75 FR 18841 - Office for Civil Rights; Privacy Act of 1974, Amended System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
... Privacy Act of 1974, Federal Information Security Management Act of 2002, Computer Security Act of 1987... 1974, Federal Information Security Management Act of 2002, Computer Security Act of 1987, the Paperwork... Oversight, the Chair of the Senate Committee on Homeland Security and Governmental Affairs, and the...
75 FR 30411 - Privacy Act of 1974; Report of a Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-01
... Privacy Act of 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse... Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance Portability... systems and data files necessary for compliance with Title XI, Part C of the Social Security Act because...
77 FR 62059 - Privacy Act of 1974, as Amended; Revisions to Existing Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-11
... and forms, microfilm or microfiche, and in computer processable storage media such as personnel system... 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986... apply: The Privacy Act of 1974; the Federal Information Security Management Act of 2002; the Computer...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-01
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0089] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that...
78 FR 15734 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0010] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...
78 FR 15733 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0008] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...
78 FR 38724 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-27
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0006] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... Agreement that establishes a computer matching program between the Department of Homeland Security/U.S...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-21
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0067] Privacy Act of 1974; Computer Matching... Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...
78 FR 15731 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0011] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy Act of 1974; Computer Matching Program...
78 FR 15732 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0007] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy Act of 1974; Computer Matching Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-01
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration (SSA). ACTION: Notice of renewal of an existing...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-15
... 1021 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of existing computer... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0073] Privacy Act of 1974, as Amended...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-18
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0055] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration. ACTION: Notice of a renewal of an existing...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-17
...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer-matching... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0021] Privacy Act of 1974, as Amended...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-09
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0077] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Office of Personnel Management (OPM))--Match 1307 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-29
... Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0002] Privacy Act of 1974, as Amended...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-08
...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0010] Privacy Act of 1974, as Amended...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-20
... 1016 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0022] Privacy Act of 1974, as Amended...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-25
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0084] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1003 AGENCY: Social Security... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-09
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0066] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match 1305 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-25
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0083] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1015 AGENCY: Social Security... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-12
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0015] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match Number 1016 AGENCY: Social Security... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-28
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0040] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Railroad Retirement Board (RRB))--Match Number 1006 AGENCY: Social Security...: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L.) 100-503), amended the...
76 FR 21373 - Privacy Act of 1974; Report of a New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-15
... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance... 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986... established by State law; (3) support litigation involving the Agency; (4) combat fraud, waste, and abuse in...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-30
... notice of its renewal of an ongoing computer-matching program with the Social Security Administration... computer-matching program with the Committee on Homeland Security and Governmental Affairs of the Senate... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as amended; Notice of Computer Matching Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-10
... notice of its renewal of an ongoing computer-matching program with the Social Security Administration... computer-matching program with the Committee on Homeland Security and Governmental Affairs of the Senate... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as Amended; Notice of Computer Matching Program...
76 FR 7818 - Announcing a Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-11
... will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L. 100..., --Presentation on Science of Security relating to computer security research, --Presentation on Access of..., --A panel of Inspector Generals regarding privacy and security, and --Update on NIST Computer Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... safeguards for disclosure of Social Security benefit information to OPM via direct computer link for the... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and Social Security Administration AGENCY: Office of Personnel Management...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-16
... Security benefit information to OPM via direct computer link for the administration of certain programs by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and Social Security Administration AGENCY: Office of Personnel Management...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-05
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0052] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Labor (DOL))--Match Number 1003 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-21
... 1310 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer..., as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0007] Privacy Act of 1974, as Amended...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-18
... 1310 AGENCY: Social Security Administration (SSA) ACTION: Notice of a renewal of an existing computer..., as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0035] Privacy Act of 1974, as Amended...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-21
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0059] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Centers for Medicare & Medicaid Services (CMS))--Match Number 1076 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-14
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0022] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Centers for Medicare & Medicaid Services (CMS))--Match Number 1076 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching...
78 FR 40541 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA)-Match Number 1014
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-05
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0019] Privacy Act of 1974, as Amended; Computer Matching Program (SSA)--Match Number 1014 AGENCY: Social Security Administration (SSA). [[Page 40542
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-06
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0015] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Centers for Medicare and Medicaid Services (CMS))--Match Number 1094 AGENCY: Social Security Administration (SSA). ACTION: Notice of a new computer matching program that will expire...
20 CFR 225.24 - SS Earnings PIA used in survivor annuities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Security Earnings PIA (SS Earnings PIA) used in survivor annuities may be used in computing the tier II... the Social Security Act as in effect on December 31, 1974. It is computed using the deceased employee... RETIREMENT ACT PRIMARY INSURANCE AMOUNT DETERMINATIONS PIA's Used in Computing Survivor Annuities and the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-21
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0010] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Railroad Retirement Board (RRB))--Match Number 1006 AGENCY: Social Security Administration. ACTION: Notice of a renewal of an existing computer matching program that will expire on...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-08
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0102] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ the States); Match 6000 and 6003 AGENCY: Social Security Administration..., as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-07
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0034] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD))--Match Number 1304 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection...
78 FR 1275 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-08
... Social Security Administration (Computer Matching Agreement 1071). SUMMARY: In accordance with the... of its new computer matching program with the Social Security Administration (SSA). DATES: OPM will... conditions under which SSA will disclose Social Security benefit data to OPM via direct computer link. OPM...
76 FR 44332 - Privacy Act of 1974; Notice of Updated Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-25
... are safeguarded in accordance with the requirements of the Privacy Act, the Computer Security Act, and... Security Numbers, birth dates and credit card numbers or other banking information, and (2) contract... bidders and buyers, including, but not limited to, names, phone numbers, addresses, Social Security...
Computing Game-Theoretic Solutions for Security in the Medium Term
This project concerns the design of algorithms for computing game- theoretic solutions . (Game theory concerns how to act in a strategically optimal...way in environments with other agents who also seek to act optimally but have different , and possibly opposite, interests .) Such algorithms have...recently found application in a number of real-world security applications, including among others airport security, scheduling Federal Air Marshals, and
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2011-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2013-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2012-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-1 General. (a) Agencies shall ensure that information assurance is... include— (1) The National Security Act; (2) The Clinger-Cohen Act; (3) National Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-17
...; Computer Matching Program (SSA/ Law Enforcement Agencies (LEA)) Match Number 5001 AGENCY: Social Security... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... accordance with the Privacy Act of 1974, as amended by the Computer Matching and Privacy Protection Act of...
20 CFR 229.65 - Initial reduction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... wage (see § 225.2 of this chapter) used to compute the DIB O/M under the Social Security Act rules... that exceed the maximum used in computing social security benefits) for the 5 consecutive years after... earnings that exceed the maximum used in computing social security benefits) for the year of highest...
76 FR 11435 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-02
... Security Administration. SUMMARY: Pursuant to the Computer Matching and Privacy Protection Act of 1988, Public Law 100-503, the Computer Matching and Privacy Protections Amendments of 1990, Pub. L. 101-508... Interpreting the Provisions of Public Law 100-503, the Computer Matching and Privacy Protection Act of 1988...
Code of Federal Regulations, 2011 CFR
2011-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
Code of Federal Regulations, 2013 CFR
2013-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
Code of Federal Regulations, 2012 CFR
2012-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
Code of Federal Regulations, 2014 CFR
2014-04-01
... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...
76 FR 81477 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-28
... sessions will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L... Secure Mobile Devices, --Panel Discussion on cyber R&D Strategy, and --Update of NIST Computer Security... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-30
... report of this computer-matching program with the Committee on Homeland Security and Governmental Affairs... INFORMATION: A. General The Computer-Matching and Privacy Protection Act of 1988, (Pub. L. 100-503), amended... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as Amended; Notice of Computer-Matching Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-23
...In accordance with the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (``Dodd-Frank Act''), the Securities and Exchange Commission (``Commission''), pursuant to the Securities Exchange Act of 1934 (``Exchange Act''), is proposing capital and margin requirements for security-based swap dealers (``SBSDs'') and major security-based swap participants (``MSBSPs''), segregation requirements for SBSDs, and notification requirements with respect to segregation for SBSDs and MSBSPs. The Commission also is proposing to increase the minimum net capital requirements for broker-dealers permitted to use the alternative internal model-based method for computing net capital (``ANC broker-dealers'').
Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).
77 FR 74518 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-14
... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program AGENCY: Office of Personnel Management. ACTION: Notice--computer matching between the Office of Personnel Management and the Social Security Administration. SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as...
78 FR 35647 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-13
... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program AGENCY: Office of Personnel Management. ACTION: Notice of computer matching between the Office of Personnel Management and the Social Security Administration (CMA 1045). SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C...
75 FR 17788 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-07
... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program AGENCY: Office of Personnel Management. ACTION: Notice--computer matching between the Office of Personnel Management and the Social Security Administration. SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as...
75 FR 31819 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program AGENCY: Office of Personnel Management. AGENCY: Notice--computer matching between the Office of Personnel Management and the Social Security Administration. SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as...
20 CFR 225.15 - Overall Minimum PIA.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Security Act based on combined railroad and social security earnings. The Overall Minimum PIA is used in computing the social security overall minimum guaranty amount. The overall minimum guaranty rate annuity... INSURANCE AMOUNT DETERMINATIONS PIA's Used in Computing Employee, Spouse and Divorced Spouse Annuities § 225...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-28
...; Computer Matching Program (SSA Internal Match)--Match Number 1014 AGENCY: Social Security Administration... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching....C. 552a, as amended, and the provisions of the Computer Matching and Privacy Protection Act of 1988...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-27
... will file a report of this computer-matching program with the Committee on Homeland Security and... . SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988, (Pub. L. 100-503... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as Amended; Notice of Computer Matching Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-21
... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching... savings securities. C. Authority for Conducting the Matching Program This computer matching agreement sets... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...
76 FR 43278 - Privacy Act; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-20
... computer (PC). The Security Management Officer's office remains locked when not in use. RETENTION AND... records to include names, addresses, social security numbers, service computation dates, leave usage data... that resides on a desktop computer. RETRIEVABILITY: Records maintained in file folders are indexed and...
78 FR 15730 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... 1974; Computer Matching Program AGENCY: U.S. Citizenship and Immigration Services, Department of... Matching Program between the Department of Homeland Security, U.S. Citizenship and Immigration Services and... computer matching program between the Department of Homeland Security, U.S. Citizenship and Immigration...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-02
...: Paper records are stored in file folders, binders, computer files (eLaw) and computer disks. Electronic records, including computer files, are stored on the Commission's network and other electronic media as... physical security measures. Technical security measures within CFTC include restrictions on computer access...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-07
...; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD))--Match Number 1038 AGENCY: Social Security... as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection... containing SSNs extracted from the Supplemental Security Record database. Exchanges for this computer...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-26
... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), amended... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0052] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ U.S. Department of Health and Human Services (HHS), Administration for...
17 CFR 171.4 - Computation of time.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Computation of time. 171.4 Section 171.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO... computing any period of time prescribed by these rules or allowed by the Commission, the day of the act...
77 FR 74020 - Office of Child Support Enforcement; Privacy Act of 1974; Computer Matching Agreement
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-12
... 29, 2012, sent a report of a Computer Matching Program to the Committee on Homeland Security and... Support Enforcement; Privacy Act of 1974; Computer Matching Agreement AGENCY: Office of Child Support Enforcement (OCSE), ACF, HHS. ACTION: Notice of a Computer Matching Program. SUMMARY: In accordance with the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-24
...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... computer matching involving the Federal government could be performed and adding certain protections for...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-03
... 1021 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...
20 CFR 225.22 - Employee RIB PIA used in survivor annuities.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... This PIA is computed in accordance with section 215 of the Social Security Act using the deceased... RETIREMENT ACT PRIMARY INSURANCE AMOUNT DETERMINATIONS PIA's Used in Computing Survivor Annuities and the... Employee Retirement Insurance Benefit PIA (Employee RIB PIA) is used to compute the employee RIB amount...
20 CFR 234.20 - Computation of the employee's 1937 Act LSDP basic amount.
Code of Federal Regulations, 2010 CFR
2010-04-01
... compensation and section 209 of the Social Security Act for a definition of creditable wages.) Closing date... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Computation of the employee's 1937 Act LSDP basic amount. 234.20 Section 234.20 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE...
32 CFR Appendix E to Part 806b - Privacy Impact Assessment
Code of Federal Regulations, 2011 CFR
2011-07-01
... Systems Development System Privacy. Rapid advancements in computer technology make it possible to store...-503, The Computer Matching and Privacy Act of 1988. 13 13 http://www.defenselink.mil/privacy/1975OMB_PAGuide/jun1989.pdf. (2) Public Law 100-235, The Computer Security Act of 1987, 14 which establishes...
20 CFR 225.23 - Combined Earnings PIA used in survivor annuities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... section 215 of the Social Security Act as in effect on December 31, 1974. It is computed using the... RAILROAD RETIREMENT ACT PRIMARY INSURANCE AMOUNT DETERMINATIONS PIA's Used in Computing Survivor Annuities... annuities. The Combined Earnings PIA used in survivor annuities may be used in computing the tier II...
12 CFR 792.19 - How does NCUA calculate the fees for processing my request?
Code of Federal Regulations, 2012 CFR
2012-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED.... Searches may be done manually or by computer. Search does not include modification of an existing program... cost of operating the computer for computer searches for records. (c) NCUA will charge the following...
