Sample records for confidential technology implementation

  1. Trust, confidentiality, and the acceptability of sharing HIV-related patient data: lessons learned from a mixed methods study about Health Information Exchanges.

    PubMed

    Maiorana, Andre; Steward, Wayne T; Koester, Kimberly A; Pearson, Charles; Shade, Starley B; Chakravarty, Deepalika; Myers, Janet J

    2012-04-19

    Concerns about the confidentiality of personal health information have been identified as a potential obstacle to implementation of Health Information Exchanges (HIEs). Considering the stigma and confidentiality issues historically associated with human immunodeficiency virus (HIV) disease, we examine how trust-in technology, processes, and people-influenced the acceptability of data sharing among stakeholders prior to implementation of six HIEs intended to improve HIV care in parts of the United States. Our analyses identify the kinds of concerns expressed by stakeholders about electronic data sharing and focus on the factors that ultimately facilitated acceptability of the new exchanges. We conducted 549 surveys with patients and 66 semi-structured interviews with providers and other stakeholders prior to implementation of the HIEs to assess concerns about confidentiality in the electronic sharing of patient data. The patient quantitative data were analyzed using SAS 9.2 to yield sample descriptive statistics. The analysis of the qualitative interviews with providers and other stakeholders followed an open-coding process, and convergent and divergent perspectives emerging from those data were examined within and across the HIEs. We found widespread acceptability for electronic sharing of HIV-related patient data through HIEs. This acceptability appeared to be driven by growing comfort with information technologies, confidence in the security protocols utilized to protect data, trust in the providers and institutions who use the technologies, belief in the benefits to the patients, and awareness that electronic exchange represents an enhancement of data sharing already taking place by other means. HIE acceptability depended both on preexisting trust among patients, providers, and institutions and on building consensus and trust in the HIEs as part of preparation for implementation. The process of HIE development also resulted in forging shared vision among institutions. Patients and providers are willing to accept the electronic sharing of HIV patient data to improve care for a disease historically seen as highly stigmatized. Acceptability depends on the effort expended to understand and address potential concerns related to data sharing and confidentiality, and on the trust established among stakeholders in terms of the nature of the systems and how they will be used.

  2. Basis for the implementation of digital signature in Argentine's health environment

    NASA Astrophysics Data System (ADS)

    Escobar, P. P.; Formica, M.

    2007-11-01

    The growth of telemedical applications and electronic transactions in health environments is paced by the constant technology evolution. This implies a big cultural change in traditional medicine and in hospital information systems' users which arrival is delayed, basically, by the lack of solid laws and a well defined role-based infrastructure. The use of digital signature as a mean of identification, authentication, confidentiality and non-repudiation is the most suitable tool for assuring the electronic transactions and patient's data protection. The implementation of a Public Key Infrastructure (PKI) in health environment allows for authentication, encryption and use of digital signature for assuring confidentiality and control of the movement of sensitive information. This work defines the minimum technological, legal and procedural basis for a successful PKI implementation and establishes the roles for the different actors in the chain of confidence in the public health environment of Argentine.

  3. A security architecture for health information networks.

    PubMed

    Kailar, Rajashekar; Muralidhar, Vinod

    2007-10-11

    Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today's healthcare enterprise. Recent work on 'nationwide health information network' architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately.

  4. A Security Architecture for Health Information Networks

    PubMed Central

    Kailar, Rajashekar

    2007-01-01

    Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today’s healthcare enterprise. Recent work on ‘nationwide health information network’ architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately. PMID:18693862

  5. 77 FR 28336 - Approval and Promulgation of Air Quality Implementation Plans; Maryland; Offset Lithographic...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-14

    ... Technology Transfer and Advancement Act of 1995 (15 U.S.C. 272 note) because application of those... Technology (RACT) for sources covered by EPA's Control Techniques Guidelines (CTG) for offset lithographic..., unless the comment includes information claimed to be Confidential Business Information (CBI) or other...

  6. 78 FR 32613 - Disapproval of State Implementation Plan; Infrastructure Requirements for the 1997 8-Hour Ozone...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-31

    ... 12866. I. National Technology Transfer and Advancement Act Section 12 of the National Technology... information claimed to be Confidential Business Information (CBI) or other information whose disclosure is... requirements of [section 128].'' \\2\\ We find that this legislative history indicates that Congress intended...

  7. Trust, confidentiality, and the acceptability of sharing HIV-related patient data: lessons learned from a mixed methods study about Health Information Exchanges

    PubMed Central

    2012-01-01

    Background Concerns about the confidentiality of personal health information have been identified as a potential obstacle to implementation of Health Information Exchanges (HIEs). Considering the stigma and confidentiality issues historically associated with human immunodeficiency virus (HIV) disease, we examine how trust—in technology, processes, and people—influenced the acceptability of data sharing among stakeholders prior to implementation of six HIEs intended to improve HIV care in parts of the United States. Our analyses identify the kinds of concerns expressed by stakeholders about electronic data sharing and focus on the factors that ultimately facilitated acceptability of the new exchanges. Methods We conducted 549 surveys with patients and 66 semi-structured interviews with providers and other stakeholders prior to implementation of the HIEs to assess concerns about confidentiality in the electronic sharing of patient data. The patient quantitative data were analyzed using SAS 9.2 to yield sample descriptive statistics. The analysis of the qualitative interviews with providers and other stakeholders followed an open-coding process, and convergent and divergent perspectives emerging from those data were examined within and across the HIEs. Results We found widespread acceptability for electronic sharing of HIV-related patient data through HIEs. This acceptability appeared to be driven by growing comfort with information technologies, confidence in the security protocols utilized to protect data, trust in the providers and institutions who use the technologies, belief in the benefits to the patients, and awareness that electronic exchange represents an enhancement of data sharing already taking place by other means. HIE acceptability depended both on preexisting trust among patients, providers, and institutions and on building consensus and trust in the HIEs as part of preparation for implementation. The process of HIE development also resulted in forging shared vision among institutions. Conclusions Patients and providers are willing to accept the electronic sharing of HIV patient data to improve care for a disease historically seen as highly stigmatized. Acceptability depends on the effort expended to understand and address potential concerns related to data sharing and confidentiality, and on the trust established among stakeholders in terms of the nature of the systems and how they will be used. PMID:22515736

  8. Continued improvements at one C3RS site

    DOT National Transportation Integrated Search

    2015-06-01

    Human-factors-based solutions, along with process and technology innovations, can make significant contributions to improving safety in the railroad industry. As part of ongoing efforts to address human-factors, FRA implemented the Confidential Close...

  9. 75 FR 4742 - Approval and Promulgation of Implementation Plans; State of California; Legal Authority

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-29

    ... requirements of Section 12(d) of the National Technology Transfer and Advancement Act of 1995 (15 U.S.C. 272... information provided, unless the comment includes Confidential Business Information (CBI) or other information..., please schedule an [[Page 4743

  10. 76 FR 62002 - Revisions to the California State Implementation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-06

    ... requirements of Section 12(d) of the National Technology Transfer and Advancement Act of 1995 (15 U.S.C. 272... Confidential Business Information (CBI) or other information whose disclosure is restricted by statute... normal business hours with the contact listed in the FOR FURTHER INFORMATION CONTACT section. FOR FURTHER...

  11. A National Agenda for Public Health Informatics

    PubMed Central

    Yasnoff, William A.; Overhage, J. Marc; Humphreys, Betsy L.; LaVenture, Martin

    2001-01-01

    The AMIA 2001 Spring Congress brought together members of the the public health and informatics communities to develop a national agenda for public health informatics. Discussions of funding and governance; architecture and infrastructure; standards and vocabulary; research, evaluation, and best practices; privacy, confidentiality, and security; and training and workforce resulted in 74 recommendations with two key themes—that all stakeholders need to be engaged in coordinated activities related to public health information architecture, standards, confidentiality, best practices, and research; and that informatics training is needed throughout the public health workforce. Implementation of this consensus agenda will help promote progress in the application of information technology to improve public health. PMID:11687561

  12. 77 FR 25109 - Revisions to the California State Implementation Plan, Imperial County Air Pollution Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-27

    ... requirements of Section 12(d) of the National Technology Transfer and Advancement Act of 1995 (15 U.S.C. 272... information provided, unless the comment includes Confidential Business Information (CBI) or other information... the hard copy materials, please schedule an appointment during normal business hours with the contact...

  13. 78 FR 63145 - Approval and Promulgation of State Implementation Plans; Hawaii; Infrastructure Requirements for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-23

    ... requirements of section 12(d) of the National Technology Transfer and Advancement Act of 1995 (15 U.S.C. 272... comment includes Confidential Business Information (CBI) or other information whose disclosure is... normal business hours with the contact listed directly below. FOR FURTHER INFORMATION CONTACT: Dawn...

  14. Research on mobile electronic commerce security technology based on WPKI

    NASA Astrophysics Data System (ADS)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  15. 76 FR 21807 - Approval and Promulgation of Implementation Plans; State of Nevada; PM-10; Determinations...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-19

    ... requirements of Section 12(d) of the National Technology Transfer and Advancement Act of 1995 (15 U.S.C. 272... some may not be available in either location (e.g., confidential business information (CBI)). To inspect the hard copy materials, please schedule an appointment during normal business hours with the...

  16. Practical, Ethical, and Legal Considerations regarding Videocounseling in College and University Counseling Centers: A Response to Quarto's "Influencing College Students' Perceptions of Videocounseling"

    ERIC Educational Resources Information Center

    Menzano, Silvestro; Goodwin, Alan; Rockett, Geraldine; Morris, Kathy

    2011-01-01

    There are numerous factors and concerns to take into consideration when implementing new technology into a counseling center's practice. These factors--informed consent, confidentiality, record-keeping, licensure, technical issues, eligibility, emergencies, and staff perceptions--are legitimate and must be addressed and resolved before…

  17. Security in perspective; luxury or must?

    PubMed

    Bakker, A

    1998-03-01

    In this paper, security in health information systems is put into perspective. The further penetration of information technology into health care is discussed and it is concluded that information systems have already become a vital component, not only for the logistics of the health care institution but also for the rendering of care and cure. Health care depends heavily on adequate data, so availability and integrity are equally important. In view of the sensitive nature of many patient data, the importance of confidentiality was recognised long before computers were invented. For widespread use of IT in health care it is of vital importance that computers can be trusted in respect of confidentiality. This paper emphasises the need to pay attention to security and suggests a responsible approach with implementation of both technical and organisational measures.

  18. Emerging Technologies: Web 2.0.

    PubMed

    Holt, Claire

    2011-03-01

    Web 2.0 has brought a change to how we communicate and disseminate information with the use of Twitter, Facebook, YouTube, instant messaging and blogging. This technology is beginning to be used in the health field for public awareness campaigns, emergency health alerts, medical education and remote healthcare services. Australian Health Information Managers will be called upon to reconcile their organisations' policies and procedures regarding the use of Web 2.0 technologies within the existing legal framework of privacy, confidentiality and consent. This article explores various applications of Web 2.0, their benefits and some of their potential legal and ethical implications when implemented in Australia.

  19. Library Records: A Review of Confidentiality Laws and Policies.

    ERIC Educational Resources Information Center

    Million, Angela C.; Fisher, Kim N.

    1986-01-01

    Cites the importance of having a state law, knowing what it says, and having a library policy statement regarding the confidentiality of patron records. Discussion covers writing and implementing a policy, the role of automation, existing laws, library records defined, exceptions to confidentiality, and legal liability. Thirty-seven references are…

  20. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2011-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  1. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  2. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2013-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  3. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2012-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  4. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  5. 75 FR 75586 - Confidentiality of Suspicious Activity Reports

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ...] RIN 1550-AC26 Confidentiality of Suspicious Activity Reports AGENCY: The Office of Thrift Supervision... implementing the Bank Secrecy Act (BSA) governing the confidentiality of a suspicious activity report (SAR) to... corporations regulated by the OTS, to keep certain records and make certain reports that have been determined...

  6. A Novel QKD-based Secure Edge Router Architecture Design for Burst Confidentiality in Optical Burst Switched Networks

    NASA Astrophysics Data System (ADS)

    Balamurugan, A. M.; Sivasubramanian, A.

    2014-06-01

    The Optical Burst Switching (OBS) is an emergent result to the technology issue that could achieve a viable network in future. They have the ability to meet the bandwidth requisite of those applications that call for intensive bandwidth. The field of optical transmission has undergone numerous advancements and is still being researched mainly due to the fact that optical data transmission can be done at enormous speeds. The concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution and quality of service (QoS). This paper proposes a framework based on QKD based secure edge router architecture design to provide burst confidentiality. The QKD protocol offers high level of confidentiality as it is indestructible. The design architecture was implemented in FPGA using diverse models and the results were taken. The results show that the proposed model is suitable for real time secure routing applications of the Optical burst switched networks.

  7. A 0.13-µm implementation of 5 Gb/s and 3-mW folded parallel architecture for AES algorithm

    NASA Astrophysics Data System (ADS)

    Rahimunnisa, K.; Karthigaikumar, P.; Kirubavathy, J.; Jayakumar, J.; Kumar, S. Suresh

    2014-02-01

    A new architecture for encrypting and decrypting the confidential data using Advanced Encryption Standard algorithm is presented in this article. This structure combines the folded structure with parallel architecture to increase the throughput. The whole architecture achieved high throughput with less power. The proposed architecture is implemented in 0.13-µm Complementary metal-oxide-semiconductor (CMOS) technology. The proposed structure is compared with different existing structures, and from the result it is proved that the proposed structure gives higher throughput and less power compared to existing works.

  8. High-Technology Companies Often Turn to Colleges for Confidential 'Beta Tests' of New Products.

    ERIC Educational Resources Information Center

    Turner, Judith Axler

    1988-01-01

    Beta testing--the process of trying a product in a real-world setting before releasing it commercially--exploits a natural interface between universities and high-technology industries. High-tech companies need confidential, real-world tests of new products, and universities are eager to get an early look at tomorrow's technology. (MLW)

  9. Design and implementation of face recognition system based on Windows

    NASA Astrophysics Data System (ADS)

    Zhang, Min; Liu, Ting; Li, Ailan

    2015-07-01

    In view of the basic Windows login password input way lacking of safety and convenient operation, we will introduce the biometrics technology, face recognition, into the computer to login system. Not only can it encrypt the computer system, also according to the level to identify administrators at all levels. With the enhancement of the system security, user input can neither be a cumbersome nor worry about being stolen password confidential.

  10. Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.

    PubMed

    Li, Xing; Chen, Dexin; Li, Chunyan; Wang, Liangmin

    2015-07-03

    With the rapid development of wireless communication technology, sensor technology, information acquisition and processing technology, sensor networks will finally have a deep influence on all aspects of people's lives. The battery resources of sensor nodes should be managed efficiently in order to prolong network lifetime in large-scale wireless sensor networks (LWSNs). Data aggregation represents an important method to remove redundancy as well as unnecessary data transmission and hence cut down the energy used in communication. As sensor nodes are deployed in hostile environments, the security of the sensitive information such as confidentiality and integrity should be considered. This paper proposes Fully homomorphic Encryption based Secure data Aggregation (FESA) in LWSNs which can protect end-to-end data confidentiality and support arbitrary aggregation operations over encrypted data. In addition, by utilizing message authentication codes (MACs), this scheme can also verify data integrity during data aggregation and forwarding processes so that false data can be detected as early as possible. Although the FHE increase the computation overhead due to its large public key size, simulation results show that it is implementable in LWSNs and performs well. Compared with other protocols, the transmitted data and network overhead are reduced in our scheme.

  11. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rothstein, M.A.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emergingmore » genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.« less

  12. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rothstein, M.A.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emergingmore » genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.« less

  13. Computer Network Security- The Challenges of Securing a Computer Network

    NASA Technical Reports Server (NTRS)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  14. 6 CFR 25.10 - Confidentiality and protection of Intellectual Property.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.10 Confidentiality and...

  15. Confidentiality in Sports Medicine.

    PubMed

    Malcolm, Dominic

    2016-04-01

    This article synthesizes existing literature to provide a summary of the ethical issues concerning patient confidentiality in sport. It outlines the medical principle of confidentiality and identifies cross-cultural ethicolegal variations that shape its implementation. Clinicians' multiple obligations, physical environments, and practice and policy contexts are discussed, and research detailing experiences of maintaining patient confidentiality in sport is reviewed. Policy recommendations for enhancing compliance with this ethical principle are summarized. It is argued that the context of sport exacerbates pressures on clinicians to break patient confidentiality, breaches occur regularly, and interventions are required to enhance ethical compliance in sports medicine. Copyright © 2016 Elsevier Inc. All rights reserved.

  16. Information governance in NHS's NPfIT: a case for policy specification.

    PubMed

    Becker, Moritz Y

    2007-01-01

    The National Health Service's (NHS's) National Programme for Information Technology (NPfIT) in the UK with its proposed nation-wide online health record service poses serious technical challenges, especially with regard to access control and patient confidentiality. The complexity of the confidentiality requirements and their constantly evolving nature (due to changes in law, guidelines and ethical consensus) make traditional technologies such as role-based access control (RBAC) unsuitable. Furthermore, a more formal approach is also needed for debating about and communicating on information governance, as natural-language descriptions of security policies are inherently ambiguous and incomplete. Our main goal is to convince the reader of the strong benefits of employing formal policy specification in nation-wide electronic health record (EHR) projects. Many difficulties could be alleviated by specifying the requirements in a formal authorisation policy language such as Cassandra. The language is unambiguous, declarative and machine-enforceable, and is based on distributed constrained Datalog. Cassandra is interpreted within a distributed Trust Management environment, where digital credentials are used for establishing mutual trust between strangers. To demonstrate how policy specification can be applied to NPfIT, we translate a fragment of natural-language NHS specification into formal Cassandra rules. In particular, we present policy rules pertaining to the management of Clinician Sealed Envelopes, the mechanism by which clinical patient data can be concealed in the nation-wide EHR service. Our case study exposes ambiguities and incompletenesses in the informal NHS documents. We strongly recommend the use of trust management and policy specification technology for the implementation of nation-wide EHR infrastructures. Formal policies can be used for automatically enforcing confidentiality requirements, but also for specification and communication purposes. Formalising the requirements also reveals ambiguities and missing details in the currently used informal specification documents.

  17. Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks

    PubMed Central

    Li, Xing; Chen, Dexin; Li, Chunyan; Wang, Liangmin

    2015-01-01

    With the rapid development of wireless communication technology, sensor technology, information acquisition and processing technology, sensor networks will finally have a deep influence on all aspects of people’s lives. The battery resources of sensor nodes should be managed efficiently in order to prolong network lifetime in large-scale wireless sensor networks (LWSNs). Data aggregation represents an important method to remove redundancy as well as unnecessary data transmission and hence cut down the energy used in communication. As sensor nodes are deployed in hostile environments, the security of the sensitive information such as confidentiality and integrity should be considered. This paper proposes Fully homomorphic Encryption based Secure data Aggregation (FESA) in LWSNs which can protect end-to-end data confidentiality and support arbitrary aggregation operations over encrypted data. In addition, by utilizing message authentication codes (MACs), this scheme can also verify data integrity during data aggregation and forwarding processes so that false data can be detected as early as possible. Although the FHE increase the computation overhead due to its large public key size, simulation results show that it is implementable in LWSNs and performs well. Compared with other protocols, the transmitted data and network overhead are reduced in our scheme. PMID:26151208

  18. Confidential close call reporting system : preliminary evaluation findings.

    DOT National Transportation Integrated Search

    2008-12-01

    The Federal Railroad Administration (FRA) is implementing a collaborative problem-solving approach to improving safety. The Confidential Close Call Reporting System (C3RS) is a human factors-based approach that is designed to reduce the accident rate...

  19. Optimization of the Controlled Evaluation of Closed Relational Queries

    NASA Astrophysics Data System (ADS)

    Biskup, Joachim; Lochner, Jan-Hendrik; Sonntag, Sebastian

    For relational databases, controlled query evaluation is an effective inference control mechanism preserving confidentiality regarding a previously declared confidentiality policy. Implementations of controlled query evaluation usually lack efficiency due to costly theorem prover calls. Suitably constrained controlled query evaluation can be implemented efficiently, but is not flexible enough from the perspective of database users and security administrators. In this paper, we propose an optimized framework for controlled query evaluation in relational databases, being efficiently implementable on the one hand and relaxing the constraints of previous approaches on the other hand.

  20. Balancing Between Privacy and Patient Needs for Health Information in the Age of Participatory Health and Social Media: A Scoping Review.

    PubMed

    Househ, Mowafa; Grainger, Rebecca; Petersen, Carolyn; Bamidis, Panagiotis; Merolli, Mark

    2018-04-22

     With the increased use of participatory health enabling technologies, such as social media, balancing the need for health information with patient privacy and confidentiality has become a more complex and immediate concern. The purpose of this paper produced by the members of the IMIA Fbrticipatoiy Health and Social Media (PHSM) working group is to investigate patient needs for health information using participatory health enabling technologies, while balancing their needs for privacy and confidentiality.  Six domain areas including media sharing platforms, patient portals, web-based platforms, crowdsourcing websites, medical avatars, and other mobile health technologies were identified by five members of the IMIA PHSM working group as relevant to participatory health and the balance between data sharing and patient needs for privacy and confidentiality. After identifying the relevant domain areas, our scoping review began by searching several databases such as PubMed, MEDLINE, Scopus, and Google Scholar using a variety of key search terms.  A total of 1,973 studies were identified, of which 68 studies met our inclusion criteria and were included in the analysis. Results showed that challenges for balancing patient needs for information and privacy and confidentiality concerns included: cross-cultural understanding, clinician and patient awareness, de-identification of data, and commercialization of patient data. Some opportunities identified were patient empowerment, connecting participatory health enabling technologies with clinical records, open data sharing agreement, and e-consent.  Balancing between privacy and patient needs for health information in the age of participatory health and social media offers several opportunities and challenges. More people are engaging in actively managing health through participatory health enabling technologies. Such activity often includes sharing health information and with this comes a perennial tension between balancing individual needs and the desire to uphold privacy and confidentiality. We recommend that guidelines for both patients and clinicians, in terms of their use of participatory health-enabling technologies, are developed to ensure that patient privacy and confidentiality are protected, and a maximum benefit can be realized. Georg Thieme Verlag KG Stuttgart.

  1. 76 FR 7121 - Privacy Act of 1974; Proposed Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-09

    ... identity of confidential sources and the nature of the information supplied by informants as well as... the information. Confidential sources and informers might refuse to provide valuable information... nature of the information they supplied. Loss of access to such sources would seriously impair the...

  2. Developing an effective corrective action process : lessons learned from operating a confidential close call reporting system

    DOT National Transportation Integrated Search

    2013-03-05

    In 2007, the Federal Railroad Administration (FRA) launched : C3RS, the Confidential Close Call Reporting System, as a : demonstration project to learn how to facilitate the effective : reporting and implementation of corrective actions, and assess t...

  3. Spectral coherent-state quantum cryptography.

    PubMed

    Cincotti, Gabriella; Spiekman, Leo; Wada, Naoya; Kitayama, Ken-ichi

    2008-11-01

    A novel implementation of quantum-noise optical cryptography is proposed, which is based on a simplified architecture that allows long-haul, high-speed transmission in a fiber optical network. By using a single multiport encoder/decoder and 16 phase shifters, this new approach can provide the same confidentiality as other implementations of Yuen's encryption protocol, which use a larger number of phase or polarization coherent states. Data confidentiality and error probability for authorized and unauthorized receivers are carefully analyzed.

  4. Applying transpose matrix on advanced encryption standard (AES) for database content

    NASA Astrophysics Data System (ADS)

    Manurung, E. B. P.; Sitompul, O. S.; Suherman

    2018-03-01

    Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) and has been adopted by the U.S. government and is now used worldwide. This paper reports the impact of transpose matrix integration to AES. Transpose matrix implementation on AES is aimed at first stage of chypertext modifications for text based database security so that the confidentiality improves. The matrix is also able to increase the avalanche effect of the cryptography algorithm 4% in average.

  5. 75 FR 46948 - Medicare Program; Listening Session Regarding Confidential Feedback Reports and the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-04

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Medicare & Medicaid Services [CMS-1578-N] Medicare Program; Listening Session Regarding Confidential Feedback Reports and the Implementation of a Value-Based Payment Modifier for Physicians, September 24, 2010 AGENCY: Centers for Medicare & Medicaid...

  6. Safeguarding Confidentiality in Electronic Health Records.

    PubMed

    Shenoy, Akhil; Appel, Jacob M

    2017-04-01

    Electronic health records (EHRs) offer significant advantages over paper charts, such as ease of portability, facilitated communication, and a decreased risk of medical errors; however, important ethical concerns related to patient confidentiality remain. Although legal protections have been implemented, in practice, EHRs may be still prone to breaches that threaten patient privacy. Potential safeguards are essential, and have been implemented especially in sensitive areas such as mental illness, substance abuse, and sexual health. Features of one institutional model are described that may illustrate the efforts to both ensure adequate transparency and ensure patient confidentiality. Trust and the therapeutic alliance are critical to the provider-patient relationship and quality healthcare services. All of the benefits of an EHR are only possible if patients retain confidence in the security and accuracy of their medical records.

  7. From Hippocrates to facsimile: Protecting patient confidentiality is more difficult and more important than ever before

    PubMed Central

    Dodek, D Y; Dodek, A

    1997-01-01

    Although patient confidentiality has been a fundamental ethical principle since the Hippocratic Oath, it is under increasing threat. The main area of confidentiality is patient records. Physicians must be able to store and dispose of medical records securely. Patients should be asked whether some information should be kept out of the record or withheld if information is released. Patient identity should be kept secret during peer review of medical records. Provincial legislation outlines circumstances in which confidential information must be divulged. Because of the "team approach" to care, hospital records may be seen by many health care and administrative personnel. All hospital workers must respect confidentiality, especially when giving out information about patients by telephone or to the media. Research based on medical-record review also creates challenges for confidentiality. Electronic technology and communications are potential major sources of breaches of confidentiality. Computer records must be carefully protected from casual browsing or from unauthorized access. Fax machines and cordless and cellular telephones can allow unauthorized people to see or overhear confidential information. Confidentiality is also a concern in clinical settings, including physicians' offices and hospitals. Conversations among hospital personnel in elevators or public cafeterias can result in breaches of confidentiality. Patient confidentiality is a right that must be safeguarded by all health care personnel. PMID:9084393

  8. 78 FR 44622 - Agency Information Collection; Activity Under OMB Review; Confidential Close Call Reporting System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-24

    ... (OMB) for approval for renewal of information collection supporting a multi-year research study that... DEPARTMENT OF TRANSPORTATION Research and Innovative Technology Administration Agency Information Collection; Activity Under OMB Review; Confidential Close Call Reporting System AGENCY: Research & Innovative...

  9. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education.

    PubMed

    Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K

    2013-08-09

    Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy.

  10. Circles of Confidence in Correspondence: Modeling Confidentiality and Secrecy in Knowledge Exchange Networks of Letters and Drawings in the Early Modern Period.

    PubMed

    van den Heuvel, Charles; Weingart, Scott B; Spelt, Nils; Nellen, Henk

    2016-01-01

    Science in the early modern world depended on openness in scholarly communication. On the other hand, a web of commercial, political, and religious conflicts required broad measures of secrecy and confidentiality; similar measures were integral to scholarly rivalries and plagiarism. This paper analyzes confidentiality and secrecy in intellectual and technological knowledge exchange via letters and drawings. We argue that existing approaches to understanding knowledge exchange in early modern Europe--which focus on the Republic of Letters as a unified entity of corresponding scholars--can be improved upon by analyzing multilayered networks of communication. We describe a data model to analyze circles of confidence and cultures of secrecy in intellectual and technological knowledge exchanges. Finally, we discuss the outcomes of a first experiment focusing on the question of how personal and professional/official relationships interact with confidentiality and secrecy, based on a case study of the correspondence of Hugo Grotius.

  11. High-Surety Telemedicine in a Distributed, 'Plug-andPlan' Environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craft, Richard L.; Funkhouser, Donald R.; Gallagher, Linda K.

    1999-05-17

    Commercial telemedicine systems are increasingly functional, incorporating video-conferencing capabilities, diagnostic peripherals, medication reminders, and patient education services. However, these systems (1) rarely utilize information architectures which allow them to be easily integrated with existing health information networks and (2) do not always protect patient confidentiality with adequate security mechanisms. Using object-oriented methods and software wrappers, we illustrate the transformation of an existing stand-alone telemedicine system into `plug-and-play' components that function in a distributed medical information environment. We show, through the use of open standards and published component interfaces, that commercial telemedicine offerings which were once incompatible with electronic patient recordmore » systems can now share relevant data with clinical information repositories while at the same time hiding the proprietary implementations of the respective systems. Additionally, we illustrate how leading-edge technology can secure this distributed telemedicine environment, maintaining patient confidentiality and the integrity of the associated electronic medical data. Information surety technology also encourages the development of telemedicine systems that have both read and write access to electronic medical records containing patient-identifiable information. The win-win approach to telemedicine information system development preserves investments in legacy software and hardware while promoting security and interoperability in a distributed environment.« less

  12. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  13. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  14. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  15. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  16. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  17. A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine.

