedlinePlus Site Map FAQs Customer Support Get ...

  15. Privacy-Related Context Information for Ubiquitous Health

    PubMed Central

    Nykänen, Pirkko; Ruotsalainen, Pekka

    2014-01-01

    Background Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing. Objective Our goal was to analyze privacy-related context information and to define the corresponding components and their properties that support privacy management in ubiquitous health. These properties should describe the privacy issues of information processing. With components and their properties, individuals can define context-aware privacy policies and set their privacy preferences that can change in different information-processing situations. Methods Scenarios and user stories are used to analyze typical activities in ubiquitous health to identify main actors, goals, tasks, and stakeholders. Context arises from an activity and, therefore, we can determine different situations, services, and systems to identify properties for privacy-related context information in information-processing situations. Results Privacy-related context information components are situation, environment, individual, information technology system, service, and stakeholder. Combining our analyses and previously identified characteristics of ubiquitous health, more detailed properties for the components are defined. Properties define explicitly what context information for different components is needed to create context-aware privacy policies that can control, limit, and constrain information processing. With properties, we can define, for example, how

  16. Provider views of harm reduction versus abstinence policies within homeless services for dually diagnosed adults.

    PubMed

    Henwood, Benjamin F; Padgett, Deborah K; Tiderington, Emmy

    2014-01-01

    Harm reduction is considered by many to be a legitimate alternative to abstinence-based services for dually diagnosed individuals, yet there is limited understanding of how varying approaches affect front-line practice within services for homeless adults. This paper examines how front-line providers working with individuals who have experienced homelessness, serious mental illness, and addiction view policies of harm reduction versus abstinence within two different approaches to homeless services: the traditional or "treatment first" approach that requires abstinence, and the more recent housing first approach that incorporates harm reduction. As part of a federally funded qualitative study, 129 in-depth interviews conducted with 41 providers were thematically analyzed to understand how providers view harm reduction versus abstinence approaches. Themes included the following: (a) harm reduction as a welcomed alternative, (b) working with ambiguity, and (c) accommodating abstinence. Drawing on recovery principles, the authors consider the broader implications of the findings for behavioral health care with this population.

  17. Waterpipe Tobacco Smoking in Turkey: Policy Implications and Trends from the Global Adult Tobacco Survey (GATS)

    PubMed Central

    Erdöl, Cevdet; Ergüder, Toker; Morton, Jeremy; Palipudi, Krishna; Gupta, Prakash; Asma, Samira

    2015-01-01

    Waterpipe tobacco smoking (WTS) is an emerging tobacco product globally, especially among adolescents and young adults who may perceive WTS as a safe alternative to smoking cigarettes. Monitoring the use of WTS in Turkey in relation to the tobacco control policy context is important to ensure that WTS does not become a major public health issue in Turkey. The Global Adult Tobacco Survey (GATS) was conducted in Turkey in 2008 and was repeated in 2012. GATS provided prevalence estimates on current WTS and change over time. Other indicators of WTS were also obtained, such as age of initiation and location of use. Among persons aged 15 and older in Turkey, the current prevalence of WTS decreased from 2.3% in 2008 to 0.8% in 2012, representing a 65% relative decline. Among males, WTS decreased from 4.0% to 1.1% (72% relative decline). While the overall smoking prevalence decreased among females, there was no change in the rate of WTS (0.7% in 2008 vs. 0.5% in 2012), though the WTS prevalence rate was already low in 2008. Comprehensive tobacco control efforts have been successful in reducing the overall smoking prevalence in Turkey, which includes the reduction of cigarette smoking and WTS. However, it is important to continue monitoring the use of waterpipes in Turkey and targeting tobacco control efforts to certain groups that may be vulnerable to future WTS marketing (e.g., youth, women). PMID:26670238

  18. Waterpipe Tobacco Smoking in Turkey: Policy Implications and Trends from the Global Adult Tobacco Survey (GATS).

    PubMed

    Erdöl, Cevdet; Ergüder, Toker; Morton, Jeremy; Palipudi, Krishna; Gupta, Prakash; Asma, Samira

    2015-12-08

    Waterpipe tobacco smoking (WTS) is an emerging tobacco product globally, especially among adolescents and young adults who may perceive WTS as a safe alternative to smoking cigarettes. Monitoring the use of WTS in Turkey in relation to the tobacco control policy context is important to ensure that WTS does not become a major public health issue in Turkey. The Global Adult Tobacco Survey (GATS) was conducted in Turkey in 2008 and was repeated in 2012. GATS provided prevalence estimates on current WTS and change over time. Other indicators of WTS were also obtained, such as age of initiation and location of use. Among persons aged 15 and older in Turkey, the current prevalence of WTS decreased from 2.3% in 2008 to 0.8% in 2012, representing a 65% relative decline. Among males, WTS decreased from 4.0% to 1.1% (72% relative decline). While the overall smoking prevalence decreased among females, there was no change in the rate of WTS (0.7% in 2008 vs. 0.5% in 2012), though the WTS prevalence rate was already low in 2008. Comprehensive tobacco control efforts have been successful in reducing the overall smoking prevalence in Turkey, which includes the reduction of cigarette smoking and WTS. However, it is important to continue monitoring the use of waterpipes in Turkey and targeting tobacco control efforts to certain groups that may be vulnerable to future WTS marketing (e.g., youth, women).

  19. Privacy Management and Networked PPD Systems - Challenges Solutions.

    PubMed

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  20. Lifelong Learning on Either Side of the Border: The Effects of Government Policy on Adult Education in the Netherlands and Belgium

    ERIC Educational Resources Information Center

    Smit, Hemmo; den Oudendammer, Frowine; Kats, Erik; van Lakerveld, Jaap

    2009-01-01

    Although there is a tendency to develop policy plans on adult education at a European level, there are still large differences between the various EU countries. These national policy contexts depend on historical, cultural, economic and political factors and can have a profound impact on the way adult education is shaped and developed within a…

  1. Conflicting Ideologies and Language Policy in Adult ESL: Complexities of Language Socialization in a Majority-L1 Classroom

    ERIC Educational Resources Information Center

    Mori, Miki

    2014-01-01

    This study looks at how language ideologies affect and are revealed in language socialization practices in a majority-L1 adult ESL classroom, particularly looking at language use and policy. It draws on recent theories and critiques of language socialization (Bayley & Langman, 2011; Bronson & Watson-Gegeo, 2008; Garrett &…

  2. "We Thought They Had Forgotten Us": Research, Policy, and Practice in the Education of Latino Immigrant Adults

    ERIC Educational Resources Information Center

    Lukes, Marguerite M.

    2009-01-01

    This article discusses English-only policies as they relate to second language teaching for children and adults; explores popular perceptions and misconceptions about learning English; and discusses types of programs best suited for different students, depending on educational background. Examples from research and practice highlight the value of…

  3. Participation Patterns in Adult Education: The Role of Institutions and Public Policy Frameworks in Resolving Coordination Problems

    ERIC Educational Resources Information Center

    Desjardins, Richard; Rubenson, Kjell

    2013-01-01

    This article focuses on evidence regarding cross-national patterns of participation in adult education and an interpretation of these patterns from an institutional and public policy perspective. The interpretation follows from the perspective that sustaining high and widely distributed levels of investment in the development and maintenance of…

  4. The adult day care workforce in England at a time of policy change: implications for learning disability support services.

    PubMed

    Hussein, Shereen; Manthorpe, Jill

    2010-06-01

    More people will receive personal budgets to pay for social care services in England. Such people may or may not continue using services such as adult day care centres. Many day centres are under threat of closure. These trends will affect those working in adult day care. This article examines the profile of this workforce, using recent NMDS-SC data and applying multinomial statistical modelling. We identified nearly 6000 adult day care workers, over half supporting adults with learning disability. The results of the analysis show significant variations between the adult day care, residential care and domiciliary workforces. At the personal level, day care workers are significantly older and less ethnically diverse than other workers. They tend to have been working in the sector for longer, and their work patterns are more stable. The findings are discussed within the context of policy changes affecting learning disabilities and social care workforce strategies.

  5. 41 CFR 105-64.107 - What standards of conduct apply to employees with privacy-related responsibilities?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... conduct apply to employees with privacy-related responsibilities? 105-64.107 Section 105-64.107 Public...-Policies and Responsibilities § 105-64.107 What standards of conduct apply to employees with privacy-related responsibilities? (a) Employees who design, develop, operate, or maintain Privacy Act...

  6. 41 CFR 105-64.107 - What standards of conduct apply to employees with privacy-related responsibilities?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... conduct apply to employees with privacy-related responsibilities? 105-64.107 Section 105-64.107 Public...-Policies and Responsibilities § 105-64.107 What standards of conduct apply to employees with privacy-related responsibilities? (a) Employees who design, develop, operate, or maintain Privacy Act...

  7. 41 CFR 105-64.107 - What standards of conduct apply to employees with privacy-related responsibilities?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... conduct apply to employees with privacy-related responsibilities? 105-64.107 Section 105-64.107 Public...-Policies and Responsibilities § 105-64.107 What standards of conduct apply to employees with privacy-related responsibilities? (a) Employees who design, develop, operate, or maintain Privacy Act...

  8. Individual privacy in an information dependent society

    SciTech Connect

    Clifford, B.P.

    1994-12-31

    The extraordinary technologies and capabilities of the Information Age have vastly improved communication, while allowing executives to have ultra-current information about their companies, subsidiaries, staff, clients, and practically any individual in the world. These advances, however, have stripped the individual of his privacy. Although invasions of privacy do not require a computer, computers have made it much easier to gather and select informatin, which means that it is also much easier to invade privacy. The increased value of information to policy makers leads them to covet information, even when acquiring it invades someone`s pricacy; not only do managers of private companies gather personal data, almost every citizen has files about him in Federal agencies and administrations.

  9. Control use of data to protect privacy.

    PubMed

    Landau, Susan

    2015-01-30

    Massive data collection by businesses and governments calls into question traditional methods for protecting privacy, underpinned by two core principles: (i) notice, that there should be no data collection system whose existence is secret, and (ii) consent, that data collected for one purpose not be used for another without user permission. But notice, designated as a fundamental privacy principle in a different era, makes little sense in situations where collection consists of lots and lots of small amounts of information, whereas consent is no longer realistic, given the complexity and number of decisions that must be made. Thus, efforts to protect privacy by controlling use of data are gaining more attention. I discuss relevant technology, policy, and law, as well as some examples that can illuminate the way.

  10. "Everybody Knows Everybody Else's Business"-Privacy in Rural Communities.

    PubMed

    Leung, Janni; Smith, Annetta; Atherton, Iain; McLaughlin, Deirdre

    2016-12-01

    Patients have a right to privacy in a health care setting. This involves conversational discretion, security of medical records and physical privacy of remaining unnoticed or unidentified when using health care services other than by those who need to know or whom the patient wishes to know. However, the privacy of cancer patients who live in rural areas is more difficult to protect due to the characteristics of rural communities. The purpose of this article is to reflect on concerns relating to the lack of privacy experienced by cancer patients and health care professionals in the rural health care setting. In addition, this article suggests future research directions to provide much needed evidence for educating health care providers and guiding health care policies that can lead to better protection of privacy among cancer patients living in rural communities.

  11. Ethics and Privacy.

    ERIC Educational Resources Information Center

    Brewer, Erin; Eastmond, Nick; Geertsen, Reed; Johnson, Doug; Lewandowski, Judith; Yeaman, Andrew R. J.

    2003-01-01

    Contains four articles covering trends and issues on ethics and privacy in instructional technology, including: considerations for assessing ethical issues; what schools must do to develop ethical behaviors in students; a privacy primer for educators; and manufacturing technophopia. Each article contains references. (MES)

  12. Children's Online Privacy.

    ERIC Educational Resources Information Center

    Aidman, Amy

    2000-01-01

    The first federal Internet privacy law (the Children's Online Privacy Protection Act) provides safeguards for children by regulating collection of their personal information. Unfortunately, teens are not protected. Legislation is pending to protect children from online marketers such as ZapMe! Interactive technologies require constant vigilance.…

  13. Historical Perspectives on Privacy.

    ERIC Educational Resources Information Center

    Huttenstine, Marian L.

    A number of court cases involving public disclosure of private information are described in this paper to point to historical trends involving the issue of privacy and to illustrate some of the problems with all aspects of the issue. After noting the conflict between the principle of individual privacy and the principle of free disclosure of…

  14. Information Privacy Revealed

    ERIC Educational Resources Information Center

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  15. Toward practicing privacy

    PubMed Central

    Dwork, Cynthia; Pottenger, Rebecca

    2013-01-01

    Private data analysis—the useful analysis of confidential data—requires a rigorous and practicable definition of privacy. Differential privacy, an emerging standard, is the subject of intensive investigation in several diverse research communities. We review the definition, explain its motivation, and discuss some of the challenges to bringing this concept to practice. PMID:23243088

  16. Emerging Privacy Issues.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    As the issue of information privacy increases in complexity in terms of the number of organizations involved, the intricacy of the information flows, and the difficulty of conceiving appropriate legal safeguards, it is not certain that the practices and laws that have been developed for current privacy protection can work for new situations.…

  17. 32 CFR 323.2 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 323.2 Section 323.2 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE LOGISTICS AGENCY PRIVACY PROGRAM § 323.2 Policy. It is the policy of DLA to safeguard personal...

  18. 22 CFR 308.2 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Policy. 308.2 Section 308.2 Foreign Relations PEACE CORPS IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 308.2 Policy. It is the policy of the Peace Corps to protect, preserve and defend the right of privacy of any individual as to whom the...

  19. 22 CFR 308.2 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 2 2011-04-01 2009-04-01 true Policy. 308.2 Section 308.2 Foreign Relations PEACE CORPS IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 308.2 Policy. It is the policy of the Peace Corps to protect, preserve and defend the right of privacy of any individual as to whom the...

  20. 22 CFR 308.2 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 2 2012-04-01 2009-04-01 true Policy. 308.2 Section 308.2 Foreign Relations PEACE CORPS IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 308.2 Policy. It is the policy of the Peace Corps to protect, preserve and defend the right of privacy of any individual as to whom the...

  1. 22 CFR 308.2 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 2 2013-04-01 2009-04-01 true Policy. 308.2 Section 308.2 Foreign Relations PEACE CORPS IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 308.2 Policy. It is the policy of the Peace Corps to protect, preserve and defend the right of privacy of any individual as to whom the...

  2. 22 CFR 308.2 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Policy. 308.2 Section 308.2 Foreign Relations PEACE CORPS IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 308.2 Policy. It is the policy of the Peace Corps to protect, preserve and defend the right of privacy of any individual as to whom the...

  3. 32 CFR 326.4 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... RECONNAISSANCE OFFICE PRIVACY ACT PROGRAM § 326.4 Policy. (a) Records about individuals— (1) Collection. The NRO... duties require it during the regular course of business. (i) Privacy Act Statement. When an individual is requested to furnish personal information about himself for inclusion in a system of records, a Privacy...

  4. 32 CFR 326.4 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... RECONNAISSANCE OFFICE PRIVACY ACT PROGRAM § 326.4 Policy. (a) Records about individuals— (1) Collection. The NRO... duties require it during the regular course of business. (i) Privacy Act Statement. When an individual is requested to furnish personal information about himself for inclusion in a system of records, a Privacy...

  5. 32 CFR 1701.20 - Exemption policies.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Exemption of Record Systems Under the Privacy Act § 1701.20 Exemption policies. (a) General. The DNI has determined that invoking exemptions under the Privacy Act and continuing exemptions previously asserted by agencies whose records...

  6. 32 CFR 1701.20 - Exemption policies.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Exemption of Record Systems Under the Privacy Act § 1701.20 Exemption policies. (a) General. The DNI has determined that invoking exemptions under the Privacy Act and continuing exemptions previously asserted by agencies whose records...

  7. 32 CFR 1701.20 - Exemption policies.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Exemption of Record Systems Under the Privacy Act § 1701.20 Exemption policies. (a) General. The DNI has determined that invoking exemptions under the Privacy Act and continuing exemptions previously asserted by agencies whose records...

  8. 32 CFR 1701.20 - Exemption policies.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Exemption of Record Systems Under the Privacy Act § 1701.20 Exemption policies. (a) General. The DNI has determined that invoking exemptions under the Privacy Act and continuing exemptions previously asserted by agencies whose records...