12 CFR 792.19 - How does NCUA calculate the fees for processing my request?
Code of Federal Regulations, 2010 CFR
2010-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED.... Searches may be done manually or by computer. Search does not include modification of an existing program... cost of operating the computer for computer searches for records. (c) NCUA will charge the following...
12 CFR 792.19 - How does NCUA calculate the fees for processing my request?
Code of Federal Regulations, 2013 CFR
2013-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED.... Searches may be done manually or by computer. Search does not include modification of an existing program... cost of operating the computer for computer searches for records. (c) NCUA will charge the following...
12 CFR 792.19 - How does NCUA calculate the fees for processing my request?
Code of Federal Regulations, 2011 CFR
2011-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED.... Searches may be done manually or by computer. Search does not include modification of an existing program... cost of operating the computer for computer searches for records. (c) NCUA will charge the following...
12 CFR 792.19 - How does NCUA calculate the fees for processing my request?
Code of Federal Regulations, 2014 CFR
2014-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED.... Searches may be done manually or by computer. Search does not include modification of an existing program... cost of operating the computer for computer searches for records. (c) NCUA will charge the following...
32 CFR Appendix E to Part 806b - Privacy Impact Assessment
Code of Federal Regulations, 2014 CFR
2014-07-01
... Systems Development System Privacy. Rapid advancements in computer technology make it possible to store...-503, The Computer Matching and Privacy Act of 1988. 13 13 http://www.defenselink.mil/privacy/1975OMB_PAGuide/jun1989.pdf. (2) Public Law 100-235, The Computer Security Act of 1987, 14 which establishes...
32 CFR Appendix E to Part 806b - Privacy Impact Assessment
Code of Federal Regulations, 2012 CFR
2012-07-01
... Systems Development System Privacy. Rapid advancements in computer technology make it possible to store...-503, The Computer Matching and Privacy Act of 1988. 13 13 http://www.defenselink.mil/privacy/1975OMB_PAGuide/jun1989.pdf. (2) Public Law 100-235, The Computer Security Act of 1987, 14 which establishes...
32 CFR Appendix E to Part 806b - Privacy Impact Assessment
Code of Federal Regulations, 2013 CFR
2013-07-01
... Systems Development System Privacy. Rapid advancements in computer technology make it possible to store...-503, The Computer Matching and Privacy Act of 1988. 13 13 http://www.defenselink.mil/privacy/1975OMB_PAGuide/jun1989.pdf. (2) Public Law 100-235, The Computer Security Act of 1987, 14 which establishes...
17 CFR 1.32 - Segregated account; daily computation and record.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Segregated account; daily computation and record. 1.32 Section 1.32 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Recordkeeping § 1.32 Segregated account...
1984-12-01
52242 Prepared for the AIR FORCE OFFICE OF SCIENTIFIC RESEARCH Under Grant No. AFOSR 82-0322 December 1984 ~ " ’w Unclassified SECURITY CLASSIFICATION4...OF THIS PAGE REPORT DOCUMENTATION PAGE is REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS Unclassified None 20 SECURITY CLASSIFICATION...designer .and computer- are 20 DIiRIBUTION/AVAILABI LIT Y 0P ABSTR4ACT 21 ABSTRACT SECURITY CLASSIFICA1ONr UNCLASSIFIED/UNLIMITED SAME AS APT OTIC USERS
Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.
20 CFR 229.55 - Reduction for spouse social security benefit.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 1 2011-04-01 2011-04-01 false Reduction for spouse social security benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.55 Reduction for spouse social security benefit. A spouse benefit under the overall minimum, after any...
20 CFR 229.56 - Reduction for child's social security benefit.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 1 2011-04-01 2011-04-01 false Reduction for child's social security benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.56 Reduction for child's social security benefit. A child's benefit under the overall minimum, after any...
20 CFR 229.55 - Reduction for spouse social security benefit.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 1 2012-04-01 2012-04-01 false Reduction for spouse social security benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.55 Reduction for spouse social security benefit. A spouse benefit under the overall minimum, after any...
20 CFR 229.55 - Reduction for spouse social security benefit.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 1 2013-04-01 2012-04-01 true Reduction for spouse social security benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.55 Reduction for spouse social security benefit. A spouse benefit under the overall minimum, after any...
20 CFR 229.56 - Reduction for child's social security benefit.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 1 2012-04-01 2012-04-01 false Reduction for child's social security benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.56 Reduction for child's social security benefit. A child's benefit under the overall minimum, after any...
20 CFR 229.55 - Reduction for spouse social security benefit.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 1 2014-04-01 2012-04-01 true Reduction for spouse social security benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.55 Reduction for spouse social security benefit. A spouse benefit under the overall minimum, after any...
20 CFR 229.56 - Reduction for child's social security benefit.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 1 2013-04-01 2012-04-01 true Reduction for child's social security benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.56 Reduction for child's social security benefit. A child's benefit under the overall minimum, after any...
20 CFR 229.56 - Reduction for child's social security benefit.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 1 2014-04-01 2012-04-01 true Reduction for child's social security benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.56 Reduction for child's social security benefit. A child's benefit under the overall minimum, after any...
20 CFR 229.55 - Reduction for spouse social security benefit.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Reduction for spouse social security benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.55 Reduction for spouse social security benefit. A spouse benefit under the overall minimum, after any...
20 CFR 229.56 - Reduction for child's social security benefit.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Reduction for child's social security benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.56 Reduction for child's social security benefit. A child's benefit under the overall minimum, after any...
75 FR 68849 - Privacy Act of 1974: System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-09
... processing of personal information is conducted within established FAA computer security regulations. A risk... SECURITY CLASSIFICATION: Sensitive, unclassified SYSTEM LOCATION: Federal Aviation Administration (FAA... Enforcement Centers of the Drug Abatement Division; Office of Security and Hazardous Materials; Flight...
20 CFR 225.21 - Survivor Tier I PIA.
Code of Federal Regulations, 2010 CFR
2010-04-01
... INSURANCE AMOUNT DETERMINATIONS PIA's Used in Computing Survivor Annuities and the Amount of the Residual Lump-Sum Payable § 225.21 Survivor Tier I PIA. The Survivor Tier I PIA is used in computing the tier I... Security Act using the deceased employee's combined railroad and social security earnings after 1950 (or...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-06
... hash algorithms in many computer network applications. On February 11, 2011, NIST published a notice in... Information Security Management Act (FISMA) of 2002 (Pub. L. 107-347), the Secretary of Commerce is authorized to approve Federal Information Processing Standards (FIPS). NIST activities to develop computer...
45 CFR 205.56 - Requirements governing the use of income and eligibility information.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) of the Social Security Act must provide that: (a) The State agency will use the information obtained... received from the Internal Revenue Service, and earnings information received from the Social Security... Federal computer matching program that is subject to the requirements in the Computer Matching and Privacy...
45 CFR 205.56 - Requirements governing the use of income and eligibility information.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) of the Social Security Act must provide that: (a) The State agency will use the information obtained... received from the Internal Revenue Service, and earnings information received from the Social Security... Federal computer matching program that is subject to the requirements in the Computer Matching and Privacy...
45 CFR 205.56 - Requirements governing the use of income and eligibility information.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) of the Social Security Act must provide that: (a) The State agency will use the information obtained... received from the Internal Revenue Service, and earnings information received from the Social Security... Federal computer matching program that is subject to the requirements in the Computer Matching and Privacy...
45 CFR 205.56 - Requirements governing the use of income and eligibility information.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) of the Social Security Act must provide that: (a) The State agency will use the information obtained... received from the Internal Revenue Service, and earnings information received from the Social Security... Federal computer matching program that is subject to the requirements in the Computer Matching and Privacy...
45 CFR 205.56 - Requirements governing the use of income and eligibility information.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) of the Social Security Act must provide that: (a) The State agency will use the information obtained... received from the Internal Revenue Service, and earnings information received from the Social Security... Federal computer matching program that is subject to the requirements in the Computer Matching and Privacy...
20 CFR 229.53 - Reduction for social security benefits on employee's wage record.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 1 2011-04-01 2011-04-01 false Reduction for social security benefits on... UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.53 Reduction for social security benefits on employee's wage record. The total annuity...
20 CFR 229.53 - Reduction for social security benefits on employee's wage record.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 1 2013-04-01 2012-04-01 true Reduction for social security benefits on... UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.53 Reduction for social security benefits on employee's wage record. The total annuity...
20 CFR 229.53 - Reduction for social security benefits on employee's wage record.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 1 2014-04-01 2012-04-01 true Reduction for social security benefits on... UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.53 Reduction for social security benefits on employee's wage record. The total annuity...
20 CFR 229.53 - Reduction for social security benefits on employee's wage record.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 1 2012-04-01 2012-04-01 false Reduction for social security benefits on... UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.53 Reduction for social security benefits on employee's wage record. The total annuity...
20 CFR 229.53 - Reduction for social security benefits on employee's wage record.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Reduction for social security benefits on... UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.53 Reduction for social security benefits on employee's wage record. The total annuity...
75 FR 39920 - Announcing a Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-13
... will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L. 100... Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB) will meet Wednesday, August...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2013 CFR
2013-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2012 CFR
2012-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...
20 CFR 228.19 - Reduction for a social security benefit.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 1 2011-04-01 2011-04-01 false Reduction for a social security benefit. 228... RETIREMENT ACT COMPUTATION OF SURVIVOR ANNUITIES The Tier I Annuity Component § 228.19 Reduction for a social security benefit. The tier I annuity component is reduced for the amount of any social security benefit to...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 1 2011-04-01 2011-04-01 false Reduction for social security benefit paid to... BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.54 Reduction for social security benefit paid to employee on...
20 CFR 228.19 - Reduction for a social security benefit.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 1 2012-04-01 2012-04-01 false Reduction for a social security benefit. 228... RETIREMENT ACT COMPUTATION OF SURVIVOR ANNUITIES The Tier I Annuity Component § 228.19 Reduction for a social security benefit. The tier I annuity component is reduced for the amount of any social security benefit to...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 1 2014-04-01 2012-04-01 true Reduction for social security benefit paid to... BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.54 Reduction for social security benefit paid to employee on...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 1 2013-04-01 2012-04-01 true Reduction for social security benefit paid to... BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.54 Reduction for social security benefit paid to employee on...
20 CFR 228.19 - Reduction for a social security benefit.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 1 2014-04-01 2012-04-01 true Reduction for a social security benefit. 228... RETIREMENT ACT COMPUTATION OF SURVIVOR ANNUITIES The Tier I Annuity Component § 228.19 Reduction for a social security benefit. The tier I annuity component is reduced for the amount of any social security benefit to...
20 CFR 228.19 - Reduction for a social security benefit.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 1 2013-04-01 2012-04-01 true Reduction for a social security benefit. 228... RETIREMENT ACT COMPUTATION OF SURVIVOR ANNUITIES The Tier I Annuity Component § 228.19 Reduction for a social security benefit. The tier I annuity component is reduced for the amount of any social security benefit to...
20 CFR 228.19 - Reduction for a social security benefit.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Reduction for a social security benefit. 228... RETIREMENT ACT COMPUTATION OF SURVIVOR ANNUITIES The Tier I Annuity Component § 228.19 Reduction for a social security benefit. The tier I annuity component is reduced for the amount of any social security benefit to...
36 CFR 1202.30 - How does NARA safeguard its systems of records?
Code of Federal Regulations, 2012 CFR
2012-07-01
... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...
36 CFR 1202.30 - How does NARA safeguard its systems of records?
Code of Federal Regulations, 2011 CFR
2011-07-01
... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...
36 CFR 1202.30 - How does NARA safeguard its systems of records?
Code of Federal Regulations, 2010 CFR
2010-07-01
... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...
36 CFR 1202.30 - How does NARA safeguard its systems of records?
Code of Federal Regulations, 2014 CFR
2014-07-01
... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...
77 FR 60401 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-03
... computer password protection.'' * * * * * System manager(s) and address: Delete entry and replace with...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The National Security Agency (NSA) is proposing to amend a system of...
Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.
Caruso, Ronald D
2003-01-01
Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003
Report: FY 2007 FISMA Report: Status of EPA’s Computer Security Program
Report #2007-S-00003, September 25, 2007. This is the Office of Inspector General’s Fiscal Year 2007 Federal Information Security Management Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).
75 FR 28253 - Privacy Act of 1974; Notice of new System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-20
... certified by the National Computer Security Association. RETENTION AND DISPOSAL: System records are retained... Agency suspects or has confirmed that the security or confidentiality of information in the system of... security or integrity of this system or other systems or programs (whether maintained by GSA or another...
17 CFR 232.106 - Prohibition against electronic submissions containing executable code.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...
75 FR 29548 - Privacy Act of 1974; Notice of New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-26
... maintained behind a firewall certified by the National Computer Security Association. RETENTION AND DISPOSAL... agencies, entities when (1) the Agency suspects or has confirmed that the security or confidentiality of..., identity theft or fraud, or harm to the security or integrity or this system or other systems or programs...
36 CFR § 1202.30 - How does NARA safeguard its systems of records?
Code of Federal Regulations, 2013 CFR
2013-07-01
... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...
17 CFR 232.106 - Prohibition against electronic submissions containing executable code.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...
17 CFR 232.106 - Prohibition against electronic submissions containing executable code.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...