    PubMed

    Murillo-Escobar, M A; Cardoza-Avendaño, L; López-Gutiérrez, R M; Cruz-Hernández, C

    2017-04-01

    Recently, telemedicine offers medical services remotely via telecommunications systems and physiological monitoring devices. This scheme provides healthcare delivery services between physicians and patients conveniently, since some patients can not attend the hospital due to any reason. However, transmission of information over an insecure channel such as internet or private data storing generates a security problem. Therefore, authentication, confidentiality, and privacy are important challenges in telemedicine, where only authorized users should have access to medical or clinical records. On the other hand, chaotic systems have been implemented efficiently in cryptographic systems to provide confidential and privacy. In this work, we propose a novel symmetric encryption algorithm based on logistic map with double chaotic layer encryption (DCLE) in diffusion process and just one round of confusion-diffusion for the confidentiality and privacy of clinical information such as electrocardiograms (ECG), electroencephalograms (EEG), and blood pressure (BP) for applications in telemedicine. The clinical signals are acquired from PhysioBank data base for encryption proposes and analysis. In contrast with recent schemes in literature, we present a secure cryptographic algorithm based on chaos validated with the most complete security analysis until this time. In addition, the cryptograms are validated with the most complete pseudorandomness tests based on National Institute of Standards and Technology (NIST) 800-22 suite. All results are at MATLAB simulations and all them show the effectiveness, security, robustness, and the potential use of the proposed scheme in telemedicine.

  18. Privacy, confidentiality, and security in information systems of state health agencies.

    PubMed

    O'Brien, D G; Yasnoff, W A

    1999-05-01

    To assess the employment and status of privacy, confidentiality, security and fair information practices in electronic information systems of U.S. state health agencies. A survey instrument was developed and administered to key contacts within the state health agencies of each of the 50 U.S. states, Puerto Rico and the District of Columbia. About a third of U.S. state health agencies have no written policies in place regarding privacy and confidentiality in electronic information systems. The doctrines of fair information practice often seemed to be ignored. One quarter of the agencies reported at least one security breach during the past two years, and 16% experienced a privacy and confidentiality related transgression. Most of the breaches were committed by personnel from within the agencies. These results raise questions about the integrity of existing privacy, confidentiality and security measures in the information systems of U.S. state health agencies. Recommendations include the development and vigorous enforcement of written privacy and confidentiality policies, increased personnel training, and expanded implementation of security measures such as encryption and system firewalls. A discussion of the current status of U.S. privacy, confidentiality and security issues is offered.

  19. Crypto-Watermarking of Transmitted Medical Images.

    PubMed

    Al-Haj, Ali; Mohammad, Ahmad; Amer, Alaa'

    2017-02-01

    Telemedicine is a booming healthcare practice that has facilitated the exchange of medical data and expertise between healthcare entities. However, the widespread use of telemedicine applications requires a secured scheme to guarantee confidentiality and verify authenticity and integrity of exchanged medical data. In this paper, we describe a region-based, crypto-watermarking algorithm capable of providing confidentiality, authenticity, and integrity for medical images of different modalities. The proposed algorithm provides authenticity by embedding robust watermarks in images' region of non-interest using SVD in the DWT domain. Integrity is provided in two levels: strict integrity implemented by a cryptographic hash watermark, and content-based integrity implemented by a symmetric encryption-based tamper localization scheme. Confidentiality is achieved as a byproduct of hiding patient's data in the image. Performance of the algorithm was evaluated with respect to imperceptibility, robustness, capacity, and tamper localization, using different medical images. The results showed the effectiveness of the algorithm in providing security for telemedicine applications.

  20. 77 FR 52027 - Information Collection Being Reviewed by the Federal Communications Commission Under Delegated...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-28

    ... request for comments. SUMMARY: As part of its continuing effort to reduce paperwork burden and as required... forms of information technology; and ways to further reduce the information burden for small business... Costs: N/A. Nature and Extent of Confidentiality: There is no need for confidentiality. Privacy Act...

  1. A Simple Technique for Securing Data at Rest Stored in a Computing Cloud

    NASA Astrophysics Data System (ADS)

    Sedayao, Jeff; Su, Steven; Ma, Xiaohao; Jiang, Minghao; Miao, Kai

    "Cloud Computing" offers many potential benefits, including cost savings, the ability to deploy applications and services quickly, and the ease of scaling those application and services once they are deployed. A key barrier for enterprise adoption is the confidentiality of data stored on Cloud Computing Infrastructure. Our simple technique implemented with Open Source software solves this problem by using public key encryption to render stored data at rest unreadable by unauthorized personnel, including system administrators of the cloud computing service on which the data is stored. We validate our approach on a network measurement system implemented on PlanetLab. We then use it on a service where confidentiality is critical - a scanning application that validates external firewall implementations.

  2. National Institute of Statistical Sciences Data Confidentiality Technical Panel: Final Report. NCES 2011-608

    ERIC Educational Resources Information Center

    Karr, Alan

    2011-01-01

    NCES asked the National Institute of Statistical Sciences (NISS) to convene a technical panel of survey and policy experts to examine the NCES current and planned data dissemination strategies for confidential data with respect to: mandates and directives that NCES make data available; current and prospective technologies for protecting and…

  3. APA (American Psychological Association) Task Force on Privacy and Confidentiality. Final Report.

    ERIC Educational Resources Information Center

    American Psychological Association, Washington, DC.

    This Task Force on Privacy and Confidentiality is intended to call attention to the central role of the right to privacy in the maintenance and enrichment of a free society. The psychological implications of the changing views of privacy as reflected in political, social, and technological developments are discussed, and recommendations relating…

  4. Evaluation of real-time location systems in their hospital contexts.

    PubMed

    Fisher, Jill A; Monahan, Torin

    2012-10-01

    The purpose of the research was to assess real-time location systems (RTLS) that have been implemented in U.S. hospitals. We examined the type of uses to which RTLS have been put, the degree of functionality of the various technologies and software, and the organizational effects of implementing RTLS. The project was a 3-year qualitative study of 23 U.S. hospitals that had implemented RTLS for the purpose of tracking assets, personnel, and/or patients. We observed the systems in use and conducted 80 semi-structured interviews with hospital personnel and vendors. In order to protect the confidentiality of the hospitals and vendors in our sample, we conducted an aggregate analysis of our findings rather than providing evaluations of specific technologies or hospital case studies. The most important findings from our research were (1) substandard functionality of most real-time location systems in use and (2) serious obstacles to effective deployment of the systems due to the material and organizational constraints of the hospitals themselves. We found that the current best use of RTLS is for asset tracking, but importantly it requires whole-hospital deployment as well as centralized control of the system, preferably by materials management or biomedical engineering departments. There are serious technological, material, and organizational barriers to the implementation of RTLS, and these barriers need to be overcome if hospitals are to maximize the potential benefits of these systems. In addition to considering the available technological options, hospitals must assess their unique environments, including the myriad material and organizational constraints that will affect the success of RTLS implementation. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  5. 77 FR 51933 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-28

    ...), is implementing a new system of records, 09-25-0223, ``NIH Records Related to Research Misconduct... protect the integrity of NIH research misconduct proceedings and to protect the identity of confidential... implementing a new system of records called, ``NIH Records Related to Research Misconduct Proceedings'' (09- 25...

  6. Successful use of tablet personal computers and wireless technologies for the 2011 Nepal Demographic and Health Survey.

    PubMed

    Paudel, Deepak; Ahmed, Marie; Pradhan, Anjushree; Lal Dangol, Rajendra

    2013-08-01

    Computer-Assisted Personal Interviewing (CAPI), coupled with the use of mobile and wireless technology, is growing as a data collection methodology. Nepal, a geographically diverse and resource-scarce country, implemented the 2011 Nepal Demographic and Health Survey, a nationwide survey of major health indicators, using tablet personal computers (tablet PCs) and wireless technology for the first time in the country. This paper synthesizes responses on the benefits and challenges of using new technology in such a challenging environment from the 89 interviewers who administered the survey. Overall, feedback from the interviewers indicate that the use of tablet PCs and wireless technology to administer the survey demonstrated potential to improve data quality and reduce data collection time-benefits that outweigh manageable challenges, such as storage and transport of the tablet PCs during fieldwork, limited options for confidential interview space due to screen readability issues under direct sunlight, and inconsistent electricity supply at times. The introduction of this technology holds great promise for improving data availability and quality, even in a context with limited infrastructure and extremely difficult terrain.

  7. Privacy and Confidentiality Practices In Adolescent Family Planning Care At Federally Qualified Health Centers.

    PubMed

    Beeson, Tishra; Mead, Katherine H; Wood, Susan; Goldberg, Debora Goetz; Shin, Peter; Rosenbaum, Sara

    2016-03-01

    The confidentiality of family planning services remains a high priority to adolescents, but barriers to implementing confidentiality and privacy practices exist in settings designed for teenagers who are medically underserved, including federally qualified health centers (FQHCs). A sample of 423 FQHCs surveyed in 2011 provided information on their use of five selected privacy and confidentiality practices, which were examined separately and combined into an index. Regression modeling was used to assess whether various state policies and organizational characteristics were associated with FQHCs' scores on the index. In-depth case studies of six FQHCs were conducted to provide additional contextual information. Among FQHCs reporting on confidentiality, most reported providing written or verbal information regarding adolescents' rights to confidential care (81%) and limiting access to family planning and medical records to protect adolescents' confidentiality (84%). Far fewer reported maintaining separate medical records for family planning (10%), using a security block on electronic medical records to prevent disclosures (43%) or using separate contact information for communications regarding family planning services (50%). Index scores were higher among FQHCs that received Title X funding than among those that did not (coefficient, 0.70) and among FQHCs with the largest patient volumes than among those with the smallest caseloads (0.43). Case studies highlighted how a lack of guidelines and providers' confusion over relevant laws present a challenge in offering confidential care to adolescents. The organizational practices used to ensure adolescent family planning confidentiality in FQHCs are varied across organizations. Copyright © 2016 by the Guttmacher Institute.

  8. An Implementation Of Elias Delta Code And ElGamal Algorithm In Image Compression And Security

    NASA Astrophysics Data System (ADS)

    Rachmawati, Dian; Andri Budiman, Mohammad; Saffiera, Cut Amalia

    2018-01-01

    In data transmission such as transferring an image, confidentiality, integrity, and efficiency of data storage aspects are highly needed. To maintain the confidentiality and integrity of data, one of the techniques used is ElGamal. The strength of this algorithm is found on the difficulty of calculating discrete logs in a large prime modulus. ElGamal belongs to the class of Asymmetric Key Algorithm and resulted in enlargement of the file size, therefore data compression is required. Elias Delta Code is one of the compression algorithms that use delta code table. The image was first compressed using Elias Delta Code Algorithm, then the result of the compression was encrypted by using ElGamal algorithm. Prime test was implemented using Agrawal Biswas Algorithm. The result showed that ElGamal method could maintain the confidentiality and integrity of data with MSE and PSNR values 0 and infinity. The Elias Delta Code method generated compression ratio and space-saving each with average values of 62.49%, and 37.51%.

  9. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education

    PubMed Central

    2013-01-01

    Background Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient’s TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Methods Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO’s standard for information security risk management. Results A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Conclusions Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy. PMID:23937965

  10. 78 FR 29367 - Access to Confidential Business Information by ABT Associates, Incorporated; Perry Johnson...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ...), Resource Conservation and Sustainability Division (RCSD) as it conducts a study of the implementation of... report identifying the areas of strength in the programs and implementation process and recommend any...

  11. Network and data security design for telemedicine applications.

    PubMed

    Makris, L; Argiriou, N; Strintzis, M G

    1997-01-01

    The maturing of telecommunication technologies has ushered in a whole new era of applications and services in the health care environment. Teleworking, teleconsultation, mutlimedia conferencing and medical data distribution are rapidly becoming commonplace in clinical practice. As a result, a set of problems arises, concerning data confidentiality and integrity. Public computer networks, such as the emerging ISDN technology, are vulnerable to eavesdropping. Therefore it is important for telemedicine applications to employ end-to-end encryption mechanisms securing the data channel from unauthorized access of modification. We propose a network access and encryption system that is both economical and easily implemented for integration in developing or existing applications, using well-known and thoroughly tested encryption algorithms. Public-key cryptography is used for session-key exchange, while symmetric algorithms are used for bulk encryption. Mechanisms for session-key generation and exchange are also provided.

  12. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data.

    PubMed

    Beck, Eduard J; Gill, Wayne; De Lay, Paul R

    2016-01-01

    As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs) may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV . The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The success of programs like Universal Health Coverage, under the recently ratified Sustainable Development Goals is also contingent on the availability of personal health information for communicable and non-communicable diseases. Guidance for countries to develop and implement their own guidelines for protecting HIV-information formed the basis of identifying a number of fundamental principles, governing the areas of privacy, confidentiality and security. The use of individual-level data must balance maximizing the benefits from their most effective and fullest use, and minimizing harm resulting from their malicious or inadvertent release. These general principles are described in this paper, as along with a bibliography referring to more detailed technical information. A country assessment tool and user's manual, based on these principles, have been developed to support countries to assess the privacy, confidentiality, and security of personal health information at facility, data warehouse/repository, and national levels. The successful development and implementation of national guidance will require strong collaboration at local, regional, and national levels, and this is a pre-condition for the successful implementation of a range of national and global programs. This paper is a call for action for stakeholders in low- and middle-income countries to develop and implement such coherent policies and provides fundamental principles governing the areas of privacy, confidentiality, and security of personal health information being collected in low- and middle-income countries.

  13. Reducing security risk using data loss prevention technology.

    PubMed

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  14. Operational fidelity to an evidence-based HIV prevention intervention for people living with HIV/AIDS.

    PubMed

    Kalichman, Seth C; Hudd, Katie; Diberto, Giorgio

    2010-08-01

    Evidence-based interventions are often disseminated in public health education with little known about their operational fidelity. This study examined the delivery of intervention components (operational fidelity) of a widely disseminated HIV prevention program designed for people living with HIV/AIDS named Healthy Relationships. Two hundred ninety-nine agencies that had been trained in the intervention by the Centers for Disease Control and Prevention were contacted, and 122 (41%) completed confidential interviews. Among the 93 agencies that implemented the program, 39 (40%) adapted at least one core element activity, and 21 (23%) dropped an activity. Most adaptations were intended to improve the community fit of the intervention. Agencies believed that funders demand that they implement the intervention with fidelity. Models of technology transfer that emphasize behavior change processes rather than specific curriculum content may advance prevention program dissemination.

  15. Assessment of Geographic Information Systems and Data Confidentiality Guidelines in STD Programs.

    PubMed

    Bissette, Jennifer M; Stover, Jeffrey A; Newman, Lori M; Delcher, Philip Christopher; Bernstein, Kyle T; Matthews, Lindsey

    2009-01-01

    Advancements in technology, such as geographic information systems (GIS), expand sexually transmitted disease (STD) program capacity for data analysis and visualization, and introduce additional confidentiality considerations. We developed a survey to examine GIS use among STD programs and to better understand existing data confidentiality practices. A Web-based survey of eight to 22 questions, depending on program-specific GIS capacity, was e-mailed to all STD program directors through the National Coalition of STD Directors in November 2004. Survey responses were accepted until April 15, 2005. Eighty-five percent of the 65 currently funded STD programs responded to the survey. Of those, 58% used GIS and 54% used geocoding. STD programs that did not use GIS (42%) identified lack of training and insufficient staff as primary barriers. Mapping, spatial analyses, and targeting program interventions were the main reasons for geocoding data. Nineteen of the 25 programs that responded to questions related to statistical disclosure rules employed a numerator rule, and 56% of those used a variation of the "Rule of 5." Of the 28 programs that responded to questions pertaining to confidentiality guidelines, 82% addressed confidentiality of GIS data informally. Survey findings showed the increasing use of GIS and highlighted the struggles STD programs face in employing GIS and protecting confidentiality. Guidance related to data confidentiality and additional access to GIS software and training could assist programs in optimizing use of spatial data.

  16. 75 FR 52701 - Approval and Promulgation of Implementation Plans; State of Missouri

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... information claimed to be Confidential Business Information (CBI) or other information whose disclosure is.... Ventilation Limits 5. Ongoing Ventilation Testing and Reporting Requirements 6. Winter Construction Work..., including building enclosure and ventilation projects, implementation of work practice standards, process...

  17. Conforming STOP Violence Against Women Formula Grant Program Regulations to Statutory Change; Definitions and Confidentiality Requirements Applicable to All OVW Grant Programs. Final rule.

    PubMed

    2016-11-29

    This rule amends the regulations for the STOP (ServicesTrainingOfficersProsecutors) Violence Against Women Formula Grant Program (STOP Program) and the general provisions governing Office on Violence Against Women (OVW) programs to comply with statutory changes and reduce repetition of statutory language. Also, this rule implements statutory requirements for nondisclosure of confidential or private information relating to all OVW grant programs.

  18. FORENSIC DNA BANKING LEGISLATION IN DEVELOPING COUNTRIES: PRIVACY AND CONFIDENTIALITY CONCERNS REGARDING A DRAFT FROM TURKISH LEGISLATION.

    PubMed

    Ilgili, Önder; Arda, Berna

    This paper presents and analyses, in terms of privacy and confidentiality, the Turkish Draft Law on National DNA Database prepared in 2004, and concerning the use of DNA analysis for forensic objectives and identity verification in Turkey. After a short introduction including related concepts, we evaluate the draft law and provide articles about confidentiality. The evaluation reminded us of some important topics at international level for the developing countries. As a result, the need for sophisticated legislations about DNA databases, for solutions to issues related to the education of employees, and the technological dependency to other countries emerged as main challenges in terms of confidentiality for the developing countries. As seen in the Turkish Draft Law on National DNA Database, the protection of the fundamental rights and freedoms requires more care during the legislative efforts.

  19. Ethical considerations in the conduct of electronic surveillance research.

    PubMed

    Bharucha, Ashok J; London, Alex John; Barnard, David; Wactlar, Howard; Dew, Mary Amanda; Reynolds, Charles F

    2006-01-01

    The extant clinical literature indicates profound problems in the assessment, monitoring, and documentation of care in long-term care facilities. The lack of adequate resources to accommodate higher staff-to-resident ratios adds additional urgency to the goal of identifying more cost-effective mechanisms to provide care oversight. The ever expanding array of electronic monitoring technologies in the clinical research arena demands a conceptual and pragmatic framework for the resolution of ethical tensions inherent in the use of such innovative tools. CareMedia is a project that explores the utility of video, audio and sensor technologies as a continuous real-time assessment and outcomes measurement tool. In this paper, the authors describe the seminal ethical challenges encountered during the implementation phase of this project, namely privacy and confidentiality protection, and the strategies employed to resolve the ethical tensions by applying principles of the interest theory of rights.

  20. Security Attacks and Solutions in Electronic Health (E-health) Systems.

    PubMed

    Zeadally, Sherali; Isaac, Jesús Téllez; Baig, Zubair

    2016-12-01

    For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients' confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.

  1. 76 FR 71562 - Emergint Technologies, Inc.; Transfer of Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-18

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPP-2011-0038: FRL-9326-9] Emergint Technologies, Inc... Cosmetic Act (FFDCA), including information that may have been claimed as Confidential Business Information (CBI) by the submitter, will be transferred to Emergint Technologies, Inc. in accordance with 40 CFR 2...

  2. Radio Frequency Identification Queuing & Geo-Location (RAQGEO): A spatial solution to inventory management at XYZ Logistics, Inc

    NASA Astrophysics Data System (ADS)

    Griffiths, Bradley Joseph

    New supply chain management methods using radio frequency identification (RFID) and global positioning system (GPS) technology are quickly being adopted by companies as various inventory management benefits are being realized. For example, companies such as Nippon Yusen Kaisha (NYK) Logistics use the technology coupled with geospatial support systems for distributors to quickly find and manage freight containers. Traditional supply chain management methods require pen-to-paper reporting, searching inventory on foot, and human data entry. Some companies that prioritize supply chain management have not adopted the new technology, because they may feel that their traditional methods save the company expenses. This thesis serves as a pilot study that examines how information technology (IT) utilizing RFID and GPS technology can serve to increase workplace productivity, decrease human labor associated with inventorying, plus be used for spatial analysis by management. This pilot study represents the first attempt to couple RFID technology with Geographic Information Systems (GIS) in supply chain management efforts to analyze and locate mobile assets by exploring costs and benefits of implementation plus how the technology can be employed. This pilot study identified a candidate to implement a new inventory management method as XYZ Logistics, Inc. XYZ Logistics, Inc. is a fictitious company but represents a factual corporation. The name has been changed to provide the company with anonymity and to not disclose confidential business information. XYZ Logistics, Inc., is a nation-wide company that specializes in providing space solutions for customers including portable offices, storage containers, and customizable buildings.

  3. Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images.

    PubMed

    Al-Haj, Ali

    2015-04-01

    Exchange of medical images over public networks is subjected to different types of security threats. This has triggered persisting demands for secured telemedicine implementations that will provide confidentiality, authenticity, and integrity for the transmitted images. The medical image exchange standard (DICOM) offers mechanisms to provide confidentiality for the header data of the image but not for the pixel data. On the other hand, it offers mechanisms to achieve authenticity and integrity for the pixel data but not for the header data. In this paper, we propose a crypto-based algorithm that provides confidentially, authenticity, and integrity for the pixel data, as well as for the header data. This is achieved by applying strong cryptographic primitives utilizing internally generated security data, such as encryption keys, hashing codes, and digital signatures. The security data are generated internally from the header and the pixel data, thus a strong bond is established between the DICOM data and the corresponding security data. The proposed algorithm has been evaluated extensively using DICOM images of different modalities. Simulation experiments show that confidentiality, authenticity, and integrity have been achieved as reflected by the results we obtained for normalized correlation, entropy, PSNR, histogram analysis, and robustness.

  4. Practical State Machine Replication with Confidentiality

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duan, Sisi; Zhang, Haibin

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography,more » while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.« less

  5. 77 FR 14324 - National Volatile Organic Compound Emission Standards for Aerosol Coatings-Addition of Dimethyl...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-09

    .... National Technology Transfer and Advancement Act Section 12(d) of the National Technology Transfer and... information claimed to be confidential business information (CBI) or other information whose disclosure is... That Significantly Affect Energy Supply, Distribution, or Use I. National Technology Transfer and...

  6. 6 CFR 25.6 - Procedures for designation of qualified anti-terrorism technologies.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...; (ii) Classified and otherwise confidential studies; (iii) Studies, tests, or other performance records...) Perform studies or analyses of the subject Technology or the insurance market for such Technology; and (v... prior experience and, thus, may be expedited. The Under Secretary may consider any scientific studies...

  7. 6 CFR 25.6 - Procedures for designation of qualified anti-terrorism technologies.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...; (ii) Classified and otherwise confidential studies; (iii) Studies, tests, or other performance records...) Perform studies or analyses of the subject Technology or the insurance market for such Technology; and (v... prior experience and, thus, may be expedited. The Under Secretary may consider any scientific studies...

  8. Using Technology to Deliver Career Development Services: Supporting Today's Students in Higher Education

    ERIC Educational Resources Information Center

    Venable, Melissa A.

    2010-01-01

    Career services professionals are increasingly involved in decisions regarding the use of technology. This article presents a number of considerations to be explored, including the characteristics and needs of today's students, available technologies, funding requirements, and confidentiality issues. The author recommends an approach that includes…

  9. Biometrics for electronic health records.

    PubMed

    Flores Zuniga, Alejandro Enrique; Win, Khin Than; Susilo, Willy

    2010-10-01

    Securing electronic health records, in scenarios in which the provision of care services is share among multiple actors, could become a complex and costly activity. Correct identification of patients and physician, protection of privacy and confidentiality, assignment of access permissions for healthcare providers and resolutions of conflicts rise as main points of concern in the development of interconnected health information networks. Biometric technologies have been proposed as a possible technological solution for these issues due to its ability to provide a mechanism for unique verification of an individual identity. This paper presents an analysis of the benefit as well as disadvantages offered by biometric technology. A comparison between this technology and more traditional identification methods is used to determine the key benefits and flaws of the use biometric in health information systems. The comparison as been made considering the viability of the technologies for medical environments, global security needs, the contemplation of a share care environment and the costs involved in the implementation and maintenance of such technologies. This paper also discusses alternative uses for biometrics technologies in health care environments. The outcome of this analysis lays in the fact that even when biometric technologies offer several advantages over traditional method of identification, they are still in the early stages of providing a suitable solution for a health care environment.

  10. Ethical challenges with welfare technology: a review of the literature.

    PubMed

    Hofmann, Bjørn

    2013-06-01

    Demographical changes in high income counties will increase the need of health care services but reduce the number of people to provide them. Welfare technology is launched as an important measure to meet this challenge. As with all types of technologies we must explore its ethical challenges. A literature review reveals that welfare technology is a generic term for a heterogeneous group of technologies and there are few studies documenting their efficacy, effectiveness and efficiency. Many kinds of welfare technology break with the traditional organization of health care. It introduces technology in new areas, such as in private homes, and it provides new functions, e.g. offering social stimuli and entertainment. At the same time welfare technology is developed for groups that traditionally have not been extensive technology users. This raises a series of ethical questions with regard to the development and use of welfare technologies, which are presented in this review. The main challenges identified are: (1) Alienation when advanced technology is used at home, (2) conflicting goals, as welfare technologies have many stakeholders with several ends, (3) respecting confidentiality and privacy when third-party actors are involved, (4) guaranteeing equal access and just distribution, and (5) handling conflicts between instrumental rationality and care in terms of respecting dignity and vulnerability. Addressing these issues is important for developing and implementing welfare technologies in a morally acceptable manner.

  11. Safeguarding donors' personal rights and biobank autonomy in biobank networks: the CRIP privacy regime.

    PubMed

    Schröder, Christina; Heidtke, Karsten R; Zacherl, Nikolaus; Zatloukal, Kurt; Taupitz, Jochen

    2011-08-01

    Governance, underlying general ICT (Information and Communication Technology) architecture, and workflow of the Central Research Infrastructure for molecular Pathology (CRIP) are discussed as a model enabling biobank networks to form operational "meta biobanks" whilst respecting the donors' privacy, biobank autonomy and confidentiality, and the researchers' needs for appropriate biospecimens and information, as well as confidentiality. Tailored to these needs, CRIP efficiently accelerates and facilitates research with human biospecimens and data.

  12. 77 FR 15593 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... sector of the economy; productivity; competition; jobs; the environment; public health or safety; or... evaluation materials used for military promotions when furnished by a confidential source. The exemption rule...

  13. The use of biometrics in the Personal Health Record (PHR).

    PubMed

    Bonney, Wilfred

    2011-01-01

    The emergence of the Personal Health Record (PHR) has made individual health information more readily accessible to a wide range of users including patients, consumers, practitioners, and healthcare providers. However, increased accessibility of PHR threatens the confidentiality, privacy, and security of personalized health information. Therefore, a need for robust and reliable forms of authentication is of prime concern. The concept of biometric authentication is now highly visible to healthcare providers as a technology to prevent unauthorized access to individual health information. Implementing biometric authentication mechanisms to protect PHR facilitates access control and secure exchange of health information. In this paper, a literature review is used to explore the key benefits, technical barriers, challenges, and ethical implications for using biometric authentication in PHR.

  14. Telemedicine and security. Confidentiality, integrity, and availability: a Canadian perspective.

    PubMed

    Jennett, P; Watanabe, M; Igras, E; Premkumar, K; Hall, W

    1996-01-01

    The health care system is undergoing major reform, characterized by organized delivery systems (regionalization, decentralization, devolution, etc); shifts in care delivery sites; changing health provider roles; increasing consumer responsibilities; and accountability. Rapid advances in information technology and telecommunications have led to a new type of information infrastructure which can play a major role in this reform. Compatible health information systems are now being integrated and connected across institutional, regional, and sectorial boundaries. In the near future, these information systems will readily be accessed and shared by health providers, researchers, policy makers, health consumers, and the public. SECURITY is a critical characteristic of any health information system. This paper will address three fields associated with SECURITY: confidentiality, integrity, and availability. These will be defined and examined as they relate to specific aspects of Telemedicine, such as electronic integrated records and clinical databases; electronic transfer of documents; as well as data storage and disposal. The guiding principles, standards, and safeguards being considered and put in place to ensure that telemedicine information intrastructures can protect and benefit all stakeholders' rights and needs in both primary and secondary uses of information will be reviewed. Implemented, proposed, and tested institutional, System, and Network solutions will be discussed; for example, encryption-decryption methods; data transfer standards; individual and terminal access and entry I.D. and password levels; smart card access and PIN number control; data loss prevention strategies; interference alerts; information access keys; algorithm safeguards; and active marketing to users of standards and principles. Issues such as policy, implementation, and ownership will be addressed.

  15. How Can Pricing and Reimbursement Policies Improve Affordable Access to Medicines? Lessons Learned from European Countries.