  9. Illinois Adult Literacy Failing the Workforce: Alternative Solution Needed. Policy Profiles.

    ERIC Educational Resources Information Center

    Banovetz, James M., Ed.

    According to the most recent National Adult Literacy Survey, nearly half of Illinois adults lack sufficient reading proficiency to ensure job success and advancement in 21st century workplaces. The Test of Adult Basic Education is currently used as a pretest/posttest in Illinois' existing adult basic education, adult secondary education, and…

  10. Towards an international electronic repository and virtual laboratory of open data and open-source software for telehealth research: comparison of international, Australian and Finnish privacy policies.

    PubMed

    Suominen, Hanna

    2012-01-01

    Health data includes all content related to health in all data formats, document types, information systems, publication media and languages from all specialties, organisations, regions, states and countries. Capabilities to share, integrate and compare these data contents, clinical trial results and other evaluation outcomes together with telehealth applications for data processing are critical to accelerate discovery and its diffusion to clinical practice. However, the same ethical and legal frameworks that protect privacy hinder this open data and open-source code approach and the issues accumulate if moving data across national, regional or organisational borders. This can be seen as one of the reasons why many telehealth applications and health-research findings tend to be limited to very narrow domains and global results are lacking. The aim of this paper is to take steps towards establishing an international electronic repository and virtual laboratory of open data and open-source code for research purposes by comparing international, Australian and Finnish frameworks. The frameworks seem to be fundamentally similar; they apply the principles of accountability and adequacy to using and disclosing personal data. Their requirements to inform data subjects about the purposes of data collection and use before the dataset is collected, assure that individuals are no longer identifiable and to destruct data when the research activities are finished make sharing data and even secondary data difficult. Using the Internet or cloud services for sharing without proper approvals by ethics committees is technically not allowed if the data are stored in another country. The research community needs to overcome these barriers and develop a virtual laboratory, which operates on distributed data repositories. This empowers the community by enabling systematic evaluations of new technologies and research hypotheses on a rich variety of data and against existing applications

  11. Comparative cervical profiles of adult and under-18 front-row rugby players: implications for playing policy

    PubMed Central

    Hamilton, D F; Gatherer, D; Robson, J; Graham, N; Rennie, N; MacLean, J G B; Simpson, A H R W

    2014-01-01

    Objective To compare the cervical isometric strength, fatigue endurance and range of motion of adult and under-18 age-grade front-row rugby players to inform the development of a safe age group policy with particular reference to scrummaging. Design Cross-sectional cohort study. Setting ‘Field testing’ at Murrayfield stadium. Participants 30 high-performance under-18 players and 22 adult front-row rugby players. Outcome measures Isometric neck strength, height, weight and grip strength. Results Youth players demonstrated the same height and grip strength as the adult players; however, the adults were significantly heavier and demonstrated substantially greater isometric strength (p<0.001). Only two of the ‘elite’ younger players could match the adult mean cervical isometric strength value. In contrast to school age players in general, grip strength was poorly associated with neck strength (r=0.2) in front-row players; instead, player weight (r=0.4) and the number of years’ experience of playing in the front row (r=0.5) were the only relevant factors in multivariate modelling of cervical strength (R2=0.3). Conclusions Extreme forces are generated between opposing front rows in the scrum and avoidance of mismatch is important if the risk of injury is to be minimised. Although elite youth front-row rugby players demonstrate the same peripheral strength as their adult counterparts on grip testing, the adults demonstrate significantly greater cervical strength. If older youths and adults are to play together, such findings have to be noted in the development of age group policies with particular reference to the scrum. PMID:24797427

  12. Electronic consent channels: preserving patient privacy without handcuffing researchers.

    PubMed

    Shelton, Robert H

    2011-02-09

    Advances in health information technology and electronic medical records have the tremendous potential to accelerate translational and clinical research. However, privacy concerns threaten to be a rate-limiting factor. By recognizing and responding to patient privacy concerns, policy-makers, researchers, and information technology leaders have the opportunity to transform trial recruitment and make it safer to electronically locate and convey sensitive health information.

  13. 76 FR 3098 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-19

    ... National Security Agency/Central Security Service (NSA/CSS) by other agencies and in some instances... Freedom of Information Act Program; DoD 5400.11- R, Department of Defense Privacy Program; NSA/CSS Policy 1-5; NSA/CSS Freedom of Information Act Program; NSA/CSS Policy 1-34; Implementation of the...

  14. Impact of Tobacco Control Policies and Mass Media Campaigns on Monthly Adult Smoking Prevalence

    PubMed Central

    Wakefield, Melanie A.; Durkin, Sarah; Spittal, Matthew J.; Siahpush, Mohammad; Scollo, Michelle; Simpson, Julie A.; Chapman, Simon; White, Victoria; Hill, David

    2008-01-01

    Objectives. We sought to assess the impact of several tobacco control policies and televised antismoking advertising on adult smoking prevalence. Methods. We used a population survey in which smoking prevalence was measured each month from 1995 through 2006. Time-series analysis assessed the effect on smoking prevalence of televised antismoking advertising (with gross audience rating points [GRPs] per month), cigarette costliness, monthly sales of nicotine replacement therapy (NRT) and bupropion, and smoke-free restaurant laws. Results. Increases in cigarette costliness and exposure to tobacco control media campaigns significantly reduced smoking prevalence. We found a 0.3-percentage-point reduction in smoking prevalence by either exposing the population to televised antismoking ads an average of almost 4 times per month (390 GRPs) or by increasing the costliness of a pack of cigarettes by 0.03% of gross average weekly earnings. Monthly sales of NRT and bupropion, exposure to NRT advertising, and smoke-free restaurant laws had no detectable impact on smoking prevalence. Conclusions. Increases in the real price of cigarettes and tobacco control mass media campaigns broadcast at sufficient exposure levels and at regular intervals are critical for reducing population smoking prevalence. PMID:18556601

  15. Privacy and medical information on the Internet.

    PubMed

    Nelson, Steven B

    2006-02-01

    Health-care consumers are beginning to realize the presence and value of health-care information available on the Internet, but they need to be aware of risks that may be involved. In addition to delivering information, some Web sites collect information. Though not all of the information might be classified as protected health information, consumers need to realize what is collected and how it might be used. Consumers should know a Web site\\'s privacy policy before divulging any personal information. Health-care providers have a responsibility to know what information they are collecting and why. Web servers may collect large amounts of visitor information by default, and they should be modified to limit data collection to only what is necessary. Providers need to be cognizant of the many regulations concerning collection and disclosure of information obtained from consumers. Providers should also provide an easily understood privacy policy for users.

  16. What adult worker model? A critical look at recent social policy reform in Europe from a gender and family perspective.

    PubMed

    Daly, Mary

    2011-01-01

    Analyses regularly feature claims that European welfare states are in the process of creating an adult worker model. The theoretical and empirical basis of this argument is examined here by looking first at the conceptual foundations of the adult worker model formulation and then at the extent to which social policy reform in western Europe fits with the argument. It is suggested that the adult worker formulation is under-specified. A framework incorporating four dimensions—the treatment of individuals vis-à-vis their family role and status for the purposes of social rights, the treatment of care, the treatment of the family as a social institution, and the extent to which gender inequality is problematized—is developed and then applied. The empirical analysis reveals a strong move towards individualization as social policy promotes and valorizes individual agency and self-sufficiency and shifts some childcare from the family. Yet evidence is also found of continued (albeit changed) familism. Rather than an unequivocal move to an individualized worker model then, a dual earner, gender-specialized, family arrangement is being promoted. The latter is the middle way between the old dependencies and the new “independence.” This makes for complexity and even ambiguity in policy, a manifestation of which is that reform within countries involves concurrent moves in several directions.

  17. The Role of Adult Education and Learning Policy in Fostering Societal Sustainability

    ERIC Educational Resources Information Center

    Milana, Marcella; Rasmussen, Palle; Holford, John

    2016-01-01

    The idea of "sustainability" as a core value has slowly permeated policy and practice at governmental and institutional levels, in public and private policy. However, at times when social and economic crises have revealed the fragility of existing institutions and policies, it is important to consider how sustainability is -- and could…

  18. Trust and Privacy Solutions Based on Holistic Service Requirements

    PubMed Central

    Sánchez Alcón, José Antonio; López, Lourdes; Martínez, José-Fernán; Rubio Cifuentes, Gregorio

    2015-01-01

    The products and services designed for Smart Cities provide the necessary tools to improve the management of modern cities in a more efficient way. These tools need to gather citizens’ information about their activity, preferences, habits, etc. opening up the possibility of tracking them. Thus, privacy and security policies must be developed in order to satisfy and manage the legislative heterogeneity surrounding the services provided and comply with the laws of the country where they are provided. This paper presents one of the possible solutions to manage this heterogeneity, bearing in mind these types of networks, such as Wireless Sensor Networks, have important resource limitations. A knowledge and ontology management system is proposed to facilitate the collaboration between the business, legal and technological areas. This will ease the implementation of adequate specific security and privacy policies for a given service. All these security and privacy policies are based on the information provided by the deployed platforms and by expert system processing. PMID:26712752

  19. Trust and Privacy Solutions Based on Holistic Service Requirements.

    PubMed

    Sánchez Alcón, José Antonio; López, Lourdes; Martínez, José-Fernán; Rubio Cifuentes, Gregorio

    2015-12-24

    The products and services designed for Smart Cities provide the necessary tools to improve the management of modern cities in a more efficient way. These tools need to gather citizens' information about their activity, preferences, habits, etc. opening up the possibility of tracking them. Thus, privacy and security policies must be developed in order to satisfy and manage the legislative heterogeneity surrounding the services provided and comply with the laws of the country where they are provided. This paper presents one of the possible solutions to manage this heterogeneity, bearing in mind these types of networks, such as Wireless Sensor Networks, have important resource limitations. A knowledge and ontology management system is proposed to facilitate the collaboration between the business, legal and technological areas. This will ease the implementation of adequate specific security and privacy policies for a given service. All these security and privacy policies are based on the information provided by the deployed platforms and by expert system processing.

  20. Pathways to Labor Market Success: The Literacy Proficiency of U.S. Adults. Policy Information Report

    ERIC Educational Resources Information Center

    Sum, Andrew; Kirsch, Irwin; Yamamoto, Kentaro

    2004-01-01

    This is the fourth in a series of reports that draws upon the vast amount of background and assessment data and information that have been collected from the National Adult Literacy Survey (NALS) and the International Adult Literacy Survey (IALS). In this report, the authors find connections between the literacy skills of adults and their success…

  1. Integrated Adult Education Data System. Policy Option Paper on Strategic Recommendation 8. First Edition.

    ERIC Educational Resources Information Center

    Porter, Dennis

    This document addresses the recommendation contained in the 1989 California Strategic Plan for Adult Education for an integrated adult education data system. The recommendation proposes collecting and organizing community adult education information into groups of data on: program services, program delivery, learner characteristics, and learning…

  2. Strategies for Success: Promising Ideas in Adult College Completion. Policy Exchanges

    ERIC Educational Resources Information Center

    Lane, Patrick

    2012-01-01

    This publication is the first of a series focusing on promising new ideas and innovative practices developed through the Adult College Completion Network. The brief addresses five topics of importance to those working to improve adult college completion: (1) Data availability particular to the returning adult population; (2) Partnerships between…

  3. Overview of Privacy in Social Networking Sites (SNS)

    NASA Astrophysics Data System (ADS)

    Powale, Pallavi I.; Bhutkar, Ganesh D.

    2013-07-01

    Social Networking Sites (SNS) have become an integral part of communication and life style of people in today's world. Because of the wide range of services offered by SNSs mostly for free of cost, these sites are attracting the attention of all possible Internet users. Most importantly, users from all age groups have become members of SNSs. Since many of the users are not aware of the data thefts associated with information sharing, they freely share their personal information with SNSs. Therefore, SNSs may be used for investigating users' character and social habits by familiar or even unknown persons and agencies. Such commercial and social scenario, has led to number of privacy and security threats. Though, all major issues in SNSs need to be addressed, by SNS providers, privacy of SNS users is the most crucial. And therefore, in this paper, we have focused our discussion on "privacy in SNSs". We have discussed different ways of Personally Identifiable Information (PII) leakages from SNSs, information revelation to third-party domains without user consent and privacy related threats associated with such information sharing. We expect that this comprehensive overview on privacy in SNSs will definitely help in raising user awareness about sharing data and managing their privacy with SNSs. It will also help SNS providers to rethink about their privacy policies.

  4. Efficient Privacy-Aware Record Integration

    PubMed Central

    Kuzu, Mehmet; Kantarcioglu, Murat; Inan, Ali; Bertino, Elisa; Durham, Elizabeth; Malin, Bradley

    2013-01-01

    The integration of information dispersed among multiple repositories is a crucial step for accurate data analysis in various domains. In support of this goal, it is critical to devise procedures for identifying similar records across distinct data sources. At the same time, to adhere to privacy regulations and policies, such procedures should protect the confidentiality of the individuals to whom the information corresponds. Various private record linkage (PRL) protocols have been proposed to achieve this goal, involving secure multi-party computation (SMC) and similarity preserving data transformation techniques. SMC methods provide secure and accurate solutions to the PRL problem, but are prohibitively expensive in practice, mainly due to excessive computational requirements. Data transformation techniques offer more practical solutions, but incur the cost of information leakage and false matches. In this paper, we introduce a novel model for practical PRL, which 1) affords controlled and limited information leakage, 2) avoids false matches resulting from data transformation. Initially, we partition the data sources into blocks to eliminate comparisons for records that are unlikely to match. Then, to identify matches, we apply an efficient SMC technique between the candidate record pairs. To enable efficiency and privacy, our model leaks a controlled amount of obfuscated data prior to the secure computations. Applied obfuscation relies on differential privacy which provides strong privacy guarantees against adversaries with arbitrary background knowledge. In addition, we illustrate the practical nature of our approach through an empirical analysis with data derived from public voter records. PMID:24500681

  5. Elements d'une Politique en Education des Adultes, 1970 (Elements of an Adult Education Policy, 1970).

    ERIC Educational Resources Information Center

    Canadian Inst. for Adult Education, Montreal (Quebec).

    Requirements of a comprehensive approach to adult and continuing education in Quebec are set forth, with particular attention to individual and social needs in a changing world as well as to short-and long-range educational objectives. Proposals are offered for serving the unemployed and other groups, reshaping content and methodology, allocating…

  6. Privacy and Disclosure Regulation of Information Systems; A Bibliographic Survey. Publication 75-8.

    ERIC Educational Resources Information Center

    Seipp, David J.

    Concern is growing over the problems of freedom of information, individual right to privacy, and automated recordkeeping systems. As a guide to policy considerations for overview and for detail, this extensive structured bibliography of privacy and disclosure literature adopts a topical scheme, dividing the subject first into governmental and…

  7. 78 FR 18932 - Public Meeting: Unmanned Aircraft Systems Test Site Program; Privacy Approach

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-28

    ...The FAA will be holding a public engagement session on Wednesday, April 3, 2013, on the proposed privacy policy approach for the unmanned aircraft systems (UAS) test site program. The FAA is seeking the views from the public with respect to proposed privacy language to be included in agreements with each test site...

  8. 17 CFR 49.16 - Privacy and confidentiality requirements of swap data repositories.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... policies and procedures reasonably designed to protect the privacy and confidentiality of any and all SDR... privacy and confidentiality of any and all SDR Information (except for swap data disseminated under part... misappropriation or misuse, directly or indirectly, of: (i) Section 8 Material; (ii) Other SDR Information;...

  9. 17 CFR 49.16 - Privacy and confidentiality requirements of swap data repositories.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... policies and procedures reasonably designed to protect the privacy and confidentiality of any and all SDR... privacy and confidentiality of any and all SDR Information (except for swap data disseminated under part... misappropriation or misuse, directly or indirectly, of: (i) Section 8 Material; (ii) Other SDR Information;...

  10. The U. S. Privacy Protection Commission--A Retrospective View from the Chair.

    ERIC Educational Resources Information Center

    Linowes, David F.