Code of Federal Regulations, 2014 CFR
2014-07-01
... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...
Code of Federal Regulations, 2012 CFR
2012-01-01
... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...
Code of Federal Regulations, 2010 CFR
2010-01-01
... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...
Code of Federal Regulations, 2013 CFR
2013-07-01
... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...
Code of Federal Regulations, 2011 CFR
2011-01-01
... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...
Code of Federal Regulations, 2014 CFR
2014-01-01
... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...
20 CFR 226.13 - Cost-of-living increase in employee vested dual benefit.
Code of Federal Regulations, 2010 CFR
2010-04-01
... RAILROAD RETIREMENT ACT COMPUTING EMPLOYEE, SPOUSE, AND DIVORCED SPOUSE ANNUITIES Computing an Employee... increase is based on the cost-of-living increases in social security benefits during the period from...
Code of Federal Regulations, 2010 CFR
2010-07-01
... (which does not include the activities of a financial transaction provider, or any interactive computer... securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as that term is defined in section 3(a)(10) of...
Report #13-P-0032, October 26, 2012. We believe the evidence obtained provides a reasonable basis for our findings and conclusions, and in all material respects, meets the FISMA reporting requirements prescribed by OMB.
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC. Information Management and Technology Div.
As required by the Computer Security Act of 1987, federal agencies have to identify systems that contain sensitive information and develop plans to safeguard them. The planning process was assessed in 10 civilian agencies as well as the extent to which they had implemented planning controls described in 22 selected plans. The National Institute of…
Code of Federal Regulations, 2010 CFR
2010-07-01
... of the National Security Division, which will consult, as necessary, with the Computer Crime and... Attorney General, the Deputy Attorney General, the Assistant Attorney General for National Security, or the...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2012 CFR
2012-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2013 CFR
2013-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2010 CFR
2010-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2014 CFR
2014-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2011 CFR
2011-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
20 CFR 410.510 - Computation of benefits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Computation of benefits. 410.510 Section 410.510 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, TITLE IV-BLACK LUNG BENEFITS (1969- ) Payment of Benefits § 410.510 Computation of benefits. (a) Basic...
Code of Federal Regulations, 2010 CFR
2010-10-01
... of the officer; (ii) Social security number of the officer; (iii) Duty station location of the... inclusion in computation of the officer's disposable earnings: (i) Basic pay; (ii) Basic allowances for... under title II of the Social Security Act when the withholding is required by law; (ii) FICA. (3...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. ANSI stands for... required documents. Electronic media means: (1) Electronic storage media including memory devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. ANSI stands for... required documents. Electronic media means: (1) Electronic storage media including memory devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. ANSI stands for... required documents. Electronic media means: (1) Electronic storage media including memory devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk...
75 FR 2118 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-14
...: Maintained on computer and electronic storage media. RETRIEVABILITY: Retrieved by name and Social Security... proposed action will be effective without further notice on February 16, 2010 unless comments are received....'' * * * * * CATEGORIES OF RECORDS IN THE SYSTEM: Delete entry and replace with ``Name, Social Security Number (SSN...
Code of Federal Regulations, 2010 CFR
2010-04-01
... RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE When... annuity rate under the overall minimum. A spouse's inclusion in the computation of the overall minimum...
Code of Federal Regulations, 2010 CFR
2010-04-01
... included in computing an annuity under the overall minimum. A divorced spouse's inclusion in the... spouse becomes entitled to a retirement or disability benefit under the Social Security Act based upon a...
78 FR 25785 - Privacy Act of 1974; Report of Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-02
... of Veterans Affairs. ACTION: Notice of Computer Matching Program. SUMMARY: The Department of Veterans Affairs (VA) provides notice that it intends to conduct a recurring computer-matching program matching Social Security Administration (SSA) Master Beneficiary Records (MBR) and Self-Employment Income System...
"Glitch Logic" and Applications to Computing and Information Security
NASA Technical Reports Server (NTRS)
Stoica, Adrian; Katkoori, Srinivas
2009-01-01
This paper introduces a new method of information processing in digital systems, and discusses its potential benefits to computing and information security. The new method exploits glitches caused by delays in logic circuits for carrying and processing information. Glitch processing is hidden to conventional logic analyses and undetectable by traditional reverse engineering techniques. It enables the creation of new logic design methods that allow for an additional controllable "glitch logic" processing layer embedded into a conventional synchronous digital circuits as a hidden/covert information flow channel. The combination of synchronous logic with specific glitch logic design acting as an additional computing channel reduces the number of equivalent logic designs resulting from synthesis, thus implicitly reducing the possibility of modification and/or tampering with the design. The hidden information channel produced by the glitch logic can be used: 1) for covert computing/communication, 2) to prevent reverse engineering, tampering, and alteration of design, and 3) to act as a channel for information infiltration/exfiltration and propagation of viruses/spyware/Trojan horses.
5 CFR 919.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2012 CFR
2012-01-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
5 CFR 919.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2014 CFR
2014-01-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
41 CFR 105-68.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2012 CFR
2012-01-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
29 CFR 98.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2014 CFR
2014-07-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
2 CFR 180.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2012 CFR
2012-01-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
29 CFR 98.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2013 CFR
2013-07-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
2 CFR 180.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2013 CFR
2013-01-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
29 CFR 98.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2010 CFR
2010-07-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
41 CFR 105-68.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2011 CFR
2011-01-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
5 CFR 919.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2010 CFR
2010-01-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
41 CFR 105-68.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2010 CFR
2010-07-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
5 CFR 919.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2013 CFR
2013-01-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
29 CFR 98.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2012 CFR
2012-07-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
5 CFR 919.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2011 CFR
2011-01-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
29 CFR 98.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2011 CFR
2011-07-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
41 CFR 105-68.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2013 CFR
2013-07-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
41 CFR 105-68.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2014 CFR
2014-01-01
... Taxpayer Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or..., only if permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
... Wesolowski, Director, Verifications Policy & Operations Branch, Division of Eligibility and Enrollment Policy..., electronic interfaces and an on-line system for the verification of eligibility. PURPOSE(S) OF THE MATCHING... Security number (SSN) verifications, (2) a death indicator, (3) an indicator of a finding of disability by...
76 FR 22682 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-22
...: Maintained in file folders and computer storage media. Retrievability: Retrieved by name and/or Social... folders and computer storage media.'' * * * * * System Manager(s) and address: Delete entry and replace... provide their full name, Social Security Number (SSN), any details which may assist in locating records...
20 CFR Appendix Vii to Subpart C... - “Old-Law” Contribution and Benefit Base
Code of Federal Regulations, 2010 CFR
2010-04-01
... Appendix VII to Subpart C of Part 404 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Computing Primary Insurance Amounts Pt. 404, Subpt. C, App. VII... Security Act without the enactment of the 1977 amendments. Year Amount 1979 $18,900 1980 20,400 1981 22,200...
Security & Privacy Policy - Naval Oceanography Portal
Notice: This is a U.S. Government Web Site 1. This is a World Wide Web site for official information information on this Web site are strictly prohibited and may be punishable under the Computer Fraud and Abuse Information Act (FOIA) | External Link Disclaimer This is an official U.S. Navy web site. Security &
24 CFR 5.234 - Requests for information from SWICAs and Federal agencies; restrictions on use.
Code of Federal Regulations, 2013 CFR
2013-04-01
...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers... obtained through computer matching agreements between HUD and a SWICA or Federal agency, or between a PHA... Privacy Act notice is required, as follows: (1) When HUD requests the computer match, the processing...
24 CFR 5.234 - Requests for information from SWICAs and Federal agencies; restrictions on use.
Code of Federal Regulations, 2010 CFR
2010-04-01
...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers... obtained through computer matching agreements between HUD and a SWICA or Federal agency, or between a PHA... Privacy Act notice is required, as follows: (1) When HUD requests the computer match, the processing...
24 CFR 5.234 - Requests for information from SWICAs and Federal agencies; restrictions on use.
Code of Federal Regulations, 2011 CFR
2011-04-01
...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers... obtained through computer matching agreements between HUD and a SWICA or Federal agency, or between a PHA... Privacy Act notice is required, as follows: (1) When HUD requests the computer match, the processing...
24 CFR 5.234 - Requests for information from SWICAs and Federal agencies; restrictions on use.
Code of Federal Regulations, 2012 CFR
2012-04-01
...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers... obtained through computer matching agreements between HUD and a SWICA or Federal agency, or between a PHA... Privacy Act notice is required, as follows: (1) When HUD requests the computer match, the processing...
24 CFR 5.234 - Requests for information from SWICAs and Federal agencies; restrictions on use.
Code of Federal Regulations, 2014 CFR
2014-04-01
...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers... obtained through computer matching agreements between HUD and a SWICA or Federal agency, or between a PHA... Privacy Act notice is required, as follows: (1) When HUD requests the computer match, the processing...
2 CFR 180.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2011 CFR
2011-01-01
... permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection... Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or disqualified...
2 CFR 180.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2014 CFR
2014-01-01
... permitted under the Privacy Act of 1974 and, if appropriate, the Computer Matching and Privacy Protection... Identification Number (TIN) (the social security number (SSN) for an individual) of an excluded or disqualified...
2 CFR 180.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U... database for the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security...
31 CFR 19.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U... database for the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security...
31 CFR 19.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U... database for the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security...
22 CFR 1006.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2013 CFR
2013-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
21 CFR 1404.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2012 CFR
2012-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
29 CFR 1471.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U... database for the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security...
29 CFR 1471.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U... database for the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security...
29 CFR 1471.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U... database for the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security...
22 CFR 1006.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2011 CFR
2011-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
21 CFR 1404.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2011 CFR
2011-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
22 CFR 1508.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2014 CFR
2014-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
21 CFR 1404.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2010 CFR
2010-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
22 CFR 1006.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2012 CFR
2012-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
22 CFR 1508.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2010 CFR
2010-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
21 CFR 1404.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2014 CFR
2014-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
34 CFR 85.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2010 CFR
2010-07-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
22 CFR 1006.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2014 CFR
2014-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
22 CFR 1508.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2011 CFR
2011-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
29 CFR 1471.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U... database for the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security...
22 CFR 1006.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2010 CFR
2010-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
34 CFR 85.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2011 CFR
2011-07-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
22 CFR 1508.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2013 CFR
2013-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
22 CFR 208.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2011 CFR
2011-04-01
... 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U... database for the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security...
21 CFR 1404.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2013 CFR
2013-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
31 CFR 19.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U... database for the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security...
31 CFR 19.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U... database for the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security...
29 CFR 1471.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U... database for the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security...
22 CFR 208.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U... database for the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security...
22 CFR 1508.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2012 CFR
2012-04-01
... appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U.S.C. 552(a). ... the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security number...
31 CFR 19.515 - What specific information is in the EPLS?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 1974 and, if appropriate, the Computer Matching and Privacy Protection Act of 1988, as codified in 5 U... database for the EPLS includes a field for the Taxpayer Identification Number (TIN) (the social security...
49 CFR 1.72 - Delegations to the Office of the Chief Information Officer.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Carry out all functions and responsibilities assigned to the Secretary with respect to the Computer Security Act of 1987 (40 U.S.C. 759, 759 notes); (d) Approve waivers to Federal Information Processing...
49 CFR 1.72 - Delegations to the Office of the Chief Information Officer.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Carry out all functions and responsibilities assigned to the Secretary with respect to the Computer Security Act of 1987 (40 U.S.C. 759, 759 notes); (d) Approve waivers to Federal Information Processing...
Use of medical information by computer networks raises major concerns about privacy.
OReilly, M
1995-01-01
The development of computer data-bases and long-distance computer networks is leading to improvements in Canada's health care system. However, these developments come at a cost and require a balancing act between access and confidentiality. Columnist Michael OReilly, who in this article explores the security of computer networks, notes that respect for patients' privacy must be given as high a priority as the ability to see their records in the first place. Images p213-a PMID:7600474
Code of Federal Regulations, 2010 CFR
2010-04-01
... AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.2a-4 Definition of “current net asset value” for... value of any redeemable security issued by a registered investment company used in computing... which reflects calculations, whether or not recorded in the books of account, made substantially in...
Electronic patient data confidentiality practices among surgical trainees: questionnaire study.
Mole, Damian J; Fox, Colin; Napolitano, Giulio
2006-10-01
The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-03
... governing local control of communicable diseases, preventive medicine and safety programs, developmental... that is being stored. Access to the computer system containing the records in this system is limited to...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-25
... pension payment data from its system of records (SOR) entitled the ``Compensation, Pension, Education, and... monthly. The actual match will take place approximately during the first week of every month. E. Inclusive...
2012-08-14
Improvement Act requirements and secure access to two payroll offices at Indianapolis, Indiana, that process sensitive payroll information. We...Without adequate controls over physical access, individuals could gain unauthorized access to computers and sensitive payroll data contained in online...and resolved. 2 Personnel and payroll data transmitted to and from interfacing systems were transferred completely, accurately, and timely
77 FR 31851 - Privacy Act System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-30
... identification, U.S. visa number, FCC point of contact, visitor signature, professional title, organizational... pertinent records, or to another public authority or professional organization, if necessary to obtain... secured by limited access card readers. The computer servers themselves are password-protected. Access to...