    PubMed

    Vogler, Sabine; Paris, Valérie; Ferrario, Alessandra; Wirtz, Veronika J; de Joncheere, Kees; Schneider, Peter; Pedersen, Hanne Bak; Dedet, Guillaume; Babar, Zaheer-Ud-Din

    2017-06-01

    This article discusses pharmaceutical pricing and reimbursement policies in European countries with regard to their ability to ensure affordable access to medicines. A frequently applied pricing policy is external price referencing. While it provides some benchmark for policy-makers and has been shown to be able to generate savings, it may also contribute to delay in product launch in countries where medicine prices are low. Value-based pricing has been proposed as a policy that promotes access while rewarding useful innovation; however, implementing it has proven quite challenging. For high-priced medicines, managed-entry agreements are increasingly used. These agreements allow policy-makers to manage uncertainty and obtain lower prices. They can also facilitate earlier market access in case of limited evidence about added therapeutic value of the medicine. However, these agreements raise transparency concerns due to the confidentiality clause. Tendering as used in the hospital and offpatent outpatient sectors has been proven to reduce medicine prices but it requires a robust framework and appropriate design with clear strategic goals in order to prevent shortages. These pricing and reimbursement policies are supplemented by the widespread use of Health Technology Assessment to inform decision-making, and by strategies to improve the uptake of generics, and also biosimilars. While European countries have been implementing a set of policy options, there is a lack of thorough impact assessments of several pricing and reimbursement policies on affordable access. Increased cooperation between authorities, experience sharing and improving transparency on price information, including the disclosure of confidential discounts, are opportunities to address current challenges.

  16. 75 FR 41991 - Amendments to National Emission Standards for Hazardous Air Pollutants: Area Source Standards for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-20

    ... Technology Transfer and Advancement Act Section 12(d) of the National Technology Transfer and Advancement Act... confidential business information (CBI) or other information whose disclosure is restricted by statute. Do not... Concerning Regulations That Significantly Affect Energy Supply, Distribution, or Use I. National Technology...

  17. Ethical Issues of Reproductive Technologies: Legal and Ethical.

    ERIC Educational Resources Information Center

    Kammler, Kim

    Ethical issues which surround the reproductive technologies being used to assist infertile couples include social impact, surrogacy, access to service and confidentiality. The use of reproductive technologies does not appear to cause harm, and often does a lot of good for the family and society. Surrogacy could be a valuable tool for the infertile…

  18. [Ethical reflection on multidisciplinarity and confidentiality of information in medical imaging through new information and communication technologies].

    PubMed

    Béranger, J; Le Coz, P

    2012-05-01

    Technological advances in medical imaging has resulted in the exponential increase of the number of images per examination, caused the irreversible decline of the silver film and imposed digital imaging. This digitization is a concept whose levels of development are multiple, reflecting the complexity of this process of technological change. Under these conditions, the use of medical information via new information and communication technologies is at the crossroads of several scientific approaches and several disciplines (medicine, ethics, law, economics, psychology, etc.) surrounding the information systems in health, doctor-patient relationship and concepts that are associated. Each day, these new information and communication technologies open up new horizons and the space of possibilities, spectacularly developing access to information and knowledge. In this perspective of digital technology emergence impacting the multidisciplinary use of health information systems, the ethical questions are numerous, especially on the preservation of privacy, confidentiality and security of medical data, and their accessibility and integrity. Copyright © 2012 Société française de radiothérapie oncologique (SFRO). Published by Elsevier SAS. All rights reserved.

  19. Lessons Learned From the Implementation of Seek, Test, Treat, Retain Interventions Using Mobile Phones and Text Messaging to Improve Engagement in HIV Care for Vulnerable Populations in the United States.

    PubMed

    Christopoulos, Katerina A; Cunningham, William E; Beckwith, Curt G; Kuo, Irene; Golin, Carol E; Knight, Kevin; Flynn, Patrick M; Spaulding, Anne C; Coffin, Lara S; Kruszka, Bridget; Kurth, Ann; Young, Jeremy D; Mannheimer, Sharon; Crane, Heidi M; Kahana, Shoshana Y

    2017-11-01

    In the United States, little is known about interventions that rely on mobile phones and/or text messaging to improve engagement in HIV care for vulnerable populations. Domestic studies using these technologies as part of the National Institute on Drug Abuse "Seek, Test, Treat, Retain" research initiative were queried regarding intervention components, implementation issues, participant characteristics, and descriptive statistics of mobile phone service delivery. Across five studies with 1,135 predominantly male, minority participants, implementation challenges occurred in three categories: (1) service interruptions; (2) billing/overage issues, and; (3) the participant user experience. Response rules for automated text messages frequently frustrated participants. The inability to reload minutes/texting capacity remotely was a significant barrier to intervention delivery. No study encountered confidentiality breaches. Service interruption was common, even if studies provided mobile phones and plans. Future studies should attend to the type of mobile phone and service, the participant user experience, and human subjects concerns.

  20. 77 FR 63805 - Federal Acquisition Regulation; Information Collection; Service Contracting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... use of appropriate technological collection techniques or other forms of information technology. DATES... all correspondence related to this collection. All comments received will be posted without change to http://www.regulations.gov , including any personal and/or business confidential information provided...

  1. Data privacy preservation in telemedicine: the PAIRSE project.

    PubMed

    Nageba, Ebrahim; Defude, Bruno; Morvan, Franck; Ghedira, Chirine; Fayn, Jocelyne

    2011-01-01

    The preservation of medical data privacy and confidentiality is a major challenge in eHealth systems and applications. A technological solution based on advanced information and communication systems architectures is needed in order to retrieve and exchange the patient's data in a secure and reliable manner. In this paper, we introduce the project PAIRSE, Preserving Privacy in Peer to Peer (P2P) environments, which proposes an original web service oriented framework preserving the privacy and confidentiality of shared or exchanged medical data.

  2. The erosion of psychiatrist-patient confidentiality by subpoenas.

    PubMed

    Levy, John; Galambos, Gary; Skarbek, Yvonne

    2014-08-01

    We explore the reasons for the prolific use of subpoenas to gain access to psychiatric records in Australia. We examine the applicable legal principles and practices at the New South Wales (NSW) and Commonwealth levels, aiming to develop recommendations for Australian Governments to curb the inappropriate and harmful use of subpoenas. Unfettered legal access to psychiatric records is inconsistent with professional ethical guidelines and risks undermining the provision of quality psychiatric care to the community. The existing legal provisions are failing to protect psychiatrist-patient confidentiality. In NSW, the onus is placed on the psychiatrist and/or patient to make a complicated application to the court, to direct that a subpoena be set aside on the grounds of "Professional Confidential Relationship Privilege." An absence of Commonwealth legislation to protect psychiatrist-patient confidentiality is used by some litigants in family law proceedings to disadvantage patients by stigmatising them, because they have consulted psychiatrists. We recommend that uniform legislation be implemented, giving effect to a primary rule of privilege with exceptions. © The Royal Australian and New Zealand College of Psychiatrists 2014.

  3. Research and realization implementation of monitor technology on illegal external link of classified computer

    NASA Astrophysics Data System (ADS)

    Zhang, Hong

    2017-06-01

    In recent years, with the continuous development and application of network technology, network security has gradually entered people's field of vision. The host computer network external network of violations is an important reason for the threat of network security. At present, most of the work units have a certain degree of attention to network security, has taken a lot of means and methods to prevent network security problems such as the physical isolation of the internal network, install the firewall at the exit. However, these measures and methods to improve network security are often not comply with the safety rules of human behavior damage. For example, the host to wireless Internet access and dual-network card to access the Internet, inadvertently formed a two-way network of external networks and computer connections [1]. As a result, it is possible to cause some important documents and confidentiality leak even in the the circumstances of user unaware completely. Secrecy Computer Violation Out-of-band monitoring technology can largely prevent the violation by monitoring the behavior of the offending connection. In this paper, we mainly research and discuss the technology of secret computer monitoring.

  4. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  5. Information security requirements in patient-centred healthcare support systems.

    PubMed

    Alsalamah, Shada; Gray, W Alex; Hilton, Jeremy; Alsalamah, Hessah

    2013-01-01

    Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medical information with the patient between different healthcare providers as they follow the patient's treatment plan. However, PC care threatens the stability of the balance of information security in the support systems since legacy systems fall short of attaining a security balance when sharing their information due to compromises made between its availability, integrity, and confidentiality. Results show that the main reason for this is that information security implementation in discrete legacy systems focused mainly on information confidentiality and integrity leaving availability a challenge in collaboration. Through an empirical study using domain analysis, observations, and interviews, this paper identifies a need for six information security requirements in legacy systems to cope with this situation in order to attain the security balance in systems supporting PC care implementation in modern healthcare.

  6. Using e-technologies in clinical trials

    PubMed Central

    Rosa, Carmen; Campbell, Aimee N. C.; Miele, Gloria M.; Brunner, Meg; Winstanley, Erin L.

    2015-01-01

    Clinical trials have been slow to incorporate e-technology (digital and electronic technology that utilizes mobile devices or the Internet) into the design and execution of studies. In the meantime, individuals and corporations are relying more on electronic platforms and most have incorporated such technology into their daily lives. This paper provides a general overview of the use of e-technologies in clinical trials research, specifically within the last decade, marked by rapid growth of mobile and Internet-based tools. Benefits of and challenges to the use of e-technologies in data collection, recruitment and retention, delivery of interventions, and dissemination are provided, as well as a description of the current status of regulatory oversight of e-technologies in clinical trials research. As an example of ways in which e-technologies can be used for intervention delivery, a summary of e-technologies for treatment of substance use disorders is presented. Using e-technologies to design and implement clinical trials has the potential to reach a wide audience, making trials more efficient while also reducing costs; however, researchers should be cautious when adopting these tools given the many challenges in using new technologies, as well as threats to participant privacy/confidentiality. Challenges of using e-technologies can be overcome with careful planning, useful partnerships, and forethought. The role of web- and smartphone-based applications is expanding, and the increasing use of those platforms by scientists and the public alike make them tools that cannot be ignored. PMID:26176884

  7. Using e-technologies in clinical trials.

    PubMed

    Rosa, Carmen; Campbell, Aimee N C; Miele, Gloria M; Brunner, Meg; Winstanley, Erin L

    2015-11-01

    Clinical trials have been slow to incorporate e-technology (digital and electronic technology that utilizes mobile devices or the Internet) into the design and execution of studies. In the meantime, individuals and corporations are relying more on electronic platforms and most have incorporated such technology into their daily lives. This paper provides a general overview of the use of e-technologies in clinical trials research, specifically within the last decade, marked by rapid growth of mobile and Internet-based tools. Benefits of and challenges to the use of e-technologies in data collection, recruitment and retention, delivery of interventions, and dissemination are provided, as well as a description of the current status of regulatory oversight of e-technologies in clinical trials research. As an example of ways in which e-technologies can be used for intervention delivery, a summary of e-technologies for treatment of substance use disorders is presented. Using e-technologies to design and implement clinical trials has the potential to reach a wide audience, making trials more efficient while also reducing costs; however, researchers should be cautious when adopting these tools given the many challenges in using new technologies, as well as threats to participant privacy/confidentiality. Challenges of using e-technologies can be overcome with careful planning, useful partnerships, and forethought. The role of web- and smartphone-based applications is expanding, and the increasing use of those platforms by scientists and the public alike make them tools that cannot be ignored. Published by Elsevier Inc.

  8. 78 FR 76753 - Standards of Performance for Petroleum Refineries for Which Construction, Reconstruction, or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-19

    ..., or Use I. National Technology Transfer and Advancement Act J. Executive Order 12898: Federal Actions... and Advancement Act Section 12(d) of the National Technology Transfer and Advancement Act of 1995... information claimed to be confidential business information (CBI) or other information whose disclosure is...

  9. Data-protection standards and confidentiality of HIV/AIDS status in the workplace - a South African case study.

    PubMed

    Muskat-Gorska, Zuzanna

    2008-11-01

    The article contextualises an emerging new regime for information privacy in South Africa (i.e. the draft Protection of Personal Information Bill). Subsequently, it discusses the possibility of successful implementation of international data-protection standards in an environment where there is an urgent need to balance HIV/AIDS confidentiality rights with public health requirements. Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on workplace data-protection practices, and it identifies some spaces for social dialogue on HIV/AIDS-data treatment in South Africa. The study methods comprise an analysis of legal documents (concerning international data-protection standards and the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade union representatives, in Johannesburg, in 2007.

  10. 76 FR 22611 - Privacy Act of 1974; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-22

    ...) Reasons: (A) from subsections (c)(3) and (d) when access to accounting disclosure and access to or amendment of records would cause the identity of a confidential source to be revealed. Disclosure of the...

  11. Green Supplier Network Manufacturer Commitment Form

    EPA Pesticide Factsheets

    Online form expressing interest in committing to be a Green Supplier; this form expresses your intent to participate in a confidential Green Suppliers Network assessment, implement recommended environmental improvements and complete a NIST MEP follow-up.

  12. Legal principles of confidentiality and other public interests: Part 1.

    PubMed

    Fullbrook, Suzanne

    The principles of confidentiality are of paramount importance to nurses and all health professionals. This is explicitly so as the Common Law recognizes confidentiality and supports its importance. However, current practice must take cognizance of the realities of 21st century healthcare delivery - we live in an age of electronic data that is potentially very difficult to keep secret. New rules, protocols and guidelines are being formulated, and regulatory bodies such as the Nursing and Midwifery Council (NMC) reflect such rules in their codes of professional conduct. There is, however, a debate that is suggesting that the rules that relate to confidentiality may need to expand or even bend a little as innovate ways of obtaining, storing, utilizing and communicating data continue to occupy the minds of government and those who formulate legal principles (British Medical Association, 2005). This series of three articles will explore these issues. The first part is a review of case law that explores the fundamental legal principles that underpin confidentiality. The second will concentrate on a review of the guidelines that are to be found in professional regulatory documentation - the NMC and the General Medical Council as they relate to the legal principles. The third and last part will review and reflect on issues that relate expressly to the implementation of electronic patient records, with a review of appropriate statutory legislation and principles of common law.

  13. The "GeneTrustee": a universal identification system that ensures privacy and confidentiality for human genetic databases.

    PubMed

    Burnett, Leslie; Barlow-Stewart, Kris; Proos, Anné L; Aizenberg, Harry

    2003-05-01

    This article describes a generic model for access to samples and information in human genetic databases. The model utilises a "GeneTrustee", a third-party intermediary independent of the subjects and of the investigators or database custodians. The GeneTrustee model has been implemented successfully in various community genetics screening programs and has facilitated research access to genetic databases while protecting the privacy and confidentiality of research subjects. The GeneTrustee model could also be applied to various types of non-conventional genetic databases, including neonatal screening Guthrie card collections, and to forensic DNA samples.

  14. Confidentiality and data sharing: vulnerabilities of the Mexican Genomics Sovereignty Act.

    PubMed

    Rojas-Martínez, Augusto

    2015-07-01

    A law known as "Genomic Sovereignty Act", instituted in 2011, regulates research on the human genome in Mexico. This law establishes Government regulations for the exportation of DNA samples from Mexican nationals for population genetics studies. The Genomic Sovereignty Act protects fundamental human values, as confidentiality and non-discrimination based on personal genetic information. It also supports the development of the genome-based medical biotechnology and the bio-economy. Current laws for the protection of the genomic confidentiality, however, are inexplicit and insufficient, and the legal and technological instruments are primitive and insufficient to safeguard this bioethical principle. In addition, this law may undermine efforts of the national and international scientific communities to cooperate with big-data analysis for the development of the genome-based biomedical sciences. The argument of this article is that deficiencies in the protection of the confidentiality of genomic information and limitations in data sharing severely weaken the objectives and scope of the Genomic Sovereignty Act. In addition, the Act may compromise the national biomedical development and the international cooperation for research and development in the field of human genomics.

  15. Young Men’s Views Toward the Barriers and Facilitators of Internet-Based Chlamydia Trachomatis Screening: Qualitative Study

    PubMed Central

    McDaid, Lisa

    2013-01-01

    Background There is a growing number of Internet-based approaches that offer young people screening for sexually transmitted infections. Objective This paper explores young men’s views towards the barriers and facilitators of implementing an Internet-based screening approach. The study sought to consider ways in which the proposed intervention would reach and engage men across ages and socioeconomic backgrounds. Methods This qualitative study included 15 focus groups with 60 heterosexual young men (aged 16-24 years) across central Scotland, drawn across age and socioeconomic backgrounds. Focus groups began by obtaining postcode data to allocate participants to a high/low deprivation category. Focus group discussions involved exploration of men’s knowledge of chlamydia, use of technology, and views toward Internet-based screening. Men were shown sample screening invitation letters, test kits, and existing screening websites to facilitate discussions. Transcripts from audio recordings were analyzed with "Framework Analysis". Results Men’s Internet and technology use was heterogeneous in terms of individual practices, with greater use among older men (aged 20-24 years) than teenagers and some deprivation-related differences in use. We detail three themes related to barriers to successful implementation: acceptability, confidentiality and privacy concerns, and language, style, and content. These themes identify ways Internet-based screening approaches may fail to engage some men, such as by raising anxiety and failing to convey confidentiality. Men wanted screening websites to frame screening as a serious issue, rather than using humorous images and text. Participants were encouraged to reach a consensus within their groups on their broad design and style preferences for a screening website; this led to a set of common preferences that they believed were likely to engage men across age and deprivation groups and lead to greater screening uptake. Conclusions The Internet provides opportunities for re-evaluating how we deliver sexual health promotion and engage young men in screening. Interventions using such technology should focus on uptake by age and socioeconomic background. Young people should be engaged as coproducers of intervention materials and websites to ensure messages and content are framed appropriately within a fast-changing environment. Doing so may go some way to addressing the overall lower levels of testing and screening among men compared with women. PMID:24300158

  16. Young men's views toward the barriers and facilitators of Internet-based Chlamydia trachomatis screening: qualitative study.

    PubMed

    Lorimer, Karen; McDaid, Lisa

    2013-12-03

    There is a growing number of Internet-based approaches that offer young people screening for sexually transmitted infections. This paper explores young men's views towards the barriers and facilitators of implementing an Internet-based screening approach. The study sought to consider ways in which the proposed intervention would reach and engage men across ages and socioeconomic backgrounds. This qualitative study included 15 focus groups with 60 heterosexual young men (aged 16-24 years) across central Scotland, drawn across age and socioeconomic backgrounds. Focus groups began by obtaining postcode data to allocate participants to a high/low deprivation category. Focus group discussions involved exploration of men's knowledge of chlamydia, use of technology, and views toward Internet-based screening. Men were shown sample screening invitation letters, test kits, and existing screening websites to facilitate discussions. Transcripts from audio recordings were analyzed with "Framework Analysis". Men's Internet and technology use was heterogeneous in terms of individual practices, with greater use among older men (aged 20-24 years) than teenagers and some deprivation-related differences in use. We detail three themes related to barriers to successful implementation: acceptability, confidentiality and privacy concerns, and language, style, and content. These themes identify ways Internet-based screening approaches may fail to engage some men, such as by raising anxiety and failing to convey confidentiality. Men wanted screening websites to frame screening as a serious issue, rather than using humorous images and text. Participants were encouraged to reach a consensus within their groups on their broad design and style preferences for a screening website; this led to a set of common preferences that they believed were likely to engage men across age and deprivation groups and lead to greater screening uptake. The Internet provides opportunities for re-evaluating how we deliver sexual health promotion and engage young men in screening. Interventions using such technology should focus on uptake by age and socioeconomic background. Young people should be engaged as coproducers of intervention materials and websites to ensure messages and content are framed appropriately within a fast-changing environment. Doing so may go some way to addressing the overall lower levels of testing and screening among men compared with women.

  17. A web implementation: the good and the not-so-good.

    PubMed

    Bergsneider, C; Piraino, D; Fuerst, M

    2001-06-01

    E-commerce, e-mail, e-greeting, e-this, and e-that everywhere you turn there is a new "e" word for an internet or Web application. We, at the Cleveland Clinic Foundation, have been "e-nlightened" and will discuss in this report the implementation of a web-based radiology information system (RIS) in our radiology division or "e-radiology" division. The application, IDXRad Version 10.0 from IDX Corp, Burlington, VT, is in use at the Cleveland Clinic Foundation and has both intranet (for use in Radiology) and internet (referring physician viewing) modules. We will concentrate on the features of using a web browser for the application's front-end, including easy prototyping for screen review, easier mock-ups of demonstrations by vendors and developers, and easier training as more people become web-addicted. Project communication can be facilitated with an internal project web page, and use of the web browser can accommodate quicker turnaround of software upgrades as the software code is centrally located. Compared with other technologies, including client/server, there is a smaller roll out cost when using a standard web browser. However, the new technology requires a change and changes are never implemented without challenges. A seasoned technologist using a legacy system can enter data quicker using function keys than using a graphical user interface and pointing and clicking through a series of pop-up windows. Also, effective use of a web browser depends on intuitive design for it to be easily implemented and accepted by the user. Some software packages will not work on both of the popular web browsers and then are tailored to specific release levels. As computer-based patient records become a standard, patient confidentiality must be enforced. The technical design and application security features that support the web-based software package will be discussed. Also web technologies have their own implementation issues.

  18. Privacy protection in HealthGrid: distributing encryption management over the VO.

    PubMed

    Torres, Erik; de Alfonso, Carlos; Blanquer, Ignacio; Hernández, Vicente

    2006-01-01

    Grid technologies have proven to be very successful in tackling challenging problems in which data access and processing is a bottleneck. Notwithstanding the benefits that Grid technologies could have in Health applications, privacy leakages of current DataGrid technologies due to the sharing of data in VOs and the use of remote resources, compromise its widespreading. Privacy control for Grid technology has become a key requirement for the adoption of Grids in the Healthcare sector. Encrypted storage of confidential data effectively reduces the risk of disclosure. A self-enforcing scheme for encrypted data storage can be achieved by combining Grid security systems with distributed key management and classical cryptography techniques. Virtual Organizations, as the main unit of user management in Grid, can provide a way to organize key sharing, access control lists and secure encryption management. This paper provides programming models and discusses the value, costs and behavior of such a system implemented on top of one of the latest Grid middlewares. This work is partially funded by the Spanish Ministry of Science and Technology in the frame of the project Investigación y Desarrollo de Servicios GRID: Aplicación a Modelos Cliente-Servidor, Colaborativos y de Alta Productividad, with reference TIC2003-01318.

  19. eTOXlab, an open source modeling framework for implementing predictive models in production environments.

    PubMed

    Carrió, Pau; López, Oriol; Sanz, Ferran; Pastor, Manuel

    2015-01-01

    Computational models based in Quantitative-Structure Activity Relationship (QSAR) methodologies are widely used tools for predicting the biological properties of new compounds. In many instances, such models are used as a routine in the industry (e.g. food, cosmetic or pharmaceutical industry) for the early assessment of the biological properties of new compounds. However, most of the tools currently available for developing QSAR models are not well suited for supporting the whole QSAR model life cycle in production environments. We have developed eTOXlab; an open source modeling framework designed to be used at the core of a self-contained virtual machine that can be easily deployed in production environments, providing predictions as web services. eTOXlab consists on a collection of object-oriented Python modules with methods mapping common tasks of standard modeling workflows. This framework allows building and validating QSAR models as well as predicting the properties of new compounds using either a command line interface or a graphic user interface (GUI). Simple models can be easily generated by setting a few parameters, while more complex models can be implemented by overriding pieces of the original source code. eTOXlab benefits from the object-oriented capabilities of Python for providing high flexibility: any model implemented using eTOXlab inherits the features implemented in the parent model, like common tools and services or the automatic exposure of the models as prediction web services. The particular eTOXlab architecture as a self-contained, portable prediction engine allows building models with confidential information within corporate facilities, which can be safely exported and used for prediction without disclosing the structures of the training series. The software presented here provides full support to the specific needs of users that want to develop, use and maintain predictive models in corporate environments. The technologies used by eTOXlab (web services, VM, object-oriented programming) provide an elegant solution to common practical issues; the system can be installed easily in heterogeneous environments and integrates well with other software. Moreover, the system provides a simple and safe solution for building models with confidential structures that can be shared without disclosing sensitive information.

  20. Protecting Privacy and Confidentiality in a Multiple Use, Multiple User Mental Health Information System.

    ERIC Educational Resources Information Center

    Bank, Rheta; Laska, Eugene M.

    1978-01-01

    These aspects of maintaining the security of computer-processed information concerning mental health patients are discussed: legal protection, technological safeguards, and managerial responsibility. (CTM)

  1. 77 FR 65413 - Certain Cameras and Mobile Devices, Related Software and Firmware, and Components Thereof and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... (202) 205-3065. Copies of non- confidential documents filed in connection with this investigation are... a complaint filed on behalf of HumanEyes Technologies, Ltd. of Jerusalem, Israel on March 28, 2012..., complainant HumanEyes Technologies filed an unopposed motion to terminate the investigation pursuant to...

  2. 76 FR 11404 - Oregon: Tentative Approval of State Underground Storage Tank Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-02

    ... Order 12866. 9. National Technology Transfer and Advancement Act Section 12(d) of the National Technology Transfer and Advancement Act of 1995 (``NTTAA''), Public Law 104-113, section 12(d) (15 U.S.C. 272... Confidential Business Information (CBI) or other information whose disclosure is restricted by statute. Do not...

  3. Management of medical confidentiality in English professional football clubs: some ethical problems and issues

    PubMed Central

    Waddington, I; Roderick, M; Bundred, P

    2002-01-01

    Objective: To examine the ways in which confidential matters are dealt with in the context of the relationship between the club doctor (or physiotherapist) and the player as patient in English professional football clubs. Methods: Semistructured tape recorded interviews with 12 club doctors, 10 club physiotherapists, and 27 current and former players. A questionnaire was also sent to 90 club doctors; 58 were returned. Results: There is among club doctors and physiotherapists no commonly held code of ethics governing how much and what kind of information about players may properly be passed on to managers; associated with this, there is considerable variation from one club to another in terms of the amount and kind of information passed on to managers. In some clubs, medical staff attempt to operate more or less on the basis of the rules governing confidentiality that apply in general practice, but in other clubs, medical staff are more ready to pass on personal information about players. In some situations, this raises serious ethical questions. Conclusions: Guidelines dealing with confidentiality in practitioner-patient relationships in medical practice have long been available and have recently been restated, specifically in relation to the practice of sports medicine, by the British Olympic Association, the British Medical Association, and the Football Association. This is a welcome first step. However, if the guidelines are to have an impact on practice, detailed consideration needs to be given to ensuring their effective implementation; if this is to be achieved, consideration also needs to be given to identifying those aspects of the culture and organisation of professional football clubs that may hinder the full and effective implementation of those guidelines. PMID:11916894

  4. Management of medical confidentiality in English professional football clubs: some ethical problems and issues.

    PubMed

    Waddington, I; Roderick, M

    2002-04-01

    To examine the ways in which confidential matters are dealt with in the context of the relationship between the club doctor (or physiotherapist) and the player as patient in English professional football clubs. Semistructured tape recorded interviews with 12 club doctors, 10 club physiotherapists, and 27 current and former players. A questionnaire was also sent to 90 club doctors; 58 were returned. There is among club doctors and physiotherapists no commonly held code of ethics governing how much and what kind of information about players may properly be passed on to managers; associated with this, there is considerable variation from one club to another in terms of the amount and kind of information passed on to managers. In some clubs, medical staff attempt to operate more or less on the basis of the rules governing confidentiality that apply in general practice, but in other clubs, medical staff are more ready to pass on personal information about players. In some situations, this raises serious ethical questions. Guidelines dealing with confidentiality in practitioner-patient relationships in medical practice have long been available and have recently been restated, specifically in relation to the practice of sports medicine, by the British Olympic Association, the British Medical Association, and the Football Association. This is a welcome first step. However, if the guidelines are to have an impact on practice, detailed consideration needs to be given to ensuring their effective implementation; if this is to be achieved, consideration also needs to be given to identifying those aspects of the culture and organisation of professional football clubs that may hinder the full and effective implementation of those guidelines.

  5. Private primary care physicians' perspectives on factors affecting the adoption of electronic medical records: a qualitative pre-implementation study.

    PubMed

    Or, Calvin; Wong, Katie; Tong, Ellen; Sek, Antonio

    2014-01-01

    Use of electronic medical records (EMR) has the potential to offer quality and safety benefits, but without the adoption of the technology, the benefits will not be realized. This study aimed to identify the factors perceived as relevant by private physicians when considering EMR adoption. A qualitative pre-implementation study was conducted using semi-structured, face to face interviews to explore the perspectives of physicians (n=16) operating in private clinics on the factors affecting their adoption of EMR. A multilevel, work system approach and the immersion/crystallization data analysis technique guided the researchers in examining the data, identifying patterns and key themes, and extracting representative quotes to illustrate these themes. The major factors associated with EMR adoption, which relate to the five categories of a work system, were system usefulness; user interface design; technical support; cost; system reliability; the privacy, confidentiality, and security of patient information; physical space in the clinic; data migration process; adverse work-related factors; and the computer and systems skills of physicians. Pre-implementation identification of factors important to adoption can allow system developers to focus proactively on these factors when developing the system and its implementation strategies, to maximize the likelihood of successful introduction.

  6. 5 CFR 2634.103 - Executive agency supplemental regulations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... written approval of the Office of Government Ethics, issue supplemental regulations implementing this part.... 2634.103 Section 2634.103 Administrative Personnel OFFICE OF GOVERNMENT ETHICS GOVERNMENT ETHICS... of Government Ethics as supplemental confidential reporting. Note: Supplemental regulations will not...

  7. 45 CFR 164.308 - Administrative safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... accordance with § 164.306: (1)(i) Standard: Security management process. Implement policies and procedures to... to the confidentiality, integrity, and availability of electronic protected health information held...