    This paper examines how the U.S. Privacy Protection Commission functioned. Examined are its basic authority, procedures and policies, operational plan, distinctive features, staffing, and results of recommendations. Created by an act of Congress in 1974, the Commission was authorized to examine all actual and potential invasions of privacy in the…

  11. Suggestions for Compliance with Privacy Rights of Parents and Students (Buckley Amendments).

    ERIC Educational Resources Information Center

    Arizona State Dept. of Education, Phoenix.

    These suggestions for formulating school district policies governing the confidentiality and release of student records are based on the Family Educational Rights and Privacy Act (the Buckley amendment) and on relevant Arizona state law. A checklist, which covers the major section of the Family Educational Rights and Privacy Act, is designed to…

  12. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security.../Transportation Security Administration- 019, Secure Flight Records (November 9, 2007, 72 FR 63711) to cover the..., Director, Privacy Policy and Compliance, TSA-36, Transportation Security Administration, 601......

  13. 75 FR 19942 - Information Privacy and Innovation in the Internet Economy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-16

    ... Privacy and Innovation in the Internet Economy AGENCIES: National Telecommunications and Information... innovation in the Internet economy. DATES: The meeting will be held on May 7, 2010, from 9:00 a.m. to 3:00 p... nexus between privacy policy and innovation in the Internet economy, which will include the issuance...

  14. Adult Still's Disease

    MedlinePlus

    ... Policy Notice of Privacy Practices Notice of Nondiscrimination Advertising Mayo Clinic is a not-for-profit organization and proceeds from Web advertising help support our mission. Mayo Clinic does not ...

  15. Summary of the Privacy Act

    EPA Pesticide Factsheets

    The purpose of the Privacy Act is to balance the government's need to maintain information about individuals with the rights of individuals to be protected against unwarranted invasions of their privacy.

  16. The Role of Education in Teaching Norms and Values to Adult Newcomers: An Analysis of Integration Policy in the Netherlands, with Emphasis on the City of Rotterdam

    ERIC Educational Resources Information Center

    Koehler, Maryan

    2009-01-01

    This paper presents research on the current debate in the Netherlands regarding integration and the teaching of 'norms and values' to adult newcomers. Data consisting of national and local (city of Rotterdam) integration policy documents and interviews with those influential in policy making were analyzed using a grounded theory approach. The…

  17. Making Sense of Federal Employment and Training Policy for Youth and Adults. Volume II: Expert Recommendations To Create a Comprehensive and Unified System.

    ERIC Educational Resources Information Center

    Moore, Kristina M., Ed.; And Others

    This document contains 27 essays and 5 policy statements regarding creation of a comprehensive and unified federal employment and training policy for youth and adults. The following essays are included: "In Search of the American Way" (Wills); "Rethink the Demand Side" (Smith); "The Federal Government as a Change Agent" (Nathan); "Making Sense of…

  18. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    SciTech Connect

    Rothstein, M.A.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  19. Inequalities for the quantum privacy

    NASA Astrophysics Data System (ADS)

    Trindade, M. A. S.; Pinto, E.

    2016-02-01

    In this work, we investigate the asymptotic behavior related to the quantum privacy for multipartite systems. In this context, an inequality for quantum privacy was obtained by exploiting of quantum entropy properties. Subsequently, we derive a lower limit for the quantum privacy through the entanglement fidelity. In particular, we show that there is an interval where an increase in entanglement fidelity implies a decrease in quantum privacy.

  20. A Policy of Individualization and Flexibility Ignoring the Situation of Non-Self-Reliant Individuals: The Example of Swedish Basic Adult Education

    ERIC Educational Resources Information Center

    Loeb, Ingrid Henning; Wass, Karin Lumsden

    2014-01-01

    Based on a case study in Swedish municipal basic adult education this article addresses current policies for providing individualized and flexible learning, which have been reinforced in recent adult education reforms. Concepts from the organization theory of "action nets" have been used. Institutionalized procedures and a number of…

  1. How to Motivate Adults with Low Literacy and Numeracy Skills to Engage and Persist in Learning: A Literature Review of Policy Interventions

    ERIC Educational Resources Information Center

    Windisch, Hendrickje Catriona

    2016-01-01

    Low basic skills levels of adults are a complex policy problem which has neither straightforward causes nor solutions, and successful interventions are still relatively rare. Tackling serious literacy and numeracy weaknesses among adults is challenging, partly because the task itself is difficult, and partly because even if accomplished…

  2. Understanding Lifelong Learning and Adult Education Policy in Estonia: Tendencies and Contradictions

    ERIC Educational Resources Information Center

    Jogi, Larissa

    2012-01-01

    There have been many theoretical and empirical analyses of lifelong learning policies and how to implement, develop, measure and facilitate lifelong learning and lifelong learning policy in order to cater for the needs and requirements of individuals as well as society in general. The particular slant on lifelong learning in different countries…

  3. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  4. Privacy Expectations in Online Contexts

    ERIC Educational Resources Information Center

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  5. Impact of Different Policies on Unhealthy Dietary Behaviors in an Urban Adult Population: An Agent-Based Simulation Model

    PubMed Central

    Giabbanelli, Philippe J.; Arah, Onyebuchi A.; Zimmerman, Frederick J.

    2014-01-01

    Objectives. Unhealthy eating is a complex-system problem. We used agent-based modeling to examine the effects of different policies on unhealthy eating behaviors. Methods. We developed an agent-based simulation model to represent a synthetic population of adults in Pasadena, CA, and how they make dietary decisions. Data from the 2007 Food Attitudes and Behaviors Survey and other empirical studies were used to calibrate the parameters of the model. Simulations were performed to contrast the potential effects of various policies on the evolution of dietary decisions. Results. Our model showed that a 20% increase in taxes on fast foods would lower the probability of fast-food consumption by 3 percentage points, whereas improving the visibility of positive social norms by 10%, either through community-based or mass-media campaigns, could improve the consumption of fruits and vegetables by 7 percentage points and lower fast-food consumption by 6 percentage points. Zoning policies had no significant impact. Conclusions. Interventions emphasizing healthy eating norms may be more effective than directly targeting food prices or regulating local food outlets. Agent-based modeling may be a useful tool for testing the population-level effects of various policies within complex systems. PMID:24832414

  6. EduCard. Adult Education Access Card. Policy Option Paper on Strategic Recommendation 4. First Edition.

    ERIC Educational Resources Information Center

    Porter, Dennis

    One recommendation of the 1989 California Strategic Plan for Adult Education is the use of EduCard. EduCard, the Adult Education Access Card, is a means of giving learners access to information about educational opportunities and providing administrators with machine-readable information on learners' prior education and traiing. Three models are:…

  7. Reflections from Latin America for Strengthening Youth and Adult Educational Policy and Process

    ERIC Educational Resources Information Center

    Mera, Carlos Zarco

    2004-01-01

    This article stems from the author's personal experience promoting processes in favour of youth and adult education as Secretary General of the Latin American Council for Adult Education. The author draws from the analyses and considerations presented in documents developed over the past seven years that reflect collective thinking and the…

  8. Adult Literacy Policies and Performance in the SADCC Region (Southern Africa).

    ERIC Educational Resources Information Center

    Bhola, H. S.

    While the implementation of adult literacy promotion can best be handled at the national level, some important things can be done at the Southern African Development Co-ordination Conference (SADCC) level. A persuasive argument can be made on behalf of adult literacy in the SADCC development strategy. The people need to be educated in the…

  9. Changing the Odds: Informing Policy with Research on How Adult Learners Succeed

    ERIC Educational Resources Information Center

    Condelli, Larry; Kirshstein, Rita; Silver-Pacuilla, Heidi; Reder, Stephen; Wrigley, Heide Spruck

    2010-01-01

    Research has identified the barriers adult learners face in attaining their education and English proficiency goals, entering and advancing in employment, succeeding in postsecondary education and training, and navigating service systems. Most adult learners face long odds in trying to meet these goals. What would it take to address these barriers…

  10. Policy-Driven for Lifelong Learning and Its Effects: Experiences of Working Adults in Taiwan

    ERIC Educational Resources Information Center

    Chang, Dian-Fu; Lin, Sung-Po

    2012-01-01

    Since the government enacted the "Lifelong Learning Act" in 2002, Taiwanese working adults consider lifelong learning as a better route to increase their employability or competitiveness at work. This study analyzed the survey on adults administered by the Ministry of Education in Taiwan in 2008, and statistics analysis showed a close…

  11. Adult Numeracy Development: Theory, Research, Practice. Series on Literacy: Research, Policy, and Practice.

    ERIC Educational Resources Information Center

    Gal, Iddo, Ed.

    This book contains 16 papers on the theory, research, and practice of adult numeracy development. The following papers are included: "The Numeracy Challenge" (Iddo Gal); "Numeracy, Mathematics, and Adult Learning" (Diane Coben); "Building a Problem-Solving Environment for Teaching Mathematics" (Peter Kloosterman, Bin Hassan Mohamad-Ali, Lynda R.…

  12. Sinking or Swimming: Findings from a Survey of State Adult Education Tuition and Financing Policies

    ERIC Educational Resources Information Center

    Foster, Marcie

    2012-01-01

    At no time in recent history has the importance of adult education been greater and the funding more threatened. Despite the fact that as many as 93 million adults in the U.S. may need basic skills services to improve their economic prospects, funding for these services is stagnating at the federal level and being slashed in statehouses and state…

  13. Older Adults with Intellectual Disabilities: Targets for Increasing Victimization, a Call for a Preemptive Screening Policy

    ERIC Educational Resources Information Center

    Strasser, Sheryl; O'Quin, Karen; Price, Thomas; Leyda, Elizabeth

    2012-01-01

    The aging population is a rapidly growing demographic in the United States. Isolation, limited autonomy, and declining physical and mental health render many older adults vulnerable to abuse, neglect, and exploitation. As the population grows, so does the need for Adult Protective Services (APS). This article highlights an ultrasensitive subgroup…

  14. Privacy and anonymity in the information society - challenges for the European Union.

    PubMed

    Tsoukalas, Ioannis A; Siozos, Panagiotis D

    2011-03-01

    Electronic information is challenging traditional views on property and privacy. The explosion of digital data, driven by novel web applications, social networking, and mobile devices makes data security and the protection of privacy increasingly difficult. Furthermore, biometric data and radiofrequency identification applications enable correlations that are able to trace our cultural, behavioral, and emotional states. The concept of privacy in the digital realm is transformed and emerges as one of the biggest risks facing today's Information Society. In this context, the European Union (EU) policy-making procedures strive to adapt to the pace of technological advancement. The EU needs to improve the existing legal frameworks for privacy and data protection. It needs to work towards a "privacy by education" approach for the empowerment of "privacy-literate" European digital citizens.

  15. [Right to privacy, reservation or secret. Changes in perspective of research on human genome].

    PubMed

    Figueroa Yañez, G

    1999-01-01

    1. Three kinds of privacy can be identified: territorial, bodily and, thirdly, psychological or spiritual. Cases and examples of each. 2. Two aspects are involved in breaches of the right to privacy--in any of its three forms-: the actual invasion of someone's privacy and the subsequent publication of the product thereof. 3. The right to privacy can enter into conflict with other constitutionally protected right such as the right to information, freedom of expression and freedom of scientific enquiry. 4. Research on the human genome has opened up a new area in privacy, given that it is unlawful to intrude into the genetic structure of a person without said person's lawful consent. Nothing is more private than a person's own individual genetic code. There may be exceptions to the right to genetic privacy: cases of lawful intrusion. 5. Unwarranted intrusion: discrimination in school admissions, employment contracts and insurance policies.

  16. A Web Policy Primer.

    ERIC Educational Resources Information Center

    Levine, Elliott

    2001-01-01

    Sound technology policies can spell the difference between an effective website and an online nightmare. An effective web development policy addresses six key areas: roles and responsibilities, content/educational value, privacy and safety, adherence to copyright laws, technical standards, and use of commercial sites and services. (MLH)

  17. Time series analysis of the impact of tobacco control policies on smoking prevalence among Australian adults, 2001–2011

    PubMed Central

    Coomber, Kerri; Durkin, Sarah J; Scollo, Michelle; Bayly, Megan; Spittal, Matthew J; Simpson, Julie A; Hill, David

    2014-01-01

    Abstract Objective To determine the impact of tobacco control policies and mass media campaigns on smoking prevalence in Australian adults. Methods Data for calculating the average monthly prevalence of smoking between January 2001 and June 2011 were obtained via structured interviews of randomly sampled adults aged 18 years or older from Australia’s five largest capital cities (monthly mean number of adults interviewed: 2375). The influence on smoking prevalence was estimated for increased tobacco taxes; strengthened smoke-free laws; increased monthly population exposure to televised tobacco control mass media campaigns and pharmaceutical company advertising for nicotine replacement therapy (NRT), using gross ratings points; monthly sales of NRT, bupropion and varenicline; and introduction of graphic health warnings on cigarette packs. Autoregressive integrated moving average (ARIMA) models were used to examine the influence of these interventions on smoking prevalence. Findings The mean smoking prevalence for the study period was 19.9% (standard deviation: 2.0%), with a drop from 23.6% (in January 2001) to 17.3% (in June 2011). The best-fitting model showed that stronger smoke-free laws, tobacco price increases and greater exposure to mass media campaigns independently explained 76% of the decrease in smoking prevalence from February 2002 to June 2011. Conclusion Increased tobacco taxation, more comprehensive smoke-free laws and increased investment in mass media campaigns played a substantial role in reducing smoking prevalence among Australian adults between 2001 and 2011. PMID:24940015

  18. Toilet privacy in hospital.

    PubMed

    Logan, Karen

    Good practice in toilet management and continence promotion can help hospital patients to maintain their dignity. This article reports on an audit that highlighted the issues important to patients and nurses in terms of improving privacy and dignity for inpatients using the toilet.

  19. Computers and Personal Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    Privacy is an issue that arises from the intersection of a demand for improved recordkeeping processes, and computing technology as the response to the demand. Recordkeeping in the United States centers on information about people. Modern day computing technology has the ability to maintain, store, and retrieve records quickly; however, this…

  20. Privacy vs. the Media.

    ERIC Educational Resources Information Center

    Naylor, David T.; Smith, Bruce D.

    1982-01-01

    Describes five learning activities designed to teach secondary students about the right of the public to know and the right of privacy. The activities will help teacher to extract information from Kubek's article and bring it to American history, government, sociology, or journalism classes. (AM)

  1. Privacy on thin ice? Considering the California Court of Appeal decision in Johnson v. Superior Court.

    PubMed

    Plosker, J A

    2001-01-01

    In Johnson v. Superior Court, the California Court of Appeal determined that a provision of a contract limiting the discovery of the identity of a sperm donor was against public policy and that the privacy interest did not protect against disclosure of this information. Although the court's analysis of the public policy exception to the enforcement of contracts was unnecessary, the opinion properly balances California's and petitioners' interests against an anonymous donor's privacy right.

  2. Collaborative Privacy - A Community-Based Privacy Infrastructure

    NASA Astrophysics Data System (ADS)

    Kolter, Jan; Kernchen, Thomas; Pernul, Günther

    The landscape of the World Wide Web with all its versatile services heavily relies on the disclosure of private user information. Service providers collecting more and more of these personal user data pose a growing privacy threat for users. Addressing user concerns privacy-enhancing technologies emerged. One goal of these technologies is to enable users to improve the control over their personal data. A famous representative is the PRIME project that aims for a holistic privacy-enhancing identity management system. However, approaches like the PRIME privacy architecture require service providers to change their server infrastructure and add specific privacy-enhancing components. In the near future, service providers are not expected to alter internal processes. In this paper, we introduce a collaborative privacy community that allows the open exchange of privacy-related information. We lay out the privacy community’s functions and potentials within a user-centric, provider-independent privacy architecture that will help foster the usage and acceptance of privacy-enhancing technologies.

  3. Educating the adult brain: How the neuroscience of learning can inform educational policy

    NASA Astrophysics Data System (ADS)

    Knowland, Victoria C. P.; Thomas, Michael S. C.