Code of Federal Regulations, 2011 CFR
2011-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
Code of Federal Regulations, 2010 CFR
2010-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-06
..., Education, and Vocational Rehabilitation and Employment Records-VA'' (58VA21/22/28), published at 74 FR.... Inclusive Dates of the Matching Program The effective date of this matching program is October 2, 2012...
Code of Federal Regulations, 2013 CFR
2013-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
Code of Federal Regulations, 2014 CFR
2014-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
Code of Federal Regulations, 2012 CFR
2012-10-01
...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...
77 FR 58101 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-19
... information technology. DATES: Consideration will be given to all comments received by November 19, 2012... to SNPMIS Project Officer, DHSS, 7700 Arlington Boulevard, Falls Church, VA 22042-2902 or call 703... activities data including referral, evaluation, eligibility, and service plans. The Computer Security Act of...
20 CFR 229.45 - Employee benefit.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 1 2011-04-01 2011-04-01 false Employee benefit. 229.45 Section 229.45 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.45 Employee benefit. The original...
20 CFR 229.45 - Employee benefit.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Employee benefit. 229.45 Section 229.45 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.45 Employee benefit. The original...
20 CFR 229.45 - Employee benefit.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 1 2014-04-01 2012-04-01 true Employee benefit. 229.45 Section 229.45 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.45 Employee benefit. The original...
20 CFR 229.45 - Employee benefit.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 1 2013-04-01 2012-04-01 true Employee benefit. 229.45 Section 229.45 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.45 Employee benefit. The original...
20 CFR 229.45 - Employee benefit.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 1 2012-04-01 2012-04-01 false Employee benefit. 229.45 Section 229.45 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.45 Employee benefit. The original...
Electronic Patient Data Confidentiality Practices Among Surgical Trainees: Questionnaire Study
Mole, Damian J; Fox, Colin; Napolitano, Giulio
2006-01-01
INTRODUCTION The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. PARTICIPANTS AND METHODS A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. RESULTS Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. CONCLUSIONS Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended. PMID:17059715
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-12
... design feature associated with the architecture and connectivity capabilities of the airplanes' computer... the comment for an association, business, labor union, etc.). DOT's complete Privacy Act Statement can...; facsimile 425-227-1149. SUPPLEMENTARY INFORMATION: The proposed network architecture includes the following...
Secure data sharing in public cloud
NASA Astrophysics Data System (ADS)
Venkataramana, Kanaparti; Naveen Kumar, R.; Tatekalva, Sandhya; Padmavathamma, M.
2012-04-01
Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.
mHealth data security: the need for HIPAA-compliant standardization.
Luxton, David D; Kayl, Robert A; Mishkind, Matthew C
2012-05-01
The rise in the use of mobile devices, such as smartphones, tablet personal computers, and wireless medical devices, as well as the wireless networks that enable their use, has raised new concerns for data security and integrity. Standardized Health Insurance Portability and Accountability Act of 1996 (HIPAA)-compliant electronic data security that will allow ubiquitous use of mobile health technologies is needed. The lack of standardized data security to assure privacy, to allow interoperability, and to maximize the full capabilities of mobile devices presents a significant barrier to care. The purpose of this article is to provide an overview of the issue and to encourage discussion of this important topic. Current security needs, standards, limitations, and recommendations for how to address this barrier to care are discussed.
76 FR 58786 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-22
... National Security Agency/Central Security System systems of records notices subject to the Privacy Act of... inquiries to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; Systems of Records AGENCY: National Security Agency/Central Security Service, Department of Defense (DoD...
78 FR 45913 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-30
... National Security Agency/Central Security Service systems of records subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act Office, 9800...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to alter...
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...
Code of Federal Regulations, 2011 CFR
2011-04-01
... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...
Code of Federal Regulations, 2010 CFR
2010-04-01
... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...
National Test Bed Security and Communications Architecture Working Group Report
1992-04-01
computer systems via a physical medium. Most of those physical media are tappable or interceptable. This means that all the data that flows across the...provides the capability for NTBN nodes to support users operating in differing COIs to share the computing resources and communication media and for...representation. Again generally speaking, the NTBN must act as the high-speed, wide-bandwidth communications media that would provide the "near real-time
An Information Policy for the Information Age.
ERIC Educational Resources Information Center
Blake, Virgil; Surprenant, Thomas
1988-01-01
Discusses recent federal information policies that pose a threat to access to information. A short-lived policy for protection of sensitive but unclassified information is criticized, and the Computer Security Act of 1987, currently under consideration in Congress, is described. Involvement by the library and information community in developing…
76 FR 78286 - Collection of Information Under Review by Office of Management and Budget
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-16
..., between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. OIRA posts its decisions on.... Coast Guard, Acting Assistant Commandant for Command, Control, Communications, Computers and Information... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0902] Collection of Information Under...
76 FR 3098 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-19
...: National Security Agency/Central Security Service, Freedom of Information Act and Privacy Act Office, 9800..., Privacy Act and Mandatory Declassification Review Records. System Location: National Security Agency... Information Act; 5 U.S.C. 552a, The Privacy Act of 1974 (as amended); E.O. 13526, Classified National Security...
A Cloud Computing Based Patient Centric Medical Information System
NASA Astrophysics Data System (ADS)
Agarwal, Ankur; Henehan, Nathan; Somashekarappa, Vivek; Pandya, A. S.; Kalva, Hari; Furht, Borko
This chapter discusses an emerging concept of a cloud computing based Patient Centric Medical Information System framework that will allow various authorized users to securely access patient records from various Care Delivery Organizations (CDOs) such as hospitals, urgent care centers, doctors, laboratories, imaging centers among others, from any location. Such a system must seamlessly integrate all patient records including images such as CT-SCANS and MRI'S which can easily be accessed from any location and reviewed by any authorized user. In such a scenario the storage and transmission of medical records will have be conducted in a totally secure and safe environment with a very high standard of data integrity, protecting patient privacy and complying with all Health Insurance Portability and Accountability Act (HIPAA) regulations.
75 FR 67697 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-03
... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act (FOIA)/Privacy Act Office...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a...
75 FR 43494 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act and Privacy Act Office, 9800...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to...
NASA Astrophysics Data System (ADS)
Pathak, Rohit; Joshi, Satyadhar
With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP and with the use of Anonymizers we have covered the identity of true source of data. Modifier tokens are generated along encryption of data which are distributed among virtual parties, then sent to TTP and finally used in the computation. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have also given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-11
... assistance to correspondents; to use Web site based programs; to provide usage statistics associated with the... of individuals for surveys. Among other things, maintaining the names, addresses, etc. of individuals... information in the system. Safeguards: Access by authorized personnel only. Computer security safeguards are...
20 CFR 229.50 - Age reduction in employee or spouse benefit.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 1 2014-04-01 2012-04-01 true Age reduction in employee or spouse benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.50 Age reduction in employee or spouse benefit. (a) When age reduction applies. The employee overall minimum...
20 CFR 229.50 - Age reduction in employee or spouse benefit.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 1 2011-04-01 2011-04-01 false Age reduction in employee or spouse benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.50 Age reduction in employee or spouse benefit. (a) When age reduction applies. The employee overall minimum...
20 CFR 229.50 - Age reduction in employee or spouse benefit.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 1 2013-04-01 2012-04-01 true Age reduction in employee or spouse benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.50 Age reduction in employee or spouse benefit. (a) When age reduction applies. The employee overall minimum...
20 CFR 229.50 - Age reduction in employee or spouse benefit.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Age reduction in employee or spouse benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.50 Age reduction in employee or spouse benefit. (a) When age reduction applies. The employee overall minimum...
20 CFR 229.50 - Age reduction in employee or spouse benefit.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 1 2012-04-01 2012-04-01 false Age reduction in employee or spouse benefit... RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.50 Age reduction in employee or spouse benefit. (a) When age reduction applies. The employee overall minimum...
20 CFR 229.49 - Adjustment of benefits under family maximum for change in family group.
Code of Federal Regulations, 2011 CFR
2011-04-01
... for change in family group. 229.49 Section 229.49 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.49 Adjustment of benefits under family maximum for change in family group. (a...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-25
... design feature associated with the architecture and connectivity capabilities of the airplanes' computer... the comment for an association, business, labor union, etc.). DOT's complete Privacy Act Statement can... architecture for the Embraer Model EMB-550 series of airplanes is composed of several connected networks. This...
75 FR 56079 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-15
... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The National Security Agency/Central Security Service is proposing to...
IT Security Support for the Spaceport Command Control System Development
NASA Technical Reports Server (NTRS)
Varise, Brian
2014-01-01
My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.
77 FR 56628 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-13
... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a system of records. SUMMARY: The National Security Agency/Central Security Service proposes to add a new...
Domestic Security Cooperation: A Unified Approach to Homeland Security and Defense
2012-09-01
counter the threats to homeland security that included the Espionage Act of 1917 and the Sedition Act of 1918. National Defense Act of 1916...the threats to homeland security that included the Espionage Act of 1917 and the Sedition Act of 1918. The Espionage Act of 1917 outlawed interfering...years or both.”12 The Sedition Act of 1918 broadened this law by including the U.S. government and prohibited uttering, printing, writing, or
76 FR 49698 - Covered Securities Pursuant to Section 18 of the Securities Act of 1933
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-11
... [Release No. 33-9251; File No. S7-31-11] RIN 3235-AL20 Covered Securities Pursuant to Section 18 of the... under Section 18 of the Securities Act of 1933 (``Securities Act''), as amended, to designate certain securities on BATS Exchange, Inc. (``BATS'' or ``Exchange'') as covered securities for purposes of Section 18...
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Securities Act industry guides... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry... claims and claim adjustment expenses of property-casualty insurance underwriters. (g) Guide 7...
Multi-agent integrated password management (MIPM) application secured with encryption
NASA Astrophysics Data System (ADS)
Awang, Norkhushaini; Zukri, Nurul Hidayah Ahmad; Rashid, Nor Aimuni Md; Zulkifli, Zuhri Arafah; Nazri, Nor Afifah Mohd
2017-10-01
Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an agent managing passwords. Multi-Agent Integrated Password Management (MIPM) is an application using encryption that provides users with secure storage of their login account information such as their username, emails and passwords. This project was developed on an Android platform with an encryption agent using Java Agent Development Environment (JADE). The purpose of the embedded agents is to act as a third-party software to ease the encryption process, and in the future, the developed encryption agents can form part of the security system. This application can be used by the computer and mobile users. Currently, users log into many applications causing them to use unique passwords to prevent password leaking. The crypto agent handles the encryption process using an Advanced Encryption Standard (AES) 128-bit encryption algorithm. As a whole, MIPM is developed on the Android application to provide a secure platform to store passwords and has high potential to be commercialised for public use.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...
DOT National Transportation Integrated Search
2003-09-09
After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-03-24
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-01-01
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-26
... Dodd-Frank Wall Street Reform and Consumer Protection Act AGENCY: Securities and Exchange Commission... Reform and Consumer Protection Act (the ``Act'') related to asset-backed securities (``ABS'').\\11... securities. The Act broadened the mission of the MSRB to include the protection of state and local...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
...; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343-1717), Acting... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...
76 FR 58007 - Privacy Act of 1974; Report of a New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-19
... Social Security Act (the Act). The system of records will contain personally identifiable information... and Medicaid Innovation, Centers for Medicare & Medicaid Services, 7500 Security Boulevard, Mailstop... Social Security Act (the Act) (42 U.S.C. 1395 et seq.) by adding new section 1899 to the Act to establish...
Compliance with HIPAA security standards in U.S. Hospitals.
Davis, Diane; Having, Karen
2006-01-01
With the widespread use of computer networks, the amount of information stored electronically has grown exponentially, resulting in increased concern for privacy and security of information. The healthcare industry has been put to the test with the federally mandated Health Insurance Portability and Accountability Act (HIPAA) of 1996. To assess the compliance status of HIPAA security standards, a random sample of 1,000 U.S. hospitals was surveyed in January 2004, yielding a return rate of 29 percent. One year later, a follow-up survey was sent to all previous respondents, with 50 percent replying. HIPAA officers'perceptions of security compliance in 2004 and 2005 are compared in this article. The security standards achieving the highest level of compliance in both 2004 and 2005 were obtaining required business associate agreements and physical safeguards to limit access to electronic information systems. Respondents indicated least compliance both years in performing periodic evaluation of security practices governed by the Security Rule. Roadblocks, threats, problems and solutions regarding HIPAA compliance are discussed. This information may be applied to current and future strategies toward maintaining security of information systems throughout the healthcare industry.
3 CFR 8546 - Proclamation 8546 of August 13, 2010. 75th Anniversary of the Social Security Act
Code of Federal Regulations, 2011 CFR
2011-01-01
... Anniversary of the Social Security Act 8546 Proclamation 8546 Presidential Documents Proclamations Proclamation 8546 of August 13, 2010 Proc. 8546 75th Anniversary of the Social Security ActBy the President of... into law the Social Security Act to protect ordinary Americans “against the loss of a job and against...
Code of Federal Regulations, 2010 CFR
2010-04-01
... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. 240.15b5-1... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. Commission... member within the meaning of Section 3(a)(2) of the Securities Investor Protection Act of 1970 for...