  8. 45 CFR 164.308 - Administrative safeguards.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... accordance with § 164.306: (1)(i) Standard: Security management process. Implement policies and procedures to... to the confidentiality, integrity, and availability of electronic protected health information held...

  9. Legal issues of the electronic dental record: security and confidentiality.

    PubMed

    Szekely, D G; Milam, S; Khademi, J A

    1996-01-01

    Computer-based, electronic dental record keeping involves complex issues of patient privacy and the dental practitioner's ethical duty of confidentiality. Federal and state law is responding to the new legal issues presented by computer technology. Authenticating the electronic record in terms of ensuring its reliability and accuracy is essential in order to protect its admissibility as evidence in legal actions. Security systems must be carefully planned to limit access and provide for back-up and storage of dental records. Carefully planned security systems protect the patient from disclosure without the patient's consent and also protect the practitioner from the liability that would arise from such disclosure. Human errors account for the majority of data security problems. Personnel security is assured through pre-employment screening, employment contracts, policies, and staff education. Contracts for health information systems should include provisions for indemnification and ensure the confidentiality of the system by the vendor.

  10. Driving toward guiding principles: a goal for privacy, confidentiality, and security of health information.

    PubMed

    Buckovich, S A; Rippen, H E; Rozen, M J

    1999-01-01

    As health care moves from paper to electronic data collection, providing easier access and dissemination of health information, the development of guiding privacy, confidentiality, and security principles is necessary to help balance the protection of patients' privacy interests against appropriate information access. A comparative review and analysis was done, based on a compilation of privacy, confidentiality, and security principles from many sources. Principles derived from ten identified sources were compared with each of the compiled principles to assess support level, uniformity, and inconsistencies. Of 28 compiled principles, 23 were supported by at least 50 percent of the sources. Technology could address at least 12 of the principles. Notable consistencies among the principles could provide a basis for consensus for further legislative and organizational work. It is imperative that all participants in our health care system work actively toward a viable resolution of this information privacy debate.

  11. Implementing Technology for Science Classrooms in Sao Tome and Principe

    NASA Astrophysics Data System (ADS)

    Jardim, Maria Dolores Rodrigues

    This qualitative bounded case study was designed to understand how technology integration in schools could be addressed in a first-wave country. The integration of educational technology in Sao Tome and Principe (STP), a first-wave agricultural civilization, can narrow the divide between STP and third-wave information age societies. The conceptual framework was based on theories of change, learning, and context. Toffler's wave theory described how societies changed while Fullan's change theory examined how the people might change. Roger's diffusion of innovations addressed how processes change. Bandura, Vygotsky, and Siemen provided the framework for the learning within the model of change. Finally, the context theories of Tessmer and Richey's instructional design, Lave and Wenger's situated learning, and Sticht's functional context theory were applied. Twenty five individuals from 5 schools, including teachers, school directors, key educational stakeholders, and the minister of education were involved in a pilot project to integrate technology into the science curriculum. The data were collected via interviews, reflective summaries, and confidential narratives. The resulting data were analyzed to find emerging patterns. The results of this analysis showed that a first-wave civilization can adopt a third-wave civilization's features in terms of technology integration, when there is the support of opinion leaders and most of the necessary contextual requirements are in place. The study contributes to social change by providing access to knowledge through technology integration, which empowers both teachers and students.

  12. Electronic patient data confidentiality practices among surgical trainees: questionnaire study.

    PubMed

    Mole, Damian J; Fox, Colin; Napolitano, Giulio

    2006-10-01

    The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended.

  13. SMS Security System on Mobile Devices Using Tiny Encryption Algorithm

    NASA Astrophysics Data System (ADS)

    Novelan, M. S.; Husein, A. M.; Harahap, M.; Aisyah, S.

    2018-04-01

    The development of telecommunications technology is so rapid has given such great benefits. With the telecommunication technology, distance and time no longer be a significant obstacle. One of the results of telecommunications technology that is well known is the Short Message Service. In this study developed an application on the mobile phone to modify the SMS message into ciphertext so that the information content of the SMS is not known by others. SMS delivery system for encrypting messages into ciphertext using a key that is entered by the sender then sends to the destination number. SMS reception system to decrypt it to others via SMS without the fear of information from these messages will be known by others. The method used in the system encrypt and decrypt the message is the algorithm Tiny Encryption Algorithm and implemented using the Java programming language. JDK 1.7 as the Java programming language ciphertext into plaintext using the key entered by the receiver and displays the original message to the recipient. This application can be used by someone who wants to send a confidential information and the Java compiler. Eclipse, a Java SDK and the Android SDK as a Java source code editor.

  14. An Analysis of Information Technology Managers' and Executives' Security Concerns on Willingness to Adopt Cloud Computing Solutions

    ERIC Educational Resources Information Center

    Tanque, Marcus M.

    2012-01-01

    The research conducted in this study inquires about Information Technology (IT) managers' and executives' attitudes, beliefs, and knowledge on Cloud Computing (CC) security. The study evaluated how these factors affect IT managers' and executives' willingness to adopt CC solutions in their organizations. Confidentiality,…

  15. Quality Assurance in School Health

    ERIC Educational Resources Information Center

    Newell, Susan; Schoenike, Sumner L.; Lisko, Elaine A.

    2003-01-01

    School nurses need to become more influential administrators, managers, and entrepreneurs. They must learn to lead and collaborate effectively in designing, implementing, and evaluating coordinated school health programs. Quality assurance is an essential ingredient in this process that requires accurate, timely, and confidential incident…

  16. Using software agents to preserve individual health data confidentiality in micro-scale geographical analyses.

    PubMed

    Kamel Boulos, Maged N; Cai, Qiang; Padget, Julian A; Rushton, Gerard

    2006-04-01

    Confidentiality constraints often preclude the release of disaggregate data about individuals, which limits the types and accuracy of the results of geographical health analyses that could be done. Access to individually geocoded (disaggregate) data often involves lengthy and cumbersome procedures through review boards and committees for approval (and sometimes is not possible). Moreover, current data confidentiality-preserving solutions compatible with fine-level spatial analyses either lack flexibility or yield less than optimal results (because of confidentiality-preserving changes they introduce to disaggregate data), or both. In this paper, we present a simulation case study to illustrate how some analyses cannot be (or will suffer if) done on aggregate data. We then quickly review some existing data confidentiality-preserving techniques, and move on to explore a solution based on software agents with the potential of providing flexible, controlled (software-only) access to unmodified confidential disaggregate data and returning only results that do not expose any person-identifiable details. The solution is thus appropriate for micro-scale geographical analyses where no person-identifiable details are required in the final results (i.e., only aggregate results are needed). Our proposed software agent technique also enables post-coordinated analyses to be designed and carried out on the confidential database(s), as needed, compared to a more conventional solution based on the Web Services model that would only support a rigid, pre-coordinated (pre-determined) and rather limited set of analyses. The paper also provides an exploratory discussion of mobility, security, and trust issues associated with software agents, as well as possible directions/solutions to address these issues, including the use of virtual organizations. Successful partnerships between stakeholder organizations, proper collaboration agreements, clear policies, and unambiguous interpretations of laws and regulations are also much needed to support and ensure the success of any technological solution.

  17. A Mixed-Methods Study on the Acceptability of Using eHealth for HIV Prevention and Sexual Health Care Among Men Who Have Sex With Men in China

    PubMed Central

    Bien, Cedric H; Wei, Chongyi; Lo, Elaine J; Yang, Min; Tucker, Joseph D; Yang, Ligang; Meng, Gang; Hightow-Weidman, Lisa B

    2015-01-01

    Background Human immunodeficiency virus (HIV) infection disproportionately affects men who have sex with men (MSM). Over half of all HIV-positive MSM in China may not know their HIV status. Mobile phones and Web interventions (eHealth) are underutilized resources that show promise for supporting HIV education, testing, and linkage to care. Objective This mixed-methods study among MSM in China assessed technology utilization and eHealth acceptability for sexual health care. Methods We conducted in-depth interviews and an online survey. Qualitative analyses informed the development of the Internet survey, which was administered through two popular MSM websites. Bivariate and multivariate analysis assessed characteristics of MSM interested in eHealth for sexual health care. Results The qualitative sample included MSM across a range of ages, education, marital status, sexuality, and HIV testing experience. Qualitative findings included the importance of the Internet as the primary source of information about sexual health, HIV and other sexually transmitted diseases (STDs), use of the Internet to enable HIV testing opportunities by facilitating connections with both the gay community and health care providers, and mixed perceptions regarding the confidentiality of eHealth tools for sexual health. Among the Internet sample (N=1342), the average age was 30.6 years old, 82.81% (1098/1342) were single, and 53.42% (711/1331) had completed college. In the past 3 months, 38.66% (382/988) had condomless sex and 60.53% (805/1330) self-reported having ever tested for HIV. The majority of men owned computers (94.14%, 1220/1296) and mobile phones (92.32%, 1239/1342), which many had used to search for HIV/STD information and testing sites. In multivariate analysis, interest in using computers or mobile phones to support their sexual health care was associated with being a student, prior use of computers or mobile phones to search for general health information, prior use of computers or mobile phones to search for HIV/STD information, and confidentiality concerns. Conclusions MSM in this sample had high utilization of technology and interest in eHealth despite confidentiality concerns. Future eHealth interventions can thoughtfully and creatively address these concerns as a priority for successful implementation. PMID:25900881

  18. Database Design to Ensure Anonymous Study of Medical Errors: A Report from the ASIPS collaborative

    PubMed Central

    Pace, Wilson D.; Staton, Elizabeth W.; Higgins, Gregory S.; Main, Deborah S.; West, David R.; Harris, Daniel M.

    2003-01-01

    Medical error reporting systems are important information sources for designing strategies to improve the safety of health care. Applied Strategies for Improving Patient Safety (ASIPS) is a multi-institutional, practice-based research project that collects and analyzes data on primary care medical errors and develops interventions to reduce error. The voluntary ASIPS Patient Safety Reporting System captures anonymous and confidential reports of medical errors. Confidential reports, which are quickly de-identified, provide better detail than do anonymous reports; however, concerns exist about the confidentiality of those reports should the database be subject to legal discovery or other security breaches. Standard database elements, for example, serial ID numbers, date/time stamps, and backups, could enable an outsider to link an ASIPS report to a specific medical error. The authors present the design and implementation of a database and administrative system that reduce this risk, facilitate research, and maintain near anonymity of the events, practices, and clinicians. PMID:12925548

  19. Improving sexually transmitted infection results notification via mobile phone technology.

    PubMed

    Reed, Jennifer L; Huppert, Jill S; Taylor, Regina G; Gillespie, Gordon L; Byczkowski, Terri L; Kahn, Jessica A; Alessandrini, Evaline A

    2014-11-01

    To improve adolescent notification of positive sexually transmitted infection (STI) tests using mobile phone technology and STI information cards. A randomized intervention among 14- to 21-year olds in a pediatric emergency department (PED). A 2 × 3 factorial design with replication was used to evaluate the effectiveness of six combinations of two factors on the proportion of STI-positive adolescents notified within 7 days of testing. Independent factors included method of notification (call, text message, or call + text message) and provision of an STI information card with or without a phone number to obtain results. Covariates for logistic regression included age, empiric STI treatment, days until first attempted notification, and documentation of confidential phone number. Approximately half of the 383 females and 201 males enrolled were ≥18 years of age. Texting only or type of card was not significantly associated with patient notification rates, and there was no significant interaction between card and notification method. For females, successful notification was significantly greater for call + text message (odds ratio, 3.2; 95% confidence interval, 1.4-6.9), and documenting a confidential phone number was independently associated with successful notification (odds ratio, 3.6; 95% confidence interval, 1.7-7.5). We found no significant predictors of successful notification for males. Of patients with a documented confidential phone number who received a call + text message, 94% of females and 83% of males were successfully notified. Obtaining a confidential phone number and using call + text message improved STI notification rates among female but not male adolescents in a pediatric emergency department. Copyright © 2014 Society for Adolescent Health and Medicine. All rights reserved.

  20. 77 FR 40317 - Approval, Disapproval and Promulgation of Air Quality Implementation Plans; Arizona; Regional...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-09

    ... material, large maps), and some may not be publicly available in either location (e.g., Confidential Business Information). To inspect the hard copy materials, please schedule an appointment during normal..., Phoenix, AZ 85003-2118. [[Page 40318

  1. 12 CFR 403.1 - General policies and definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 403.1 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES CLASSIFICATION, DECLASSIFICATION, AND... the Export-Import Bank (the Bank) implements executive orders which govern the classification... the United States. (5) Confidential source means any individual or organization that has provided, or...

  2. 12 CFR 403.1 - General policies and definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 403.1 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES CLASSIFICATION, DECLASSIFICATION, AND... the Export-Import Bank (the Bank) implements executive orders which govern the classification... the United States. (5) Confidential source means any individual or organization that has provided, or...

  3. 12 CFR 403.1 - General policies and definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 403.1 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES CLASSIFICATION, DECLASSIFICATION, AND... the Export-Import Bank (the Bank) implements executive orders which govern the classification... the United States. (5) Confidential source means any individual or organization that has provided, or...

  4. 12 CFR 403.1 - General policies and definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 403.1 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES CLASSIFICATION, DECLASSIFICATION, AND... the Export-Import Bank (the Bank) implements executive orders which govern the classification... the United States. (5) Confidential source means any individual or organization that has provided, or...

  5. 78 FR 47024 - Excepted Service

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-02

    ... Program Administrator, two Social Science Program Administrators, one Middle East Studies Program... Science, Technology and Innovation Program Administrator. Schedule B 10. Department of Justice (Sch. B... Communications. Office of Confidential DB130041 4/30/2013 Innovation and Assistant. Improvement. Environmental...

  6. Applying language technology to nursing documents: pros and cons with a focus on ethics.

    PubMed

    Suominen, Hanna; Lehtikunnas, Tuija; Back, Barbro; Karsten, Helena; Salakoski, Tapio; Salanterä, Sanna

    2007-10-01

    The present study discusses ethics in building and using applications based on natural language processing in electronic nursing documentation. Specifically, we first focus on the question of how patient confidentiality can be ensured in developing language technology for the nursing documentation domain. Then, we identify and theoretically analyze the ethical outcomes which arise when using natural language processing to support clinical judgement and decision-making. In total, we put forward and justify 10 claims related to ethics in applying language technology to nursing documents. A review of recent scientific articles related to ethics in electronic patient records or in the utilization of large databases was conducted. Then, the results were compared with ethical guidelines for nurses and the Finnish legislation covering health care and processing of personal data. Finally, the practical experiences of the authors in applying the methods of natural language processing to nursing documents were appended. Patient records supplemented with natural language processing capabilities may help nurses give better, more efficient and more individualized care for their patients. In addition, language technology may facilitate patients' possibility to receive truthful information about their health and improve the nature of narratives. Because of these benefits, research about the use of language technology in narratives should be encouraged. In contrast, privacy-sensitive health care documentation brings specific ethical concerns and difficulties to the natural language processing of nursing documents. Therefore, when developing natural language processing tools, patient confidentiality must be ensured. While using the tools, health care personnel should always be responsible for the clinical judgement and decision-making. One should also consider that the use of language technology in nursing narratives may threaten patients' rights by using documentation collected for other purposes. Applying language technology to nursing documents may, on the one hand, contribute to the quality of care, but, on the other hand, threaten patient confidentiality. As an overall conclusion, natural language processing of nursing documents holds the promise of great benefits if the potential risks are taken into consideration.

  7. Addressing critical issues in the development of an Oncology Information System.

    PubMed

    Urda, D; Ribelles, N; Subirats, J L; Franco, L; Alba, E; Jerez, J M

    2013-05-01

    This paper presents the experience on the design and implementation of a user-centered Oncology Information System developed for the Medical Oncology Department at the "Hospital Universitario Virgen de la Victoria", in Málaga, Spain. The project focused on the aspects considered in the literature as critical factors for a successful deployment and usage of a health information system. System usability, adequate technology, integration of clinical routines, real-time statistical analysis of data, information confidentiality and standard protocol-based external interconnection were the key aspects considered. The developed system is based on a web application with a modular and layered architecture accounting for usability, ease of maintenance and further system development. Evaluation of system usability was carried at three and fifteen months after system deployment to analyze the advantages/disadvantages experienced by the end-users. A thorough prior analysis of clinical activities and workflows, the use of the adequate technology, and the availability of data analysis tools will almost guarantee success in the deployment of an Oncology Information System. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  8. Securing health sensing using integrated circuit metric.

    PubMed

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-10-20

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.

  9. Securing Health Sensing Using Integrated Circuit Metric

    PubMed Central

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-01-01

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250

  10. Electronic Patient Data Confidentiality Practices Among Surgical Trainees: Questionnaire Study

    PubMed Central

    Mole, Damian J; Fox, Colin; Napolitano, Giulio

    2006-01-01

    INTRODUCTION The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. PARTICIPANTS AND METHODS A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. RESULTS Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. CONCLUSIONS Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended. PMID:17059715

  11. 40 CFR 49.171 - Public participation requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... ASSISTANCE INDIAN COUNTRY: AIR QUALITY PLANNING AND MANAGEMENT General Federal Implementation Plan Provisions... participation requirements. (a) What permit information will be publicly available? With the exception of any confidential information as defined in part 2, subpart B of this chapter, the reviewing authority must make...

  12. 40 CFR 49.171 - Public participation requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... ASSISTANCE INDIAN COUNTRY: AIR QUALITY PLANNING AND MANAGEMENT General Federal Implementation Plan Provisions... participation requirements. (a) What permit information will be publicly available? With the exception of any confidential information as defined in part 2, subpart B of this chapter, the reviewing authority must make...

  13. 77 FR 64241 - Privacy Act of 1974; Implementation of Exemptions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-19

    .... SUPPLEMENTARY INFORMATION: Background The CFPB is re-publishing its System of Records Notice entitled ``CFPB.005... Confidential business information, Consumer protection, Freedom of information, Privacy. Authority and Issuance... its system of records entitled ``CFPB.005--Consumer Response System'' from certain provisions of the...

  14. 40 CFR 49.171 - Public participation requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... ASSISTANCE INDIAN COUNTRY: AIR QUALITY PLANNING AND MANAGEMENT General Federal Implementation Plan Provisions... participation requirements. (a) What permit information will be publicly available? With the exception of any confidential information as defined in part 2, subpart B of this chapter, the reviewing authority must make...

  15. 40 CFR 49.157 - Public participation requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ASSISTANCE INDIAN COUNTRY: AIR QUALITY PLANNING AND MANAGEMENT General Federal Implementation Plan Provisions... information will be publicly available? With the exception of any confidential information as defined in part... information available for public inspection at the appropriate EPA Regional Office and in at least one...

  16. 40 CFR 49.157 - Public participation requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... ASSISTANCE INDIAN COUNTRY: AIR QUALITY PLANNING AND MANAGEMENT General Federal Implementation Plan Provisions... information will be publicly available? With the exception of any confidential information as defined in part... information available for public inspection at the appropriate EPA Regional Office and in at least one...

  17. 40 CFR 49.157 - Public participation requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... ASSISTANCE INDIAN COUNTRY: AIR QUALITY PLANNING AND MANAGEMENT General Federal Implementation Plan Provisions... information will be publicly available? With the exception of any confidential information as defined in part... information available for public inspection at the appropriate EPA Regional Office and in at least one...

  18. 40 CFR 49.157 - Public participation requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... ASSISTANCE INDIAN COUNTRY: AIR QUALITY PLANNING AND MANAGEMENT General Federal Implementation Plan Provisions... information will be publicly available? With the exception of any confidential information as defined in part... information available for public inspection at the appropriate EPA Regional Office and in at least one...

  19. 40 CFR 49.171 - Public participation requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ASSISTANCE INDIAN COUNTRY: AIR QUALITY PLANNING AND MANAGEMENT General Federal Implementation Plan Provisions... participation requirements. (a) What permit information will be publicly available? With the exception of any confidential information as defined in part 2, subpart B of this chapter, the reviewing authority must make...

  20. Application of Barcoding to Reduce Error of Patient Identification and to Increase Patient's Information Confidentiality of Test Tube Labelling in a Psychiatric Teaching Hospital.

    PubMed

    Liu, Hsiu-Chu; Li, Hsing; Chang, Hsin-Fei; Lu, Mei-Rou; Chen, Feng-Chuan

    2015-01-01

    Learning from the experience of another medical center in Taiwan, Kaohsiung Municipal Kai-Suan Psychiatric Hospital has changed the nursing informatics system step by step in the past year and a half . We considered ethics in the original idea of implementing barcodes on the test tube labels to process the identification of the psychiatric patients. The main aims of this project are to maintain the confidential information and to transport the sample effectively. The primary nurses had been using different work sheets for this project to ensure the acceptance of the new barcode system. In the past two years the errors in the blood testing process were as high as 11,000 in 14,000 events per year, resulting in wastage of resources. The actions taken by the nurses and the new barcode system implementation can improve the clinical nursing care quality, safety of the patients, and efficiency, while decreasing the cost due to the human error.

  1. 14 CFR § 1203.400 - Specific classifying guidance.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... and operational information and material, and in some exceptional cases scientific information falling... activities), intelligence sources or methods, or cryptology; (d) Foreign relations or foreign activities of the United States, including confidential sources; (e) Scientific, technological, or economic matters...

  2. 10 CFR 1045.17 - Classification levels.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... classification include detailed technical descriptions of critical features of a nuclear explosive design that... classification include designs for specific weapon components (not revealing critical features), key features of uranium enrichment technologies, or specifications of weapon materials. (3) Confidential. The Director of...

  3. 10 CFR 1045.17 - Classification levels.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... classification include detailed technical descriptions of critical features of a nuclear explosive design that... classification include designs for specific weapon components (not revealing critical features), key features of uranium enrichment technologies, or specifications of weapon materials. (3) Confidential. The Director of...

  4. 10 CFR 1045.17 - Classification levels.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... classification include detailed technical descriptions of critical features of a nuclear explosive design that... classification include designs for specific weapon components (not revealing critical features), key features of uranium enrichment technologies, or specifications of weapon materials. (3) Confidential. The Director of...

  5. 10 CFR 1045.17 - Classification levels.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... classification include detailed technical descriptions of critical features of a nuclear explosive design that... classification include designs for specific weapon components (not revealing critical features), key features of uranium enrichment technologies, or specifications of weapon materials. (3) Confidential. The Director of...

  6. Geothermal industry assessment

    NASA Astrophysics Data System (ADS)

    1980-07-01

    Focus is on industry structure, corporate activities and strategies, and detailed analysis of the technological, economic, financial, and institutional issues important to government policy formulation. The study is based principally on confidential interviews and with executives of 75 companies active in the field.

  7. The Implementation of Managed Entry Agreements in Central and Eastern Europe: Findings and Implications.

    PubMed

    Ferrario, Alessandra; Arāja, Diāna; Bochenek, Tomasz; Čatić, Tarik; Dankó, Dávid; Dimitrova, Maria; Fürst, Jurij; Greičiūtė-Kuprijanov, Ieva; Hoxha, Iris; Jakupi, Arianit; Laidmäe, Erki; Löblová, Olga; Mardare, Ileana; Markovic-Pekovic, Vanda; Meshkov, Dmitry; Novakovic, Tanja; Petrova, Guenka; Pomorski, Maciej; Tomek, Dominik; Voncina, Luka; Haycox, Alan; Kanavos, Panos; Vella Bonanno, Patricia; Godman, Brian

    2017-12-01

    Managed entry agreements (MEAs) are a set of instruments to facilitate access to new medicines. This study surveyed the implementation of MEAs in Central and Eastern Europe (CEE) where limited comparative information is currently available. We conducted a survey on the implementation of MEAs in CEE between January and March 2017. Sixteen countries participated in this study. Across five countries with available data on the number of different MEA instruments implemented, the most common MEAs implemented were confidential discounts (n = 495, 73%), followed by paybacks (n = 92, 14%), price-volume agreements (n = 37, 5%), free doses (n = 25, 4%), bundle and other agreements (n = 19, 3%), and payment by result (n = 10, >1%). Across seven countries with data on MEAs by therapeutic group, the highest number of brand names associated with one or more MEA instruments belonged to the Anatomical Therapeutic Chemical (ATC)-L group, antineoplastic and immunomodulating agents (n = 201, 31%). The second most frequent therapeutic group for MEA implementation was ATC-A, alimentary tract and metabolism (n = 87, 13%), followed by medicines for neurological conditions (n = 83, 13%). Experience in implementing MEAs varied substantially across the region and there is considerable scope for greater transparency, sharing experiences and mutual learning. European citizens, authorities and industry should ask themselves whether, within publicly funded health systems, confidential discounts can still be tolerated, particularly when it is not clear which country and party they are really benefiting. Furthermore, if MEAs are to improve access, countries should establish clear objectives for their implementation and a monitoring framework to measure their performance, as well as the burden of implementation.

  8. Eavesdropping-aware routing and spectrum allocation based on multi-flow virtual concatenation for confidential information service in elastic optical networks

    NASA Astrophysics Data System (ADS)

    Bai, Wei; Yang, Hui; Yu, Ao; Xiao, Hongyun; He, Linkuan; Feng, Lei; Zhang, Jie

    2018-01-01

    The leakage of confidential information is one of important issues in the network security area. Elastic Optical Networks (EON) as a promising technology in the optical transport network is under threat from eavesdropping attacks. It is a great demand to support confidential information service (CIS) and design efficient security strategy against the eavesdropping attacks. In this paper, we propose a solution to cope with the eavesdropping attacks in routing and spectrum allocation. Firstly, we introduce probability theory to describe eavesdropping issue and achieve awareness of eavesdropping attacks. Then we propose an eavesdropping-aware routing and spectrum allocation (ES-RSA) algorithm to guarantee information security. For further improving security and network performance, we employ multi-flow virtual concatenation (MFVC) and propose an eavesdropping-aware MFVC-based secure routing and spectrum allocation (MES-RSA) algorithm. The presented simulation results show that the proposed two RSA algorithms can both achieve greater security against the eavesdropping attacks and MES-RSA can also improve the network performance efficiently.

  9. 16 CFR 314.1 - Purpose and scope.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... relationship, or pertains to the customers of other financial institutions that have provided such information... SAFEGUARDING CUSTOMER INFORMATION § 314.1 Purpose and scope. (a) Purpose. This part, which implements sections..., confidentiality, and integrity of customer information. (b) Scope. This part applies to the handling of customer...

  10. Intranet-Based Learning: A One-Year Study of Student Utilisation.

    ERIC Educational Resources Information Center

    Herson, Katie; Sosabowski, M. H.; Lloyd, A. W.

    1999-01-01

    Reports on the undergraduate utilization and evaluation of an Intranet learning resource developed at the School of Pharmacy of the University of Brighton (United Kingdom). Topics include advantages of Intranets over the Internet, including software licensing and confidentiality; barriers to implementation; and future proposals. (LRW)

  11. 25 CFR 43.22 - Assuring integrity of records.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...

  12. 25 CFR 43.22 - Assuring integrity of records.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...

  13. 25 CFR 43.22 - Assuring integrity of records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...

  14. 25 CFR 43.22 - Assuring integrity of records.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which...

  15. 25 CFR 43.22 - Assuring integrity of records.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...

  16. Managing medical and insurance information through a smart-card-based information system.

    PubMed

    Lambrinoudakis, C; Gritzalis, S

    2000-08-01

    The continuously increased mobility of patients and doctors, in conjunction with the existence of medical groups consisting of private doctors, general practitioners, hospitals, medical centers, and insurance companies, pose significant difficulties on the management of patients' medical data. Inevitably this affects the quality of the health care services provided. The evolving smart card technology can be utilized for the implementation of a secure portable electronic medical record, carried by the patient herself/himself. In addition to the medical data, insurance information can be stored in the smart card thus facilitating the creation of an "intelligent system" supporting the efficient management of patient's data. In this paper we present the main architectural and functional characteristics of such a system. We also highlight how the security features offered by smart cards can be exploited in order to ensure confidentiality and integrity of the medical data stored in the patient cards.

  17. 75 FR 24688 - Access to Confidential Business Information by Guident Technologies Inc.’s Identified Subcontractor

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-05

    ... show photographic identification, pass through a metal detector, and sign the EPA visitor log. All visitor bags are processed through an X-ray machine and subject to search. Visitors will be provided an...

  18. 76 FR 77816 - Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-14

    ... (202) 566-0280. Docket visitors are required to show photographic identification, pass through a metal detector, and sign the EPA visitor log. All visitor bags are processed through an X-ray machine and subject...

  19. 5 CFR 370.106 - Terms and conditions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....106 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS INFORMATION TECHNOLOGY EXCHANGE PROGRAM § 370.106 Terms and conditions. (a) A Federal employee detailed under this part... (Disclosure of Confidential Information Generally), and section 1913 (Lobbying with Appropriated Moneys); (iii...

  20. Efficient security mechanisms for mHealth applications using wireless body sensor networks.

    PubMed

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.

  1. Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

    PubMed Central

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734

  2. Simple algorithm for improved security in the FDDI protocol

    NASA Astrophysics Data System (ADS)

    Lundy, G. M.; Jones, Benjamin

    1993-02-01

    We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.