    2014-05-01

    The acquisition of new skills in adulthood can positively affect an individual's quality of life, including their earning potential. In some cases, such as the learning of literacy in developing countries, it can provide an avenue to escape from poverty. In developed countries, job retraining in adulthood contributes to the flexibility of labour markets. For all adults, learning opportunities increase participation in society and family life. However, the popular view is that adults are less able to learn for an intrinsic reason: their brains are less plastic than in childhood. This article reviews what is currently known from neuroscientific research about how brain plasticity changes with age, with a particular focus on the ability to acquire new skills in adulthood. Anchoring their review in the examples of the adult acquisition of literacy and new motor skills, the authors address five specific questions: (1) Are sensitive periods in brain development relevant to learning complex educational skills like literacy? (2) Can adults become proficient in a new skill? (3) Can everyone learn equally effectively in adulthood? (4) What is the role of the learning environment? (5) Does adult education cost too much? They identify areas where further research is needed and conclude with a summary of principles for enhancing adult learning now established on a neuroscience foundation.

  4. Identifiability and privacy in pluripotent stem cell research.

    PubMed

    Isasi, Rosario; Andrews, Peter W; Baltz, Jay M; Bredenoord, Annelien L; Burton, Paul; Chiu, Ing-Ming; Hull, Sara Chandros; Jung, Ji-Won; Kurtz, Andreas; Lomax, Geoffrey; Ludwig, Tenneille; McDonald, Michael; Morris, Clive; Ng, Huck Hui; Rooke, Heather; Sharma, Alka; Stacey, Glyn N; Williams, Clare; Zeng, Fanyi; Knoppers, Bartha Maria

    2014-04-03

    Data sharing is an essential element of research; however, recent scientific and social developments have challenged conventional methods for protecting privacy. Here we provide guidance for determining data sharing thresholds for human pluripotent stem cell research aimed at a wide range of stakeholders, including research consortia, biorepositories, policy-makers, and funders.

  5. Windows without Curtains: Computer Privacy and Academic Freedom

    ERIC Educational Resources Information Center

    McCaughey, Martha

    2003-01-01

    When armed police officers, with no warrant, confiscated and searched the computer from this author's state university office, she began to cross-examine her relationship to computers and to investigate professors' computer privacy at public universities. She had violated no university policy. She had simply received an anonymous e-mail (an e-mail…

  6. 75 FR 25870 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-10

    ... submit comments and who are not able to attend or speak at the meeting may submit comments at any time... within DHS, on DHS Immigration and Customs Enforcement (ICE) implementation of DHS privacy policy, and on the development of the National Strategy for Secure Online Transactions. The agenda will be posted...

  7. 75 FR 19622 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-15

    ...] Privacy Act of 1974; System of Records AGENCY: Defense Security Cooperation Agency, DoD. ACTION: Notice to... Certification Program, a voluntary program sponsored by the Defense Security Cooperation Agency and Departments... Policy and DoD Directive 5105.65, Defense Security Cooperation Agency.'' Purpose(s): Delete entry...

  8. Research in the Biotech Age: Can Informational Privacy Compete?

    ERIC Educational Resources Information Center

    Peekhaus, Wilhelm

    2008-01-01

    This article examines the privacy of personal medical information in the health research context. Arguing that biomedical research in Canada has been caught up in the government's broader neoliberal policy agenda that has positioned biotechnology as a strategic driver of economic growth, the author discusses the tension between informational…

  9. Risk-Based Models for Managing Data Privacy in Healthcare

    ERIC Educational Resources Information Center

    AL Faresi, Ahmed

    2011-01-01

    Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…

  10. Privacy Awareness: A Means to Solve the Privacy Paradox?

    NASA Astrophysics Data System (ADS)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  11. Privacy Practices of Health Social Networking Sites: Implications for Privacy and Data Security in Online Cancer Communities.

    PubMed

    Charbonneau, Deborah H

    2016-08-01

    While online communities for social support continue to grow, little is known about the state of privacy practices of health social networking sites. This article reports on a structured content analysis of privacy policies and disclosure practices for 25 online ovarian cancer communities. All of the health social networking sites in the study sample provided privacy statements to users, yet privacy practices varied considerably across the sites. The majority of sites informed users that personal information was collected about participants and shared with third parties (96%, n = 24). Furthermore, more than half of the sites (56%, n = 14) stated that cookies technology was used to track user behaviors. Despite these disclosures, only 36% (n = 9) offered opt-out choices for sharing data with third parties. In addition, very few of the sites (28%, n = 7) allowed individuals to delete their personal information. Discussions about specific security measures used to protect personal information were largely missing. Implications for privacy, confidentiality, consumer choice, and data safety in online environments are discussed. Overall, nurses and other health professionals can utilize these findings to encourage individuals seeking online support and participating in social networking sites to build awareness of privacy risks to better protect their personal health information in the digital age.

  12. Stakeholder Perspectives on Policies to Support Family Caregivers of Older Adults with Dementia

    ERIC Educational Resources Information Center

    Putnam, Michelle; Pickard, Joseph G.; Rodriguez, Carroll; Shear, Erin

    2010-01-01

    Persons with dementia are often excluded from consumer-directed home- and community-based service programs because they cannot direct their own care. Surrogates are permitted in some states, thereby allowing program participation. This study explored family caregiver perspectives on policies that support family needs related to providing care to…

  13. The Politics of Paternalism: Adult and Youth Perspectives on Youth Voice in Public Policy

    ERIC Educational Resources Information Center

    Conner, Jerusha Osberg; Ober, C. Nathan; Brown, Amanda S.

    2016-01-01

    Background/Context: Over the last two decades, youth involvement in policy advocacy has increased sharply, through youth councils, organizing coalitions, and new media forums. Currently 12 states and 140 American cities have youth councils or commissions established to advise policymakers on the impact of their legislation on youth. Despite their…

  14. Location Privacy in RFID Applications

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  15. Gaussian operations and privacy

    SciTech Connect

    Navascues, Miguel; Acin, Antonio

    2005-07-15

    We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states.

  16. "Media Mediators": Advocating an Alternate Paradigm for Critical Adult Education ICT Policy

    ERIC Educational Resources Information Center

    Remtulla, Karim A.

    2010-01-01

    This article explores the efficacy of current education program approaches to prepare instructors to achieve critical thinking and active learning from their students by integrating ICTs with traditional adult education practices. An argument is put forward that the increasing presence and influence of ICTs in education necessitates a paradigmatic…

  17. State Education Policy in the Field of Adult Education in Germany

    ERIC Educational Resources Information Center

    Hizhynska, Tetiana

    2016-01-01

    German experience of development and modernization of the field of adult education has been outlined in the paper. Historical development of the field and its recognition as an independent level in education have been considered. The aim of the field has been defined. It has been emphasized that the names of the field in Ukraine and Germany…

  18. The Learning Imperative. National Education and Training Targets and Adult Learners. A NIACE Policy Discussion Paper.

    ERIC Educational Resources Information Center

    National Inst. of Adult Continuing Education, Leicester (England).

    This paper promotes the adoption of the lifetime learning targets that form part of National Education and Training Targets (NETTS) for Lifetime Learning in the United Kingdom. Section 1 defines NETTs as goals for levels of participation in education and training. Section 2 considers the characteristics and current profile of adult learners.…

  19. Global Polity in Adult Education and UNESCO: Landmarking, Brokering and Framing Policy

    ERIC Educational Resources Information Center

    Milana, Marcella

    2016-01-01

    Aknowledging the complexity of local-global interconnections, the author argues for the adoption of a global polity perspective in adult education, here applied to study mobilisation processes that occur through UNESCO. The findings point to three processes that cross geopolitical borders and professional interests: "landmarking," by…

  20. Evaluating the privacy properties of telephone metadata.

    PubMed

    Mayer, Jonathan; Mutchler, Patrick; Mitchell, John C

    2016-05-17

    Since 2013, a stream of disclosures has prompted reconsideration of surveillance law and policy. One of the most controversial principles, both in the United States and abroad, is that communications metadata receives substantially less protection than communications content. Several nations currently collect telephone metadata in bulk, including on their own citizens. In this paper, we attempt to shed light on the privacy properties of telephone metadata. Using a crowdsourcing methodology, we demonstrate that telephone metadata is densely interconnected, can trivially be reidentified, and can be used to draw sensitive inferences.

  1. Privacy, confidentiality, and electronic medical records.

    PubMed Central

    Barrows, R C; Clayton, P D

    1996-01-01

    The enhanced availability of health information in an electronic format is strategic for industry-wide efforts to improve the quality and reduce the cost of health care, yet it brings a concomitant concern of greater risk for loss of privacy among health care participants. The authors review the conflicting goals of accessibility and security for electronic medical records and discuss nontechnical and technical aspects that constitute a reasonable security solution. It is argued that with guiding policy and current technology, an electronic medical record may offer better security than a traditional paper record. PMID:8653450

  2. Evaluating the privacy properties of telephone metadata

    PubMed Central

    Mayer, Jonathan; Mutchler, Patrick; Mitchell, John C.

    2016-01-01

    Since 2013, a stream of disclosures has prompted reconsideration of surveillance law and policy. One of the most controversial principles, both in the United States and abroad, is that communications metadata receives substantially less protection than communications content. Several nations currently collect telephone metadata in bulk, including on their own citizens. In this paper, we attempt to shed light on the privacy properties of telephone metadata. Using a crowdsourcing methodology, we demonstrate that telephone metadata is densely interconnected, can trivially be reidentified, and can be used to draw sensitive inferences. PMID:27185922

  3. Engaging the U.S. Congress in the oral health of special-needs adults: lessons from pediatric oral health policy.

    PubMed

    Edelstein, Burton L

    2013-01-01

    The U.S. Congress has a long history of attending to insurance coverage for children's oral health services while being relatively silent about adult dental care. Yet many adults, made vulnerable by their disabilities and illnesses, are dependent upon governmental programs. This paper contrasts the robust history of federal legislative action in support of children's oral health with the lack of attention to adults' oral health to identify approaches that advocates may consider when engaging Congress in improving oral health for disabled and older adults. It provides a historical context of Congressional action on dental coverage from Medicaid and Medicare in the 1960s through passage of the Affordable Care Act in 2010 and explicates the misconception that Congress has demonstrated about the importance of oral health for adults' well-being and general health. Drivers and strategies for policy change are described and recommendations are made to expand coverage for vulnerable adults.

  4. How to motivate adults with low literacy and numeracy skills to engage and persist in learning: A literature review of policy interventions

    NASA Astrophysics Data System (ADS)

    Windisch, Hendrickje Catriona

    2016-06-01

    Low basic skills levels of adults are a complex policy problem which has neither straightforward causes nor solutions, and successful interventions are still relatively rare. Tackling serious literacy and numeracy weaknesses among adults is challenging, partly because the task itself is difficult, and partly because even if accomplished successfully, the returns on the investment (of expertise, time and money) are uncertain. The Survey of Adult Skills, an international investigation conducted in 22 member and two partner countries of the Organisation for Economic Co-operation and Development (OECD) as part of the Programme for the International Assessment of Adult Competencies (PIAAC), has revealed that a considerable number of adults possess only limited literacy and numeracy skills. Governments now recognise the need to upskill these adults in order to maintain national prosperity. This literature review examines current evidence on policy interventions for adults with low literacy and numeracy proficiencies to pinpoint what has so far proven to motivate adults to join and persist in basic literacy and numeracy learning. The author identifies three approaches which seem promising in helping to address individual learners' needs: (1) adapting instruction to learners' needs by means of regular assessment (formative assessment); (2) complementary e-learning (blended learning); and (3) contextualisation of basic skills provision both at work and at home (workplace learning and family literacy). The central challenge is to put the evidence to work.

  5. Adult Literacy for Development in Ethiopia: A Review of Policy and Performance at Mid-Point.

    ERIC Educational Resources Information Center

    Bhola, H. S.

    When Ethiopia launched its National Literacy Campaign (NLC) in July 1979, it was announced that illiteracy would be removed from the urban areas of the country by 1982 and from rural Ethiopia by 1987. By the end of the 12th round of the NLC in February 1985, 16.9 million youths and adults had been covered by the campaign, and 12 million (almost…

  6. 41 CFR 105-64.107 - What standards of conduct apply to employees with privacy-related responsibilities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... conduct apply to employees with privacy-related responsibilities? 105-64.107 Section 105-64.107 Public... SERVICES ADMINISTRATION Regional Offices-General Services Administration 64-GSA PRIVACY ACT RULES 64.1-Policies and Responsibilities § 105-64.107 What standards of conduct apply to employees with...

  7. Regulating genetic privacy in the online health information era.

    PubMed

    Magnusson, Roger S

    2002-01-01

    As the clinical implications of the genetic components of disease come to be better understood, there is likely to be a significant increase in the volume of genetic information held within clinical records. As patient health care records, in turn, come on-line as part of broader health information networks, there is likely to be considerable pressure in favour of special laws protecting genetic privacy. This paper reviews some of the privacy challenges posed by electronic health records, some government initiatives in this area, and notes the impact that developments in genetic testing will have upon the 'genetic content' of e-health records. Despite the sensitivity of genetic information, the paper argues against a policy of 'genetic exceptionalism', and its implications for genetic privacy laws.

  8. CPR - adult - slideshow

    MedlinePlus

    ... this important distinction for online health information and services. Learn more about A.D.A.M.'s editorial policy , editorial process and privacy policy . A.D.A.M. is also a founding member of Hi-Ethics and subscribes to the principles of the Health on the Net Foundation (www. ...

  9. Privacy Law and Print Photojournalism.

    ERIC Educational Resources Information Center

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  10. Child Advocacy and Family Privacy.

    ERIC Educational Resources Information Center

    Feshbach, Seymour; Feshbach, Norma Deitch

    This paper discusses the issues involved in achieving a balance between a child's rights to protection and adequate care and a family's rights to privacy and autonomy. The paper advocates a shift from the current norm of privacy concerning parents' child rearing practices towards increased openness and freer community-family communication. In view…

  11. Student Privacy and School Responsibility.

    ERIC Educational Resources Information Center

    Gluckman, Ivan

    1987-01-01

    This pamphlet considers students' right to privacy and the application of this right to the confidentiality of information disclosed to administrators and counselors. Privacy is also considered in regard to special problems associated with counseling students about drugs, contraceptives, sexually transmitted diseases, abortion, and possible threat…

  12. Privacy Issues and New Technologies.

    ERIC Educational Resources Information Center

    Colman, Sue

    1997-01-01

    Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…

  13. 39 CFR 266.2 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PRIVACY OF INFORMATION § 266.2 Policy. It is the... to provide the means for individuals to know: (a) Of the existence of all Postal Service Privacy Act... establishment or revision of a computer matching program....

  14. 39 CFR 266.2 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PRIVACY OF INFORMATION § 266.2 Policy. It is the... to provide the means for individuals to know: (a) Of the existence of all Postal Service Privacy Act... establishment or revision of a computer matching program....

  15. 39 CFR 266.2 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PRIVACY OF INFORMATION § 266.2 Policy. It is the... to provide the means for individuals to know: (a) Of the existence of all Postal Service Privacy Act... establishment or revision of a computer matching program....

  16. 39 CFR 266.2 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PRIVACY OF INFORMATION § 266.2 Policy. It is the... to provide the means for individuals to know: (a) Of the existence of all Postal Service Privacy Act... establishment or revision of a computer matching program....

  17. An Exploratory Study of the Factors That Influence Enrolling in Alternative Educational Options: Adult Perceptions and Implications for Policy and Practice

    ERIC Educational Resources Information Center

    Kocsis-McNerney, Violet

    2013-01-01

    This research obtained information using focus groups as qualitative method to determine the factors that influenced alternative education decisions. The purpose of this study was to help bridge theory, research, and educational practices and examine policy reform efforts. Through the lenses of returning adult education students, this research…

  18. "It Is Difficult to Be a Woman with a Dream of an Education:" Challenging U.S. Adult Basic Education Policies to Support Women Immigrants' Self-Determination

    ERIC Educational Resources Information Center

    Cuban, Sondra; Stromquist, Nelly P.

    2009-01-01

    Women immigrants are an increasing population in the U.S. and in the Adult Basic Education (ABE) system, particularly in English to Speakers of Other Languages (ESOL) programmes. The authors argue that their numerical predominance and comprehensive needs are not factored into U.S. ABE policies by reformers who are anxious about the system being…

  19. User Privacy in RFID Networks

    NASA Astrophysics Data System (ADS)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  20. 78 FR 42945 - Health Information Technology Policy Committee Vacancy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-18

    ... OFFICE Health Information Technology Policy Committee Vacancy AGENCY: Government Accountability Office... Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy Committee (Health IT.... ARRA requires that one member have expertise in health information privacy and security. Due to...