ERIC Educational Resources Information Center
Moore, Gwendolyn B.; And Others
The Privacy Act of 1974 places restrictions on the Federal, state and local agencies' use of the Social Security account number as an identifier. For some agencies, compliance will involve changes in implementation of retrieval algorithms. This report describes methodology applicable to these changes in the more general context of the problem of…
Code of Federal Regulations, 2010 CFR
2010-04-01
... method, and experience gains and losses of previous years. (3) Limit adjustment. The term “limit... (k) of the section, where applicable) with respect to a given plan year in computing deductible... case of a plan using a spread gain funding method which maintains an unfunded liability (e.g., the...
17 CFR 210.12-12A - Investments-securities sold short.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Investments-securities sold... EXCHANGE ACT OF 1934, PUBLIC UTILITY HOLDING COMPANY ACT OF 1935, INVESTMENT COMPANY ACT OF 1940, INVESTMENT ADVISERS ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Form and Content of Schedules...
17 CFR 210.12-12A - Investments-securities sold short.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Investments-securities sold... EXCHANGE ACT OF 1934, PUBLIC UTILITY HOLDING COMPANY ACT OF 1935, INVESTMENT COMPANY ACT OF 1940, INVESTMENT ADVISERS ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Form and Content of Schedules...
Privacy and Security in Multi-User Health Kiosks
TAKYI, HAROLD; WATZLAF, VALERIE; MATTHEWS, JUDITH TABOLT; ZHOU, LEMING; DEALMEIDA, DILHARI
2017-01-01
Enforcement of the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH) has gotten stricter and penalties have become more severe in response to a significant increase in computer-related information breaches in recent years. With health information said to be worth twice as much as other forms of information on the underground market, making preservation of privacy and security an integral part of health technology development, rather than an afterthought, not only mitigates risks but also helps to ensure HIPAA and HITECH compliance. This paper provides a guide, based on the Office for Civil Rights (OCR) audit protocol, for creating and maintaining an audit checklist for multi-user health kiosks. Implementation of selected audit elements for a multi-user health kiosk designed for use by community-residing older adults illustrates how the guide can be applied. PMID:28814990
Pitfalls in computer housekeeping by doctors and nurses in KwaZulu-Natal: no malicious intent.
Jack, Caron; Singh, Yashik; Mars, Maurice
2013-01-01
Information and communication technologies are becoming an integral part of medical practice, research and administration and their use will grow as telemedicine and electronic medical record use become part of routine practice. Security in maintaining patient data is important and there is a statuary obligation to do so, but few health professionals have been trained on how to achieve this. There is no information on the use of computers and email by doctors and nurses in South Africa in the workplace and at home, and whether their current computer practices meets legal and ethical requirements. The aims of this study were to determine the use of computers by healthcare practitioners in the workplace and home; the use and approach to data storage, encryption and security of patient data and patient email; and the use of informed consent to transmit data by email. A self-administered questionnaire was administered to 400 health care providers from the state and private health care sectors. The questionnaire covered computer use in the workplace and at home, sharing of computers, data encryption and storage, email use, encryption of emails and storage, and the use of informed consent for email communication. 193 doctors and 207 nurses in the private and public sectors completed the questionnaire. Forty (10%) of participants do not use a computer. A third of health professionals were the only users of computers at work or at home. One hundred and ninety-eight respondents (55%) did not know if the data on the computers were encrypted, 132 (36.7%) knew that the data were not encrypted and 30 (8.3%) individuals knew that the data on the computers they were using were encrypted. Few doctors, 58 (16%), received emails from patients, with doctors more likely to receive emails from patients than nurses (p = 0.0025). Thirty-one percent of individuals did not respond to the emails. Emails were saved by 40 (69%) recipients but only 5 (12.5%) doctors encrypted the messages, 19 (47.5%) individuals knowingly did not encrypt and 16 (40.0%) did not know if they encrypted the data. While 20% of health professionals have emailed patient data, but only 41.7% gained consent to do so. Most health professionals as sampled in South Africa are not compliant with the National Health Act or the Electronic Communications Transactions Act of South Africa or guidelines from regulatory bodies when managing patient data on computers. Many appear ignorant or lack the ability to comply with simple data security procedures.
76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-31
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...
78 FR 76662 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-18
... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... rules and forms related to the offer and sale of securities pursuant to Section 3(b) of the Securities...
Code of Federal Regulations, 2010 CFR
2010-04-01
... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is not...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-23
...In accordance with the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (``Dodd-Frank Act''), the Commodity Futures Trading Commission (``CFTC'') and the Securities and Exchange Commission (``SEC'') (collectively, the ``Commissions''), in consultation with the Board of Governors of the Federal Reserve System (``Board''), are adopting new rules and interpretive guidance under the Commodity Exchange Act (``CEA''), and the Securities Exchange Act of 1934 (``Exchange Act''), to further define the terms ``swap dealer,'' ``security-based swap dealer,'' ``major swap participant,'' ``major security-based swap participant,'' and ``eligible contract participant.''
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-30
... Assistance Files System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to update and reissue a current Department of Homeland Security system of...
Code of Federal Regulations, 2011 CFR
2011-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
17 CFR 229.908 - (Item 908) Reasons for and alternatives to the roll-up transaction.
Code of Federal Regulations, 2011 CFR
2011-04-01
... alternatives to the roll-up transaction. 229.908 Section 229.908 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K Roll-Up...
17 CFR 229.908 - (Item 908) Reasons for and alternatives to the roll-up transaction.
Code of Federal Regulations, 2014 CFR
2014-04-01
... alternatives to the roll-up transaction. 229.908 Section 229.908 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K Roll-Up...
Code of Federal Regulations, 2014 CFR
2014-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
Code of Federal Regulations, 2012 CFR
2012-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
Code of Federal Regulations, 2010 CFR
2010-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
Code of Federal Regulations, 2013 CFR
2013-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
17 CFR 229.908 - (Item 908) Reasons for and alternatives to the roll-up transaction.
Code of Federal Regulations, 2013 CFR
2013-04-01
... alternatives to the roll-up transaction. 229.908 Section 229.908 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K Roll-Up...
17 CFR 229.908 - (Item 908) Reasons for and alternatives to the roll-up transaction.
Code of Federal Regulations, 2012 CFR
2012-04-01
... alternatives to the roll-up transaction. 229.908 Section 229.908 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K Roll-Up...
A novel quantum scheme for secure two-party distance computation
NASA Astrophysics Data System (ADS)
Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun
2017-12-01
Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.
75 FR 79992 - End-User Exception to Mandatory Clearing of Security-Based Swaps
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-21
...In accordance with the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (``Dodd-Frank Act''), the Securities and Exchange Commission (``Commission'') is proposing new Rule 3Cg-1 under the Securities Exchange Act of 1934 (``Exchange Act'') governing the exception to mandatory clearing of security-based swaps available for counterparties meeting certain conditions. The Commission is requesting comments on the proposed rule and related matters.
Code of Federal Regulations, 2011 CFR
2011-04-01
... securities of power supply companies from section 9(a)(2) of the Act. 250.14 Section 250.14 Commodity and... of securities of power supply companies from section 9(a)(2) of the Act. (a) An electric utility... exempt from section 9(a)(2) of the Act with respect to the acquisition of any security of a power supply...
Code of Federal Regulations, 2010 CFR
2010-04-01
... securities of power supply companies from section 9(a)(2) of the Act. 250.14 Section 250.14 Commodity and... of securities of power supply companies from section 9(a)(2) of the Act. (a) An electric utility... exempt from section 9(a)(2) of the Act with respect to the acquisition of any security of a power supply...
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1983-01-01
The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-13
... Location Accuracy, Network Security Best Practices, DNSSEC Implementation Practices for ISPs, Secure BGP... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security... persons that the Federal Communications Commission's (FCC) Communications Security, Reliability, and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-10
... SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974; as Amended; Proposed Alteration to an Existing Privacy Act System of Records, Housekeeping Changes, and New Routine Uses AGENCY: Social Security..., Social Security number (SSN), date of birth, address, and other relevant information about persons who...
Side-channel-free quantum key distribution.
Braunstein, Samuel L; Pirandola, Stefano
2012-03-30
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.
20 CFR 638.528 - Social Security.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 3 2011-04-01 2011-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...
17 CFR 240.12h-1 - Exemptions from registration under section 12(g) of the Act.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemptions from registration under section 12(g) of the Act. 240.12h-1 Section 240.12h-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
20 CFR 638.528 - Social Security.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 3 2012-04-01 2012-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...
20 CFR 638.528 - Social Security.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...
Cyber-Security Issues in Healthcare Information Technology.
Langer, Steve G
2017-02-01
In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.
Communication and computing technology in biocontainment laboratories using the NEIDL as a model.
McCall, John; Hardcastle, Kath
2014-07-01
The National Emerging Infectious Diseases Laboratories (NEIDL), Boston University, is a globally unique biocontainment research facility housing biosafety level 2 (BSL-2), BSL-3, and BSL-4 laboratories. Located in the BioSquare area at the University's Medical Campus, it is part of a national network of secure facilities constructed to study infectious diseases of major public health concern. The NEIDL allows for basic, translational, and clinical phases of research to be carried out in a single facility with the overall goal of accelerating understanding, treatment, and prevention of infectious diseases. The NEIDL will also act as a center of excellence providing training and education in all aspects of biocontainment research. Within every detail of NEIDL operations is a primary emphasis on safety and security. The ultramodern NEIDL has required a new approach to communications technology solutions in order to ensure safety and security and meet the needs of investigators working in this complex building. This article discusses the implementation of secure wireless networks and private cloud computing to promote operational efficiency, biosecurity, and biosafety with additional energy-saving advantages. The utilization of a dedicated data center, virtualized servers, virtualized desktop integration, multichannel secure wireless networks, and a NEIDL-dedicated Voice over Internet Protocol (VoIP) network are all discussed. © 2014 Federation of European Microbiological Societies. Published by John Wiley & Sons Ltd. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-10
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0062] Privacy Act of 1974; Department of Homeland Security United States Coast Guard DHS/USCG-027 Recruiting Files System of... accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to update and reissue an...
Code of Federal Regulations, 2010 CFR
2010-04-01
... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933 and... of 1933 of securities issued by any small business investment company which is registered under the...
5 CFR Appendix A to Subpart F of... - Standards for a Merit System of Personnel Administration
Code of Federal Regulations, 2010 CFR
2010-01-01
...). Employment Security (Unemployment Insurance and Employment Services), Social Security Act (Title III), as amended by the Social Security Act Amendments of 1939, Section 301, on August 10, 1939, and the Wagner....C. 49d(b). Grants to States for Old-Age Assistance for the Aged (Title I of the Social Security Act...
5 CFR Appendix A to Subpart F of... - Standards for a Merit System of Personnel Administration
Code of Federal Regulations, 2011 CFR
2011-01-01
...). Employment Security (Unemployment Insurance and Employment Services), Social Security Act (Title III), as amended by the Social Security Act Amendments of 1939, Section 301, on August 10, 1939, and the Wagner....C. 49d(b). Grants to States for Old-Age Assistance for the Aged (Title I of the Social Security Act...
77 FR 45721 - Consolidated Audit Trail
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-01
...The Securities and Exchange Commission (``Commission'') is adopting Rule 613 under the Securities Exchange Act of 1934 (``Exchange Act'' or ``Act'') to require national securities exchanges and national securities associations (``self-regulatory organizations'' or ``SROs'') to submit a national market system (``NMS'') plan to create, implement, and maintain a consolidated order tracking system, or consolidated audit trail, with respect to the trading of NMS securities, that would capture customer and order event information for orders in NMS securities, across all markets, from the time of order inception through routing, cancellation, modification, or execution.
75 FR 66811 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-29
... Law 111-203, to prohibit fraud, manipulation, and deception in connection with security-based swaps. 3... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange...
76 FR 44057 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... (DTC). DTC operates an automated, centralized system for book-entry movement of securities positions in...
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950... 218 of the Act. Under section 218 of the Social Security Act (the Act) a State may ask the Commissioner of Social Security to enter into an agreement to extend Federal old-age, survivors, disability and...
Code of Federal Regulations, 2010 CFR
2010-04-01
... under the Securities Act of 1933 of certain investment grade debt or investment grade preferred... Statements § 239.39 Form F-9, for registration under the Securities Act of 1933 of certain investment grade debt or investment grade preferred securities of certain Canadian issuers. (a) Form F-9 may be used for...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-13
...In accordance with section 712(a)(8), section 712(d)(1), sections 712(d)(2)(B) and (C), sections 721(b) and (c), and section 761(b) of the Dodd-Frank Wall Street Reform and Consumer Protection Act (``Dodd-Frank Act''), the Commodity Futures Trading Commission (``CFTC'') and the Securities and Exchange Commission (``SEC'') (collectively, ``Commissions''), in consultation with the Board of Governors of the Federal Reserve System (``Board''), are jointly adopting new rules and interpretations under the Commodity Exchange Act (``CEA'') and the Securities Exchange Act of 1934 (``Exchange Act'') to further define the terms ``swap,'' ``security-based swap,'' and ``security-based swap agreement'' (collectively, ``Product Definitions''); regarding ``mixed swaps;'' and governing books and records with respect to ``security-based swap agreements.'' The CFTC requests comment on its interpretation concerning forwards with embedded volumetric optionality, contained in Section II.B.2.(b)(ii) of this release.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...
17 CFR 210.8-02 - Annual financial statements.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Annual financial statements... AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE... ADVISERS ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Article 8 Financial Statements of...