  3. 76 FR 14611 - Approval and Promulgation of Implementation Plans; Alabama; 110(a)(1) and (2) Infrastructure...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... Regional Office's normal hours of operation. The Regional Office's official hours of business are Monday... personal information provided, unless the comment includes information claimed to be Confidential Business... INFORMATION CONTACT section to schedule your inspection. The Regional Office's official hours of business are...

  4. 76 FR 12587 - Approval and Promulgation of Implementation Plans and Designation of Areas for Air Quality...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-08

    ... is not publicly available, i.e., Confidential Business Information or other information whose... to schedule your inspection. The Regional Office's official hours of business are Monday through... Administrators, Regions I-X, regarding Policy on Excess Emissions During Startup, Shutdown, Maintenance, and...

  5. 77 FR 1414 - Approval and Promulgation of State Implementation Plans: Alaska

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-10

    ... the index, some information may not be publicly available, i.e., Confidential Business Information or... section to schedule your inspection. The Regional Office's official hours of business are Monday through... revision submitted by Alaska included a technical analysis using EPA approved models and methods to...

  6. 76 FR 62004 - Revisions to the California State Implementation Plan, California Air Resources Board-Consumer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-06

    ... comment includes Confidential Business Information (CBI) or other information whose disclosure is... the hard copy materials, please schedule an appointment during normal business hours with the contact... compounds with a global warming potential (GWP) of 150 or greater in Multi-purpose Solvents and Paint...

  7. 78 FR 77557 - Releasing Information; General Provisions; Accounting and Reporting Requirements; Reports of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ..., including controls for maintaining the confidentiality of borrower information. The system of internal... develop and implement an effective system of internal controls over the central data repository to ensure..., and maintain an effective system of internal controls over the data included in the report of accounts...

  8. 77 FR 15595 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ...) and (d) when access to accounting disclosures and access to or amendment of records would cause the identity of a confidential source to be revealed. Disclosure of the source's identity not only will result... provided access to the information except to the extent that disclosure would reveal the identity of a...

  9. 76 FR 48093 - Hazardous Chemical Reporting: Revisions to the Emergency and Hazardous Chemical Inventory Forms...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-08

    ... provisions to the Office of Information and Regulatory Affairs, Office of Management and Budget (OMB), Attn... information provided, unless the comment includes information claimed to be Confidential Business Information... EPA information about these programs and hazards in a risk management plan (RMP). The implementing...

  10. Development and Operation of a Voluntary Audit Program.

    ERIC Educational Resources Information Center

    Murphy, Jerome R.

    This report describes a voluntary audit program implemented by the Educational Testing Service (ETS). The comprehensive audit program was developed to assure that all corporate programs adhere to the ETS Standards for Quality and Fairness. The standards address issues which relate to all ETS activities such as accountability, confidentiality of…

  11. Validation of the PCN Concept: Mobility, Traffic Flow Confidentiality and Protection Against Directed Attacks

    DTIC Science & Technology

    2010-11-01

    peer, racoon (IKE-daemon) will start authenticating using certificates. After a successful authentication, IPSec security associations will be set up...colour had credentials from one CA. Racoon and ipsec-tools are open-source software, implementing IKE and IPSec. Validation of the PCN Concept; Mobility

  12. XDS-I outsourcing proxy: ensuring confidentiality while preserving interoperability.

    PubMed

    Ribeiro, Luís S; Viana-Ferreira, Carlos; Oliveira, José Luís; Costa, Carlos

    2014-07-01

    The interoperability of services and the sharing of health data have been a continuous goal for health professionals, patients, institutions, and policy makers. However, several issues have been hindering this goal, such as incompatible implementations of standards (e.g., HL7, DICOM), multiple ontologies, and security constraints. Cross-enterprise document sharing (XDS) workflows were proposed by Integrating the Healthcare Enterprise (IHE) to address current limitations in exchanging clinical data among organizations. To ensure data protection, XDS actors must be placed in trustworthy domains, which are normally inside such institutions. However, due to rapidly growing IT requirements, the outsourcing of resources in the Cloud is becoming very appealing. This paper presents a software proxy that enables the outsourcing of XDS architectural parts while preserving the interoperability, confidentiality, and searchability of clinical information. A key component in our architecture is a new searchable encryption (SE) scheme-Posterior Playfair Searchable Encryption (PPSE)-which, besides keeping the same confidentiality levels of the stored data, hides the search patterns to the adversary, bringing improvements when compared to the remaining practical state-of-the-art SE schemes.

  13. Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions

    NASA Astrophysics Data System (ADS)

    Elbaz, Reouven; Torres, Lionel; Sassatelli, Gilles; Guillemin, Pierre; Bardouillet, Michel; Martinez, Albert

    The bus between the System on Chip (SoC) and the external memory is one of the weakest points of computer systems: an adversary can easily probe this bus in order to read private data (data confidentiality concern) or to inject data (data integrity concern). The conventional way to protect data against such attacks and to ensure data confidentiality and integrity is to implement two dedicated engines: one performing data encryption and another data authentication. This approach, while secure, prevents parallelizability of the underlying computations. In this paper, we introduce the concept of Block-Level Added Redundancy Explicit Authentication (BL-AREA) and we describe a Parallelized Encryption and Integrity Checking Engine (PE-ICE) based on this concept. BL-AREA and PE-ICE have been designed to provide an effective solution to ensure both security services while allowing for full parallelization on processor read and write operations and optimizing the hardware resources. Compared to standard encryption which ensures only confidentiality, we show that PE-ICE additionally guarantees code and data integrity for less than 4% of run-time performance overhead.

  14. Defining the physician's duty to warn: consensus statement of Ontario's Medical Expert Panel on Duty to Inform

    PubMed Central

    Ferris, L E; Barkun, H; Carlisle, J; Hoffman, B; Katz, C; Silverman, M

    1998-01-01

    Ontario's Medical Expert Panel on Duty to Inform was formed to consider the duty of Ontario physicians in circumstances where a patient threatens to kill or cause serious bodily harm to a third party. The panel was concerned about the implications of any duty to inform on the integrity of the physician-patient relationship, particularly with respect to confidentiality. The panel agreed that regulations safeguarding the confidentiality of patient information ought to be changed only if there is a critical reason for doing so, but, after deliberation, the panel members concluded that the need to protect the public from serious risk of harm is a paramount concern that should supersede the duty of confidentiality. The recommendations reported here were endorsed in principle by the panelists and the groups they represented (the Royal College of Physicians and Surgeons of Canada, the Canadian Medical Protective Association, the College of Physicians and Surgeons of Ontario, the Ontario College of Family Physicians and the Ontario Medical Association) and are being implemented by the College of Physicians and Surgeons of Ontario. PMID:9629112

  15. Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention.

    PubMed

    Jacquez, Geoffrey M; Essex, Aleksander; Curtis, Andrew; Kohler, Betsy; Sherman, Recinda; Emam, Khaled El; Shi, Chen; Kaufmann, Andy; Beale, Linda; Cusick, Thomas; Goldberg, Daniel; Goovaerts, Pierre

    2017-07-01

    As the volume, accuracy and precision of digital geographic information have increased, concerns regarding individual privacy and confidentiality have come to the forefront. Not only do these challenge a basic tenet underlying the advancement of science by posing substantial obstacles to the sharing of data to validate research results, but they are obstacles to conducting certain research projects in the first place. Geospatial cryptography involves the specification, design, implementation and application of cryptographic techniques to address privacy, confidentiality and security concerns for geographically referenced data. This article defines geospatial cryptography and demonstrates its application in cancer control and surveillance. Four use cases are considered: (1) national-level de-duplication among state or province-based cancer registries; (2) sharing of confidential data across cancer registries to support case aggregation across administrative geographies; (3) secure data linkage; and (4) cancer cluster investigation and surveillance. A secure multi-party system for geospatial cryptography is developed. Solutions under geospatial cryptography are presented and computation time is calculated. As services provided by cancer registries to the research community, de-duplication, case aggregation across administrative geographies and secure data linkage are often time-consuming and in some instances precluded by confidentiality and security concerns. Geospatial cryptography provides secure solutions that hold significant promise for addressing these concerns and for accelerating the pace of research with human subjects data residing in our nation's cancer registries. Pursuit of the research directions posed herein conceivably would lead to a geospatially encrypted geographic information system (GEGIS) designed specifically to promote the sharing and spatial analysis of confidential data. Geospatial cryptography holds substantial promise for accelerating the pace of research with spatially referenced human subjects data.

  16. Community health workers' experiences of using video teaching tools during home visits-A pilot study.

    PubMed

    Coetzee, Bronwyné; Kohrman, Hannah; Tomlinson, Mark; Mbewu, Nokwanele; Le Roux, Ingrid; Adam, Maya

    2018-03-01

    Innovations in health, such as the use of tablet computers, show promise in broadening the scope of work of community health workers (CHWs), and play an important role in keeping CHWs and their clients up to date with advancements in health. While the use of mobile phones and tablets is innovative, the applicability of these technologies in different contexts remains poorly understood. Furthermore, little is known about the acceptability and feasibility of the use of video teaching tools on such devices across diverse contexts. In this study, we aimed to explore the acceptability and feasibility of using tablets with teaching videos (about HIV, alcohol, nutrition and breastfeeding) to support the health promotion efforts of 24 CHWs who work with pregnant mothers and mothers of young children in an urban township in South Africa. Between November 2015 and May 2016, we conducted focus groups and identified four key themes (with several sub-themes) that demonstrated factors related to the acceptability and feasibility of these devices and their content. Focus group transcripts were analysed thematically using qualitative data analysis software. The findings indicated that while the devices contained several supportive features (such as lightening the workload, and stimulating interest in their work), they also contained several restrictive features (safety and confidentiality). CHWs considered the video content an important tool to engage not only their clients but also family members and the community at large. Issues surrounding safety, privacy and confidentiality of using these devices require careful consideration prior to implementation in large-scale studies. Furthermore, stigma associated with household visits by CHWs and the nature of their work also need to be addressed by researchers and programme implementers. Overall, CHWs deemed the devices and the video content an acceptable and feasible means with which to provide health promotion and education among their clients. © 2017 John Wiley & Sons Ltd.

  17. Telerehabilitation, virtual therapists, and acquired neurologic speech and language disorders.

    PubMed

    Cherney, Leora R; van Vuuren, Sarel

    2012-08-01

    Telerehabilitation (telerehab) offers cost-effective services that potentially can improve access to care for those with acquired neurologic communication disorders. However, regulatory issues including licensure, reimbursement, and threats to privacy and confidentiality hinder the routine implementation of telerehab services into the clinical setting. Despite these barriers, rapid technological advances and a growing body of research regarding the use of telerehab applications support its use. This article reviews the evidence related to acquired neurologic speech and language disorders in adults, focusing on studies that have been published since 2000. Research studies have used telerehab systems to assess and treat disorders including dysarthria, apraxia of speech, aphasia, and mild Alzheimer disease. They show that telerehab is a valid and reliable vehicle for delivering speech and language services. The studies represent a progression of technological advances in computing, Internet, and mobile technologies. They range on a continuum from working synchronously (in real-time) with a speech-language pathologist to working asynchronously (offline) with a stand-in virtual therapist. One such system that uses a virtual therapist for the treatment of aphasia, the Web-ORLA™ (Rehabilitation Institute of Chicago, Chicago, IL) system, is described in detail. Future directions for the advancement of telerehab for clinical practice are discussed. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  18. 40 CFR 307.22 - Preauthorization of response actions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... procedures for project management, EPA oversight, and reporting of progress of the project; and (12) The... innovative technology, if appropriate; (7) Employs treatment that reduces the volume, toxicity or mobility of... confidentiality may be asserted for information submitted to EPA under this subpart. Information claimed...

  19. 13 CFR 121.1008 - What occurs after SBA receives a size protest or request for a formal size determination?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Chief, Office of Technology. If the protest involves the size status of a concern that SBA has certified... of privacy or confidentiality, because SBA will not disclose information obtained in the course of a...

  20. 76 FR 10360 - Access to Confidential Business Information by Guident Technologies Inc. and Its Identified...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-24

    ... identification, pass through a metal detector, and sign the EPA visitor log. All visitor bags are processed through an X-ray machine and subject to search. Visitors will be provided an EPA/DC badge that must be...

  1. Processes and Outcomes of Developing a Continuity of Care Document for Use as a Personal Health Record by People Living with HIV/AIDS in New York City

    PubMed Central

    Gordon, Peter; Camhi, Eli; Hesse, Ron; Odlum, Michelle; Schnall, Rebecca; Rodriguez, Martha; Valdez, Esmerlin; Bakken, Suzanne

    2015-01-01

    Purpose To describe the processes and outcomes of developing and implementing a Continuity of Care Document (CCD), My Health Profile, as personal health record for persons living with HIV (PLWH) in an HIV/AIDS Special Needs Plan (SNP) in New York City. Methods Multiple qualitative and quantitative data sources were used to describe the processes and outcomes of implementing My Health Profile including focus groups, Audio Computer Assisted Self Interview (ACASI) surveys, administrative databases, chart abstraction, usage logs, and project management records. Qualitative data were thematically analyzed. Quantitative data analytic methods included descriptive and multivariate statistics. Data were triangulated and synthesized using the Reach, Efficacy/Effectiveness, Adoption, Implementation, Maintenance (RE-AIM) Framework. Results Reach SNP members are predominantly African American or Hispanic/Latino and about one third are female. A larger proportion of African Americans and smaller proportions of Hispanics/Latinos and Whites were trained to use My Health Profile. Efficacy/Effectiveness CCDs were produced for 8,249 unique members and updated on a monthly basis, 509 members were trained to use My Health Profile. Total number of member logins for 112 active users was 1,808 and the longest duration of use was 1,008 days. There were no significant differences between users and non-users of My Health Profile in clinical outcomes, perceptions of the quality of medical care, or health service utilization. Adoption My Health Profile was well-matched to organizational mission, values, and priorities related to coordination of care for a high-risk population of PLWH. Implementation Pre-implementation focus group participants identified potential barriers to use of My Health Profile including functional and computer literacy, privacy and confidentiality concerns, potential reluctance to use technology, and cognitive challenges. Key strategies for addressing barriers included a dedicated bilingual coach for recruitment, training, and support; basic computer and My Health Profile training; transparent audit trail revealing clinician and case manager access of My Health Profile, time-limited passwords for sharing My Health Profile with others at the point of need, and emergency access mechanism. Maintenance My Health Profile was integrated into routine operational activities and its sustainability is facilitated by its foundation on standards for Health Information Exchange (HIE). Conclusions Although potential barriers exist to the use of PHRs such as My Health Profile, PLWH with complex medical needs, low socioeconomic status, and limited computer experience will use such tools when a sufficient level of user support is provided and privacy and confidentiality concerns are addressed. PMID:22841825

  2. Issues of social policy and ethics in gene technology.

    PubMed

    Sade, R M

    1994-09-01

    Technical developments in the last ten years have made possible mapping and sequencing of the entire human genome, along with the possibility of treating genetic disorders by manipulating DNA. A variety of issues regarding potential uses and abuses of these technologies have become apparent. They relate to both genetic screening and gene therapy. Problems facing individuals and their families mostly revolve around rights of self-determination and of confidentiality. Health care professionals will need to design optimal systems to provide genetic counseling and to protect confidentiality of DNA data bases. Society and social institutions will need to develop policies and laws that protect the privacy of individuals whose DNA is stored in data banks. Patenting of the results of gene research remains controversial internationally. Moreover, there is concern in many quarters about society's potential abuse of gene technology for eugenic purposes. Gene therapy is now a reality. There is little disagreement on the use of gene therapy to treat genetic diseases in individuals by somatic cell therapy. There is much controversy, however, over the use of germ-line cell therapy. Gene technology has contributed to the growth among a small group of influential people of the Post-Modern Movement, which is strongly antiscience and antitechnology. This movement may pose a long-term threat to future technological advances and should not be ignored. There is much outside of the laboratory that scientists, particularly molecular biologists, can do to assure a secure place for science and technology in our culture.

  3. Medical students and personal smartphones in the clinical environment: the impact on confidentiality of personal health information and professionalism.

    PubMed

    Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C

    2014-05-22

    Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students' use of personal smartphones for clinical work. The intent of the study was to examine final-year medical students' experience with and attitudes toward using personal mobile technology in the clinical environment, with respect to the perceived impact on patient confidentiality and provider professionalism. Cross-sectional surveys were completed by final-year medical students at the University of Toronto. Respondents were asked about the type of personal mobile phone they use, security features on their personal phone, experiences using their personal phone during clinical rotations, and attitudes about using their personal phone for clinical work purposes. The overall response rate was 45.4% (99/218). Smartphone ownership was prevalent (98%, 97/99) with the majority (86%, 85/99) of participants using their personal phones for patient-related communication during clinical rotations. A total of 26% (26/99) of participants reported not having any type of security feature on their personal phone, 94% (90/96) of participants agreed that using their personal phone for clinical work makes them more efficient, and 86% (82/95) agreed that their personal phone allows them to provide better patient care. Although 68% (65/95) of participants believe that the use of personal phones for patient-related communication with colleagues poses a risk to the privacy and confidentiality of patient health information, 22% (21/96) of participants still use their personal phone to text or email identifiable patient data to colleagues. Our findings suggest that the use of personal smartphones for clinical work by medical students is prevalent. There is a need to more fully address the threat to patient confidentiality posed by the use of unsecured communication devices such as smartphones.

  4. Confidentiality and spatially explicit data: Concerns and challenges

    PubMed Central

    VanWey, Leah K.; Rindfuss, Ronald R.; Gutmann, Myron P.; Entwisle, Barbara; Balk, Deborah L.

    2005-01-01

    Recent theoretical, methodological, and technological advances in the spatial sciences create an opportunity for social scientists to address questions about the reciprocal relationship between context (spatial organization, environment, etc.) and individual behavior. This emerging research community has yet to adequately address the new threats to the confidentiality of respondent data in spatially explicit social survey or census data files, however. This paper presents four sometimes conflicting principles for the conduct of ethical and high-quality science using such data: protection of confidentiality, the social–spatial linkage, data sharing, and data preservation. The conflict among these four principles is particularly evident in the display of spatially explicit data through maps combined with the sharing of tabular data files. This paper reviews these two research activities and shows how current practices favor one of the principles over the others and do not satisfactorily resolve the conflict among them. Maps are indispensable for the display of results but also reveal information on the location of respondents and sampling clusters that can then be used in combination with shared data files to identify respondents. The current practice of sharing modified or incomplete data sets or using data enclaves is not ideal for either the advancement of science or the protection of confidentiality. Further basic research and open debate are needed to advance both understanding of and solutions to this dilemma. PMID:16230608

  5. The Evaluation of California's Migrant Education Program. Summary of the Study.

    ERIC Educational Resources Information Center

    Noggle, Nelson L.; And Others

    A 2-phase study provided summative information on the status of the statewide implementation of California's federally funded migrant program and also provided confidential formative information to program participants at district, regional, and state levels. Guided by an advisory panel, phase I was conducted in 1980-1981 and covered all grade…

  6. 76 FR 43143 - Approval and Promulgation of Air Quality Implementation Plan; Kansas; Final Disapproval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-20

    ..., some information is not publicly available, i.e., Confidential Business Information (CBI) or other... business are Monday through Friday, 8 to 4:30, excluding Federal holidays. FOR FURTHER INFORMATION CONTACT... unfair disadvantage by not finding the submittal incomplete instead of issuing a proposed disapproval is...

  7. 78 FR 41012 - Approval of Air Quality Implementation Plans; Navajo Nation; Regional Haze Requirements for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-09

    ... included in the public docket without change and may be made available online at www.regulations.gov , including any personal information provided, unless the comment includes Confidential Business Information... materials, please schedule an appointment during normal business hours with the contact listed in the FOR...

  8. 76 FR 18870 - Approval and Promulgation of Implementation Plans: Alabama: Final Disapproval of Revisions to the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-06

    ... index, some information is not publicly available, i.e., Confidential Business Information (CBI) or... INFORMATION CONTACT section to schedule your inspection. The Regional Office's official hours of business are... assumptions made about the relationship drive model results and, thus, are important in evaluating the result...

  9. Improving Teaching through a Peer Support "Teacher Consultation Process."

    ERIC Educational Resources Information Center

    Kerwin, Mike; Rhoads, Judith

    The Teaching Consultation Program (TCP) is one of the most popular faculty development programs offered in the University of Kentucky Community Colleges (UKCC's), having trained over 500 faculty since its implementation in 1977. The TCP is a confidential, peer consulting program available to faculty who wish to analyze their teaching behaviors and…

  10. Social Security Number Protection Laws: State-by-State Summary Table

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2011

    2011-01-01

    As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…

  11. 78 FR 9589 - Disclosures To Participate in State Prescription Drug Monitoring Programs

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-11

    ... patient information in order to implement VA's authority to participate in State Prescription Drug... the Act amended 38 U.S.C. 5701, which governs the confidential nature of VA claims and information of present and former members of the Armed Forces and their dependents in VA's possession, by adding a new...

  12. A Hands-On Approach for Teaching Denial of Service Attacks: A Case Study

    ERIC Educational Resources Information Center

    Trabelsi, Zouheir; Ibrahim, Walid

    2013-01-01

    Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…

  13. 78 FR 4333 - Approval and Promulgation of Air Quality Implementation Plans; West Virginia; Requirements for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-22

    ... information provided, unless the comment includes information claimed to be Confidential Business Information....gov or in hard copy during normal business hours at the Air Protection Division, U.S. Environmental... the November 30, 1993 edition of the Federal Register (58 FR 63214) and codified in the Code of...

  14. 77 FR 3386 - Approval and Promulgation of Air Quality Implementation Plans; Pennsylvania; Clean Vehicles Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-24

    ... Vehicle Program, which adopts California's second generation low emission vehicle program for light- duty... listed in the electronic docket, some information is not publicly available, i.e., confidential business....regulations.gov or in hard copy for public inspection during normal business hours at the Air Protection...

  15. Design and implementation of a simulation exercise for teaching confidentiality of patient information.

    PubMed

    Snyder, J R

    1982-05-01

    Allied health students, making the transition from a purely academic to a professional school setting, are suddenly faced with judgment decisions about disclosure of medical information. Obscure guidelines and new interpersonal relationships with other members of the health care team complicate this transition and pose a threat to confidentiality of patient information. This article describes the design and implementation of a simulation exercise to reinforce lecture guidelines specifying disclosure of medical information without risk to the patient or student. The simulation is comprised of 10 critical incidents calling for responses ranging from logical to judgmental. Although written primarily for medical technologists, with emphasis on limitations governing release of patient laboratory data, the simulation approach is presented here as a model for other allied health professions. The use of a latent image format provides learners with positive or negative reinforcement as they learn the consequences of their decisions. The simulation activity described is easily adapted to small group discussion or computer-assisted instruction. While the simulation appears to be an accurate representation of reality, peer and real-life pressures could not be totally simulated.

  16. A confidential inquiry estimating the number of patients affected with sickle cell disease and thalassemia major confirms the need for a prevention strategy in the Netherlands.

    PubMed

    Giordano, Piero C; Bouva, Marelle J; Harteveld, Cornelis L

    2004-01-01

    We have conducted a broad confidential inquiry among 401 hospital departments trying to estimate the number of patients affected with severe forms of hemoglobinopathies living in The Netherlands. With less than 30% response we have registered 559 patients in all age categories of whom 77.0% are affected with sickle cell disease and 17.5% with beta-thalassemia (thal) major. We estimate that the real figure could be around 800 patients, a figure more than six times higher than the number published in 1995 on which the reluctance to offer prevention was based. The actual figures and the incidence estimation of approximately 60 patients a year underline the urgent need for the official implementation of a prevention strategy in The Netherlands. During the last 5 years we have been working towards the implementation of a multi-intervention strategy for primary prevention using the existing structures of public health. The obstacles we have encountered to endorse such a strategy are discussed as a possible guide for other immigration countries.

  17. Agents Based e-Commerce and Securing Exchanged Information

    NASA Astrophysics Data System (ADS)

    Al-Jaljouli, Raja; Abawajy, Jemal

    Mobile agents have been implemented in e-Commerce to search and filter information of interest from electronic markets. When the information is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described, which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol usingSymbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data-authenticity, origin confidentiality and data non-repudiability.

  18. Security measures required for HIPAA privacy.

    PubMed

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  19. Science and Technology Resources on the Internet: Computer Security.

    ERIC Educational Resources Information Center

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  20. 78 FR 69337 - Greenhouse Gas Reporting Program: Amendments and Confidentiality Determinations for Fluorinated...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... Classification System NF 3 nitrogen trifluoride NODA notice of data availability NTTAA National Technology... Previously Produced Fluorinated GHGs and From Venting of Residual Fluorinated GHGs From Containers 7... emissions from production and transformation processes; emissions from venting of container heels and...

  1. 77 FR 69626 - Federal Acquisition Regulation; Information Collection; Subcontracting Plans/Individual...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-20

    ... collection of information on those who are to respond, through the use of appropriate technological... this collection. All comments received will be posted without change to http://www.regulations.gov , including any personal and/or business confidential information provided. FOR FURTHER INFORMATION CONTACT...

  2. Teleradiology network system and computer-aided diagnosis workstation using the web medical image conference system with a new information security solution

    NASA Astrophysics Data System (ADS)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki

    2011-03-01

    We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of RAID. With RAID technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. We can safely share the screen of workstation to which the medical image of Data Center is displayed from two or more web conference terminals at the same time. Moreover, Real time biometric face authentication system is connected with Data Center. Real time biometric face authentication system analyzes the feature of the face image of which it takes a picture in 20 seconds with the camera and defends the safety of the medical information. We propose a new information transmission method and a new information storage method with a new information security solution.

  3. Protecting HIV information in countries scaling up HIV services: a baseline study.

    PubMed

    Beck, Eduard J; Mandalia, Sundhiya; Harling, Guy; Santas, Xenophon M; Mosure, Debra; Delay, Paul R

    2011-02-06

    Individual-level data are needed to optimize clinical care and monitor and evaluate HIV services. Confidentiality and security of such data must be safeguarded to avoid stigmatization and discrimination of people living with HIV. We set out to assess the extent that countries scaling up HIV services have developed and implemented guidelines to protect the confidentiality and security of HIV information. Questionnaires were sent to UNAIDS field staff in 98 middle- and lower-income countries, some reportedly with guidelines (G-countries) and others intending to develop them (NG-countries). Responses were scored, aggregated and weighted to produce standard scores for six categories: information governance, country policies, data collection, data storage, data transfer and data access. Responses were analyzed using regression analyses for associations with national HIV prevalence, gross national income per capita, OECD income, receiving US PEPFAR funding, and being a G- or NG-country. Differences between G- and NG-countries were investigated using non-parametric methods. Higher information governance scores were observed for G-countries compared with NG-countries; no differences were observed between country policies or data collection categories. However, for data storage, data transfer and data access, G-countries had lower scores compared with NG-countries. No significant associations were observed between country score and HIV prevalence, per capita gross national income, OECD economic category, and whether countries had received PEPFAR funding. Few countries, including G-countries, had developed comprehensive guidelines on protecting the confidentiality and security of HIV information. Countries must develop their own guidelines, using established frameworks to guide their efforts, and may require assistance in adapting, adopting and implementing them.

  4. Quantum key based burst confidentiality in optical burst switched networks.

    PubMed

    Balamurugan, A M; Sivasubramanian, A

    2014-01-01

    The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  5. Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks

    PubMed Central

    Balamurugan, A. M.; Sivasubramanian, A.

    2014-01-01

    The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks. PMID:24578663

  6. Cybersecurity in healthcare: A systematic review of modern threats and trends.

    PubMed

    Kruse, Clemens Scott; Frederick, Benjamin; Jacobson, Taylor; Monticone, D Kyle

    2017-01-01

    The adoption of healthcare technology is arduous, and it requires planning and implementation time. Healthcare organizations are vulnerable to modern trends and threats because it has not kept up with threats. The objective of this systematic review is to identify cybersecurity trends, including ransomware, and identify possible solutions by querying academic literature. The reviewers conducted three separate searches through the CINAHL and PubMed (MEDLINE) and the Nursing and Allied Health Source via ProQuest databases. Using key words with Boolean operators, database filters, and hand screening, we identified 31 articles that met the objective of the review. The analysis of 31 articles showed the healthcare industry lags behind in security. Like other industries, healthcare should clearly define cybersecurity duties, establish clear procedures for upgrading software and handling a data breach, use VLANs and deauthentication and cloud-based computing, and to train their users not to open suspicious code. The healthcare industry is a prime target for medical information theft as it lags behind other leading industries in securing vital data. It is imperative that time and funding is invested in maintaining and ensuring the protection of healthcare technology and the confidentially of patient information from unauthorized access.