  1. 48 CFR 239.7102 - Policy and responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SYSTEM, DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102 Policy and responsibilities. ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Policy...

  2. Quality of Life and Social Isolation Among Caregivers of Adults with Schizophrenia: Policy and Outcomes.

    PubMed

    Hayes, Laura; Hawthorne, Graeme; Farhall, John; O'Hanlon, Brendan; Harvey, Carol

    2015-07-01

    Services have been increasingly directed at supporting carers of people living with mental illness but it is difficult to evaluate the impact of service change where benchmarks for carer functioning are sparse. Sixty Australian carers were assessed regarding their quality of life, psychological distress, social isolation and caregiving experience. Their scores were compared with two matched community samples and previous studies. Carers were ten times more likely to be socially isolated and quality of life was significantly less than matched community samples. Over 40 % of the carer sample met criteria for probable psychiatric disorder. Comparison of caregiving experiences with a study 15 years ago showed no improvement in negative caregiving experiences. Carers still face considerable challenges to their wellbeing as they support people living with mental illness, in spite of progress in the development of policy and services.

  3. Surgical patients' and nurses' opinions and expectations about privacy in care.

    PubMed

    Akyüz, Elif; Erdemir, Firdevs

    2013-09-01

    The purpose of this study was to determine the opinions and expectations of patients and nurses about privacy during a hospital admission for surgery. The study explored what enables and maintains privacy from the perspective of Turkish surgical patients and nurses. The study included 102 adult patients having surgery and 47 nurses caring for them. Data were collected via semistructured questionnaire by face-to-face interviews. The results showed that patients were mostly satisfied by the respect shown to their privacy by the nurses but were less confident of the confidentiality of their personal data. It was found that patients have expectations regarding nursing approaches and attitudes about acknowledging and respecting patient autonomy and confidentiality. It is remarkable that while nurses focused on the physical dimension of privacy, patients focused on informational and psychosocial dimensions of privacy, as well as its physical dimension.

  4. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  5. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  6. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  7. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  8. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  9. 78 FR 7798 - Privacy Act of 1974; Department of Homeland Security U.S. Immigration and Customs Enforcement-010...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... more accurately reflect the types of information collected and maintained on Confidential Informants... place of birth, immigration history, documentation of information received and monetary payment, and... residents. As a matter of policy, DHS extends administrative Privacy Act protections to all...

  10. Privacy as an enabler, not an impediment: building trust into health information exchange.

    PubMed

    McGraw, Deven; Dempsey, James X; Harris, Leslie; Goldman, Janlori

    2009-01-01

    Building privacy and security protections into health information technology systems will bolster trust in such systems and promote their adoption. The privacy issue, too long seen as a barrier to electronic health information exchange, can be resolved through a comprehensive framework that implements core privacy principles, adopts trusted network design characteristics, and establishes oversight and accountability mechanisms. The public policy challenges of implementing this framework in a complex and evolving environment will require improvements to existing law, new rules for entities outside the traditional health care sector, a more nuanced approach to the role of consent, and stronger enforcement mechanisms.

  11. User Centric Policy Management

    ERIC Educational Resources Information Center

    Cheek, Gorrell P.

    2013-01-01

    Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protecting this information is a challenge. Access control policy composition is complex, laborious and…

  12. 45 CFR 5.4 - Relationship between the FOIA and the Privacy Act of 1974.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Relationship between the FOIA and the Privacy Act of 1974. 5.4 Section 5.4 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION FREEDOM OF INFORMATION REGULATIONS Basic Policy § 5.4 Relationship between the FOIA and the Privacy Act of 1974. (a) Coverage. The FOIA and...

  13. 32 CFR 2400.22 - Freedom of Information Act and Privacy Act requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Freedom of Information Act and Privacy Act... SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.22 Freedom of Information Act and...

  14. 75 FR 70924 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee's...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-19

    ... Policy Committee's Workgroups: Meaningful Use, Privacy & Security Tiger Team, Enrollment, Governance... December 2010: December 3rd Privacy & Security Tiger Team, 10 a.m. to 12 p.m./ET; December 3rd Meaningful..../ET; December 8th Enrollment Workgroup, 11 a.m. to 2 p.m./ET; December 9th Privacy & Security...

  15. 75 FR 36658 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee's...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ... Policy Committee's Workgroups: Meaningful Use, Privacy & Security Tiger Team, Enrollment, Adoption... & Security Tiger Team, 10 a.m. to 12 p.m./ET; July 8th Certification/Adoption Workgroup, 10 a.m. to 12 p.m./ET; July 9th Privacy & Security Tiger Team, 10 a.m. to 1 p.m./ET; July 13th Privacy & Security...

  16. 75 FR 65485 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee's...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... Policy Committee's Workgroups: Meaningful Use, Privacy & Security Tiger Team, Enrollment, Governance... Privacy & Security Tiger Team, 10 a.m. to 12 p.m./ET; November 9th Meaningful Use Workgroup, 10 a.m. to 12..., 11 a.m. to 2 p.m./ET; and November 22nd Privacy & Security Tiger Team, 10 a.m. to 12...

  17. 76 FR 4352 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee's...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-25

    ... Policy Committee's Workgroups: Meaningful Use, Privacy & Security Tiger Team, Enrollment, Governance... meetings during February 2011: February 4th, Privacy & Security Tiger Team, 10 a.m. to 12 p.m./ET; February.... to 2 p.m./ET; February 14th, Privacy & Security Tiger Team, 10 a.m. to 12 p.m./ET; February...

  18. 45 CFR 5b.3 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the policy of the Department to protect the privacy of individuals to the fullest extent possible... responsibilities of the Department, and responsibilities of the Department for disclosing records which the...

  19. 45 CFR 5b.3 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the policy of the Department to protect the privacy of individuals to the fullest extent possible... responsibilities of the Department, and responsibilities of the Department for disclosing records which the...

  20. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute...

  1. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute...

  2. Extensive Nonadditivity of Privacy

    NASA Astrophysics Data System (ADS)

    Smith, Graeme; Smolin, John A.

    2009-09-01

    Quantum information theory establishes the ultimate limits on communication and cryptography in terms of channel capacities for various types of information. The private capacity is particularly important because it quantifies achievable rates of quantum key distribution. We study the power of quantum channels with limited private capacity, focusing on channels that dephase in random bases. These display extensive nonadditivity of private capacity: a channel with 2log⁡d input qubits that has a private capacity less than 2, but when used together with a second channel with zero private capacity, the joint capacity jumps to (1/2)log⁡d. In contrast to earlier work which found nonadditivity vanishing as a fraction of input size or conditional on unproven mathematical assumptions, this provides a natural setting manifesting nonadditivity of privacy of the strongest possible sort.

  3. Extensive nonadditivity of privacy.

    PubMed

    Smith, Graeme; Smolin, John A

    2009-09-18

    Quantum information theory establishes the ultimate limits on communication and cryptography in terms of channel capacities for various types of information. The private capacity is particularly important because it quantifies achievable rates of quantum key distribution. We study the power of quantum channels with limited private capacity, focusing on channels that dephase in random bases. These display extensive nonadditivity of private capacity: a channel with 2logd input qubits that has a private capacity less than 2, but when used together with a second channel with zero private capacity, the joint capacity jumps to (1/2)logd. In contrast to earlier work which found nonadditivity vanishing as a fraction of input size or conditional on unproven mathematical assumptions, this provides a natural setting manifesting nonadditivity of privacy of the strongest possible sort.

  4. Oscillating in and out of place: Experiences of older adults residing in homeless shelters in Montreal, Quebec.

    PubMed

    Burns, Victoria F

    2016-12-01

    Aging in place is desirable from the perspective of older adults and policy makers alike. However, the meaning of 'place' for adults experiencing homelessness has been largely overlooked. Addressing this gap, this constructivist grounded theory study discusses the meaning of place for 15 older adults residing in emergency homeless shelters in Montreal, Quebec. Findings revealed that four interrelated dimensions of place-that is, control, comfort, privacy, and security were instrumental in supporting participants' ability to feel in place across housed-homeless trajectories. Many felt out of place well before they lost their housing and some felt more in place during homelessness when shelter conditions and interpersonal relations supported these four dimensions. The empirically-driven model oscillating in and out of place extends and nuances existing understandings of aging in place and provides insights into policy and practice solutions for older adults who may not have a stable place to call home.

  5. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.

    PubMed

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-11-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.

  6. Improving Programs through Policy and Professional Development: Lessons Learned from Project Educational Quality in Adult Literacy (EQuAL).

    ERIC Educational Resources Information Center

    Alamprese, Judith A.; Stickney, Eric M.

    Project Educational Quality in Adult Literacy (EQuAL) was initiated to improve the quality of adult basic and literacy education (ABLE) services provided to adult learners in Pennsylvania. Project EQuAL's objectives were as follows: (1) set performance standards to facilitate delivery of quality ABLE programs to adult learners; (2) institute a…

  7. Automated Detection of Privacy Sensitive Conditions in C-CDAs: Security Labeling Services at the Department of Veterans Affairs.

    PubMed

    Bouhaddou, Omar; Davis, Mike; Donahue, Margaret; Mallia, Anthony; Griffin, Stephania; Teal, Jennifer; Nebeker, Jonathan

    2016-01-01

    Care coordination across healthcare organizations depends upon health information exchange. Various policies and laws govern permissible exchange, particularly when the information includes privacy sensitive conditions. The Department of Veterans Affairs (VA) privacy policy has required either blanket consent or manual sensitivity review prior to exchanging any health information. The VA experience has been an expensive, administratively demanding burden on staffand Veterans alike, particularly for patients without privacy sensitive conditions. Until recently, automatic sensitivity determination has not been feasible. This paper proposes a policy-driven algorithmic approach (Security Labeling Service or SLS) to health information exchange that automatically detects the presence or absence of specific privacy sensitive conditions and then, to only require a Veteran signed consent for release when actually present. The SLS was applied successfully to a sample of real patient Consolidated-Clinical Document Architecture(C-CDA) documents. The SLS identified standard terminology codes by both parsing structured entries and analyzing textual information using Natural Language Processing (NLP).

  8. Personal Privacy Clarification Act

    THOMAS, 112th Congress

    Rep. Deutch, Theodore E. [D-FL-19

    2011-01-26

    02/08/2011 Referred to the Subcommittee on Technology, Information Policy, Intergovernmental Relations and Procurement Reform . (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Privacy and Security - a Way to Manage the Dilemma

    NASA Astrophysics Data System (ADS)

    Peissl, Walter

    Privacy and security are often seen as opposites in a zero-sum game. The more you want from one, the less you get from the other. To overcome this dilemma the PRISE project (EU-funded by PASR/DG Enterprise) developed a methodology to establish sets of criteria for privacy enhancing security technologies. These sets of criteria are applicable on different levels (research, development, implementation) and by different actors (research coordinators, industry, policy-makers, public and private users). The use of these criteria is intended to contribute directly to a tangible and demonstrable improvement in security as accepted and acceptable security technologies will be more easily implemented, more widely used and confronted with less rejection by the general public and users of these technologies. A similar set of criteria is used for certification for the European Privacy Seal. Both the privacy by design approach and the certification scheme should increase the competitiveness of European security industries by providing guidance on the provision of widely acceptable security technologies.

  10. Physical underpinnings of privacy

    NASA Astrophysics Data System (ADS)

    Renes, Joseph M.; Boileau, Jean-Christian

    2008-09-01

    One of the remarkable features of quantum mechanics is the ability to ensure secrecy. Private states embody this effect, as they are precisely those multipartite quantum states from which two parties can produce a shared secret that cannot under any circumstances be correlated with an external system. Naturally, these play an important role in quantum key distribution (QKD) and quantum information theory. However, a general distillation method has heretofore been missing. Inspired by Koashi’s complementary control scenario [M. Koashi, e-print arXiv:0704.3661 (2007)], we give a new definition of private states in terms of one party’s potential knowledge of two complementary measurements made on the other and use this to construct a general method of private state distillation using quantum error-correcting codes. The procedure achieves the same key rate as recent, more information-theoretic approaches while demonstrating the physical principles underlying privacy of the key. Additionally, the same approach can be used to establish the hashing inequality for entanglement distillation, as well as the direct quantum coding theorem.

  11. 77 FR 15835 - Privacy Act of 1974: Revision of Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... ADMINISTRATION Privacy Act of 1974: Revision of Privacy Act System of Records AGENCY: Small Business Administration (SBA). ACTION: Notice of Revision of Privacy Act Systems of Records. SUMMARY: SBA is revising the Privacy Act Systems of Records for the Loan System, SBA 21 (``SOR 21'') and the Suspension and...

  12. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    SciTech Connect

    Rothstein, M.A.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  13. Privacy versus autonomy: a tradeoff model for smart home monitoring technologies.

    PubMed

    Townsend, Daphne; Knoefel, Frank; Goubran, Rafik

    2011-01-01

    Smart homes are proposed as a new location for the delivery of healthcare services. They provide healthcare monitoring and communication services, by using integrated sensor network technologies. We validate a hypothesis regarding older adults' adoption of home monitoring technologies by conducting a literature review of articles studying older adults' attitudes and perceptions of sensor technologies. Using current literature to support the hypothesis, this paper applies the tradeoff model to decisions about sensor acceptance. Older adults are willing to trade privacy (by accepting a monitoring technology), for autonomy. As the information captured by the sensor becomes more intrusive and the infringement on privacy increases, sensors are accepted if the loss in privacy is traded for autonomy. Even video cameras, the most intrusive sensor type were accepted in exchange for the height of autonomy which is to remain in the home.

  14. Adult Literacy: Policies, Programs and Practices. Lessons Learned. Final Report = Alphabetisation des adultes: politiques, programmes et pratiques. Etude bilan. Rapport final.

    ERIC Educational Resources Information Center

    2001

    Studies and reports examining the problems associated with adult literacy and efforts to address those problems were reviewed to identify lessons for adult literacy programs in Canada and elsewhere. Low literacy levels were linked to above-average rates of personal and/or learning difficulties, low self-esteem, associated social problems, and…

  15. Children and Adults with Attention-Deficit/Hyperactivity Disorder

    MedlinePlus

    ... good work. Children and Adults with Attention-Deficit/Hyperactivity Disorder (CHADD), is a national nonprofit organization that ... 2017 by Children and Adults with Attention-Deficit/Hyperactivity Disorder (CHADD). All Rights Reserved. Press Privacy Attention ...

  16. 39 CFR 262.5 - Systems (Privacy).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a... 39 Postal Service 1 2011-07-01 2011-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system...

  17. 39 CFR 262.5 - Systems (Privacy).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION RECORDS AND INFORMATION MANAGEMENT DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system...

  18. Effective Management of Information Security and Privacy

    ERIC Educational Resources Information Center

    Anderson, Alicia

    2006-01-01

    No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…

  19. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C... operation of a system of records using commercial information technology services or information...

  20. 78 FR 69552 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... Department of the Navy 32 CFR Part 701 Privacy Act; Implementation AGENCY: Department of the Navy, DoD... Privacy Act Program by adding the (k)(5) exemption to accurately describe the basis for exempting the... Department of the Navy Privacy Program rules that will exempt applicable Department records and/or...

  1. 78 FR 17471 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-21

    ... Internal Revenue Service Privacy Act of 1974 AGENCY: Internal Revenue Service, Treasury. ACTION: IRS notice...) and the Congressional committees responsible for oversight of the Privacy Act in accordance with the Privacy Act of 1974, OMB Guidelines on the Conduct of Matching Programs (54 FR 25818, June 19, 1989),...

  2. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 2 2011-04-01 2011-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  3. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance: Treasury 1 2013-07-01 2013-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  4. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  5. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  6. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 2 2012-04-01 2012-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  7. 75 FR 61994 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-07

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC25 Privacy Act; Implementation AGENCY: Office of Foreign... requirements of the Privacy Act of 1974, as amended, the Department of the Treasury is amending its regulations... records by revising the number and title of the Privacy Act system of records for which an exemption...