20 CFR 422.210 - Judicial review.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Procedures of the Office of... Social Security Act, or of health services to be provided by a health maintenance organization without...) of the Act). The Social Security Act does not provide for a right to judicial review of a final...
77 FR 26259 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-03
.... SUPPLEMENTARY INFORMATION: The National Security Agency systems of records notice subject to the Privacy Act of... of Records AGENCY: National Security Agency/Central Security Service. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security Service is deleting a system of...
17 CFR 229.1004 - (Item 1004) Terms of the transaction.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 1004) Terms of the transaction. 229.1004 Section 229.1004 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND...
17 CFR 229.1004 - (Item 1004) Terms of the transaction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1004) Terms of the transaction. 229.1004 Section 229.1004 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND...
17 CFR 229.1004 - (Item 1004) Terms of the transaction.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 1004) Terms of the transaction. 229.1004 Section 229.1004 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.
20 CFR 401.25 - Terms defined.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Employees' Benefits SOCIAL SECURITY ADMINISTRATION PRIVACY AND DISCLOSURE OF OFFICIAL RECORDS AND.... Act means the Social Security Act. Agency means the Social Security Administration. Commissioner means the Commissioner of Social Security. Disclosure means making a record about an individual available to...
HIPAA-compliant automatic monitoring system for RIS-integrated PACS operation
NASA Astrophysics Data System (ADS)
Jin, Jin; Zhang, Jianguo; Chen, Xiaomeng; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Feng, Jie; Sheng, Liwei; Huang, H. K.
2006-03-01
As a governmental regulation, Health Insurance Portability and Accountability Act (HIPAA) was issued to protect the privacy of health information that identifies individuals who are living or deceased. HIPAA requires security services supporting implementation features: Access control; Audit controls; Authorization control; Data authentication; and Entity authentication. These controls, which proposed in HIPAA Security Standards, are Audit trails here. Audit trails can be used for surveillance purposes, to detect when interesting events might be happening that warrant further investigation. Or they can be used forensically, after the detection of a security breach, to determine what went wrong and who or what was at fault. In order to provide security control services and to achieve the high and continuous availability, we design the HIPAA-Compliant Automatic Monitoring System for RIS-Integrated PACS operation. The system consists of two parts: monitoring agents running in each PACS component computer and a Monitor Server running in a remote computer. Monitoring agents are deployed on all computer nodes in RIS-Integrated PACS system to collect the Audit trail messages defined by the Supplement 95 of the DICOM standard: Audit Trail Messages. Then the Monitor Server gathers all audit messages and processes them to provide security information in three levels: system resources, PACS/RIS applications, and users/patients data accessing. Now the RIS-Integrated PACS managers can monitor and control the entire RIS-Integrated PACS operation through web service provided by the Monitor Server. This paper presents the design of a HIPAA-compliant automatic monitoring system for RIS-Integrated PACS Operation, and gives the preliminary results performed by this monitoring system on a clinical RIS-integrated PACS.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Form D, notice of sales of... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE SECURITIES ACT OF 1933 Forms Pertaining to Exemptions § 239.500 Form D, notice of sales of securities under...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Form D, notice of sales of... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE SECURITIES ACT OF 1933 Forms Pertaining to Exemptions § 239.500 Form D, notice of sales of securities under...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form D, notice of sales of... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE SECURITIES ACT OF 1933 Forms Pertaining to Exemptions § 239.500 Form D, notice of sales of securities under...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Form D, notice of sales of... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE SECURITIES ACT OF 1933 Forms Pertaining to Exemptions § 239.500 Form D, notice of sales of securities under...
A Portable Computer Security Workshop
ERIC Educational Resources Information Center
Wagner, Paul J.; Phillips, Andrew T.
2006-01-01
We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... DEPARTMENT OF JUSTICE Antitrust Division Notice Pursuant to the National Cooperative Research and Production Act of 1993--Secure Content Storage Association, LLC Notice is hereby given that, on May 3, 2012, pursuant to Section 6(a) of the National Cooperative Research and Production Act of 1993, 15 U.S.C. 4301 et seq. (``the Act''), the Secure...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-08
... Financial Accounting Standards Board (``FASB'') and its parent organization, the Financial Accounting... recognizing the FASB's financial accounting and reporting standards as ``generally accepted'' under Section...; Securities Exchange Act of 1934; Order Regarding Review of FASB Accounting Support Fee for 2010 Under Section...
17 CFR 210.8-08 - Age of financial statements.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Age of financial statements... AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE... ADVISERS ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Article 8 Financial Statements of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-19
... for OMB Review; Comment Request; Employee Retirement Income Security Act of 1974 Investment Manager... Retirement Income Security Act of 1974 Investment Manager Electronic Registration,'' to the Office of... order to meet the definition of investment manager under Employee Retirement Income Security Act of 1974...
76 FR 6596 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
.... The Food Security Act of 1985 permits the states to establish ``central filing systems.'' These... in section 1324 of the Food Security Act of 1985. The information received from the State is... responsibility for the Clear Title Program (Section 1324 of the Food Security Act of 1985. Clear Title Program...
75 FR 39273 - Energy Independence and Security Act (Pub. L. 110-140)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
... DEPARTMENT OF THE INTERIOR U.S. Geological Survey Energy Independence and Security Act (Pub. L... Resource Assessment Methodology. SUMMARY: In 2007, the Energy Independence and Security Act (Pub. L. 110... provide important information to evaluate the potential for CO 2 storage as a mitigation option for global...
32 CFR 199.8 - Double coverage.
Code of Federal Regulations, 2010 CFR
2010-07-01
... the Social Security Act (42 U.S.C. 1396 et seq.). (2) The provision in paragraph (a)(1) of this... administered under title XIX of the Social Security Act (Medicaid); (ii) Coverage specifically designed to... under Title XIX of the Social Security Act (Medicaid) are never considered to be available in the...
Kennedy, Devin
2017-12-01
This article traces the development and expansion of early computer systems for managing and disseminating 'real-time' market data at the most influential stock market in the United States, the New York Stock Exchange (NYSE). It follows electronic media at the NYSE over a roughly ten-year period, from the time of the deployment of a computer called the Market Data System (MDS) through debates surrounding the National Market System and the passage of the 1975 Securities Acts Amendments. Building on research at the archives of the NYSE and the Securities and Exchange Commission (SEC), this history emphasizes the regulatory and managerial contexts in which market data became computerized. The SEC viewed market automation as both necessary for the viability of the securities industry and a mechanism for expanding regulatory oversight over the venues of stock trading. Moving from the MDS to later technical projects in the late 1960s and early 1970s, this article charts the changing meaning of electronic governance in a market increasingly conceptualized as a technical object. Adding to recent work in the social studies of finance and financial technologies, this history sites early NYSE computerization programs within managerial efforts to consolidate control over the clerical labor of financial markets, and in contests between regulatory and market institutions. It concludes by exploring the differing forms of electronic governance activated in these efforts to bring computers into the market.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Definition for purposes of... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.133 Definition for purposes of section 5 of the Act, of “sale”, “offer...
75 FR 75207 - Regulation SBSR-Reporting and Dissemination of Security-Based Swap Information
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-02
...In accordance with Section 763 (``Section 763'') and Section 766 (``Section 766'') of Title VII (``Title VII'') of the Dodd-Frank Wall Street Reform and Consumer Protection Act (the ``Dodd-Frank Act''), the Securities and Exchange Commission (``SEC'' or ``Commission'') is proposing Regulation SBSR--Reporting and Dissemination of Security-Based Swap Information (``Regulation SBSR'') under the Securities Exchange Act of 1934 (``Exchange Act'').\\1\\ Proposed Regulation SBSR would provide for the reporting of security- based swap information to registered security-based swap data repositories or the Commission and the public dissemination of security-based swap transaction, volume, and pricing information. Registered security-based swap data repositories would be required to establish and maintain certain policies and procedures regarding how transaction data are reported and disseminated, and participants of registered security-based swap data repositories that are security- based swap dealers or major security-based swap participants would be required to establish and maintain policies and procedures that are reasonably designed to ensure that they comply with applicable reporting obligations. Finally, proposed Regulation SBSR also would require a registered SDR to register with the Commission as a securities information processor on existing Form SIP. ---------------------------------------------------------------------------
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 210.12-25 - Supplementary profit and loss information.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Supplementary profit and loss information. 210.12-25 Section 210.12-25 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934, PUBLIC UTILITY...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-28
... alerting systems, 9-1-1 location accuracy, and network security. The FCC will attempt to accommodate as... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security... persons that the Federal Communications Commission's (FCC) third Communications Security, Reliability, and...
Domestic Security Cooperation: A Unified Approach to Homeland Security and Defense
2012-05-17
recommend non-materiel or materiel approaches 8 David A. Shirk, “Transnational Crime , U.S...the Sedition Act of 1918, captured this periods approach to homeland security and defense. The Espionage Act of 1917 outlawed interfering with any...10,000 or imprisonment for not more than twenty years or both.26 The Sedition Act of 1918 broadened the laws set out in the Espionage Act of 1917 by
3 CFR - The Energy Independence and Security Act of 2007
Code of Federal Regulations, 2010 CFR
2010-01-01
... 3 The President 1 2010-01-01 2010-01-01 false The Energy Independence and Security Act of 2007 Presidential Documents Other Presidential Documents Memorandum of January 26, 2009 The Energy Independence and Security Act of 2007 Memorandum for the Secretary of Transportation [and] the Administrator of the National Highway Traffic Safety...
42 CFR 435.115 - Individuals deemed to be receiving AFDC.
Code of Federal Regulations, 2011 CFR
2011-10-01
... collection of child or spousal support under title IV-D of the Social Security Act results in the termination of AFDC eligibility in accordance with section 406(h) of the Social Security Act. States must... eligible spouse of such relative as described in section 406(b) of the Social Security Act) who: (1...
17 CFR 229.1007 - (Item 1007) Source and amount of funds or other consideration.
Code of Federal Regulations, 2014 CFR
2014-04-01
... SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K Mergers and.... Disclose any alternative financing arrangements or alternative financing plans in the event the primary...
17 CFR 229.1007 - (Item 1007) Source and amount of funds or other consideration.
Code of Federal Regulations, 2012 CFR
2012-04-01
... SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K Mergers and.... Disclose any alternative financing arrangements or alternative financing plans in the event the primary...
17 CFR 229.1007 - (Item 1007) Source and amount of funds or other consideration.
Code of Federal Regulations, 2013 CFR
2013-04-01
... SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K Mergers and.... Disclose any alternative financing arrangements or alternative financing plans in the event the primary...
17 CFR 229.1007 - (Item 1007) Source and amount of funds or other consideration.
Code of Federal Regulations, 2011 CFR
2011-04-01
... SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K Mergers and.... Disclose any alternative financing arrangements or alternative financing plans in the event the primary...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-16
... security for inclusion in the Fund's portfolio to have aggregate investment characteristics, fundamental... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30459; File No. 812-13887... an order under section 6(c) of the Investment Company Act of 1940 (the ``Act'') for an exemption from...
32 CFR 199.8 - Double coverage.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., except in the case of a plan administered under title XIX of the Social Security Act (42 U.S.C. 1396 et... not include: (i) Plans administered under title XIX of the Social Security Act (Medicaid); (ii... under Title XIX of the Social Security Act (Medicaid) are never considered to be available in the...
42 CFR 447.510 - Requirements for manufacturers.
Code of Federal Regulations, 2011 CFR
2011-10-01
... report must include: (1) AMP, calculated in accordance with section 1927(k)(1) of the Social Security Act... provided for in section 1927(k)(1) of the Social Security Act. (ii) A manufacturer may choose to... should be calculated based on section 1927(k)(1) of the Social Security Act, except the period covered...
78 FR 6331 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-30
... Section 1876 of the Social Security Act are required to submit a budget and enrollment forecast, semi... under Section 1833 of the Social Security Act are required to submit a budget and enrollment forecast... Social Security Act. The purposes of the revisions were to implement some changes in response to the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... Alerting, E9-1-1 Location Accuracy, Network Security Best Practices, DNSSEC Implementation Practices for... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security... Security, Reliability, and Interoperability Council (CSRIC) meeting that was scheduled for March 6, 2013 is...
5 CFR 844.201 - General requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... withdrawal of an application for social security disability benefits. (c) An agency may consider the... the Social Security Act; or (ii) An official statement from the Social Security Administration that... Social Security Act. (2) A disability retirement application under this part will be dismissed when OPM...