  7. MicroArray Facility: a laboratory information management system with extended support for Nylon based technologies.

    PubMed

    Honoré, Paul; Granjeaud, Samuel; Tagett, Rebecca; Deraco, Stéphane; Beaudoing, Emmanuel; Rougemont, Jacques; Debono, Stéphane; Hingamp, Pascal

    2006-09-20

    High throughput gene expression profiling (GEP) is becoming a routine technique in life science laboratories. With experimental designs that repeatedly span thousands of genes and hundreds of samples, relying on a dedicated database infrastructure is no longer an option.GEP technology is a fast moving target, with new approaches constantly broadening the field diversity. This technology heterogeneity, compounded by the informatics complexity of GEP databases, means that software developments have so far focused on mainstream techniques, leaving less typical yet established techniques such as Nylon microarrays at best partially supported. MAF (MicroArray Facility) is the laboratory database system we have developed for managing the design, production and hybridization of spotted microarrays. Although it can support the widely used glass microarrays and oligo-chips, MAF was designed with the specific idiosyncrasies of Nylon based microarrays in mind. Notably single channel radioactive probes, microarray stripping and reuse, vector control hybridizations and spike-in controls are all natively supported by the software suite. MicroArray Facility is MIAME supportive and dynamically provides feedback on missing annotations to help users estimate effective MIAME compliance. Genomic data such as clone identifiers and gene symbols are also directly annotated by MAF software using standard public resources. The MAGE-ML data format is implemented for full data export. Journalized database operations (audit tracking), data anonymization, material traceability and user/project level confidentiality policies are also managed by MAF. MicroArray Facility is a complete data management system for microarray producers and end-users. Particular care has been devoted to adequately model Nylon based microarrays. The MAF system, developed and implemented in both private and academic environments, has proved a robust solution for shared facilities and industry service providers alike.

  8. MicroArray Facility: a laboratory information management system with extended support for Nylon based technologies

    PubMed Central

    Honoré, Paul; Granjeaud, Samuel; Tagett, Rebecca; Deraco, Stéphane; Beaudoing, Emmanuel; Rougemont, Jacques; Debono, Stéphane; Hingamp, Pascal

    2006-01-01

    Background High throughput gene expression profiling (GEP) is becoming a routine technique in life science laboratories. With experimental designs that repeatedly span thousands of genes and hundreds of samples, relying on a dedicated database infrastructure is no longer an option. GEP technology is a fast moving target, with new approaches constantly broadening the field diversity. This technology heterogeneity, compounded by the informatics complexity of GEP databases, means that software developments have so far focused on mainstream techniques, leaving less typical yet established techniques such as Nylon microarrays at best partially supported. Results MAF (MicroArray Facility) is the laboratory database system we have developed for managing the design, production and hybridization of spotted microarrays. Although it can support the widely used glass microarrays and oligo-chips, MAF was designed with the specific idiosyncrasies of Nylon based microarrays in mind. Notably single channel radioactive probes, microarray stripping and reuse, vector control hybridizations and spike-in controls are all natively supported by the software suite. MicroArray Facility is MIAME supportive and dynamically provides feedback on missing annotations to help users estimate effective MIAME compliance. Genomic data such as clone identifiers and gene symbols are also directly annotated by MAF software using standard public resources. The MAGE-ML data format is implemented for full data export. Journalized database operations (audit tracking), data anonymization, material traceability and user/project level confidentiality policies are also managed by MAF. Conclusion MicroArray Facility is a complete data management system for microarray producers and end-users. Particular care has been devoted to adequately model Nylon based microarrays. The MAF system, developed and implemented in both private and academic environments, has proved a robust solution for shared facilities and industry service providers alike. PMID:16987406

  9. The challenge of electronic health records (EHRs) design and implementation: responses of health workers to drawing a 'big and rich picture' of a future EHR programme using animated tools.

    PubMed

    Jenkings, K Neil; Wilson, Robert G

    2007-01-01

    To investigate the use of animation tools to aid visualisation of problems for discussion within focus groups, in the context of healthcare workers discussing electronic health records (EHRs). Ten healthcare staff focus groups, held in a range of organisational contexts. Each focus group was in four stages: baseline discussion, animator presentation, post-animator discussion and questionnaire. Audio recordings of the focus groups were transcribed and coded and the emergent analytic themes analysed for issues relating to EHR design and implementation. The data allowed a comparison of baseline and post-animator discussion. The animator facilitated discussion about EHR issues and these were thematically coded as: Workload; Sharing Information; Access to Information; Record Content; Confidentiality; Patient Consent; and Implementation. We illustrate that use of the animator in focus groups is one means to raise understanding about a proposed EHR development. The animator provided a visual 'probe' to support a more proactive and discursive localised approach to end-user concerns, which could be part of an effective stakeholder engagement and communication strategy crucial in any EHR or health informatics implementation programme. The results of the focus groups were to raise salient issues and concerns, many of which anticipated those that have emerged in the current NHS Connecting for Health Care Records programme in England. Potentially, animator-type technologies may facilitate the user ownership which other forms of dissemination appear to be failing to achieve.

  10. Improving Access to Data While Protecting Confidentiality: Prospects for the Future.

    ERIC Educational Resources Information Center

    Duncan, George T.; Pearson, Robert W.

    Providing researchers, especially those in the social sciences, with access to publicly collected microdata furthers research while advancing public policy goals in a democratic society. However, while technological improvements have eased remote access to these databases and enabled computer using researchers to perform sophisticated statistical…

  11. 75 FR 65359 - Common Formats for Patient Safety Data Collection and Event Reporting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-22

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Agency for Healthcare Research and Quality Common Formats..., and analyze confidential information regarding the quality and safety of healthcare delivery. The... Information Technology (HIT) Device format and the remaining Common Formats Version 1.1 can be accessed...

  12. Security of Data, Stored in Information Systems of Bulgarian Municipal Administrations

    NASA Astrophysics Data System (ADS)

    Kapralyakov, Petko

    2011-12-01

    Massive influx of information technology in municipal administrations increases their efficiency in delivering public services but increased the risk of theft of confidential information electronically. The report proposed an approach for improving information security for small municipal governments in Bulgaria through enhanced intrusion detection and prevention system.

  13. 6 CFR 25.6 - Procedures for designation of qualified anti-terrorism technologies.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... available or can be feasibly conducted or obtained, including test results produced by an independent laboratory or other entity engaged to test or verify the safety, utility, performance, in order to assess the...; (ii) Classified and otherwise confidential studies; (iii) Studies, tests, or other performance records...

  14. 6 CFR 25.6 - Procedures for designation of qualified anti-terrorism technologies.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... available or can be feasibly conducted or obtained, including test results produced by an independent laboratory or other entity engaged to test or verify the safety, utility, performance, in order to assess the...; (ii) Classified and otherwise confidential studies; (iii) Studies, tests, or other performance records...

  15. [Risk sharing methods in middle income countries].

    PubMed

    Inotai, András; Kaló, Zoltán

    2012-01-01

    The pricing strategy of innovative medicines is based on the therapeutic value in the largest pharmaceutical markets. The cost-effectiveness of new medicines with value based ex-factory price is justifiable. Due to the international price referencing and parallel trade the ex-factory price corridor of new medicines has been narrowed in recent years. Middle income countries have less negotiation power to change the narrow drug pricing corridor, although their fair intention is to buy pharmaceuticals at lower price from their scarce public resources compared to higher income countries. Therefore the reimbursement of new medicines at prices of Western-European countries may not be justifiable in Central-Eastern European countries. Confidential pricing agreements (i.e. confidential price discounts, claw-back or rebate) in lower income countries of the European Union can alleviate this problem, as prices of new medicines can be adjusted to local purchasing power without influencing the published ex-factory price and so the accessibility of patients to these drugs in other countries. In order to control the drug budget payers tend to apply financial risk sharing agreements for new medicines in more and more countries to shift the consequences of potential overspending to pharmaceutical manufacturers. The major paradox of financial risk-sharing schemes is that increased mortality, poor persistence of patients, reduced access to healthcare providers, and no treatment reduce pharmaceutical spending. Consequently, payers have started to apply outcome based risk sharing agreements for new medicines recently to improve the quality of health care provision. Our paper aims to review and assess the published financial and outcome based risk sharing methods. Introduction of outcome based risk-sharing schemes can be a major advancement in the drug reimbursement strategy of payers in middle income countries. These schemes can help to reduce the medical uncertainty in coverage decisions for valuable innovative healthcare technologies. However risk-sharing schemes can also reduce the transparency of pharmaceutical pricing and reimbursement, as the payback, and consequently the actual price per patient can be calculated only retrospectively. Therefore risk-sharing agreements can be interpreted as special forms of confidential pricing agreements to facilitate the implementation of differential pricing in middle income countries.

  16. [Views of health system administrators, professionals, and users concerning the electronic health record and facilitators and obstacles to its implementation].

    PubMed

    Costa, Jose Felipe Riani; Portela, Margareth Crisóstomo

    2018-02-05

    The design and deployment of complex technologies like the electronic health record (EHR) involve technical, personal, social, and organizational issues. The Brazilian public and private scenario includes different local and regional initiatives for implementation of the electronic health record. The Brazilian Ministry of Health also has a proposal to develop a national EHR. The current study aimed to provide a comprehensive view of perceptions by health system administrators, professionals, and users concerning their experiences with the electronic health record and their opinions of the possibility of developing a national EHR. This qualitative study involved 28 semi-structured interviews. The results revealed both the diversity of factors that can influence the implementation of an electronic health record and the existence of convergences and aspects that tend to be valued differently according to the different points of view. Key aspects include discussions on the electronic health record's attributes and it impact on healthcare, especially in the case of local electronic health records, concerns over costs and confidentiality and privacy pertaining to electronic health records in general, and the possible implications of centralized versus decentralized data storage in the case of a national EHR. The interviews clearly showed the need to establish more effective communication among the various stakeholders, and that the different perspectives should be considered when drafting and deploying an EHR at the local, regional, and national levels.

  17. Secure Embedded Systems

    DTIC Science & Technology

    2016-02-26

    UAS) to illustrate how we use cryptography to ensure confidentiality and integrity. Using this example, we demonstrate the identification of...potential attack targets by considering the CONOPS, the development of countermeasures to these attacks, and the design and implementation of a cryptography ...based security architecture. Because cryptography does not directly enable availability, we also provide insight into the ongoing research that

  18. How to apply Y2K lessons to patient confidentiality.

    PubMed

    2001-04-01

    Despite current debate over the details of implementing the privacy portion of the Health Insurance Portability and Accountability Act (HIPAA) of 1996, experts say quality managers should continue their planning to comply with the new law. One way to prepare for the sweeping new mandates is to apply the lessons of Y2K to HIPAA.

  19. Managing information technology security risk

    NASA Technical Reports Server (NTRS)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  20. Implementing a regional oncology information system: approach and lessons learned.

    PubMed

    Evans, W K; Ashbury, F D; Hogue, G L; Smith, A; Pun, J

    2014-10-01

    Paper-based medical record systems are known to have major problems of inaccuracy, incomplete data, poor accessibility, and challenges to patient confidentiality. They are also an inefficient mechanism of record-sharing for interdisciplinary patient assessment and management, and represent a major problem for keeping current and monitoring quality control to facilitate improvement. To address those concerns, national, regional, and local health care authorities have increased the pressure on oncology practices to upgrade from paper-based systems to electronic health records. Here, we describe and discuss the challenges to implementing a region-wide oncology information system across four independent health care organizations, and we describe the lessons learned from the initial phases that are now being applied in subsequent activities of this complex project. The need for change must be shared across centres to increase buy-in, adoption, and implementation. It is essential to establish physician leadership, commitment, and engagement in the process. Work processes had to be revised to optimize use of the new system. Culture change must be included in the change management strategy. Furthermore, training and resource requirements must be thoroughly planned, implemented, monitored, and modified as required for effective adoption of new work processes and technology. Interfaces must be established with multiple existing electronic systems across the region to ensure appropriate patient flow. Periodic assessment of the existing project structure is necessary, and adjustments are often required to ensure that the project meets its objectives. The implementation of region-wide oncology information systems across different health practice locations has many challenges. Leadership is essential. A strong, collaborative information-sharing strategy across the region and with the supplier is essential to identify, discuss, and resolve implementation problems. A structure that supports project management and accountability contributes to success.

  1. ACR Imaging IT Reference Guide: Image Sharing: Evolving Solutions in the Age of Interoperability

    PubMed Central

    Erickson, Bradley J.; Choy, Garry

    2014-01-01

    Interoperability is a major focus of the quickly evolving world of Health Information Technology. Easy, yet secure and confidential exchange of imaging exams and the associated reports must be a part of the solutions that are implemented. The availability of historical exams is essential in providing a quality interpretation and reducing inappropriate utilization of imaging services. Today exchange of imaging exams is most often achieved via a CD. We describe the virtues of this solution as well as challenges that have surfaced. Internet and cloud based technologies employed for many consumer services can provide a better solution. Vendors are making these solutions available. Standards for internet based exchange are emerging. Just as Radiology converged on DICOM as a standard to store and view images we need a common exchange standard. We will review the existing standards, and how they are organized into useful workflows through Integrating the Healthcare Enterprise (IHE) profiles. IHE and standards development processes are discussed. Healthcare and the domain of Radiology must stay current with quickly evolving internet standards. The successful use of the “cloud” will depend upon both the technologies we discuss and the policies put into place around these technologies. We discuss both aspects. The Radiology community must lead the way and provide a solution that works for radiologists and clinicians in the Electronic Medical Record (EMR). Lastly we describe the features we believe radiologists should consider when considering adding internet based exchange solutions to their practice. PMID:25467903

  2. Lessons Learned From Google Glass: Telemedical Spark or Unfulfilled Promise?

    PubMed

    Yu, Jonathan; Ferniany, William; Guthrie, Barton; Parekh, Selene G; Ponce, Brent

    2016-04-01

    Wearable devices such as Google Glass could potentially be used in the health care setting to expand access and improve quality of care. This study aims to assess the demographics of Google Glass users in health care and determine the obstacles to using Google Glass by surveying those who are known to use the device. A 48-question survey was designed to assess demographics of users, technological limitations of Google Glass, and obstacles to implementation of the device. The physicians surveyed worked in various fields of health care, with 50% of the respondents being surgeons. Potential participants were found using an Internet search for physicians using Google Glass in their practice. Outcome measures were divided into demographic information of users, technological limitations of the device, and administrative obstacles. A 43.6% response rate was observed. The majority of users were male, assistant professors, in academic hospitals, and in the United States. Numerous technological limitations were observed by the majority, including device ergonomics, display location, video quality, and audio quality. Patient confidentiality and data security were the major concerns among administrative obstacles. Despite the potential of Google Glass, numerous obstacles exist that limit its use in health care. While Google Glass has been discontinued, the results of this study may be used to guide future designs of wearable devices. © The Author(s) 2015.

  3. Multi-agent system as a new approach to effective chronic heart failure management: key considerations.

    PubMed

    Mohammadzadeh, Niloofar; Safdari, Reza; Rahimi, Azin

    2013-09-01

    Given the importance of the follow-up of chronic heart failure (CHF) patients to reduce common causes of re-admission and deterioration of their status that lead to imposing spiritual and physical costs on patients and society, modern technology tools should be used to the best advantage. The aim of this article is to explain key points which should be considered in designing an appropriate multi-agent system to improve CHF management. In this literature review articles were searched with keywords like multi-agent system, heart failure, chronic disease management in Science Direct, Google Scholar and PubMed databases without regard to the year of publications. Agents are an innovation in the field of artificial intelligence. Because agents are capable of solving complex and dynamic health problems, to take full advantage of e-Health, the healthcare system must take steps to make use of this technology. Key factors in CHF management through a multi-agent system approach must be considered such as organization, confidentiality in general aspects and design and architecture points in specific aspects. Note that use of agent systems only with a technical view is associated with many problems. Hence, in delivering healthcare to CHF patients, considering social and human aspects is essential. It is obvious that identifying and resolving technical and non-technical challenges is vital in the successful implementation of this technology.

  4. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    PubMed Central

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-01-01

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214

  5. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.

    PubMed

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-02-07

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  6. Multi-Agent System as a New Approach to Effective Chronic Heart Failure Management: Key Considerations

    PubMed Central

    Mohammadzadeh, Niloofar; Rahimi, Azin

    2013-01-01

    Objectives Given the importance of the follow-up of chronic heart failure (CHF) patients to reduce common causes of re-admission and deterioration of their status that lead to imposing spiritual and physical costs on patients and society, modern technology tools should be used to the best advantage. The aim of this article is to explain key points which should be considered in designing an appropriate multi-agent system to improve CHF management. Methods In this literature review articles were searched with keywords like multi-agent system, heart failure, chronic disease management in Science Direct, Google Scholar and PubMed databases without regard to the year of publications. Results Agents are an innovation in the field of artificial intelligence. Because agents are capable of solving complex and dynamic health problems, to take full advantage of e-Health, the healthcare system must take steps to make use of this technology. Key factors in CHF management through a multi-agent system approach must be considered such as organization, confidentiality in general aspects and design and architecture points in specific aspects. Conclusions Note that use of agent systems only with a technical view is associated with many problems. Hence, in delivering healthcare to CHF patients, considering social and human aspects is essential. It is obvious that identifying and resolving technical and non-technical challenges is vital in the successful implementation of this technology. PMID:24195010

  7. Autonomy and Privacy in Clinical Laboratory Science Policy and Practice.

    PubMed

    Leibach, Elizabeth Kenimer

    2014-01-01

    Rapid advancements in diagnostic technologies coupled with growth in testing options and choices mandate the development of evidence-based testing algorithms linked to the care paths of the major chronic diseases and health challenges encountered most frequently. As care paths are evaluated, patient/consumers become partners in healthcare delivery. Clinical laboratory scientists find themselves firmly embedded in both quality improvement and clinical research with an urgent need to translate clinical laboratory information into knowledge required by practitioners and patient/consumers alike. To implement this patient-centered care approach in clinical laboratory science, practitioners must understand their roles in (1) protecting patient/consumer autonomy in the healthcare informed consent process and (2) assuring patient/consumer privacy and confidentiality while blending quality improvement study findings with protected health information. A literature review, describing the current ethical environment, supports a consultative role for clinical laboratory scientists in the clinical decision-making process and suggests guidance for policy and practice regarding the principle of autonomy and its associated operational characteristics: informed consent and privacy.

  8. 78 FR 27479 - Notice of Request for Approval To Continue To Collect New Information: Confidential Close Call...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-10

    ... project. This data collection effort is in support of a five-year research study aiming at improving rail... ongoing research study is conducted by the Office of Human Factors in the Federal Railroad Administration... DEPARTMENT OF TRANSPORTATION Research and Innovative Technology Administration [Docket Number RITA...

  9. Using Technology-Based Simulations to Promote Teacher Candidate Parental Collaboration and Reflective Instructional Decision Making

    ERIC Educational Resources Information Center

    Accardo, Amy; Xin, Joy

    2017-01-01

    In teacher preparation programs, teacher candidates are expected to learn parental collaboration through their required college coursework and field experiences. Due to confidentiality requirements in field placements, however, teacher candidates are typically not provided an opportunity to attend IEP or 504 plan conferences. In this study,…

  10. Joint Force Cyberspace Component Command: Establishing Cyberspace Operations Unity of Effort for the Joint Force Commander

    DTIC Science & Technology

    2015-05-01

    say/. According to the article, “the hackers targeted big-name makers of nuclear and solar technology, stealing confidential business information...As JTF-GNO synchronized efforts to disinfect and protect over 2.5 million computers in 3,500 DoD organizations spanning 99 countries, Defense

  11. The Patient-Surgeon Relationship in the Cyber Era: Communication and Information

    PubMed Central

    Blake, J. Herman; Schwemmer, Mary Kay; Sade, Robert M.

    2012-01-01

    Synopsis From Laennec’s invention of the stethoscope in 1816 to the recently introduced Sapien transcatheter aortic valve replacement, the increasing complexity of health care technology has altered the relationship between patients and physicians, usually for the better. Telemedicine, the provision of medical services through electronic media, has dramatically changed how the patient and physician interact and how medical care is delivered. A consistent pattern of increased use of the Internet by patients and their families has been well documented. Patients clearly want more Internet interactions with clinicians in their quest for general information, prescription renewals, and such administrative matters as scheduling appointments. Despite privacy concerns, patients are generally satisfied that their communications and medical records are confidential and accurate. Physicians’ utilization of information technology has increased as the range of electronic devices and modes of communication has expanded. Many studies of physicians’ perceptions of electronic communication with patients have documented recognition of benefits as well as a consistent chorus of concerns about confidentiality, increased workload, inappropriate use, and medicolegal issues. PMID:23084616

  12. Requirements of a new communication technology for handover and the escalation of patient care: a multi-stakeholder analysis.

    PubMed

    Johnston, Maximilian J; King, Dominic; Arora, Sonal; Cooper, Kerri; Panda, Neha Aparajita; Gosling, Rebecca; Singh, Kaushiki; Sanders, Bradley; Cox, Benita; Darzi, Ara

    2014-08-01

    In order to enable safe and efficient information transfer between health care professionals during clinical handover and escalation of care, existing communication technologies must be updated. This study aimed to provide a user-informed guide for the development of an application-based communication system (ABCS), tailored for use in patient handover and escalation of care. Current methods of inter-professional communication in health care along with information system needs for communication technology were identified through literature review. A focus group study was then conducted according to a topic guide developed by health innovation and safety researchers. Fifteen doctors and 11 nurses from three London hospitals participated in a mixture of homogeneous and heterogeneous sessions. The sessions were recorded and transcribed verbatim before being subjected to thematic analysis. Seventeen information system needs were identified from the literature review. Participants identified six themes detailing user perceptions of current communication technology, attitudes to smartphone technology and anticipated requirements of an application produced for handover and escalation of care. Participants were in favour of an ABCS over current methods and expressed enthusiasm for a system with integrated patient information and group-messaging functions. Despite concerns regarding confidentiality and information governance a robust guide for development and implementation of an ABCS was produced, taking input from multiple stakeholders into account. Handover and escalation of care are vital processes for patient safety and communication within these must be optimized. An ABCS for health care professionals would be a welcome innovation and may lead to improvements in patient safety. © 2014 John Wiley & Sons, Ltd.

  13. Implementing and integrating a clinically driven electronic medical record for radiation oncology in a large medical enterprise.

    PubMed

    Kirkpatrick, John P; Light, Kim L; Walker, Robyn M; Georgas, Debra L; Antoine, Phillip A; Clough, Robert W; Cozart, Heidi B; Yin, Fang-Fang; Yoo, Sua; Willett, Christopher G

    2013-01-01

    While our department is heavily invested in computer-based treatment planning, we historically relied on paper-based charts for management of Radiation Oncology patients. In early 2009, we initiated the process of conversion to an electronic medical record (EMR) eliminating the need for paper charts. Key goals included the ability to readily access information wherever and whenever needed, without compromising safety, treatment quality, confidentiality, or productivity. In February, 2009, we formed a multi-disciplinary team of Radiation Oncology physicians, nurses, therapists, administrators, physicists/dosimetrists, and information technology (IT) specialists, along with staff from the Duke Health System IT department. The team identified all existing processes and associated information/reports, established the framework for the EMR system and generated, tested and implemented specific EMR processes. Two broad classes of information were identified: information which must be readily accessed by anyone in the health system versus that used solely within the Radiation Oncology department. Examples of the former are consultation reports, weekly treatment check notes, and treatment summaries; the latter includes treatment plans, daily therapy records, and quality assurance reports. To manage the former, we utilized the enterprise-wide system, which required an intensive effort to design and implement procedures to export information from Radiation Oncology into that system. To manage "Radiation Oncology" data, we used our existing system (ARIA, Varian Medical Systems.) The ability to access both systems simultaneously from a single workstation (WS) was essential, requiring new WS and modified software. As of January, 2010, all new treatments were managed solely with an EMR. We find that an EMR makes information more widely accessible and does not compromise patient safety, treatment quality, or confidentiality. However, compared to paper charts, time required by clinicians to access/enter patient information has substantially increased. While productivity is improving with experience, substantial growth will require better integration of the system components, decreased access times, and improved user interfaces. $127K was spent on new hardware and software; elimination of paper yields projected savings of $21K/year. One year after conversion to an EMR, more than 90% of department staff favored the EMR over the previous paper charts. Successful implementation of a Radiation Oncology EMR required not only the effort and commitment of all functions of the department, but support from senior health system management, corporate IT, and vendors. Realization of the full benefits of an EMR will require experience, faster/better integrated software, and continual improvement in underlying clinical processes.

  14. Fingerprint verification on medical image reporting system.

    PubMed

    Chen, Yen-Cheng; Chen, Liang-Kuang; Tsai, Ming-Dar; Chiu, Hou-Chang; Chiu, Jainn-Shiun; Chong, Chee-Fah

    2008-03-01

    The healthcare industry is recently going through extensive changes, through adoption of robust, interoperable healthcare information technology by means of electronic medical records (EMR). However, a major concern of EMR is adequate confidentiality of the individual records being managed electronically. Multiple access points over an open network like the Internet increases possible patient data interception. The obligation is on healthcare providers to procure information security solutions that do not hamper patient care while still providing the confidentiality of patient information. Medical images are also part of the EMR which need to be protected from unauthorized users. This study integrates the techniques of fingerprint verification, DICOM object, digital signature and digital envelope in order to ensure that access to the hospital Picture Archiving and Communication System (PACS) or radiology information system (RIS) is only by certified parties.

  15. Ethics in sports medicine.

    PubMed

    Dunn, Warren R; George, Michael S; Churchill, Larry; Spindler, Kurt P

    2007-05-01

    Physicians have struggled with the medical ramifications of athletic competition since ancient Greece, where rational medicine and organized athletics originated. Historically, the relationship between sport and medicine was adversarial because of conflicts between health and sport. However, modern sports medicine has emerged with the goal of improving performance and preventing injury, and the concept of the "team physician" has become an integral part of athletic culture. With this distinction come unique ethical challenges because the customary ethical norms for most forms of clinical practice, such as confidentiality and patient autonomy, cannot be translated easily into sports medicine. The particular areas of medical ethics that present unique challenges in sports medicine are informed consent, third parties, advertising, confidentiality, drug use, and innovative technology. Unfortunately, there is no widely accepted code of sports medicine ethics that adequately addresses these issues.

  16. School Counselors and Confidentiality: Factors Affecting Professional Choices.

    ERIC Educational Resources Information Center

    Isaacs, Madelyn L; Stone, Carolyn

    1999-01-01

    Counselors who work with children regularly face the ethical dilemma of confidentiality for which there are few definitive answers. Confidentiality and Minors Questionnaire about managing student's confidential information was distributed to district guidance supervisors. It appears that counselors' judgment of what breaches confidentiality is…

  17. 29 CFR 90.33 - Confidential business information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 1 2014-07-01 2013-07-01 true Confidential business information. 90.33 Section 90.33 Labor... General Provisions § 90.33 Confidential business information. (a) Definition. Confidential business... of information submitted in confidence. Business information which is to be treated as confidential...

  18. 12 CFR 1070.44 - Disclosure of confidential consumer complaint information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Disclosure of confidential consumer complaint... RECORDS AND INFORMATION Confidential Information § 1070.44 Disclosure of confidential consumer complaint... disclose confidential consumer complaint information as it deems necessary to investigate, resolve, or...

  19. 12 CFR 1070.44 - Disclosure of confidential consumer complaint information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 9 2014-01-01 2014-01-01 false Disclosure of confidential consumer complaint... RECORDS AND INFORMATION Confidential Information § 1070.44 Disclosure of confidential consumer complaint... disclose confidential consumer complaint information as it deems necessary to investigate, resolve, or...

  20. 12 CFR 1070.44 - Disclosure of confidential consumer complaint information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Disclosure of confidential consumer complaint... RECORDS AND INFORMATION Confidential Information § 1070.44 Disclosure of confidential consumer complaint... disclose confidential consumer complaint information as it deems necessary to investigate, resolve, or...

  1. 15 CFR 718.3 - Disclosure of confidential business information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false Disclosure of confidential business... CONFIDENTIAL BUSINESS INFORMATION § 718.3 Disclosure of confidential business information. (a) General... Information Act, as appropriate. (b) Disclosure of confidential business information contained in advance...

  2. 15 CFR 718.3 - Disclosure of confidential business information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false Disclosure of confidential business... CONFIDENTIAL BUSINESS INFORMATION § 718.3 Disclosure of confidential business information. (a) General... Information Act, as appropriate. (b) Disclosure of confidential business information contained in advance...

  3. 15 CFR 718.3 - Disclosure of confidential business information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Disclosure of confidential business... CONFIDENTIAL BUSINESS INFORMATION § 718.3 Disclosure of confidential business information. (a) General... Information Act, as appropriate. (b) Disclosure of confidential business information contained in advance...

  4. Social Media Tips to Enhance Medical Education.

    PubMed

    Shah, Vikas; Kotsenas, Amy L

    2017-06-01

    In this article, we describe how social media can supplement traditional education, articulate the advantages and disadvantages of various social media platforms for both teachers and learners, discuss best practices to maintain confidentiality of protected health information, and provide tips for implementing social media-based teaching into the training curriculum. Copyright © 2017 The Association of University Radiologists. All rights reserved.

  5. 17 CFR 400.2 - Office responsible for regulations; filing of requests for exemptions, for interpretations and of...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., exemption, or classification. A separate request for confidential treatment and the basis for such request... implementation of the regulations, including interpretations and action on requests for exemption, classification... classifications. Section 15C(a)(4) of the Act (15 U.S.C. 78o-5(a)(4)) authorizes the Secretary to exempt any...

  6. 17 CFR 400.2 - Office responsible for regulations; filing of requests for exemptions, for interpretations and of...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., exemption, or classification. A separate request for confidential treatment and the basis for such request... implementation of the regulations, including interpretations and action on requests for exemption, classification... classifications. Section 15C(a)(4) of the Act (15 U.S.C. 78o-5(a)(4)) authorizes the Secretary to exempt any...