  8. 76 FR 71293 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-17

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC37 Privacy Act; Implementation AGENCY: Office of the Secretary, Treasury. ACTION: Proposed rule. SUMMARY: In accordance with the requirements of the Privacy Act... Identification Number Records'' from certain provisions of the Privacy Act. DATES: Comments must be received...

  9. 78 FR 69550 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD... updating the DIA Privacy Act Program by adding the (k)(2) and (k)(5) exemptions to accurately describe the... rules. These changes will allow the Department to add exemption rules to the DIA Privacy Program...

  10. 78 FR 69551 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD... proposing to update the DIA Privacy Act Program by adding the (k)(2) and (k)(5) exemptions to accurately... exemption rules to the DIA Privacy Program rules that will exempt applicable Department records...

  11. 76 FR 49661 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... Office of the Secretary 32 CFR Part 323 Privacy Act; Implementation AGENCY: Defense Logistics Agency, DoD... updating the DLA Privacy Act Program Rules by updating the language of the (k)(2) exemption. The update of the exemption will more accurately describe the basis for exempting the records. The Privacy...

  12. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance: Treasury 1 2012-07-01 2012-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  13. Sexiled: Privacy Acquisition Strategies of College Roommates

    ERIC Educational Resources Information Center

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  14. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  15. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 5 2014-04-01 2014-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  16. 75 FR 54162 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-03

    ... Services [CMS Computer Match No. 2010-01; HHS Computer Match No. 1006] Privacy Act of 1974 AGENCY...: Notice of Computer Matching Program (CMP). SUMMARY: In accordance with the requirements of the Privacy.... The Privacy Act provides an opportunity for interested persons to comment on the proposed...

  17. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  18. 77 FR 56771 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-14

    ... Department of the Navy 32 CFR Part 701 Privacy Act; Implementation AGENCY: Department of the Navy, DoD... Privacy Act Program by adding the (k)(2) exemption to accurately describe the basis for exempting the... nonsubstantive changes dealing with DoD's management of its Privacy Programs. DoD expects no opposition to...

  19. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 2 2014-04-01 2014-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  20. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 2 2013-04-01 2013-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  1. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  2. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  3. 77 FR 57015 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD... that have been previously claimed for the records in another Privacy Act system of records. DIA is updating the DIA Privacy Act Program by adding the (k)(2) and (k)(5) exemptions to accurately describe...

  4. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 5 2013-04-01 2013-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  5. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 5 2011-04-01 2011-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  6. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance: Treasury 1 2011-07-01 2011-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  7. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 5 2012-04-01 2012-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  8. 75 FR 65229 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-22

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC26 Privacy Act; Implementation AGENCY: Departmental... of the Privacy Act of 1974, as amended, the Department of the Treasury is revising the title of an... FURTHER INFORMATION CONTACT: Dale Underwood, Privacy Act officer, Department of the Treasury,...

  9. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  10. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 1 2014-07-01 2014-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  11. Alcohol policy changes and 22-year trends in individual alcohol consumption in a Swiss adult population: a 1993–2014 cross-sectional population-based study

    PubMed Central

    Dumont, Shireen; Marques-Vidal, Pedro; Favrod-Coune, Thierry; Theler, Jean-Marc; Gaspoz, Jean-Michel; Broers, Barbara; Guessous, Idris

    2017-01-01

    Objective Evidence on the impact of legislative changes on individual alcohol consumption is limited. Using an observational study design, we assessed trends in individual alcohol consumption of a Swiss adult population following the public policy changes that took place between 1993 and 2014, while considering individual characteristics and secular trends. Design Cross-sectional study. Setting Swiss general adult population. Participants Data from 18 963 participants were collected between 1993 and 2014 (aged 18–75 years). Outcome measures We used data from the ‘Bus Santé’ study, an annual health survey conducted in random samples of the adult population in the State of Geneva, Switzerland. Individual alcohol intake was assessed using a validated food frequency questionnaire. Individual characteristics including education were self-reported. 7 policy changes (6 about alcohol and 1 about tobacco) that occurred between 1993 and 2014 defined 6 different periods. We predicted alcohol intake using quantile regression with multivariate analysis for each period adjusting for participants' characteristics and tested significance periods. Sensitivity analysis was performed including drinkers only, the 10th centile of highest drinkers and smoker's status. Results Between 1993 and 2014, participants' individual alcohol intake decreased from 7.1 to 5.4 g/day (24% reduction, p<0.001). Men decreased their alcohol intake by 34% compared with 22% for women (p<0.001). The decrease in alcohol intake remained significant when considering drinkers only (28% decrease, p<0.001) and the 10th centile highest drinkers (24% decrease, p<0.001). Consumption of all alcoholic beverages decreased between 1993 and 2014 except for the moderate consumption of beer, which increased. After adjustment for participants' characteristics and secular trends, no independent association between alcohol legislative changes and individual alcohol intake was found. Conclusions Between 1993 and

  12. Privacy and data security in E-health: requirements from the user's perspective.

    PubMed

    Wilkowska, Wiktoria; Ziefle, Martina

    2012-09-01

    In this study two currently relevant aspects of using medical assistive technologies were addressed-security and privacy. In a two-step empirical approach that used focus groups (n = 19) and a survey (n = 104), users' requirements for the use of medical technologies were collected and evaluated. Specifically, we focused on the perceived importance of data security and privacy issues. Outcomes showed that both security and privacy aspects play an important role in the successful adoption of medical assistive technologies in the home environment. In particular, analysis of data with respect to gender, health-status and age (young, middle-aged and old users) revealed that females and healthy adults require, and insist on, the highest security and privacy standards compared with males and the ailing elderly.

  13. Preserving Patient Privacy When Sharing Same-Disease Data.

    PubMed

    Liu, Xiaoping; Li, Xiao-Bai; Motiwalla, Luvai; Li, Wenjun; Zheng, Hua; Franklin, Patricia D

    2016-10-01

    Medical and health data are often collected for studying a specific disease. For such same-disease microdata, a privacy disclosure occurs as long as an individual is known to be in the microdata. Individuals in same-disease microdata are thus subject to higher disclosure risk than those in microdata with different diseases. This important problem has been overlooked in data-privacy research and practice, and no prior study has addressed this problem. In this study, we analyze the disclosure risk for the individuals in same-disease microdata and propose a new metric that is appropriate for measuring disclosure risk in this situation. An efficient algorithm is designed and implemented for anonymizing same-disease data to minimize the disclosure risk while keeping data utility as good as possible. An experimental study was conducted on real patient and population data. Experimental results show that traditional reidentification risk measures underestimate the actual disclosure risk for the individuals in same-disease microdata and demonstrate that the proposed approach is very effective in reducing the actual risk for same-disease data. This study suggests that privacy protection policy and practice for sharing medical and health data should consider not only the individuals' identifying attributes but also the health and disease information contained in the data. It is recommended that data-sharing entities employ a statistical approach, instead of the HIPAA's Safe Harbor policy, when sharing same-disease microdata.

  14. Preserving Patient Privacy When Sharing Same-Disease Data

    PubMed Central

    LIU, XIAOPING; LI, XIAO-BAI; MOTIWALLA, LUVAI; LI, WENJUN; ZHENG, HUA; FRANKLIN, PATRICIA D.

    2016-01-01

    Medical and health data are often collected for studying a specific disease. For such same-disease microdata, a privacy disclosure occurs as long as an individual is known to be in the microdata. Individuals in same-disease microdata are thus subject to higher disclosure risk than those in microdata with different diseases. This important problem has been overlooked in data-privacy research and practice, and no prior study has addressed this problem. In this study, we analyze the disclosure risk for the individuals in same-disease microdata and propose a new metric that is appropriate for measuring disclosure risk in this situation. An efficient algorithm is designed and implemented for anonymizing same-disease data to minimize the disclosure risk while keeping data utility as good as possible. An experimental study was conducted on real patient and population data. Experimental results show that traditional reidentification risk measures underestimate the actual disclosure risk for the individuals in same-disease microdata and demonstrate that the proposed approach is very effective in reducing the actual risk for same-disease data. This study suggests that privacy protection policy and practice for sharing medical and health data should consider not only the individuals’ identifying attributes but also the health and disease information contained in the data. It is recommended that data-sharing entities employ a statistical approach, instead of the HIPAA's Safe Harbor policy, when sharing same-disease microdata. PMID:27867450

  15. Privacy-enhanced electronic mail

    NASA Astrophysics Data System (ADS)

    Bishop, Matt

    1990-06-01

    The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.

  16. Teaching Notes to Casebook I: Faculty Employment Policies [and] Casebook I: Faculty Employment Policies. Using Cases in Higher Education. The Jossey-Bass Higher and Adult Education Series.

    ERIC Educational Resources Information Center

    Honan, James P., Ed.; Rule, Cheryl Sternman, Ed.

    "Casebook I: Faculty Employment Policies" presents six cases developed by the Project on Faculty Appointments at the Harvard Graduate School of Education. "Teaching Notes to Casebook I" provides detailed suggestions and strategies for leading an effective classroom or workshop discussion about each of the casebook's six case studies, all of which…

  17. The Privacy War: Enabling Siblings the Right to Privacy.

    ERIC Educational Resources Information Center

    Sagarese, Margaret; Giannetti, Charlene

    2003-01-01

    Polled adolescents, parents, and teachers to determine where the child's right to privacy ends and the parent's responsibility to protect begins. Results indicate that the worst offenders tend to be siblings. The paper presents a three-pronged strategy to help parents deal with battling children: recognize the breaches, negotiate the truce…

  18. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy.

    PubMed

    Mulligan, Deirdre K; Koopman, Colin; Doty, Nick

    2016-12-28

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy's disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy's essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy's multiple uses across multiple contexts.This article is part of the themed issue 'The ethical impact of data science'.

  19. Comprehensive quantitative analysis on privacy leak behavior.

    PubMed

    Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan

    2013-01-01

    Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects.

  20. Comprehensive Quantitative Analysis on Privacy Leak Behavior

    PubMed Central

    Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan

    2013-01-01

    Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects. PMID:24066046

  1. Legal and ethical issues in neuroimaging research: human subjects protection, medical privacy, and the public communication of research results.

    PubMed

    Kulynych, Jennifer

    2002-12-01

    Humans subjects research entails significant legal and ethical obligations. Neuroimaging researchers must be familiar with the requirements of human subjects protection, including evolving standards for the protection of privacy and the disclosure of risk in "non-therapeutic" research. Techniques for creating veridical surface renderings from volumetric anatomical imaging data raise new privacy concerns, particularly under the federal medical privacy regulation. Additionally, neuroimaging researchers must consider their obligation to communicate research results responsibly. The emerging field of neuroethics should strive to raise awareness of these issues and to involve neuroimaging researchers in the legal, ethical, and policy debates that currently surround human subjects research.

  2. Obesity Prevention Practices and Policies in Child Care Settings Enrolled and Not Enrolled in the Child and Adult Care Food Program.

    PubMed

    Liu, Sherry T; Graffagino, Cheryl L; Leser, Kendall A; Trombetta, Autumn L; Pirie, Phyllis L

    2016-09-01

    Objectives The United States Department of Agriculture's Child and Adult Care Food Program (CACFP) provides meals and snacks to low-income children in child care. This study compared nutrition and physical activity practices and policies as well as the overall nutrition and physical activity environments in a sample of CACFP and non-CACFP child care settings. Methods A random stratified sample of 350 child care settings in a large Midwestern city and its suburbs, was mailed a survey on obesity prevention practices and policies concerning menu offerings, feeding practices, nutrition and physical activity education, activity levels, training, and screen time. Completed surveys were obtained from 229 of 309 eligible child care settings (74.1 % response rate). Chi square tests were used to compare practices and policies in CACFP and non-CACFP sites. Poisson and negative binomial regression were used to examine associations between CACFP and total number of practices and policies. Results Sixty-nine percent of child care settings reported CACFP participation. A significantly higher proportion of CACFP sites reported offering whole grain foods daily and that providers always eat the same foods that are offered to the children. CACFP sites had 1.1 times as many supportive nutrition practices as non-CACFP sites. CACFP participation was not associated with written policies or physical activity practices. Conclusions for Practice There is room for improvement across nutrition and physical activity practices and policies. In addition to food reimbursement, CACFP participation may help promote child care environments that support healthy nutrition; however, additional training and education outreach activities may be needed.

  3. Panel: RFID Security and Privacy

    NASA Astrophysics Data System (ADS)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  4. Facebook: When Education Meets Privacy

    ERIC Educational Resources Information Center

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  5. Personal Privacy and the Archivist.

    ERIC Educational Resources Information Center

    Raaska, Helmi

    This discussion of the protection of privacy as it relates to archival functions draws on the procedures followed by three repositories: the Gerald R. Ford Presidential Library (NLF), the Michigan Historical Collections (MHC) at the University of Michigan, and the Walter P. Reuther Library of Labor and Urban Affairs (Reuther Library) at Wayne…

  6. Privacy and Security: A Bibliography.

    ERIC Educational Resources Information Center

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  7. The Paradoxical Value of Privacy

    DTIC Science & Technology

    2003-03-14

    on occurrence of identity theft correlated with consumer behavior so that probabilities of at least such clear privacy problems could be assigned to...now. And, the market typically needs to learn from experience, so consumer behavior is likely to lag behind any current reality. So one answer is that

  8. 78 FR 46256 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code...

  9. The privacy rule that's not.

    PubMed

    Sobel, Richard

    2007-01-01

    HIPAA is often described as a privacy rule. It is not. In fact, HIPAA is a disclosure regulation, and it has effectively dismantled the longstanding moral and legal tradition of patient confidentiality. By permitting broad and easy dissemination of patients' medical information, with no audit trails for most disclosures, it has undermined both medical ethics and the effectiveness of medical care.

  10. College and University Privacy Leadership

    ERIC Educational Resources Information Center

    Showalter, Rodney J.

    2009-01-01

    Beginning in the late 1990s, international corporations began hiring Chief Privacy Officers (CPOs). By 2002, large universities responded to this trend by creating this distinct position or modifying an existing job description to include CPO responsibilities. While not every registrar assumes the role of CPO, increasing practical and legislative…

  11. Efficient Discovery of De-identification Policies Through a Risk-Utility Frontier.

    PubMed

    Xia, Weiyi; Heatherly, Raymond; Ding, Xiaofeng; Li, Jiuyong; Malin, Bradley

    2013-01-01

    Modern information technologies enable organizations to capture large quantities of person-specific data while providing routine services. Many organizations hope, or are legally required, to share such data for secondary purposes (e.g., validation of research findings) in a de-identified manner. In previous work, it was shown de-identification policy alternatives could be modeled on a lattice, which could be searched for policies that met a prespecified risk threshold (e.g., likelihood of re-identification). However, the search was limited in several ways. First, its definition of utility was syntactic - based on the level of the lattice - and not semantic - based on the actual changes induced in the resulting data. Second, the threshold may not be known in advance. The goal of this work is to build the optimal set of policies that trade-off between privacy risk (R) and utility (U), which we refer to as a R-U frontier. To model this problem, we introduce a semantic definition of utility, based on information theory, that is compatible with the lattice representation of policies. To solve the problem, we initially build a set of policies that define a frontier. We then use a probability-guided heuristic to search the lattice for policies likely to update the frontier. To demonstrate the effectiveness of our approach, we perform an empirical analysis with the Adult dataset of the UCI Machine Learning Repository. We show that our approach can construct a frontier closer to optimal than competitive approaches by searching a smaller number of policies. In addition, we show that a frequently followed de-identification policy (i.e., the Safe Harbor standard of the HIPAA Privacy Rule) is suboptimal in comparison to the frontier discovered by our approach.