Terrorism: Its Evolving Nature
1989-01-01
the adequacy of the Foreign Airport Security Act, an overall evaluation of the required foreign airport security assessments, and several others can...procedures envisioned by the Foreign Airport Security Act of 1985, which your committee helped initiate, played a useful role in this security...case of a threat to an airline, we get that information into the hands of airport security officials responsible for aviation security. This is the
17 CFR 240.31T - Temporary rule regarding fiscal year 2004.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Temporary rule regarding fiscal year 2004. 240.31T Section 240.31T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
17 CFR 240.31T - Temporary rule regarding fiscal year 2004.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Temporary rule regarding fiscal year 2004. 240.31T Section 240.31T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
17 CFR 240.31T - Temporary rule regarding fiscal year 2004.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Temporary rule regarding fiscal year 2004. 240.31T Section 240.31T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
17 CFR 240.31T - Temporary rule regarding fiscal year 2004.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Temporary rule regarding fiscal year 2004. 240.31T Section 240.31T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
17 CFR 240.31T - Temporary rule regarding fiscal year 2004.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Temporary rule regarding fiscal year 2004. 240.31T Section 240.31T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
Energy Independence and Security Act of 2007
This page provides an overview of the Energy Independence and Security Act (EISA) of 2007, which aims to increase U.S. energy security, develop renewable energy production, and improve vehicle fuel economy.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-29
...The Department proposes to establish a new Privacy Act SORN subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended, entitled Ginnie Mae Mortgage-Backed Security Unclaimed Funds System. The new record system will be used to track unclaimed security holder payments. Such unclaimed payments are owed to certificate holders of Ginnie Mae-guaranteed mortgage-backed securities who cannot be located by the Ginnie Mae servicer. Ginnie Mae tracks this information to ensure that security holders are paid properly.
17 CFR 210.12-13 - Investments other than securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Investments other than... EXCHANGE ACT OF 1934, PUBLIC UTILITY HOLDING COMPANY ACT OF 1935, INVESTMENT COMPANY ACT OF 1940, INVESTMENT ADVISERS ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Form and Content of Schedules...
17 CFR 210.12-13 - Investments other than securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Investments other than... EXCHANGE ACT OF 1934, PUBLIC UTILITY HOLDING COMPANY ACT OF 1935, INVESTMENT COMPANY ACT OF 1940, INVESTMENT ADVISERS ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Form and Content of Schedules...
6 CFR 1002.4 - Responses to Privacy Act requests.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Responses to Privacy Act requests. 1002.4 Section 1002.4 Domestic Security PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 1002.4 Responses to Privacy Act requests. (a) Acknowledgement. The Privacy Act Officer...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-21
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [DHS-2013-0073] Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency, Federal Government--001 National Defense Executive Reserve System of Records AGENCY: Department of Homeland Security, Privacy Office...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-20
... DEPARTMENT OF THE TREASURY Order Granting Temporary Exemptions From Certain Government Securities... temporary exemptions from certain Government Securities Act of 1986 provisions and regulations regarding transactions in credit default swaps that reference government securities. ICE Clear Credit LLC requested these...
76 FR 17106 - Secure Rural Schools Resource Advisory Committee (RAC) Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-28
... DEPARTMENT OF AGRICULTURE Forest Service Secure Rural Schools Resource Advisory Committee (RAC... meeting to be held authorized under the Secure Rural Schools Act and Community Self-Determination Act... federally designated Secure Rural Schools Resource Advisory Committee (RAC). The public is invited to attend...
77 FR 39749 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-05
... advertising in securities offerings conducted pursuant to Rule 506 of Regulation D under the Securities Act... Startups Act. At times, changes in Commission priorities require alterations in the scheduling of meeting...
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 2 2011-10-01 2011-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
20 CFR 410.530 - Reductions; excess earnings.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 410.530 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF...), (h), (j), and (l) of the Social Security Act (42 U.S.C. 403 (b), (f), (g), (h), (j), and (l)), as if such benefit payments were benefits payable under section 202 of the Social Security Act (42 U.S.C. 402...
6 CFR 5.34 - Standards of conduct for administration of the Privacy Act.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Standards of conduct for administration of the Privacy Act. 5.34 Section 5.34 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.34 Standards of conduct for administration of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-26
... the Securities Exchange Act of 1934 (``Exchange Act'') concerning large trader reporting to assist the... persons are referred to as ``large traders'').\\1\\ \\1\\ See Securities Exchange Act Release No. 64976 (July... person is a large trader: (1) Any transaction that is part of an offering of securities by or on behalf...
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 2 2014-10-01 2012-10-01 true What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 2 2013-10-01 2012-10-01 true What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 2 2012-10-01 2012-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-30
... 1974; Department of Homeland Security U.S. Customs and Border Protection-DHS/CBP-009 Electronic System for Travel Authorization (ESTA) System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of...
42 CFR 436.114 - Individuals deemed to be receiving AFDC.
Code of Federal Regulations, 2011 CFR
2011-10-01
... increased collection of child or spousal support under title IV-D of the Social Security Act results in the termination of AFDC eligibility in accordance with section 406(h) of the Social Security Act. States must... eligible spouse of such relative as described in section 406(b) of the Social Security Act) who: (1...
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 2 2010-10-01 2010-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-01-01
Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-10-01
While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934, PUBLIC UTILITY... POLICY AND CONSERVATION ACT OF 1975 General Instructions As to Financial Statements § 210.3-19 [Reserved] ...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-06
... Ellen Callahan, Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC... (703-235- 0780), Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC... Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-08
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63417; File No. SR-NSCC-2010-17] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Immediate... to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ notice is hereby given that...
17 CFR 403.7 - Effective dates.
Code of Federal Regulations, 2010 CFR
2010-04-01
... THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER SECURITIES AND BALANCES § 403.7 Effective... referred to in § 403.4 concerning the Securities Investor Protection Act of 1970, and (ii) if applicable... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Effective dates. 403.7 Section...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... Prevention Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of... to establish a new system of records titled, ``Department of Homeland Security/Transportation Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...
17 CFR 210.3-07-210.3-08 - [Reserved
Code of Federal Regulations, 2010 CFR
2010-04-01
... CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF... ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 General Instructions As to Financial Statements §§ 210.3-07—210.3-08 [Reserved] ...
Complying with the Campus Security Act--1990. Title II--Crime Awareness and Campus Security.
ERIC Educational Resources Information Center
National Association of Student Personnel Administrators, Inc.
This paper offers guidelines to colleges and universities which must comply with requirements of the Student Right-to-Know and Campus Security Act of 1990, specifically Title II, Crime Awareness and Campus Security. An introduction outlines some measures that campuses are urged to adopt such as campus-wide committees to review security policies,…
Exploring Factors That Affect Adoption of Computer Security Practices among College Students
ERIC Educational Resources Information Center
Alqarni, Amani
2017-01-01
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-07
... generally subject to certain antifraud and anti-manipulation provisions under the Exchange Act. This is... specific antifraud and anti-manipulation provisions (including Exchange Act section 10(b)).\\25\\ Accordingly... application of those Exchange Act antifraud and anti-manipulation provisions, as well as Securities Act...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-19
..., 2012: Investment Company Act of 1940; Release No. 30261/November 14, 2012] Order Granting Exmeptions From Specified Provisions of the Securities Exchange Act and the Investment Company Act and Certain...(C) and Section 38(A) of the Investment Company Act of 1940 Granting Exemptions From Specified...
HIPAA--a real world perspective.
Nulan, C
2001-01-01
An effective and realistic approach to HIPAA compliance requires healthcare organizations to achieve a fundamental shift in attitude, awareness, habits and capabilities in the areas of privacy and security. They must create a sense of accountability among staff, and even patients, for the safeguarding of patient information. Only when this culture shift has occurred, along with the required technological advancements, can HIPAA compliance be realistically achieved. There is still ample time to create the organizational shift necessary, along with technological enhancements, to meet HIPAA requirements. Beyond compliance, HIPAA will benefit the healthcare industry by promoting administrative simplification--the original intention of the Act. And it will require the healthcare industry, in an abbreviated timeframe, to upgrade its level of sophistication in managing information. HIPAA certification springs from an organizational compliance method that has been underway in government for the past two decades. The HIPAA playbook is taken lock, stock and barrel from other Federal guidelines. HIPAA's legislative lineage includes the Healthcare Reform Act of 1993, Paperwork Reduction Act of 1980, Computer Security Act of 1987 and the Privacy Act of 1974. HIPAA means that public and private sector healthcare organizations are going to be required by law to adopt the same information-handling practices that have been in effect in the Federal government for years. That boils down to two things: Standardized formatting of data electronically exchanged between providers, payers and business partners (EDI) Federalization of security and privacy practices within private-sector healthcare information management The key to making HIPAA compliance achievable within a practical timeframe, as well as instituting the culture changes that go with enhanced privacy and security standards, is a process that is largely unfamiliar in the private sector, called administrative certification and accreditation. Certification is an organizational change-management methodology that drives accountability for security down to that level in the organization where it will concretely and tangibly get done. It is a comprehensive managerial assessment of the technical and non-technical security features and other safeguards of a system associated with its use and environment. The assessment seeks to establish and document the extent to which a particular system meets a set of specified security requirements. HIPAA accreditation occurs when all functional managers in an organization have completed reports of what they know they need to do in their areas. They submit that information to an executive official within the organization who functions as the accrediting official for the organization. Accreditation is the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and should be strongly based on the solvable vulnerabilities and residual risks identified during certification. Institutionalizing a practical and formal HIPAA certification program is important to support business activities and can provide several benefits including increased communication within an organization.
17 CFR 210.2-07 - Communication with audit committees.
Code of Federal Regulations, 2014 CFR
2014-04-01
... FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934, INVESTMENT COMPANY ACT OF 1940, INVESTMENT ADVISERS ACT OF 1940, AND ENERGY POLICY... to be used; (2) All alternative treatments within Generally Accepted Accounting Principles for...
17 CFR 210.2-07 - Communication with audit committees.
Code of Federal Regulations, 2012 CFR
2012-04-01
... FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934, INVESTMENT COMPANY ACT OF 1940, INVESTMENT ADVISERS ACT OF 1940, AND ENERGY POLICY... to be used; (2) All alternative treatments within Generally Accepted Accounting Principles for...
17 CFR 210.2-07 - Communication with audit committees.
Code of Federal Regulations, 2013 CFR
2013-04-01
... FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934, INVESTMENT COMPANY ACT OF 1940, INVESTMENT ADVISERS ACT OF 1940, AND ENERGY POLICY... to be used; (2) All alternative treatments within Generally Accepted Accounting Principles for...
IT Security on Campus: A Fragile Equilibrium.
ERIC Educational Resources Information Center
Wada, Kent
2003-01-01
Considers how to provide appropriate levels of information technology (IT) security in the higher education environment. Discusses implications of the Digital Millennium Copyright Act, the USA Patriot Act, the Health Insurance Portability and Accountability Act of 1996, California Information Practices Act, VISA USA Cardholder Information Security…
Kraemer, Sara; Carayon, Pascale
2007-03-01
This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.
Analysis of the Security and Privacy Requirements of Cloud-Based Electronic Health Records Systems
Fernández, Gonzalo; López-Coronado, Miguel
2013-01-01
Background The Cloud Computing paradigm offers eHealth systems the opportunity to enhance the features and functionality that they offer. However, moving patients’ medical information to the Cloud implies several risks in terms of the security and privacy of sensitive health records. In this paper, the risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed. To protect the confidentiality of patient information and facilitate the process, some suggestions for health care providers are made. Moreover, security issues that Cloud service providers should address in their platforms are considered. Objective To show that, before moving patient health records to the Cloud, security and privacy concerns must be considered by both health care providers and Cloud service providers. Security requirements of a generic Cloud service provider are analyzed. Methods To study the latest in Cloud-based computing solutions, bibliographic material was obtained mainly from Medline sources. Furthermore, direct contact was made with several Cloud service providers. Results Some of the security issues that should be considered by both Cloud service providers and their health care customers are role-based access, network security mechanisms, data encryption, digital signatures, and access monitoring. Furthermore, to guarantee the safety of the information and comply with privacy policies, the Cloud service provider must be compliant with various certifications and third-party requirements, such as SAS70 Type II, PCI DSS Level 1, ISO 27001, and the US Federal Information Security Management Act (FISMA). Conclusions Storing sensitive information such as EHRs in the Cloud means that precautions must be taken to ensure the safety and confidentiality of the data. A relationship built on trust with the Cloud service provider is essential to ensure a transparent process. Cloud service providers must make certain that all security mechanisms are in place to avoid unauthorized access and data breaches. Patients must be kept informed about how their data are being managed. PMID:23965254
Analysis of the security and privacy requirements of cloud-based electronic health records systems.
Rodrigues, Joel J P C; de la Torre, Isabel; Fernández, Gonzalo; López-Coronado, Miguel
2013-08-21
The Cloud Computing paradigm offers eHealth systems the opportunity to enhance the features and functionality that they offer. However, moving patients' medical information to the Cloud implies several risks in terms of the security and privacy of sensitive health records. In this paper, the risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed. To protect the confidentiality of patient information and facilitate the process, some suggestions for health care providers are made. Moreover, security issues that Cloud service providers should address in their platforms are considered. To show that, before moving patient health records to the Cloud, security and privacy concerns must be considered by both health care providers and Cloud service providers. Security requirements of a generic Cloud service provider are analyzed. To study the latest in Cloud-based computing solutions, bibliographic material was obtained mainly from Medline sources. Furthermore, direct contact was made with several Cloud service providers. Some of the security issues that should be considered by both Cloud service providers and their health care customers are role-based access, network security mechanisms, data encryption, digital signatures, and access monitoring. Furthermore, to guarantee the safety of the information and comply with privacy policies, the Cloud service provider must be compliant with various certifications and third-party requirements, such as SAS70 Type II, PCI DSS Level 1, ISO 27001, and the US Federal Information Security Management Act (FISMA). Storing sensitive information such as EHRs in the Cloud means that precautions must be taken to ensure the safety and confidentiality of the data. A relationship built on trust with the Cloud service provider is essential to ensure a transparent process. Cloud service providers must make certain that all security mechanisms are in place to avoid unauthorized access and data breaches. Patients must be kept informed about how their data are being managed.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64906; File No. SR-NYSEArca-2011-49] Self... Operate Consistent With the Requirements of Rule 15c3-5 Under the Securities Exchange Act of 1934 July 18, 2011. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64905; File No. SR-NYSEArca-2011-50] Self... Operate Consistent With the Requirements of Rule 15c3-5 Under the Securities Exchange Act of 1934 July 18, 2011. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and...