  7. 17 CFR 400.2 - Office responsible for regulations; filing of requests for exemptions, for interpretations and of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., exemption, or classification. A separate request for confidential treatment and the basis for such request... implementation of the regulations, including interpretations and action on requests for exemption, classification... classifications. Section 15C(a)(4) of the Act (15 U.S.C. 78o-5(a)(4)) authorizes the Secretary to exempt any...

  8. 17 CFR 400.2 - Office responsible for regulations; filing of requests for exemptions, for interpretations and of...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., exemption, or classification. A separate request for confidential treatment and the basis for such request... implementation of the regulations, including interpretations and action on requests for exemption, classification... classifications. Section 15C(a)(4) of the Act (15 U.S.C. 78o-5(a)(4)) authorizes the Secretary to exempt any...

  9. 17 CFR 400.2 - Office responsible for regulations; filing of requests for exemptions, for interpretations and of...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., exemption, or classification. A separate request for confidential treatment and the basis for such request... implementation of the regulations, including interpretations and action on requests for exemption, classification... classifications. Section 15C(a)(4) of the Act (15 U.S.C. 78o-5(a)(4)) authorizes the Secretary to exempt any...

  10. A qualitative study of women's views on medical confidentiality

    PubMed Central

    Jenkins, G; Merz, J; Sankar, P

    2005-01-01

    Context: The need to reinvigorate medical confidentiality protections is recognised as an important objective in building patient trust necessary for successful health outcomes. Little is known about patient understanding and expectations from medical confidentiality. Objective: To identify and describe patient views of medical confidentiality and to assess provisionally the range of these views. Design: Qualitative study using indepth, open ended face-to-face interviews. Setting: Southeastern Pennsylvania and southern New Jersey, USA. Participants: A total of 85 women interviewed at two clinical sites and three community/research centres. Main outcome measures: Subjects' understanding of medical confidentiality, beliefs about the handling of confidential information and concerns influencing disclosure of information to doctors. Results: The subjects defined medical confidentiality as the expectation that something done or said would be kept "private" but differed on what information was confidential and the basis and methods for protecting information. Some considered all medical information as confidential and thought confidentiality protections functioned to limit its circulation to medical uses and reimbursement needs. Others defined only sensitive or potentially stigmatising information as confidential. Many of these also defined medical confidentiality as a strict limit prohibiting information release, although some noted that specific permission or urgent need could override this limit. Conclusions: Patients share a basic understanding of confidentiality as protection of information, but some might have expectations that are likely not met by current practice nor anticipated by doctors. Doctors should recognise that patients might have their own medical confidentiality models. They should address divergences from current practice and provide support to those who face emotional or practical obstacles to self-revelation. PMID:16131550

  11. Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle.

    PubMed

    Tipton, Stephen J; Forkey, Sara; Choi, Young B

    2016-04-01

    This paper examines various methods encompassing the authentication of users in accessing Electronic Medical Records (EMRs). From a methodological perspective, multiple authentication methods have been researched from both a desktop and mobile accessibility perspective. Each method is investigated at a high level, along with comparative analyses, as well as real world examples. The projected outcome of this examination is a better understanding of the sophistication required in protecting the vital privacy constraints of an individual's Protected Health Information (PHI). In understanding the implications of protecting healthcare data in today's technological world, the scope of this paper is to grasp an overview of confidentiality as it pertains to information security. In addressing this topic, a high level overview of the three goals of information security are examined; in particular, the goal of confidentiality is the primary focus. Expanding upon the goal of confidentiality, healthcare accessibility legal aspects are considered, with a focus upon the Health Insurance Portability and Accountability Act of 1996 (HIPAA). With the primary focus of this examination being access to EMRs, the paper will consider two types of accessibility of concern: access from a physician, or group of physicians; and access from an individual patient.

  12. 46 CFR 221.79 - Request for confidential treatment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Request for confidential treatment. 221.79 Section 221... INTERESTS Civil Penalties § 221.79 Request for confidential treatment. (a) In addition to information treated as confidential under § 221.77 of this subpart, a request for confidential treatment of a document...

  13. 40 CFR 85.1712 - Treatment of confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Treatment of confidential information... and Motor Vehicle Engines § 85.1712 Treatment of confidential information. (a) Any person or... confidential treatment as provided by 40 CFR part 2, subpart B. (b) Any claim of confidentiality must accompany...

  14. 40 CFR 86.1116-87 - Treatment of confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 19 2010-07-01 2010-07-01 false Treatment of confidential information... Vehicles, Including Light-Duty Trucks § 86.1116-87 Treatment of confidential information. (a) Any... confidential treatment as provided by 40 CFR part 2, subpart B. (b) Any claim of confidentiality must accompany...

  15. Processes and outcomes of developing a continuity of care document for use as a personal health record by people living with HIV/AIDS in New York City.

    PubMed

    Gordon, Peter; Camhi, Eli; Hesse, Ron; Odlum, Michelle; Schnall, Rebecca; Rodriguez, Martha; Valdez, Esmerlin; Bakken, Suzanne

    2012-10-01

    To describe the processes and outcomes of developing and implementing a Continuity of Care Document (CCD), My Health Profile, as a personal health record for persons living with HIV (PLWH) in an HIV/AIDS Special Needs Plan in New York City. Multiple qualitative and quantitative data sources were used to describe the processes and outcomes of implementing My Health Profile including focus groups, Audio Computer Assisted Self Interview (ACASI) surveys, administrative databases, chart abstraction, usage logs, and project management records. Qualitative data were thematically analyzed. Quantitative data analytic methods included descriptive and multivariate statistics. Data were triangulated and synthesized using the Reach, Efficacy/Effectiveness, Adoption, Implementation, Maintenance (RE-AIM) Framework. Reach - SNP members are predominantly African American or Hispanic/Latino and about one-third are female. A larger proportion of African Americans and smaller proportions of Hispanics/Latinos and Whites were trained to use My Health Profile.Efficacy/Effectiveness - CCDs were produced for 8249 unique members and updated on a monthly basis, 509 members were trained to use My Health Profile. Total number of member logins for 112 active users was 1808 and the longest duration of use was 1008 days. There were no significant differences between users and non-users of My Health Profile in clinical outcomes, perceptions of the quality of medical care, or health service utilization. Adoption -My Health Profile was well-matched to organizational mission, values, and priorities related to coordination of care for a high-risk population of PLWH. Implementation - Pre-implementation focus group participants identified potential barriers to use of My Health Profile including functional and computer literacy, privacy and confidentiality concerns, potential reluctance to use technology, and cognitive challenges. Key strategies for addressing barriers included a dedicated bilingual coach for recruitment, training, and support; basic computer and My Health Profile training; transparent audit trail revealing clinician and case manager access of My Health Profile, time-limited passwords for sharing My Health Profile with others at the point of need, and emergency access mechanism. Maintenance -My Health Profile was integrated into routine operational activities and its sustainability is facilitated by its foundation on standards for Health Information Exchange (HIE). Although potential barriers exist to the use of personal health records (PHRs) such as My Health Profile, PLWH with complex medical needs, low socioeconomic status, and limited computer experience will use such tools when a sufficient level of user support is provided and privacy and confidentiality concerns are addressed. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  16. Draft secure medical database standard.

    PubMed

    Pangalos, George

    2002-01-01

    Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.

  17. Superintendent Searches: Public or Confidential? Why Confidentiality Contributes to Quality Searches

    ERIC Educational Resources Information Center

    Attea, William J.

    2010-01-01

    When a highly qualified candidate learns the search will be conducted confidentially, a positive response is almost certain, in the author's experience running superintendent searches since 1988. Just as likely, the prospective candidate responds negatively to being told the search process will not be confidential. Confidentiality is the item of…

  18. The israeli virtual national health record: a robust national health information infrastructure based on a firm foundation of trust.

    PubMed

    Saiag, Esther

    2005-01-01

    In many developed countries, a coordinated effort is underway to build national and regional Health Information Infrastructures (HII) for the linking of disparate sites of care, so that an access to a comprehensive Health Record will be feasible when critical medical decisions are made [1]. However, widespread adoption of such national projects is hindered by a series of barriers- regulatory, technical, financial and cultural. Above all, a robust national HII requires a firm foundation of trust: patients must be assured that their confidential health information will not be misused and that there are adequate legal remedies in the event of inappropriate behavior on the part of either authorized or unauthorized parties[2].The Israeli evolving National HII is an innovative state of the art implementation of a wide-range clinical inter-organizational data exchange, based on a unique concept of virtually temporary sharing of information. A logically connection of multiple caregivers and medical organizations creates a patient-centric virtual repository, without centralization. All information remains in its original format, location, system and ownership. On demand, relevant information is instantly integrated and delivered to the point of care. This system, successfully covering more than half of Israel's population, is currently evolving from a voluntary private-public partnership (dbMOTION and CLALIT HMO) to a formal national reality. The governmental leadership, now taking over the process, is essential to achieve a full potential of the health information technology. All partners of the Israeli health system are coordinated in concert with each other, driven with a shared vision - realizing that a secured, private, confidential health information exchange is assured.

  19. Legal interfaces in telemedicine technology.

    PubMed

    Lott, C M

    1996-05-01

    Telemedicine, an emerging technology which seeks to use advanced telecommunications equipment to enhance medical care, is progressing rapidly in the Department of Defense health care delivery system. This paper recommends that a cautious, preventive law approach be simultaneously initiated to ensure that the technology does not abridge patients' rights to confidentiality or security of medical records, and that agreement on practice parameters be developed. Seven interfaces, in the areas of informed consent, physician liability, non-physician liability, costs, practice parameters, physician-patient relationships, and ergonomics, are discussed in the context of telemedicine. The author recommends that telemedicine pioneers include the legal community's early input in the application of telemedicine technology to help avoid needless litigation.

  20. Anticipated Ethics and Regulatory Challenges in PCORnet: The National Patient-Centered Clinical Research Network.

    PubMed

    Ali, Joseph; Califf, Robert; Sugarman, Jeremy

    2016-01-01

    PCORnet, the National Patient-Centered Clinical Research Network, seeks to establish a robust national health data network for patient-centered comparative effectiveness research. This article reports the results of a PCORnet survey designed to identify the ethics and regulatory challenges anticipated in network implementation. A 12-item online survey was developed by leadership of the PCORnet Ethics and Regulatory Task Force; responses were collected from the 29 PCORnet networks. The most pressing ethics issues identified related to informed consent, patient engagement, privacy and confidentiality, and data sharing. High priority regulatory issues included IRB coordination, privacy and confidentiality, informed consent, and data sharing. Over 150 IRBs and five different approaches to managing multisite IRB review were identified within PCORnet. Further empirical and scholarly work, as well as practical and policy guidance, is essential if important initiatives that rely on comparative effectiveness research are to move forward.

  1. Should dentistry be part of the National Health Information Infrastructure?

    PubMed

    Schleyer, Titus K L

    2004-12-01

    The National Health Information Infrastructure, or NHII, proposes to improve the effectiveness, efficiency and overall quality of health in the United States by establishing a national, electronic information network for health care. To date, dentistry's integration into this network has not been discussed widely. The author reviews the NHII and its goals and structure through published reports and background literature. The author evaluates the advantages and disadvantages of the NHII regarding their implications for the dental care system. The NHII proposes to implement computer-based patient records, or CPRs, for most Americans by 2014, connect personal health information with other clinical and public health information, and enable different types of care providers to access CPRs. Advantages of the NHII include transparency of health information across health care providers, potentially increased involvement of patients in their care, better clinical decision making through connecting patient-specific information with the best clinical evidence, increased efficiency, enhanced bioterrorism defense and potential cost savings. Challenges in the implementation of the NHII in dentistry include limited use of CPRs, required investments in information technology, limited availability and adoption of standards, and perceived threats to privacy and confidentiality. The implementation of the NHII is making rapid strides. Dentistry should become an active participant in the NHII and work to ensure that the needs of dental patients and the profession are met. Practice Implications. The NHII has far-reaching implications on dental practice by making it easier to access relevant patient information and by helping to improve clinical decision making.

  2. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania: findings of the surveys conducted in 2005 and 2012.

    PubMed

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-04-01

    An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations for confidentiality using a five-point Likert scale for eight types of SRH consultations. Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations for confidentiality in both contexts. Public expectations regarding confidentiality were less demanding in 2012 than in 2005. The expectation of confidentiality protection was greater for topics related to sexual behaviour than for the consequences of sexual behaviour, such as pregnancy, abortion or a sexually transmitted infection. This implies a need for targeted information strategies for the general population and explicit guidance for physicians on when and for whom care should remain confidential.

  3. It's been a privilege: advising patients of the Tarasoff duty and its legal consequences for the federal psychotherapist-patient privilege.

    PubMed

    Klinka, Elisha

    2009-11-01

    State laws modeled on Tarasoff v. Regents of the University of California require psychotherapists to warn potential victims or law enforcement when treating dangerous patients who make serious threats of harm to another person. In practice, many psychotherapists advise their patients who make such threats about their duty under these Tarasoff-model laws. Although they are not required to make these advisories by law, psychotherapists generally assume that they also have a concomitant ethical duty to advise their patients that such threats will not be kept confidential, as their communications normally would be. This Note looks at how these advisories affect the status of privilege for subsequent threatening statements relayed to a psychotherapist. It explores the opposing views in the federal circuit courts regarding whether such an advisory precludes the existence of privilege for subsequent statements, or whether the advisory operates as a waiver to the privilege. This Note argues that threats communicated to a psychotherapist after an advisory about a psychotherapist's Tarasoff duty cannot be considered privileged if the patient intended for the threat to be passed on to a third party. Psychotherapists must now be aware of the possible legal consequences regarding the patients' diminished expectation of confidentiality and lack of privilege following such advisories. In order to act in their patients' best interest, psychotherapists should educate themselves about the scope of a Tarasoff duty in their applicable states and should consider alternative intervention techniques that could reduce dangerous patients' risk of harm. Psychotherapists should continue to follow professional ethical guidelines about advising patients of the limits of confidentiality, but implement techniques that evidence the patients' true intent about confidentiality, in order to bolster the patients' possible privilege claims later on and minimize harm to the treatment relationship.

  4. 16 CFR 1102.24 - Designation of confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... ACT REGULATIONS PUBLICLY AVAILABLE CONSUMER PRODUCT SAFETY INFORMATION DATABASE Procedural... allegedly confidential information is not placed in the database, a request for designation of confidential... publication in the Database until it makes a determination regarding confidential treatment. (e) Assistance...

  5. 16 CFR 1102.24 - Designation of confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... ACT REGULATIONS PUBLICLY AVAILABLE CONSUMER PRODUCT SAFETY INFORMATION DATABASE Procedural... allegedly confidential information is not placed in the database, a request for designation of confidential... publication in the Database until it makes a determination regarding confidential treatment. (e) Assistance...

  6. HIV testing in community pharmacies and retail clinics: a model to expand access to screening for HIV infection.

    PubMed

    Weidle, Paul J; Lecher, Shirley; Botts, Linda W; Jones, LaDawna; Spach, David H; Alvarez, Jorge; Jones, Rhondette; Thomas, Vasavi

    2014-01-01

    To test the feasibility of offering rapid point-of-care human immunodeficiency virus (HIV) testing at community pharmacies and retail clinics. Pilot program to determine how to implement confidential HIV testing services in community pharmacies and retail clinics. 21 community pharmacies and retail clinics serving urban and rural patients in the United States, from August 2011 to July 2013. 106 community pharmacy and retail clinic staff members. A model was developed to implement confidential HIV counseling and testing services using community pharmacy and retail clinic staff as certified testing providers, or through collaborations with organizations that provide HIV testing. Training materials were developed and sites selected that serve patients from urban and rural areas to pilot test the model. Each site established a relationship with its local health department for HIV testing policies, developed referral lists for confirmatory HIV testing/care, secured a CLIA Certificate of Waiver, and advertised the service. Staff were trained to perform a rapid point-of-care HIV test on oral fluid, and provide patients with confidential test results and information on HIV. Patients with a preliminary positive result were referred to a physician or health department for confirmatory testing and, if needed, HIV clinical care. Number of HIV tests completed and amount of time required to conduct testing. The 21 participating sites administered 1,540 HIV tests, with 1,087 conducted onsite by staff during regular working hours and 453 conducted at 37 different HIV testing events (e.g., local health fairs). The median amount of time required for pretest counseling/consent, waiting for test results, and posttest counseling was 4, 23, and 3 minutes, respectively. A majority of the sites (17) said they planned to continue HIV testing after the project period ended and would seek assistance or support from the local health department, a community-based organization, or an AIDS service organization. This pilot project established HIV testing in several community pharmacies and retail clinics to be a feasible model for offering rapid, point-of-care HIV testing. It also demonstrated the willingness and ability of staff at community pharmacies and retail clinics to provide confidential HIV testing to patients. Expanding this model to additional sites and evaluating its feasibility and effectiveness may serve unmet needs in urban and rural settings.

  7. Systematized contact between inventors and industry. Final technical report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1992-07-31

    A total of 139 inventions by private (individual) inventors were submitted to Technology Targeting Incorporated. Each inventor was told of the nature of the DOE-supported Project, through informational and promotional efforts by TTI, and each completed an Invention Submittal Form developed by TTI to describe the essential nature of the claimed invention. Many also submitted detailed descriptions, drawings, technical reports and similar supplemental materials giving a more comprehensive view of their inventions. Each invention was reviewed for technical and commercial merit, as well as for appropriateness of marketing through the Technology Targeting DataBase{trademark} (hereafter ``DATABASE). Overall, participating inventors were enthusiasticmore » about the Project and felt participation in it was rewording. Even when not selected for marketing, inventors were given an analysis of their inventions which could help them enhance the inventions and improve marketing efforts. Inventors whose inventions were selected for marketing were shown how to professionally market the inventions, including the format for Non Confidential Invention Summaries, the preferred form for Confidential Disclosure Agreements, targeting of business decision-makers responsible for technology evaluation, and the like; some of these inventors are still interacting with industrial contacts provided by TTI through this Project. All inventors received copies of patent abstracts uncovered in the prior art searches for their inventions and a copy of TTI`s booklet, Patent Law Basics for Individual Inventors.« less

  8. Systematized contact between inventors and industry. [Final Technical Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1992-07-31

    A total of 139 inventions by private (individual) inventors were submitted to Technology Targeting Incorporated. Each inventor was told of the nature of the DOE-supported Project, through informational and promotional efforts by TTI, and each completed an Invention Submittal Form developed by TTI to describe the essential nature of the claimed invention. Many also submitted detailed descriptions, drawings, technical reports and similar supplemental materials giving a more comprehensive view of their inventions. Each invention was reviewed for technical and commercial merit, as well as for appropriateness of marketing through the Technology Targeting DataBase[trademark] (hereafter DATABASE). Overall, participating inventors were enthusiasticmore » about the Project and felt participation in it was rewording. Even when not selected for marketing, inventors were given an analysis of their inventions which could help them enhance the inventions and improve marketing efforts. Inventors whose inventions were selected for marketing were shown how to professionally market the inventions, including the format for Non Confidential Invention Summaries, the preferred form for Confidential Disclosure Agreements, targeting of business decision-makers responsible for technology evaluation, and the like; some of these inventors are still interacting with industrial contacts provided by TTI through this Project. All inventors received copies of patent abstracts uncovered in the prior art searches for their inventions and a copy of TTI's booklet, Patent Law Basics for Individual Inventors.« less

  9. An introduction to intellectual property licensing for technology companies

    NASA Astrophysics Data System (ADS)

    Meier, Lawrence H.

    2001-05-01

    Intellectual property licensing is an important issue facing all technology companies. Before entering into license agreements a number of issues need to be addressed, including invention ownership, obtaining and identifying licensable subject matter, and developing a licensing strategy. There are a number of important provisions that are included in most intellectual property license agreements. These provisions include definitions, the license grant, consideration, audit rights confidentiality, warranties, indemnification, and limitation of liability. Special licensing considerations exist relative to each type of intellectual property, and when the other party is a foreign company or a university.

  10. JPRS Report Science and Technology: Europe.

    DTIC Science & Technology

    1991-08-19

    Fireproof Glass Foam Developed [Paris SCIENCES & AVENIR, Apr 91] 1 German University Develops Anticorrosion Coating [Bonn WISSENSCHAFT WIRTSCHAFT...Alain Chevy from the Solid-State Physics Laboratory at the University of Paris-VI. To demonstrate the efficiency of their method , the two researchers...are still highly confidential for the time being. German University Develops Anticorrosion Coating 91MI0339Bonn WISSENSCHAFT WIRTSCHAFT POLITIK in

  11. 37 CFR 382.5 - Confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2014-07-01 2014-07-01 false Confidential information. 382... SATELLITE DIGITAL AUDIO RADIO SERVICES Preexisting Subscription Services § 382.5 Confidential information. (a) For purposes of this subpart, confidential information shall include statements of account and...

  12. 16 CFR § 1102.24 - Designation of confidential information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... SAFETY ACT REGULATIONS PUBLICLY AVAILABLE CONSUMER PRODUCT SAFETY INFORMATION DATABASE Procedural... allegedly confidential information is not placed in the database, a request for designation of confidential... publication in the Database until it makes a determination regarding confidential treatment. (e) Assistance...

  13. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  14. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  15. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  16. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  17. Online medical care: the current state of "eVisits" in acute primary care delivery.

    PubMed

    Hickson, Ryan; Talbert, Jeffery; Thornbury, William C; Perin, Nathan R; Goodin, Amie J

    2015-02-01

    Online technologies offer the promise of an efficient, improved healthcare system. Patients benefit from increased access to care, physicians are afforded greater flexibility in care delivery, and the health system itself benefits from lower costs to provide such care. One method of incorporating online care into clinical practice, called electronic office visits or "eVisits," allows physicians to provide a consultation with patients online. We performed an analysis of the current published literature on eVisits as well as present emerging research describing the use of mobile platforms as the delivery model. We focused on the role of eVisits in acute primary care practice. A literature review was conducted using electronic databases with a variety of search terms related to the use of eVisits in primary care. Several advantages to eVisit utilization in the primary care setting were identified, namely, improvements in efficiency, continuity of care, quality of care, and access to care. Barriers to eVisit implementation were also identified, including challenges with incorporation into workflow, reimbursement, physician technological literacy, patient health literacy, overuse, security, confidentiality, and integration with existing medical technologies. Only one study of patient satisfaction with eVisit acute primary care services was identified, and this suggests that previous analyses of eVisit utilization are lacking this key component of healthcare service delivery evaluations. The delivery of primary care via eVisits on mobile platforms is still in adolescence, with few methodologically rigorous analyses of outcomes of efficiency, patient health, and satisfaction.

  18. 37 CFR 380.5 - Confidential Information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2014-07-01 2014-07-01 false Confidential Information. 380... Noncommercial Webcasters § 380.5 Confidential Information. (a) Definition. For purposes of this subpart, “Confidential Information” shall include the statements of account and any information contained therein...

  19. 37 CFR 262.5 - Confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2014-07-01 2014-07-01 false Confidential information. 262... Confidential information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein, including the amount of royalty payments...

  20. 37 CFR 384.5 - Confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2014-07-01 2014-07-01 false Confidential information. 384... BUSINESS ESTABLISHMENT SERVICES § 384.5 Confidential information. (a) Definition. For purposes of this section, “Confidential Information” shall include the statements of account and any information contained...

  1. 37 CFR 380.14 - Confidential Information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2014-07-01 2014-07-01 false Confidential Information. 380... Confidential Information. (a) Definition. For purposes of this subpart, “Confidential Information” shall include the statements of account and any information contained therein, including the amount of royalty...

  2. 37 CFR 261.5 - Confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2014-07-01 2014-07-01 false Confidential information. 261... TRANSMISSIONS AND THE MAKING OF EPHEMERAL REPRODUCTIONS § 261.5 Confidential information. (a) For purposes of this part, “Confidential Information” shall include the statements of account, any information...

  3. 37 CFR 380.24 - Confidential Information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2014-07-01 2014-07-01 false Confidential Information. 380... Webcasters § 380.24 Confidential Information. (a) Definition. For purposes of this subpart, “Confidential Information” shall include the statements of account and any information contained therein, including the...

  4. 37 CFR 382.14 - Confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2014-07-01 2014-07-01 false Confidential information. 382... Confidential information. (a) Definition. For purposes of this subpart, “Confidential Information” shall include the statements of account and any information contained therein, including the amount of royalty...

  5. 37 CFR 382.14 - Confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 382... Confidential information. (a) Definition. For purposes of this subpart, “Confidential Information” shall include the statements of account and any information contained therein, including the amount of royalty...

  6. 37 CFR 384.5 - Confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 384... BUSINESS ESTABLISHMENT SERVICES § 384.5 Confidential information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein, including...

  7. 40 CFR 2.215 - Confidentiality agreements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Confidentiality agreements. 2.215... Confidentiality of Business Information § 2.215 Confidentiality agreements. (a) No EPA officer, employee, contractor, or subcontractor shall enter into any agreement with any affected business to keep business...

  8. 40 CFR 2.215 - Confidentiality agreements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Confidentiality agreements. 2.215... Confidentiality of Business Information § 2.215 Confidentiality agreements. (a) No EPA officer, employee, contractor, or subcontractor shall enter into any agreement with any affected business to keep business...

  9. 16 CFR 1102.24 - Designation of confidential information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... ACT REGULATIONS PUBLICLY AVAILABLE CONSUMER PRODUCT SAFETY INFORMATION DATABASE (Eff. Jan. 10, 2011... allegedly confidential information is not placed in the database, a request for designation of confidential... publication in the Database until it makes a determination regarding confidential treatment. (e) Assistance...

  10. 19 CFR 210.5 - Confidential business information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 3 2011-04-01 2011-04-01 false Confidential business information. 210.5 Section... business information. (a) Definition and submission. Confidential business information shall be defined and... law judge, or another section of this part states otherwise, confidential business information shall...

  11. 19 CFR 210.5 - Confidential business information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 3 2013-04-01 2013-04-01 false Confidential business information. 210.5 Section... business information. (a) Definition and submission. Confidential business information shall be defined and... law judge, or another section of this part states otherwise, confidential business information shall...

  12. 42 CFR 2.63 - Confidential communications.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidential communications. 2.63 Section 2.63 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS... Confidential communications. (a) A court order under these regulations may authorize disclosure of confidential...

  13. 15 CFR 705.6 - Confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false Confidential information. 705.6... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... confidential information (trade secrets, commercial or financial information, or any other information...

  14. 21 CFR 807.95 - Confidentiality of information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... and Drug Administration hold as confidential commercial information the intent to market the device... market the device to be confidential commercial information; (ii) That neither the person nor, to the... device is confidential commercial information. (c) Where the Commissioner determines that the person has...

  15. 21 CFR 807.95 - Confidentiality of information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... and Drug Administration hold as confidential commercial information the intent to market the device... market the device to be confidential commercial information; (ii) That neither the person nor, to the... device is confidential commercial information. (c) Where the Commissioner determines that the person has...

  16. 21 CFR 807.95 - Confidentiality of information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... and Drug Administration hold as confidential commercial information the intent to market the device... market the device to be confidential commercial information; (ii) That neither the person nor, to the... device is confidential commercial information. (c) Where the Commissioner determines that the person has...

  17. 15 CFR 705.6 - Confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false Confidential information. 705.6... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... confidential information (trade secrets, commercial or financial information, or any other information...

  18. 15 CFR 705.6 - Confidential information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Confidential information. 705.6... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... confidential information (trade secrets, commercial or financial information, or any other information...

  19. 15 CFR 705.6 - Confidential information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Confidential information. 705.6... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... confidential information (trade secrets, commercial or financial information, or any other information...

  20. 21 CFR 807.95 - Confidentiality of information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... and Drug Administration hold as confidential commercial information the intent to market the device... market the device to be confidential commercial information; (ii) That neither the person nor, to the... device is confidential commercial information. (c) Where the Commissioner determines that the person has...

  1. The Technology Acceptance Model for Resource-Limited Settings (TAM-RLS): A Novel Framework for Mobile Health Interventions Targeted to Low-Literacy End-Users in Resource-Limited Settings.

    PubMed

    Campbell, Jeffrey I; Aturinda, Isaac; Mwesigwa, Evans; Burns, Bridget; Santorino, Data; Haberer, Jessica E; Bangsberg, David R; Holden, Richard J; Ware, Norma C; Siedner, Mark J

    2017-11-01

    Although mobile health (mHealth) technologies have shown promise in improving clinical care in resource-limited settings (RLS), they are infrequently brought to scale. One limitation to the success of many mHealth interventions is inattention to end-user acceptability, which is an important predictor of technology adoption. We conducted in-depth interviews with 43 people living with HIV in rural Uganda who had participated in a clinical trial of a short messaging system (SMS)-based intervention designed to prompt return to clinic after an abnormal laboratory test. Interviews focused on established features of technology acceptance models, including perceived ease of use and perceived usefulness, and included open-ended questions to gain insight into unexplored issues related to the intervention's acceptability. We used conventional (inductive) and direct content analysis to derive categories describing use behaviors and acceptability. Interviews guided development of a proposed conceptual framework, the technology acceptance model for resource-limited settings (TAM-RLS). This framework incorporates both classic technology acceptance model categories as well as novel factors affecting use in this setting. Participants described how SMS message language, phone characteristics, and experience with similar technologies contributed to the system's ease of use. Perceived usefulness was shaped by the perception that the system led to augmented HIV care services and improved access to social support from family and colleagues. Emergent themes specifically related to mHealth acceptance among PLWH in Uganda included (1) the importance of confidentiality, disclosure, and stigma, and (2) the barriers and facilitators downstream from the intervention that impacted achievement of the system's target outcome. The TAM-RLS is a proposed model of mHealth technology acceptance based upon end-user experiences in rural Uganda. Although the proposed model requires validation, the TAM-RLS may serve as a useful tool to guide design and implementation of mHealth interventions.