  12. Efficient Discovery of De-identification Policies Through a Risk-Utility Frontier

    PubMed Central

    Xia, Weiyi; Heatherly, Raymond; Ding, Xiaofeng; Li, Jiuyong; Malin, Bradley

    2014-01-01

    Modern information technologies enable organizations to capture large quantities of person-specific data while providing routine services. Many organizations hope, or are legally required, to share such data for secondary purposes (e.g., validation of research findings) in a de-identified manner. In previous work, it was shown de-identification policy alternatives could be modeled on a lattice, which could be searched for policies that met a prespecified risk threshold (e.g., likelihood of re-identification). However, the search was limited in several ways. First, its definition of utility was syntactic - based on the level of the lattice - and not semantic - based on the actual changes induced in the resulting data. Second, the threshold may not be known in advance. The goal of this work is to build the optimal set of policies that trade-off between privacy risk (R) and utility (U), which we refer to as a R-U frontier. To model this problem, we introduce a semantic definition of utility, based on information theory, that is compatible with the lattice representation of policies. To solve the problem, we initially build a set of policies that define a frontier. We then use a probability-guided heuristic to search the lattice for policies likely to update the frontier. To demonstrate the effectiveness of our approach, we perform an empirical analysis with the Adult dataset of the UCI Machine Learning Repository. We show that our approach can construct a frontier closer to optimal than competitive approaches by searching a smaller number of policies. In addition, we show that a frequently followed de-identification policy (i.e., the Safe Harbor standard of the HIPAA Privacy Rule) is suboptimal in comparison to the frontier discovered by our approach. PMID:25520961

  13. Cross-National Patterns of Participation in Adult Education and Policy Trends in Korea, Norway, and Vietnam

    ERIC Educational Resources Information Center

    Desjardins, Richard; Melo, Veriene; Lee, Jeongwoo

    2016-01-01

    Using comparative data, this article examines the level and distribution of participation in adult education (AE) opportunities among countries that participated in PIAAC (Programme for the International Assessment of Adult Competencies). It considers observed cross-country patterns in relation to some mechanisms that drive unequal chances to…

  14. Lifelong Learning Policy and Practice: The Impact of Accreditation on Education and Training Provision for Adult Women in the UK.

    ERIC Educational Resources Information Center

    Coats, Maggie

    In the United Kingdom, these two perspectives on lifelong learning sit uneasily together: emphasis on adults in employment and a focus on diversity and widening participation in adult education. A recent emphasis on accreditation with implications for funding has affected diversity and participation objectives because involving assessment,…

  15. National Information Policy: An Insider's View and National and International Information Policies and The Analysis of Information Policy.

    ERIC Educational Resources Information Center

    Bearman, Toni Carbo; And Others

    1986-01-01

    In the first of three articles, Bearman discusses trends, policy issues, and implications of policy developments for the library and information community. Jacob and Rings discuss copyright law, regulations, culture, language, recent technological developments, economic aspects, and privacy legislation. Burger provides background on evaluating…

  16. Update on Performance in Tobacco Control: A Longitudinal Analysis of the Impact of Tobacco Control Policy and the US Adult Smoking Rate, 2011-2013

    PubMed Central

    Lapin, Brittany; Cameron, Brianna J.; Carr, Thomas A.; Morley, Christopher P.

    2016-01-01

    Context: Tobacco use remains the leading cause of preventable death in the United States. States and municipalities have instituted a variety of tobacco control measures (TCMs) to address the significant impact tobacco use has on population health. The American Lung Association annually grades state performance of tobacco control using the State of Tobacco Control grading framework. Objective: To gain an updated understanding of how recent efforts in tobacco control have impacted tobacco use across the United States, using yearly State of Tobacco Control TCM assessments. Design: The independent TCM variables of smoke-free air score, cessation score, excise tax, and percentage of recommended funding were selected from the American Lung Association State of Tobacco Control reports. Predictors of adult smoking rates were determined by a mixed-effects model. Setting/Participants: The 50 US states and District of Columbia. Main Outcome Measure: Adult smoking rate in each state from 2011 to 2013. Results: The average adult smoking rate decreased significantly from 2011 to 2013 (21.3% [SD: 3.5] to 19.3% [SD: 3.5], P = .016). All forms of TCMs varied widely in implementation levels across states. Excise taxes (β = −.812, P = .006) and smoke-free air regulations (β = −.057, P = .008) were significant, negative predictors of adult smoking. Cessation services (β = .015, P = .46) did not have a measurable effect on adult smoking. Conclusion: Tobacco control measures with the strongest influence on adult smoking include the state excise tax and state smoke-free air regulations. The lack of robust funding for tobacco cessation services across the majority of US states highlights an important shortfall in current tobacco control policy. PMID:26618847

  17. Interventions to prevent or reduce the level of frailty in community-dwelling older adults: a protocol for a scoping review of the literature and international policies

    PubMed Central

    Puts, Martine T E; Toubasi, Samar; Atkinson, Esther; Ayala, Ana Patricia; Andrew, Melissa; Ashe, Maureen C; Bergman, Howard; Ploeg, Jenny; McGilton, Katherine S

    2016-01-01

    Introduction With ageing comes increased vulnerability such that older adults’ ability to recover from acute illnesses, fall-related injuries and other stresses related to the physical ageing processes declines. This increased vulnerability, also known as frailty, is common in older adults and associated with increased healthcare service use and adverse health outcomes. Currently, there is no overview of available interventions to prevent or reduce the level of frailty (as defined by study's authors) which will help healthcare providers in community settings caring for older adults. We will address this gap by reviewing interventions and international polices that are designed to prevent or reduce the level of frailty in community-dwelling older adults. Methods and analysis We will conduct a scoping review using the updated guidelines of Arksey and O'Malley to systematically search the peer-reviewed journal articles to identify interventions that aimed to prevent or reduce the level of frailty. We will search grey literature for international policies. The 6-stage scoping review model involves: (1) identifying the research question; (2) identifying relevant studies; (3) selecting studies; (4) charting the data; (5) collating, summarising and reporting the results and (6) consulting with key stakeholders. Ethics and dissemination Our scoping review will use robust methodology to search for available interventions focused on preventing or reducing the level of frailty in community-dwelling older adults. We will consult with stakeholders to find out whether they find the frailty interventions/policies useful and to identify the barriers and facilitators to their implementation in Canada. We will disseminate our findings to relevant stakeholders at local, national and international levels by presenting at relevant meetings and publishing the findings. Our review will identify gaps in research and provide healthcare providers and policymakers with an overview of

  18. Urban vs. rural differences in prescription opioid misuse among adults in the United States: Informing region specific drug policies and interventions

    PubMed Central

    Rigg, Khary K.; Monnat, Shannon M.

    2014-01-01

    Background In the United States, prescription opioid misuse (POM) has increased dramatically over the past two decades. However, there are still questions regarding whether rural/urban differences in adult POM exist, and more important, which factors might be driving these differences. Methods Using data from the 2011 and 2012 National Survey on Drug Use and Health, we conducted unadjusted and adjusted binary logistic regression analyses to determine the association between metropolitan status and POM. Results We found that urban adults were more likely to engage in POM compared to rural adults because of their higher use of other substances, including alcohol, marijuana, and other illicit and prescription drugs, and because of their greater use of these substances as children. Conclusions This study fills an important gap in the literature by not only identifying urban/rural differences in POM, but by also pointing out factors that mediate those differences. Because patterns and predictors of POM can be unique to geographic region, this research is critical to informing tailored interventions and drug policy decisions. Specifically, these data suggest that interventions should be aimed at urban illicit drug users and adults in manual labor occupations. PMID:25458403

  19. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    PubMed

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  20. Privacy for All Students? Talking about and around Trans Students in "Public"

    ERIC Educational Resources Information Center

    Stiegler, Sam

    2016-01-01

    This paper places under examination the arguments used to fight against school policies and legislation intended to guarantee and protect the rights of trans students. That is, the paper's central investigation works to uncover the regimes of truth about children, gender, race and privacy implicit in the methods employed by activists who seek to…

  1. Federal Privacy Laws That Apply to Children and Education. Safeguarding Data

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2014

    2014-01-01

    This table identifies and briefly describes the following federal policies that safeguard and protect the confidentiality of personal information: (1) Family Educational Rights and Privacy Act (FERPA); (2) Protection of Pupil Rights Amendment (PPRA); (3) Health Insurance Portability and Accountability Act (HIPAA); (4) Children's Online Privacy…

  2. 16 CFR 313.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who... finance, accounting, or audit department of any company (or while employed by such a company or financial... not have a choice about your acquisition. (ii) Substantial delay of customer's transaction....

  3. EPA's Public Access Website Children’s Privacy and Copyright Issues

    EPA Pesticide Factsheets

    This document establishes the policy for protecting the privacy of children on EPA’s Public Access Web site. It concerns the collection, both online and off, of information from ages 13 and under, and the display of Personally Identifying Information (PII)

  4. 17 CFR 160.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... customers required. 160.5 Section 160.5 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... notice to customers required. (a)(1) General rule. You must provide a clear and conspicuous notice to customers that accurately reflects your privacy policies and practices not less than annually during...

  5. Network Policy and Economic Doctrines

    ERIC Educational Resources Information Center

    Atkinson, Robert D.

    2010-01-01

    For many years, debates over telecommunications network policy were marked by a relative lack of partisan and ideological conflict. In the last decade, this has changed markedly. Today, debates over a whole set of issues, including broadband competition, net neutrality, copyright, privacy, and others, have become more contentious. These…

  6. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Model privacy form and examples. 160.2 Section 160.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A...

  7. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  8. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  9. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  10. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  11. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  12. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  13. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  14. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendixA of this part, consistent with the instructions in...

  15. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  16. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  17. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  18. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  19. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  20. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  1. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  2. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  3. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  4. 6 CFR 1002.4 - Responses to Privacy Act requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Responses to Privacy Act requests. 1002.4 Section 1002.4 Domestic Security PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 1002.4 Responses to Privacy Act requests. (a) Acknowledgement. The Privacy Act...

  5. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  6. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  7. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Model privacy form and... (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A...

  8. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 13 Business Credit and Assistance 1 2014-01-01 2014-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  9. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  10. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  11. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  12. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  13. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  14. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 13 Business Credit and Assistance 1 2013-01-01 2013-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  15. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  16. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  17. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-25

    ... compliance fundamentals, privacy and data security, and the privacy compliance life cycle. A learning lunch... SECURITY Office of the Secretary Public Workshop: Privacy Compliance Workshop AGENCY: Privacy Office, DHS. ACTION: Notice Announcing Public Workshop. SUMMARY: The Department of Homeland Security Privacy...

  18. 48 CFR 2424.203 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Policy. 2424.203 Section... SOCIOECONOMIC PROGRAMS PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 2424.203 Policy. See 24 CFR part 15 for the HUD regulations which implement the Freedom of Information Act....

  19. 48 CFR 2124.102-70 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Policy. 2124.102-70 Section 2124.102-70 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT, FEDERAL EMPLOYEES... FREEDOM OF INFORMATION Protection of Individual Privacy 2124.102-70 Policy. Records retained by...

  20. 48 CFR 2024.202 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Policy. 2024.202 Section... PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 2024.202 Policy. The provisions at 10 CFR part 9, subpart A, Freedom of Information Act Regulations, are applicable to...

  1. 48 CFR 2824.202 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Policy. 2824.202 Section... OF PRIVACY AND FREEDOM OF INFORMATION Freedom of Information Act 2824.202 Policy. Procedures for processing Freedom of Information Act requests are set forth in Departmental regulations and 28 CFR part 16....

  2. 32 CFR 316.5 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INFORMATION SYSTEMS AGENCY PRIVACY PROGRAM § 316.5 Policy. It is the policy of DISA: (a) To preserve the... personal information in a manner that assures that such action is for a necessary and lawful purpose; that the information is timely and accurate for its intended use; and that adequate safeguards are...

  3. 32 CFR 316.5 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INFORMATION SYSTEMS AGENCY PRIVACY PROGRAM § 316.5 Policy. It is the policy of DISA: (a) To preserve the... personal information in a manner that assures that such action is for a necessary and lawful purpose; that the information is timely and accurate for its intended use; and that adequate safeguards are...

  4. 32 CFR 316.5 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INFORMATION SYSTEMS AGENCY PRIVACY PROGRAM § 316.5 Policy. It is the policy of DISA: (a) To preserve the... personal information in a manner that assures that such action is for a necessary and lawful purpose; that the information is timely and accurate for its intended use; and that adequate safeguards are...

  5. 32 CFR 316.5 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INFORMATION SYSTEMS AGENCY PRIVACY PROGRAM § 316.5 Policy. It is the policy of DISA: (a) To preserve the... personal information in a manner that assures that such action is for a necessary and lawful purpose; that the information is timely and accurate for its intended use; and that adequate safeguards are...

  6. 32 CFR 316.5 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INFORMATION SYSTEMS AGENCY PRIVACY PROGRAM § 316.5 Policy. It is the policy of DISA: (a) To preserve the... personal information in a manner that assures that such action is for a necessary and lawful purpose; that the information is timely and accurate for its intended use; and that adequate safeguards are...

  7. Biobank research and the right to privacy.

    PubMed

    Ursin, Lars Oystein

    2008-01-01

    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants in biobank research might have to privacy, it is argued that their interests should be related to the specific context of the provision and reception of health care that participation in biobank research is connected with. Rather than just granting participants an exclusive right to or ownership of their health information, which must be waived in order to make biobank research possible, the privacy aspect of health information should be viewed in light of the moral rights and duties that accompany any involvement in a research based system of health services.

  8. 78 FR 39021 - Privacy Act of 1974; Privacy and Civil Liberties Oversight Board; System of Records Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-28

    ... From the Federal Register Online via the Government Publishing Office PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD Privacy Act of 1974; Privacy and Civil Liberties Oversight Board; System of Records Notice AGENCY: Privacy and Civil Liberties Oversight Board. ACTION: Notice of Privacy Act system of...

  9. 75 FR 44803 - Privacy Act of 1974; Notice of a New Privacy Act System of Records (SORN), Ginnie Mae Master...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-29

    ... URBAN DEVELOPMENT Privacy Act of 1974; Notice of a New Privacy Act System of Records (SORN), Ginnie Mae... Privacy Act SORN. SUMMARY: The Department proposes to establish a new Privacy Act SORN subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. The Ginne Mae Master Subservicer System will be used...

  10. Informational Privacy and the Public's Health: The Model State Public Health Privacy Act

    PubMed Central

    Gostin, Lawrence O.; Hodge, James G.; Valdiserri, Ronald O.

    2001-01-01

    Protecting public health requires the acquisition, use, and storage of extensive health-related information about individuals. The electronic accumulation and exchange of personal data promises significant public health benefits but also threatens individual privacy; breaches of privacy can lead to individual discrimination in employment, insurance, and government programs. Individuals concerned about privacy invasions may avoid clinical or public health tests, treatments, or research. Although individual privacy protections are critical, comprehensive federal privacy protections do not adequately protect public health data, and existing state privacy laws are inconsistent and fragmented. The Model State Public Health Privacy Act provides strong privacy safeguards for public health data while preserving the ability of state and local public health departments to act for the common good. PMID:11527765

  11. Security and privacy services in pathology for enabling trustworthy personal health.

    PubMed

    Blobel, Bernd

    2012-01-01

    Ubiquitous personalized health services including ePathology require comprehensive, but trusted interoperability. Contrary to regulated traditional health services with pre-defined policies, the solutions enabled by mobile, pervasive and autonomous technology have to follow dynamic policies reflecting the customers changing health services needs, expectations and wishes as well as contextual and environmental conditions. The paper introduces an advanced approach to trustworthy architecture-centric, policy-driven pHealth solutions. To some details, it also addresses security and privacy ontologies to represent the required policies.

  12. [Patients' perception about privacy in the hospital].

    PubMed

    Pupulim, Jussara Simone Lenzi; Sawada, Namie Okino

    2012-01-01

    This qualitative study aimed to describe the hospitalized patient's perception on privacy, using the content analysis. Thirty-four patients, who have been at least three days hospitalized, participated in the study. The analysis of the information was based on the theoretical reference framework of privacy, and evidenced three thematic categories: dignity and respect, autonomy, personal and territorial space. The subjects pointed out behavioral factors, which contribute or not for the protection and maintenance of the privacy in the hospital, highlighting respect as the most important aspect, followed by personal control over situations that violate privacy. Patients believe that privacy is linked to dignity and respect, depends on the demarcation of the personal/territorial space and the autonomy's security; and that these concepts and attitudes are connected and essential to protect privacy in the hospital context.

  13. The Student's Privacy: A Developing Concept. Part One: Student Records. A Legal Memorandum.

    ERIC Educational Resources Information Center

    National Association of Secondary School Principals, Reston, VA.