First Annual Report to Congress on Title XX of the Social Security Act.
ERIC Educational Resources Information Center
Department of Health, Education, and Welfare, Washington, DC.
This annual report to Congress on Title XX of the Social Security Act reports on the operation of the 1976 fiscal year program. Preceding the report are descriptive highlights of the program. Title XX of the Social Security Act changes the role and relationships of the Department of Health, Education, and Welfare; the individual states; and…
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Age of financial statements at... FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934, PUBLIC UTILITY... POLICY AND CONSERVATION ACT OF 1975 General Instructions As to Financial Statements § 210.3-12 Age of...
20 CFR 228.2 - Tier I and tier II annuity components.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Social Security Act if all of the employee's earnings after 1936 under both the railroad retirement system and the social security system had been creditable under the Social Security Act. (b) Tier II...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-01
... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION: Notice of public... persons that the Federal Communications Commission's (FCC or Commission) Communications Security...
Institute for scientific computing research;fiscal year 1999 annual report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keyes, D
2000-03-28
Large-scale scientific computation, and all of the disciplines that support it and help to validate it, have been placed at the focus of Lawrence Livermore National Laboratory by the Accelerated Strategic Computing Initiative (ASCI). The Laboratory operates the computer with the highest peak performance in the world and has undertaken some of the largest and most compute-intensive simulations ever performed. Computers at the architectural extremes, however, are notoriously difficult to use efficiently. Even such successes as the Laboratory's two Bell Prizes awarded in November 1999 only emphasize the need for much better ways of interacting with the results of large-scalemore » simulations. Advances in scientific computing research have, therefore, never been more vital to the core missions of the Laboratory than at present. Computational science is evolving so rapidly along every one of its research fronts that to remain on the leading edge, the Laboratory must engage researchers at many academic centers of excellence. In FY 1999, the Institute for Scientific Computing Research (ISCR) has expanded the Laboratory's bridge to the academic community in the form of collaborative subcontracts, visiting faculty, student internships, a workshop, and a very active seminar series. ISCR research participants are integrated almost seamlessly with the Laboratory's Center for Applied Scientific Computing (CASC), which, in turn, addresses computational challenges arising throughout the Laboratory. Administratively, the ISCR flourishes under the Laboratory's University Relations Program (URP). Together with the other four Institutes of the URP, it must navigate a course that allows the Laboratory to benefit from academic exchanges while preserving national security. Although FY 1999 brought more than its share of challenges to the operation of an academic-like research enterprise within the context of a national security laboratory, the results declare the challenges well met and well worth the continued effort. A change of administration for the ISCR occurred during FY 1999. Acting Director John Fitzgerald retired from LLNL in August after 35 years of service, including the last two at helm of the ISCR. David Keyes, who has been a regular visitor in conjunction with ASCI scalable algorithms research since October 1997, overlapped with John for three months and serves half-time as the new Acting Director.« less
Development of a HIPAA-compliant environment for translational research data and analytics.
Bradford, Wayne; Hurdle, John F; LaSalle, Bernie; Facelli, Julio C
2014-01-01
High-performance computing centers (HPC) traditionally have far less restrictive privacy management policies than those encountered in healthcare. We show how an HPC can be re-engineered to accommodate clinical data while retaining its utility in computationally intensive tasks such as data mining, machine learning, and statistics. We also discuss deploying protected virtual machines. A critical planning step was to engage the university's information security operations and the information security and privacy office. Access to the environment requires a double authentication mechanism. The first level of authentication requires access to the university's virtual private network and the second requires that the users be listed in the HPC network information service directory. The physical hardware resides in a data center with controlled room access. All employees of the HPC and its users take the university's local Health Insurance Portability and Accountability Act training series. In the first 3 years, researcher count has increased from 6 to 58.
Code of Federal Regulations, 2011 CFR
2011-04-01
... than U.S. Generally Accepted Accounting Principles or International Financial Reporting Standards as... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Financial statements of... FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934, PUBLIC UTILITY...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-13
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68864; File No. S7-27-11] Order Extending.... Introduction On July 1, 2011, the Securities and Exchange Commission (``Commission'') issued an order granting... security-based swaps (``Exchange Act Exemptive Order'').\\1\\ Certain temporary exemptions contained in the...
32 CFR 806b.12 - Requesting the Social Security Number.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-25
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69174; File No. SR-NYSEMKT-2013-26] Self... Securities March 19, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (``Act... MKT'' or ``Exchange'') filed with the Securities and Exchange Commission (``Commission'') the proposed...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70357; File No. SR-MIAX-2013-42] Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate... provisions of Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70873; File No. SR-ISE-2013-56] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70872; File No. SR-ISE-2013-57] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65499; File No. SR-ISE-2011-64] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that...
17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...
17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...
17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...
17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...
17 CFR 240.10b5-2 - Duties of trust or confidence in misappropriation insider trading cases.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Duties of trust or confidence... Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Manipulative and Deceptive...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-06
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64769; File No. SR-NSCC-2011-04] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change... to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder \\2...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-21
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70884; File No. SR-ISE-2013-59] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... November 15, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-03
... things, that transactions in security-based swaps be cleared through a clearing agency that is registered... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63390; File No. S7-17-09] Order Extending Temporary Conditional Exemptions Under the Securities Exchange Act of 1934 in Connection With Request on...
12 CFR 792.67 - Security of systems of records.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Security of systems of records. 792.67 Section... AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION The Privacy Act § 792.67 Security of systems of records. (a) Each system manager, with the approval of the head of that...
32 CFR 806b.12 - Requesting the Social Security Number.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...
32 CFR 806b.12 - Requesting the Social Security Number.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...
32 CFR 806b.12 - Requesting the Social Security Number.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...
32 CFR 806b.12 - Requesting the Social Security Number.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Requesting the Social Security Number. 806b.12... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.12 Requesting the Social Security Number. When asking an individual for his or her Social Security Number, always give a Privacy Act...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-03
... is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0031] Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... Tapes, eliminated the distinction between Derivative Securities Products and Non-Derivative Securities... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71137; File No. SR-CHX-2013-22] Self-Regulatory...) \\1\\ of the Securities Exchange Act of 1934 (``Act'') \\2\\ and Rule 19b-4 thereunder,\\3\\ notice is...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65087; File No. SR-ISE-2011-47] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... August 10, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Schedule 15G-Information to be... Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934...
A novel quantum solution to secure two-party distance computation
NASA Astrophysics Data System (ADS)
Peng, Zhen-wan; Shi, Run-hua; Wang, Pan-hong; Zhang, Shun
2018-06-01
Secure Two-Party Distance Computation is an important primitive of Secure Multiparty Computational Geometry that it involves two parties, where each party has a private point, and the two parties want to jointly compute the distance between their points without revealing anything about their respective private information. Secure Two-Party Distance Computation has very important and potential applications in settings of high secure requirements, such as privacy-preserving Determination of Spatial Location-Relation, Determination of Polygons Similarity, and so on. In this paper, we present a quantum protocol for Secure Two-Party Distance Computation by using QKD-based Quantum Private Query. The security of the protocol is based on the physical principles of quantum mechanics, instead of difficulty assumptions, and therefore, it can ensure higher security than the classical related protocols.
17 CFR 210.12-10-210.12-11 - [Reserved
Code of Federal Regulations, 2011 CFR
2011-04-01
... CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF... ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Form and Content of Schedules §§ 210.12-10—210.12-11 [Reserved] for management investment companies ...
17 CFR 210.12-10-210.12-11 - [Reserved
Code of Federal Regulations, 2010 CFR
2010-04-01
... CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF... ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Form and Content of Schedules §§ 210.12-10—210.12-11 [Reserved] for management investment companies ...
Secure Multiparty Quantum Computation for Summation and Multiplication.
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-21
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.
Secure Multiparty Quantum Computation for Summation and Multiplication
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-01
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197
A Computer Security Course in the Undergraduate Computer Science Curriculum.
ERIC Educational Resources Information Center
Spillman, Richard
1992-01-01
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
2010-07-01
Cloud computing , an emerging form of computing in which users have access to scalable, on-demand capabilities that are provided through Internet... cloud computing , (2) the information security implications of using cloud computing services in the Federal Government, and (3) federal guidance and...efforts to address information security when using cloud computing . The complete report is titled Information Security: Federal Guidance Needed to
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64907; File No. SR-NYSEAmex-2011-53] Self... Consistent With the Requirements of Rule 15c3-5 Under the Securities Exchange Act of 1934 July 18, 2011. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64908; File No. SR-NYSEAmex-2011-52] Self... Consistent With the Requirements of Rule 15c3-5 Under the Securities Exchange Act of 1934 July 18, 2011. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64904; File No. SR-NYSE-2011-34] Self... Consistent With the Requirements of Rule 15c3-5 Under the Securities Exchange Act of 1934 July 18, 2011. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption from section 14(a... Section 270.14a-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.14a-2 Exemption from section 14(a) of the Act...
17 CFR 210.5-01 - Application of §§ 210.5-01 to 210.5-04.
Code of Federal Regulations, 2010 CFR
2010-04-01
... EXCHANGE ACT OF 1934, PUBLIC UTILITY HOLDING COMPANY ACT OF 1935, INVESTMENT COMPANY ACT OF 1940... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Application of §§ 210.5-01 to 210.5-04. 210.5-01 Section 210.5-01 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...
ERIC Educational Resources Information Center
DeBowes, Michael Matthew
2014-01-01
The "Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act" (the "Clery Act") is a consumer right-to-know law originally passed by Congress in 1900. The law requires colleges and universities receiving federal student aid to publish annually their security-related policies and crime statistics. The…
76 FR 34277 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-13
... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange Commission will hold an Open Meeting [[Page 34278
... Resources Resource Request System Contact Us Legal and Security Accessibility Accessibility Tools Disclaimer Privacy Act Statement & Security No Fear Act FOIA Inspector General Audits & Investigative ...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-03
...The Department of Homeland Security is issuing a final rule to amend its regulations to exempt portions of a Department of Homeland Security/U.S. Customs and Border Protection system of records entitled the, ``Department of Homeland Security/U.S. Customs and Border Protection--006 Automated Targeting System of Records'' from certain provisions of the Privacy Act. Specifically, the Department exempts portions of the Department of Homeland Security/U.S. Customs and Border Protection--006 Automated Targeting system of records from one or more provisions of the Privacy Act because of criminal, civil, and administrative enforcement requirements.
SEED: A Suite of Instructional Laboratories for Computer Security Education
ERIC Educational Resources Information Center
Du, Wenliang; Wang, Ronghua
2008-01-01
The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Definition of âpreceded by a... security holders. 230.153a Section 230.153a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.153a Definition of “preceded...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Definition of âpreceded by a... security holders. 230.153a Section 230.153a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.153a Definition of “preceded...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Definition of âpreceded by a... security holders. 230.153a Section 230.153a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.153a Definition of “preceded...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Definition of âpreceded by a... security holders. 230.153a Section 230.153a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.153a Definition of “preceded...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Definition of âpreceded by a... security holders. 230.153a Section 230.153a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.153a Definition of “preceded...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-23
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62523; File No. SR-ISE-2010-73] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change Relating to... Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on...
Code of Federal Regulations, 2012 CFR
2012-07-01
... are exempt from release under the National Security Exemption of the Privacy Act? 1202.90 Section 1202... from release under the National Security Exemption of the Privacy Act? (a) The Investigative Case Files... interfere with ongoing investigations and law enforcement or national security activities and impose an...
Code of Federal Regulations, 2011 CFR
2011-07-01
... are exempt from release under the National Security Exemption of the Privacy Act? 1202.90 Section 1202... from release under the National Security Exemption of the Privacy Act? (a) The Investigative Case Files... interfere with ongoing investigations and law enforcement or national security activities and impose an...
Code of Federal Regulations, 2014 CFR
2014-07-01
... are exempt from release under the National Security Exemption of the Privacy Act? 1202.90 Section 1202... from release under the National Security Exemption of the Privacy Act? (a) The Investigative Case Files... interfere with ongoing investigations and law enforcement or national security activities and impose an...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-30
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71172; File No. SR-MIAX-2013-58] Self...) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby...'') filed with the Securities and Exchange Commission (``Commission'') a proposed rule change as described...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71066; File No. SR-ISE-2013-66] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4...
The 1983 Amendments to the Social Security Act: The Issue of Intergenerational Equity.
ERIC Educational Resources Information Center
Ozawa, Martha N.
1984-01-01
Reviews the conditions that prevailed before the passage of the 1983 amendments to the Social Security Act, the probable effects of the amendments, and the future direction of social security. Questions whether the amendments have in reality rescued social security from financial insolvency and discusses the concept of intergenerational equity.…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-28
... Balance Orders March 22, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act... security. Net Balance Order Pricing The uniform settlement price for net Balance Orders is currently established using a rounding methodology.\\11\\ If the current per share price of the Balance Order Security is...