    The Family Educational Rights and Privacy Act (FERPA) provides students and parents access to their school records and requires that parents and adult students be informed of their rights under the act. FERPA also bars the release of records to third parties without written consent except to school district employees possessing legitimate…

  14. Modelling and enforcing privacy for medical data disclosure across Europe.

    PubMed

    Boussi Rahmouni, Hanene; Solomonides, Tony; Casassa Mont, Marco; Shiu, Simon

    2009-01-01

    The harmonization of data protection legislation in Europe has been theoretically achieved by means of the EU directive on data protection. In practice the harmonization is not absolute and conflicts and inconsistencies continue to exist in the way Member States are implementing the directive. The integration of different European medical systems by means of grid technologies will continue to be challenging if technology does not intervene to enhance interoperability between national regulatory frameworks on data protection. In this paper we present an approach to automate privacy requirements for the sharing of patient data across Europe on a healthgrid domain and ensure its enforcement internally and within external domains where the data might travel. This approach is based on the semantic modelling of privacy obligations that are of legal, ethical or cultural nature. These requirements are for the sharing of personal data between different European Member States. Our model reflects both similarities and conflicts, if any, between the different Member States. This allows us to reason on the safeguards a data controller should ask from an organization belonging to another Member State before disclosing medical data to them. The system will also generate the relevant set of policies to be enforced at the process level of the grid to ensure privacy compliance before allowing access to the data.

  15. Genetic privacy: orthodoxy or oxymoron?

    PubMed Central

    Sommerville, A; English, V

    1999-01-01

    In this paper we question whether the concept of "genetic privacy" is a contradiction in terms. And, if so, whether the implications of such a conclusion, inevitably impact on how society comes to perceive privacy and responsibility generally. Current law and ethical discourse place a high value on self-determination and the rights of individuals. In the medical sphere, the recognition of patient "rights" has resulted in health professionals being given clear duties of candour and frankness. Dilemmas arise, however, when patients decline to know relevant information or, knowing it, refuse to share it with others who may also need to know. This paper considers the notions of interconnectedness and responsibility to others which are brought to the fore in the genetic sphere and which challenge the primacy afforded to personal autonomy. It also explores the extent to which an individual's perceived moral obligations can or should be enforced. PMID:10226920

  16. Trust and Privacy in Healthcare

    NASA Astrophysics Data System (ADS)

    Singleton, Peter; Kalra, Dipak

    This paper considers issues of trust and privacy in healthcare around increased data-sharing through Electronic Health Records (EHRs). It uses a model structured around different aspects of trust in the healthcare organisation’s reasons for greater data-sharing and their ability to execute EHR projects, particularly any associated confidentiality controls. It reflects the individual’s personal circumstances and attitude to use of health records.

  17. Fictional privacy among Facebook users.

    PubMed

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  18. Patient Privacy: A Consumer Protection Approach

    PubMed Central

    Brannigan, Vincent M.

    1983-01-01

    In the United States, a “Constitutional Analysis” of medical data privacy has been so far unsuccessful in obtaining significant protection. Statutory protection has evolved primarily to protect the citizen against the state, not to vindicate the privacy interest of the individual. A “Consumer Protection” approach rather than a right to privacy approach can be used to develop a coherent, practical approach to the needs of various parties in the health care system in the U.S.

  19. Student Privacy versus Campus Safety: Has Recent Legislation Compromised Privacy Rights?

    ERIC Educational Resources Information Center

    van der Kaay, Christopher D.

    This study highlights major legislation addressing campus safety and crime reporting and discusses its impact on a student's right to privacy. The 1974 Family Educational Rights and Privacy Act, commonly referred to as the "Buckley Amendment," was among the first pieces of legislation to address the notion of student privacy and confidentiality.…

  20. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... From the Federal Register Online via the Government Publishing Office NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and...: Patti F. Stockman, Privacy Act Officer, Office of the Chief Information Officer, National...

  1. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... candidates for and recipients of training associated with ] NASA Astronaut and Human Space Flight Programs... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Each...

  2. The Dimensions of Privacy: A National Opinion Research Survey of Attitudes Toward Privacy.

    ERIC Educational Resources Information Center

    Westin, Alan F.; And Others

    This report of a Louis Harris poll on national opinions toward privacy includes the questions asked of each respondent and the responses given in categories related to age, sex, employment, income, and other factors. There are chapters on privacy and the individual; personal privacy in relation to governmental and business institutions; privacy…

  3. The Need for Privacy and the Application of Privacy to the Day Care Setting.

    ERIC Educational Resources Information Center

    Jacobs, Ellen

    This paper, focusing on young children's need for privacy, describes a study conducted to determine the manner in which children in day care centers resolve the problem of reduced space and time for privacy. A pilot study revealed that children displayed three privacy seeking behaviors: (1) verbal and nonverbal territorial behavior (use or defense…

  4. 77 FR 65206 - Privacy Act of 1974; Amendment of Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-25

    ... BOARD Privacy Act of 1974; Amendment of Privacy Act System of Records AGENCY: Merit Systems Protection... maintains subject to the Privacy Act of 1974 (5 U.S.C. 552a). MSPB/ GOVT-1, ``Appeals and Case Records,'' is being amended to reflect that its location is in the Office of the Clerk of the Board. Also, the...

  5. Privacy Challenges for Wireless Medical Devices

    SciTech Connect

    Lagesse, Brent J

    2010-01-01

    Implantable medical devices are becoming more pervasive as new technologies increase their reliability and safety. Furthermore, these devices are becoming increasingly reliant on wireless communication for interaction with the device. Such technologies have the potential to leak information that could be utilized by an attacker to threaten the lives of patients. Privacy of patient information is essential; however, this information is not the only privacy issue that must be considered. In this paper, we discuss why information privacy is insufficient for protecting patients from some attacks and how information regarding the presence of individual devices can leak vulnerabilities. Furthermore, we examine existing privacy enhancing algorithms and discuss their applicability to implantable medical devices.

  6. Ethical issues and policy analysis for genetic testing: Huntington's disease as a paradigm for diseases with a late onset.

    PubMed

    Lilani, Anjali

    2005-01-01

    This paper discusses the main ethical issues that arise when testing for genetic diseases with a late adult onset, such as Huntington's disease, take place. It is imperative to study genetic testing for HD and similar diseases because of the potential to influence future medical advances and the growing number of individuals who are considered pre-symptomatic. The main ethical issues are consent and privacy, prenatal testing and its implications, in addition to insurance discrimination. These issues are viewed from the perspective of genetic counselors, patients, the families of patients, and insurance companies. Policies put forth by the United States National Society of Genetic Counselors ("NSGC"), the Task Force on Genetic Testing, and the President's Council for Bioethics are also analyzed. Finally, new recommendations are proposed in order to ameliorate the ethical dilemmas encountered in genetic testing. These recommendations are largely based on existing policies and therefore involve amending current policies rather than revamping them.

  7. Public Policy Affirmations Affecting the Planning and Implementation of Developmental Services for Children and Adults with HIV Infection.

    ERIC Educational Resources Information Center

    Crocker, Allen C., Comp.; And Others

    The increasing number of individuals infected with symptomatic human immunodeficiency virus (HIV) infection has created a need to examine public policy issues and to further efforts in planning, implementing, and evaluating services for individuals with HIV infection and their families. A working conference was convened, which identified several…

  8. Adult Education and the Contested Terrain of Public Policy. Proceedings of the Annual Conference of the Canadian Association for the Study of Adult Education (21st, Toronto, Ontario May 30-31 and June 1, 2002). = L'Education des Adultes et le Domaine Controverse des Affaires Publiques. Actes Annuel de L'Association Canadienne pour L'Etude de L'Education des Adultes (21eme, Toronto, Ontario, 30-31 Mai et 1 Juin, 2002).

    ERIC Educational Resources Information Center

    Mojab, Shahrzad, Ed.; McQueen, William, Ed.

    This document contains the texts of 57 papers, 10 roundtables, and 7 symposia from a Canadian conference on adult education and public policy. The following are among the papers included: "Childhood, Schooling Family and Community" (Margarida Aguiar); "Voices Inside" (Irene C. Baird); "Beyond Personal Agency" (Rose…

  9. Policy Changes in Medicare Home Health Care: Challenges to Providing Family-Centered, Community-Based Care for Older Adults

    ERIC Educational Resources Information Center

    Davitt, Joan K.

    2009-01-01

    The Balanced Budget Act of 1997 (BBA) established new reimbursement systems in the Medicare home health fee-for-service benefit. Reimbursements were reduced to 1993 levels and per-beneficiary capitated limits were introduced for the first time. This article analyzes the impact of these changes on chronically ill older adults and their families.…

  10. Initial and Continuing Professional Development of Adult Educators from an Educational-Policy Perspective: Rethinking from Croatia

    ERIC Educational Resources Information Center

    Cepic, Renata; Mašic, Marijeta

    2016-01-01

    Notwithstanding the fact that adult education is accepted as an equal subsystem in all European countries, it is still characterised by a distinct level of differentiation in the approach and offer, and by a pronouncedly disorganised legislation, which may be seen in the heterogeneity of competences and qualifications expected from adult…

  11. Dispelling the Myth: An Analysis of Youth and Adult Crime Patterns in California over the Past 20 Years. Policy Report.

    ERIC Educational Resources Information Center

    Males, Mike; Macallair, Dan

    To examine the theory of growing criminality among today's youths, this study analyzes youth and adult crime rates in California from 1975 to 1991. Data were obtained from the California Department of Justice for arrest statistics by age, race, ethnicity, sex, and offense, statewide and by county and from the state department of finance. From 1978…

  12. Reflections on Policy in Adult Education and Community Learning (ACE), with Special Reference to "Koia! Koia! Towards a Learning Society"

    ERIC Educational Resources Information Center

    Tobias, Robert

    2002-01-01

    This paper undertakes a review of the report of the Adult Education and Community Learning Working Party released by the New Zealand Government in September 2001. It discusses a number of themes arising out of this report. However, the report is not seen in isolation, and the paper locates it in a wider context. It identifies some of the…

  13. Changing Skills for a Changing World: Recommendations for Adult Literacy Policy in Aotearoa/New Zealand. Occasional Paper Series.

    ERIC Educational Resources Information Center

    Johnson, Alice H.

    This report summarizes issues facing New Zealand's modern adult literacy movement and places it in the context of the rapidly changing skill demands of the 21st century. Part I introduces political, economic, and social issues facing New Zealand. Chapter 1 provides an overview of the issues and structures that create the current climate. Part II…

  14. From Dreams to Dust: The Deteriorating Labor Market Fortunes of Young Adults. Policy Issues Monograph 96-02.

    ERIC Educational Resources Information Center

    Sum, Andrew; And Others

    Over the past 2 decades, the inflation-adjusted median weekly earnings of full-time employed males and females decreased by 31% and 13%, respectively, and the deterioration in the real weekly earnings of young adults (ages 18-24) shows no signs of abatement. Male high school dropouts and graduates with no postsecondary schooling experienced the…

  15. Beyond Lawrence v. Texas: crafting a fundamental right to sexual privacy.

    PubMed

    Fasullo, Kristin

    2009-05-01

    After the watershed 2003 U.S. Supreme Court decision Lawrence v.Texas, courts are faced with the daunting task of navigating the bounds of sexual privacy in light of Lawrence's sweeping language and unconventional structure. This Note focuses on the specific issue of state governments regulating sexual device distribution. Evaluating the substantive due process rights of sexual device retailers and users, this Note ultimately argues that the privacy interest identified in Lawrence is sufficiently broad to protect intimate decisions to engage in adult consensual sexual behavior, including the liberty to sell, purchase, and use a sexual device.

  16. Policymaking to preserve privacy in disclosure of public health data: a suggested framework.

    PubMed

    Mizani, Mehrdad A; Baykal, Nazife

    2015-03-01

    Health organisations in Turkey gather a vast amount of valuable individual data that can be used for public health purposes. The organisations use rigid methods to remove some useful details from the data while publishing the rest of the data in a highly aggregated form, mostly because of privacy concerns and lack of standardised policies. This action leads to information loss and bias affecting public health research. Hence, organisations need dynamic policies and well-defined procedures rather than a specific algorithm to protect the privacy of individual data. To address this need, we developed a framework for the systematic application of anonymity methods while reducing and objectively reporting the information loss without leaking confidentiality. This framework acts as a roadmap for policymaking by providing high-level pseudo-policies with semitechnical guidelines in addition to some sample scenarios suitable for policymakers, public health programme managers and legislators.

  17. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    PubMed

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  18. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    PubMed Central

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  19. Just in Time Research: Privacy Practices

    ERIC Educational Resources Information Center

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  20. Privacy and Psychosomatic Stress: An Empirical Analysis.

    ERIC Educational Resources Information Center

    Webb, Stephen D.

    1978-01-01

    Examines the supposition that insufficient privacy is stressful to the individual. Data were obtained from urban centers in New Zealand. Findings support the hypothesis that a percieved lack of privacy is associated with psychosomatic stress. The relationship is specified by measures of stress and sex of respondents. (Author)

  1. Reconsidering the Right to Privacy in Canada

    ERIC Educational Resources Information Center

    Shade, Leslie Regan

    2008-01-01

    This article argues that post-September 11 political debates and legislation around security necessitates a reconsideration of a right to privacy in Canada. It looks at the proposal for a Canadian Charter of Privacy Rights promoted by Senator Sheila Finestone in the late 1990s and the current challenges of emergent material technologies…

  2. The Press, Privacy, and Community Mores.

    ERIC Educational Resources Information Center

    Glasser, Theodore L.

    Because of judicial indifference and legislative inaction, the conflict between the right of privacy and the freedom of the press is no closer to a resolution than it was a century ago. William Prosser's reduction of the common law of privacy into four separate torts has not solved the problem. The concept of "newsworthiness" has not been helpful…

  3. Contemporary Privacy Theory Contributions to Learning Analytics

    ERIC Educational Resources Information Center

    Heath, Jennifer

    2014-01-01

    With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems…

  4. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy of... accessed, used, or shared for any purpose other than to ensure compliance with this title or to facilitate a product recall to protect public health and safety. (c) A regulated seller who in good...

  5. Privacy and the National Information Infrastructure.

    ERIC Educational Resources Information Center

    Rotenberg, Marc

    1994-01-01

    Explains the work of Computer Professionals for Social Responsibility regarding privacy issues in the use of electronic networks; recommends principles that should be adopted for a National Information Infrastructure privacy code; discusses the need for public education; and suggests pertinent legislative proposals. (LRW)

  6. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 4 2013-10-01 2013-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  7. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 1 2014-10-01 2014-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  8. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  9. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  10. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  11. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  12. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 4 2012-10-01 2012-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  13. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  14. 78 FR 18473 - Army Privacy Act Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-27

    ... Department of the Army 32 CFR Part 505 Army Privacy Act Program AGENCY: Department of the Army, DoD. ACTION... Litigation Division when complaints citing the Privacy Act are filed in order to correct the mailing address in Sec. 505.12. The address for notifying the Army Litigation Division of cases citing the...

  15. Privacy-Preserving Location-Based Services

    ERIC Educational Resources Information Center

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  16. 77 FR 57013 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is updating the Defense Intelligence Agency Privacy Act Program, by adding the (k)(2) exemption to...

  17. Privacy Questions from Practicing School Nurses

    ERIC Educational Resources Information Center

    Bergren, Martha Dewey

    2004-01-01

    This Question and Answer (Q&A) article addresses practice issues related to school health records and school nursing documentation that were posed by school nurses in the field. Specifically, the questions addressed concern the following: education records, medication privacy issues, sharing of sensitive health information, privacy of…

  18. The Law, Computers, and Student Privacy.

    ERIC Educational Resources Information Center

    Curran, Robert

    1988-01-01

    The problem with privacy and computers is not technology but lack of systematic value education in those who use, teach, and learn about computers. A deeper issue than updating the law to the age of computers is integrating computers and the right to privacy into the world of education. (MSE)

  19. Privacy and Ethics in Undergraduate GIS Curricula

    ERIC Educational Resources Information Center

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  20. 76 FR 25409 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... AFFAIRS Privacy Act of 1974 AGENCY: Department of Veterans Affairs (VA). ACTION: Notice of Amendment to System of Records. SUMMARY: The Privacy Act of 1974 (5 U.S.C. 552a(e)(4)) requires that all agencies... amending the system by revising the System Location, Categories of Records in the System, Purpose,...