  2. Data Confidentiality Challenges in Big Data Applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yin, Jian; Zhao, Dongfang

    In this paper, we address the problem of data confidentiality in big data analytics. In many fields, much useful patterns can be extracted by applying machine learning techniques to big data. However, data confidentiality must be protected. In many scenarios, data confidentiality could well be a prerequisite for data to be shared. We present a scheme to provide provable secure data confidentiality and discuss various techniques to optimize performance of such a system.

  3. Do You Have a Disability--Yes or No? Or Is There a Better Way of Asking? Guidance on Disability Disclosure and Respecting Confidentiality

    ERIC Educational Resources Information Center

    Rose, Christine

    2006-01-01

    Many providers are keen to implement the requirements of the Disability Discrimination Act (DDA), seeing this as an opportunity to further improve the experience of disabled learners. However, the DDA Part 4 raises many issues about the ways in which education providers encourage a learner to disclose an impairment in order to make adjustments,…

  4. 77 FR 74817 - Approval and Promulgation of Air Quality Implementation Plans; Wisconsin; Disapproval of PM2.5

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-18

    ... hours of business are Monday through Friday, 8:30 a.m. to 4:30 p.m., excluding Federal holidays... to be Confidential Business Information (CBI) or other information whose disclosure is restricted by...) and (4m); (6) amend NR 405.02(25k)(intro.); (7) create NR 405.02(27)(a)5m in Table A; (8) amend NR 405...

  5. Situating mobile health: a qualitative study of mHealth expectations in the rural health district of Nouna, Burkina Faso.

    PubMed

    Duclos, Vincent; Yé, Maurice; Moubassira, Kagoné; Sanou, Hamidou; Sawadogo, N Hélène; Bibeau, Gilles; Sié, Ali

    2017-07-12

    The implementation of mobile health (mHealth) projects in low- and middle-income countries raises high and well-documented expectations among development agencies, policymakers and researchers. By contrast, the expectations of direct and indirect mHealth users are not often examined. In preparation for a proposed intervention in the Nouna Health District, in rural Burkina Faso, this study investigates the expected benefits, challenges and limitations associated with mHealth, approaching these expectations as a form of situated knowledge, inseparable from local conditions, practices and experiences. The study was conducted within the Nouna Health District. We used a qualitative approach, and conducted individual semi-structured interviews and group interviews (n = 10). Participants included healthcare workers (n = 19), godmothers (n = 24), pregnant women (n = 19), women with children aged 12-24 months (n = 33), and women of childbearing age (n = 92). Thematic and content qualitative analyses were conducted. Participants expect mHealth to help retrieve patients lost to follow-up, improve maternal care monitoring, and build stronger relationships between pregnant women and primary health centres. Expected benefits are not reducible to a technological realisation (sending messages), but rather point towards a wider network of support. mHealth implementation is expected to present considerable challenges, including technological barriers, organisational challenges, gender issues, confidentiality concerns and unplanned aftereffects. mHealth is also expected to come with intrinsic limitations, to be found as obstacles to maternal care access with which pregnant women are confronted and on which mHealth is not expected to have any significant impact. mHealth expectations appear as situated knowledges, inseparable from local health-related experiences, practices and constraints. This problematises universalistic approaches to mHealth knowledge, while nevertheless hinting at concrete, expected benefits. Findings from this study will help guide the design and implementation of mHealth initiatives, thus optimising their chances for success.

  6. 37 CFR 261.5 - Confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 261... THE MAKING OF EPHEMERAL REPRODUCTIONS § 261.5 Confidential information. (a) For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein, including...

  7. 22 CFR 130.15 - Confidential business information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required...

  8. 15 CFR 718.3 - Disclosure of confidential business information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Disclosure of confidential business... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION § 718.3 Disclosure of confidential business information. (a) General...

  9. 22 CFR 130.15 - Confidential business information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is required... person considers to be confidential business information. No person, including any applicant or supplier...

  10. 5 CFR 294.112 - Confidential commercial information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Confidential commercial information. 294... § 294.112 Confidential commercial information. (a) In general, OPM will not disclose confidential commercial information in response to a Freedom of Information Act request except in accordance with this...

  11. 21 CFR 720.8 - Confidentiality of statements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...) COSMETICS VOLUNTARY FILING OF COSMETIC PRODUCT INGREDIENT COMPOSITION STATEMENTS § 720.8 Confidentiality of... request for confidentiality of a cosmetic ingredient submitted with such forms or separately will be... chapter. (b) Any request for confidentiality of the identity of a cosmetic ingredient should contain a...

  12. 21 CFR 720.8 - Confidentiality of statements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...) COSMETICS VOLUNTARY FILING OF COSMETIC PRODUCT INGREDIENT COMPOSITION STATEMENTS § 720.8 Confidentiality of... request for confidentiality of a cosmetic ingredient submitted with such forms or separately will be... chapter. (b) Any request for confidentiality of the identity of a cosmetic ingredient should contain a...

  13. 21 CFR 720.8 - Confidentiality of statements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...) COSMETICS VOLUNTARY FILING OF COSMETIC PRODUCT INGREDIENT COMPOSITION STATEMENTS § 720.8 Confidentiality of... request for confidentiality of a cosmetic ingredient submitted with such forms or separately will be... chapter. (b) Any request for confidentiality of the identity of a cosmetic ingredient should contain a...

  14. 21 CFR 720.8 - Confidentiality of statements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...) COSMETICS VOLUNTARY FILING OF COSMETIC PRODUCT INGREDIENT COMPOSITION STATEMENTS § 720.8 Confidentiality of... request for confidentiality of a cosmetic ingredient submitted with such forms or separately will be... chapter. (b) Any request for confidentiality of the identity of a cosmetic ingredient should contain a...

  15. 21 CFR 720.8 - Confidentiality of statements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...) COSMETICS VOLUNTARY FILING OF COSMETIC PRODUCT INGREDIENT COMPOSITION STATEMENTS § 720.8 Confidentiality of... request for confidentiality of a cosmetic ingredient submitted with such forms or separately will be... chapter. (b) Any request for confidentiality of the identity of a cosmetic ingredient should contain a...

  16. Patient Perspectives of Medical Confidentiality

    PubMed Central

    Sankar, Pamela; Mora, Susan; Merz, Jon F; Jones, Nora L

    2003-01-01

    OBJECTIVE To lay the groundwork for a better understanding of patient views on medical confidentiality. DESIGN Studies were found by searching medline, bioethicsline, and selected bibliographies. Articles concerning physician perspectives or implications of legal and administrative regulations were excluded. Only peer-reviewed journal articles reporting original research on patients' confidentiality views and conduct were included. MAIN RESULTS Many patients are unaware of or misunderstand their legal or ethical right to medical confidentiality protections, which leads them to both over- and underestimate confidentiality protections. The possibility that medical information might be revealed, intentionally or not, to acquaintances in a clinic or other social community troubles patients as much as information release to insurers or employers. A significant minority of patients distrust confidentiality protections, leading some to report that they delay or forgo medical care. If doubtful that confidentiality will be upheld, patients will act independently to protect information. CONCLUSIONS Our review found a wider variety of understandings and beliefs about medical confidentiality among patients than are often indicated in the writings of practitioners or legal experts. As medical confidentiality regulations evolve, these differences need to be recognized and accounted for in interactions between practitioners and patients. PMID:12911650

  17. 37 CFR 260.4 - Confidential information and statements of account.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Confidential information and statements of account. (a) For purposes of this part, confidential information shall include statements of account and any information pertaining to the statements of account... included on the statement of account. (d) Access to the confidential information pertaining to the royalty...

  18. 7 CFR 983.65 - Confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65..., ARIZONA, AND NEW MEXICO Reports, Books and Records § 983.65 Confidential information. All reports and records furnished or submitted by handlers to the committee which include confidential data or information...

  19. 40 CFR 704.7 - Confidential business information claims.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidential business information... Provisions for Section 8(a) Information-Gathering Rules § 704.7 Confidential business information claims. (a) Any person submitting a notice under this rule may assert a business confidentiality claim covering...

  20. 10 CFR 9.28 - Predisclosure notification procedures for information containing trade secrets or confidential...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... containing trade secrets or confidential commercial or financial information. 9.28 Section 9.28 Energy... notification procedures for information containing trade secrets or confidential commercial or financial... secrets or confidential commercial or financial information, or the NRC believes the information contains...

  1. 10 CFR 9.28 - Predisclosure notification procedures for information containing trade secrets or confidential...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... containing trade secrets or confidential commercial or financial information. 9.28 Section 9.28 Energy... notification procedures for information containing trade secrets or confidential commercial or financial... secrets or confidential commercial or financial information, or the NRC believes the information contains...

  2. 10 CFR 9.28 - Predisclosure notification procedures for information containing trade secrets or confidential...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... containing trade secrets or confidential commercial or financial information. 9.28 Section 9.28 Energy... notification procedures for information containing trade secrets or confidential commercial or financial... secrets or confidential commercial or financial information, or the NRC believes the information contains...

  3. 10 CFR 9.28 - Predisclosure notification procedures for information containing trade secrets or confidential...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... containing trade secrets or confidential commercial or financial information. 9.28 Section 9.28 Energy... notification procedures for information containing trade secrets or confidential commercial or financial... secrets or confidential commercial or financial information, or the NRC believes the information contains...

  4. 10 CFR 9.28 - Predisclosure notification procedures for information containing trade secrets or confidential...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... containing trade secrets or confidential commercial or financial information. 9.28 Section 9.28 Energy... notification procedures for information containing trade secrets or confidential commercial or financial... secrets or confidential commercial or financial information, or the NRC believes the information contains...

  5. 15 CFR 30.60 - Confidentiality of Electronic Export Information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false Confidentiality of Electronic Export... § 30.60 Confidentiality of Electronic Export Information. (a) Confidential status. The EEI collected... in any form including but not limited to electronic transmission, paper printout, or certified...

  6. 15 CFR 30.60 - Confidentiality of Electronic Export Information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Confidentiality of Electronic Export... § 30.60 Confidentiality of Electronic Export Information. (a) Confidential status. The EEI collected... in any form including but not limited to electronic transmission, paper printout, or certified...

  7. 15 CFR 30.60 - Confidentiality of Electronic Export Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Confidentiality of Electronic Export... § 30.60 Confidentiality of Electronic Export Information. (a) Confidential status. The EEI collected... in any form including but not limited to electronic transmission, paper printout, or certified...

  8. 40 CFR 704.7 - Confidential business information claims.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 31 2011-07-01 2011-07-01 false Confidential business information... Provisions for Section 8(a) Information-Gathering Rules § 704.7 Confidential business information claims. (a) Any person submitting a notice under this rule may assert a business confidentiality claim covering...

  9. 40 CFR 704.7 - Confidential business information claims.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 31 2014-07-01 2014-07-01 false Confidential business information... Provisions for Section 8(a) Information-Gathering Rules § 704.7 Confidential business information claims. (a) Any person submitting a notice under this rule may assert a business confidentiality claim covering...

  10. 12 CFR 978.5 - Storage of confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Storage of confidential information. 978.5... OPERATIONS AND AUTHORITIES BANK REQUESTS FOR INFORMATION § 978.5 Storage of confidential information. Each Bank shall: (a) Store all identified confidential information in secure storage areas or filing...

  11. 22 CFR 1304.7 - Confidential commercial information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Confidential commercial information. 1304.7... § 1304.7 Confidential commercial information. (a) Notice to submitters. The FOIA Officer shall, to the extent permitted by law, provide a submitter who provides confidential commercial information to the FOIA...

  12. 19 CFR 143.4 - Confidentiality of data.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Confidentiality of data. 143.4 Section 143.4... TREASURY (CONTINUED) SPECIAL ENTRY PROCEDURES Automated Broker Interface § 143.4 Confidentiality of data. The electronic data received and exchanged by a service bureau shall be considered confidential, and...

  13. Ultralong room temperature phosphorescence from amorphous organic materials toward confidential information encryption and decryption.

    PubMed

    Su, Yan; Phua, Soo Zeng Fiona; Li, Youbing; Zhou, Xianju; Jana, Deblin; Liu, Guofeng; Lim, Wei Qi; Ong, Wee Kong; Yang, Chaolong; Zhao, Yanli

    2018-05-01

    Ultralong room temperature phosphorescence (URTP) emitted from pure amorphous organic molecules is very rare. Although a few crystalline organic molecules could realize URTP with long lifetimes (>100 ms), practical applications of these crystalline organic phosphors are still challenging because the formation and maintenance of high-quality crystals are very difficult and complicated. Herein, we present a rational design for minimizing the vibrational dissipation of pure amorphous organic molecules to achieve URTP. By using this strategy, a series of URTP films with long lifetimes and high phosphorescent quantum yields (up to 0.75 s and 11.23%, respectively) were obtained from amorphous organic phosphors without visible fluorescence and phosphorescence under ambient conditions. On the basis of the unique features of URTP films, a new green screen printing technology without using any ink was developed toward confidential information encryption and decryption. This work presents a breakthrough strategy in applying amorphous organic materials for URTP.

  14. Driving Toward Guiding Principles

    PubMed Central

    Buckovich, Suzy A.; Rippen, Helga E.; Rozen, Michael J.

    1999-01-01

    As health care moves from paper to electronic data collection, providing easier access and dissemination of health information, the development of guiding privacy, confidentiality, and security principles is necessary to help balance the protection of patients' privacy interests against appropriate information access. A comparative review and analysis was done, based on a compilation of privacy, confidentiality, and security principles from many sources. Principles derived from ten identified sources were compared with each of the compiled principles to assess support level, uniformity, and inconsistencies. Of 28 compiled principles, 23 were supported by at least 50 percent of the sources. Technology could address at least 12 of the principles. Notable consistencies among the principles could provide a basis for consensus for further legislative and organizational work. It is imperative that all participants in our health care system work actively toward a viable resolution of this information privacy debate. PMID:10094065

  15. A linkable identity privacy algorithm for HealthGrid.

    PubMed

    Zhang, Ning; Rector, Alan; Buchan, Iain; Shi, Qi; Kalra, Dipak; Rogers, Jeremy; Goble, Carole; Walker, Steve; Ingram, David; Singleton, Peter

    2005-01-01

    The issues of confidentiality and privacy have become increasingly important as Grid technology is being adopted in public sectors such as healthcare. This paper discusses the importance of protecting the confidentiality and privacy of patient health/medical records, and the challenges exhibited in enforcing this protection in a Grid environment. It proposes a novel algorithm to allow traceable/linkable identity privacy in dealing with de-identified medical records. Using the algorithm, de-identified health records associated to the same patient but generated by different healthcare providers are given different pseudonyms. However, these pseudonymised records of the same patient can still be linked by a trusted entity such as the NHS trust or HealthGrid manager. The paper has also recommended a security architecture that integrates the proposed algorithm with other data security measures needed to achieve the desired security and privacy in the HealthGrid context.

  16. Adolescent views on comprehensive health risk assessment and counseling: assessing gender differences.

    PubMed

    Kadivar, Hajar; Thompson, Lindsay; Wegman, Martin; Chisholm, TaJuana; Khan, Maryum; Eddleton, Katie; Muszynski, Michael; Shenkman, Elizabeth

    2014-07-01

    Adolescence is an important time for the detection of health risk behaviors and factors with subsequent counseling and intervention. Limited research has examined adolescent perceptions of comprehensive health risk assessments (HRAs) and counseling with an assessment of gender differences. Participants were identified using Florida's Medicaid and State Children's Health Insurance Program databases. A total of 35 low-income, racially/ethnically diverse adolescents (ages 14-18 years) participated in eight focus groups stratified by gender. Adolescents completed an internet-based, tablet-administered, comprehensive HRA and then participated in a semi-structured interview. Discussions were recorded, transcribed, and analyzed using a multi-step, team-based approach applying grounded theory to determine major themes. Male adolescents desired less parental involvement, had less understanding of the protections of clinical confidentiality and the need for comprehensive HRA, and placed greater emphasis on the importance of professional appearance. In contrast, more females valued face-to-face interactions and stressed the importance of concern from the health risk assessor. Overall, adolescents placed importance on their relationship with the health risk assessor, and on valuing trust, confidentiality, and nonjudgmental care. Adolescents preferred to complete HRAs in clinical, private, and professional settings, and reported that tablet technology supported their confidentially in completing the HRA. Furthermore, they stressed the importance of autonomy and learning about the health risk outcomes for risk reduction. Gender differences exist in adolescent perceptions of comprehensive HRAs. Adolescent perceptions of HRAs support their use in confidential primary care settings using modalities that emphasize nonjudgmental, private care, and the use of communication techniques that respect adolescents' autonomy to change health risks. Copyright © 2014. Published by Elsevier Inc.

  17. 7 CFR 983.9 - Confidential data or information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 8 2011-01-01 2011-01-01 false Confidential data or information. 983.9 Section 983.9..., ARIZONA, AND NEW MEXICO Definitions § 983.9 Confidential data or information. Confidential data or information submitted to the committee consists of data or information constituting a trade secret or...

  18. 7 CFR 983.9 - Confidential data or information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 8 2013-01-01 2013-01-01 false Confidential data or information. 983.9 Section 983.9..., ARIZONA, AND NEW MEXICO Definitions § 983.9 Confidential data or information. Confidential data or information submitted to the committee consists of data or information constituting a trade secret or...

  19. 7 CFR 983.9 - Confidential data or information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 8 2014-01-01 2014-01-01 false Confidential data or information. 983.9 Section 983.9..., ARIZONA, AND NEW MEXICO Definitions § 983.9 Confidential data or information. Confidential data or information submitted to the committee consists of data or information constituting a trade secret or...

  20. 7 CFR 983.9 - Confidential data or information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 8 2012-01-01 2012-01-01 false Confidential data or information. 983.9 Section 983.9..., ARIZONA, AND NEW MEXICO Definitions § 983.9 Confidential data or information. Confidential data or information submitted to the committee consists of data or information constituting a trade secret or...

  1. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Confidentiality of Reports, Risk Ratings and related Confidential Information. 120.1060 Section 120.1060 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1060...

  2. 48 CFR 1552.235-73 - Access to Federal Insecticide, Fungicide, and Rodenticide Act Confidential Business Information...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). 1552.235-73 Section... Insecticide, Fungicide, and Rodenticide Act Confidential Business Information (APR 1996). As prescribed in... Act Confidential Business Information (APR 1996) In order to perform duties under the contract, the...

  3. Confidentiality Revisited: A Response to Manhal-Baugus (1996).

    ERIC Educational Resources Information Center

    Doyle, Kevin

    1998-01-01

    Reviews the issues relating to confidentiality raised by Manhal-Baugus (1996), identifies problem areas from the 1996 article, and offers additional information about confidentiality not included in the article. Chemical dependency counselors are urged to consider the federal law covering confidentiality of alcohol- and drug-abuse patient records…

  4. 21 CFR 20.55 - Indexing trade secrets and confidential commercial or financial information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Indexing trade secrets and confidential commercial... secrets and confidential commercial or financial information. Whenever the Food and Drug Administration... exempt from public disclosure as trade secret or confidential commercial or financial data and...

  5. 21 CFR 20.55 - Indexing trade secrets and confidential commercial or financial information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 1 2014-04-01 2014-04-01 false Indexing trade secrets and confidential commercial... secrets and confidential commercial or financial information. Whenever the Food and Drug Administration... exempt from public disclosure as trade secret or confidential commercial or financial data and...

  6. 21 CFR 20.55 - Indexing trade secrets and confidential commercial or financial information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 1 2013-04-01 2013-04-01 false Indexing trade secrets and confidential commercial... secrets and confidential commercial or financial information. Whenever the Food and Drug Administration... exempt from public disclosure as trade secret or confidential commercial or financial data and...

  7. 21 CFR 20.55 - Indexing trade secrets and confidential commercial or financial information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Indexing trade secrets and confidential commercial... secrets and confidential commercial or financial information. Whenever the Food and Drug Administration... exempt from public disclosure as trade secret or confidential commercial or financial data and...

  8. 21 CFR 20.55 - Indexing trade secrets and confidential commercial or financial information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Indexing trade secrets and confidential commercial... secrets and confidential commercial or financial information. Whenever the Food and Drug Administration... exempt from public disclosure as trade secret or confidential commercial or financial data and...

  9. 12 CFR 1070.43 - Disclosure of confidential information to law enforcement agencies and other government agencies.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... confidentiality of the information disclosed; and (2) Disclose confidential consumer complaint information to a... CONSUMER FINANCIAL PROTECTION DISCLOSURE OF RECORDS AND INFORMATION Confidential Information § 1070.43... market for consumer financial products and services, provided that the agency shall first give written...

  10. 12 CFR 1070.43 - Disclosure of confidential information to law enforcement agencies and other government agencies.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... confidentiality of the information disclosed; and (2) Disclose confidential consumer complaint information to a... CONSUMER FINANCIAL PROTECTION DISCLOSURE OF RECORDS AND INFORMATION Confidential Information § 1070.43... market for consumer financial products and services, provided that the agency shall first give written...

  11. 12 CFR 1070.43 - Disclosure of confidential information to law enforcement agencies and other government agencies.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... confidentiality of the information disclosed; and (2) Disclose confidential consumer complaint information to a... CONSUMER FINANCIAL PROTECTION DISCLOSURE OF RECORDS AND INFORMATION Confidential Information § 1070.43... market for consumer financial products and services, provided that the agency shall first give written...

  12. 42 CFR 2.22 - Notice to patients of Federal confidentiality requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.22... alcohol and drug abuse patient records. (d) Sample notice. Confidentiality of Alcohol and Drug Abuse Patient Records The confidentiality of alcohol and drug abuse patient records maintained by this program...

  13. 42 CFR 2.22 - Notice to patients of Federal confidentiality requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.22... alcohol and drug abuse patient records. (d) Sample notice. Confidentiality of Alcohol and Drug Abuse Patient Records The confidentiality of alcohol and drug abuse patient records maintained by this program...

  14. 42 CFR 2.22 - Notice to patients of Federal confidentiality requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.22... alcohol and drug abuse patient records. (d) Sample notice. Confidentiality of Alcohol and Drug Abuse Patient Records The confidentiality of alcohol and drug abuse patient records maintained by this program...

  15. 42 CFR 2.22 - Notice to patients of Federal confidentiality requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.22... alcohol and drug abuse patient records. (d) Sample notice. Confidentiality of Alcohol and Drug Abuse Patient Records The confidentiality of alcohol and drug abuse patient records maintained by this program...

  16. 42 CFR 2.22 - Notice to patients of Federal confidentiality requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.22... alcohol and drug abuse patient records. (d) Sample notice. Confidentiality of Alcohol and Drug Abuse Patient Records The confidentiality of alcohol and drug abuse patient records maintained by this program...

  17. 37 CFR 104.24 - Demands or requests in legal proceedings for records protected by confidentiality statutes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... proceedings for records protected by confidentiality statutes. 104.24 Section 104.24 Patents, Trademarks, and... proceedings for records protected by confidentiality statutes. Demands in legal proceedings for the production of records, or for the testimony of employees regarding information protected by the confidentiality...

  18. 40 CFR 86.615-84 - Treatment of confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 19 2010-07-01 2010-07-01 false Treatment of confidential information....615-84 Treatment of confidential information. (a) Any manufacturer may assert that some or all of the information submitted pursuant to this subpart is entitled to confidential treatment as provided by 40 CFR...

  19. 40 CFR 370.42 - What is Tier II inventory information?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Confidential and Non-Confidential Information Sheets and all attachments. All other pages must also contain..., the city, county, State and zip code. (d) The North American Industry Classification System (NAICS... “confidential.” You must provide the confidential location information on a separate sheet from the other Tier...

  20. 40 CFR 370.42 - What is Tier II inventory information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Confidential and Non-Confidential Information Sheets and all attachments. All other pages must also contain..., the city, county, State and zip code. (d) The North American Industry Classification System (NAICS... “confidential.” You must provide the confidential location information on a separate sheet from the other Tier...

  1. Introducing an electronic Palliative Care Summary (ePCS) in Scotland: patient, carer and professional perspectives.

    PubMed

    Hall, Susan; Murchie, Peter; Campbell, Christine; Murray, Scott A

    2012-10-01

    An electronic Palliative Care Summary (ePCS) is currently being implemented throughout Scotland to provide out-of-hours (OOH) staff with up-to-date summaries of medical history, patient understanding and wishes, medications and decisions regarding treatment of patients requiring palliative care: automatic twice daily updates of information from GP records to a central electronic repository are available to OOH services. To identify key issues related to the introduction of ePCS from primary care and OOH staff, to identify facilitators and barriers to their use, to explore the experiences of patients and carers and to make recommendations for improvements. Twenty-two semi-structured interviews were carried out with a purposive sample of health professionals [practice nurses (3 interviews), GPs (12 interviews), a practice manager (1 interview) from practices using different computing software systems] and patients and/or carers (6 interviews for whom an ePCS had been completed). Interviews were digitally recorded, transcribed and analysed thematically. Patients and carers were reassured that OOH staff were informed about their current circumstances. OOH staff considered the ePCS allowed them to be better informed in decision making and in carrying out home visits. GPs viewed the introduction of ePCSs to have benefits for in-hours structures of care including advance care planning. No interviewee expressed concern about confidentiality. Barriers raised related to the introduction of new technology including unfamiliarity with the process, limited time and information technology skills. The ePCS has clear potential to improve patient care although several implementation issues and technical problems require to be addressed first to enable this. GPs and community nurses should identify more patients with malignant and non-malignant illnesses for completion of the ePCS.

  2. [Confidentiality as ethical responsibility and legal duty].

    PubMed

    Arroyo Cordero, Tamara

    2009-01-01

    The article analyzes the challenge that the health professionals encounter when trying to protect their patient's confidentiality, considering the increasing demand for globalization of the information. It discusses the importance that confidentiality has for the therapeutic alliance and how the government has protected it throughout time. It identifies weak areas in the protection of confidentiality, especially in the psychiatry field. Finally, it invites the reader to consider the real benefits of sharing patient's information when deciding whether to brake or not the patient's confidentiality.

  3. Digital imagery/telecytology. International Academy of Cytology Task Force summary. Diagnostic Cytology Towards the 21st Century: An International Expert Conference and Tutorial.

    PubMed

    O'Brien, M J; Takahashi, M; Brugal, G; Christen, H; Gahm, T; Goodell, R M; Karakitsos, P; Knesel, E A; Kobler, T; Kyrkou, K A; Labbe, S; Long, E L; Mango, L J; McGoogan, E; Oberholzer, M; Reith, A; Winkler, C

    1998-01-01

    Optical digital imaging and its related technologies have applications in cytopathology that encompass training and education, image analysis, diagnosis, report documentation and archiving, and telecommunications. Telecytology involves the use of telecommunications to transmit cytology images for the purposes of diagnosis, consultation or education. This working paper provides a mainly informational overview of optical digital imaging and summarizes current technologic resources and applications and some of the ethical and legal implications of the use of these new technologies in cytopathology. Computer hardware standards for optical digital imagery will continue to be driven mainly by commercial interests and nonmedical imperatives, but professional organizations can play a valuable role in developing recommendations or standards for digital image sampling, documentation, archiving, authenticity safeguards and teleconsultation protocols; in addressing patient confidentiality and ethical, legal and informed consent issues; and in providing support for quality assurance and standardization of digital image-based testing. There is some evidence that high levels of accuracy for telepathology diagnosis can be achieved using existing dynamic systems, which may also be applicable to telecytology consultation. Static systems for both telepathology and telecytology, which have the advantage of considerably lower cost, appear to have lower levels of accuracy. Laboratories that maintain digital image databases should adopt practices and protocols that ensure patient confidentiality. Individuals participating in telecommunication of digital images for diagnosis should be properly qualified, meet licensing requirements and use procedures that protect patient confidentiality. Such individuals should be cognizant of the limitations of the technology and employ quality assurance practices that ensure the validity and accuracy of each consultation. Even in an informal teleconsultation setting one should define the extent of participation and be mindful of potential malpractice liability. Digital imagery applications will continue to present new opportunities and challenges. Position papers such as this are directed toward assisting the profession to stay informed and in control of these applications in the laboratory. Telecytology is an area in particular need of studies of good quality to provide data on factors affecting accuracy. New technologic approaches to addressing the issue of selective sampling in static image consultation are needed. The use of artificial intelligence software as an adjunct to enhance the accuracy and reproducibility of cytologic diagnosis of digital images in routine and consultation settings deserves to be pursued. Other telecytology-related issues that require clarification and the adoption of workable guidelines include interstate licensure and protocols to define malpractice liability.

  4. Anticipating the potential for positive uptake and adaptation in the implementation of a publicly funded online STBBI testing service: a qualitative analysis.

    PubMed

    Chabot, Cathy; Gilbert, Mark; Haag, Devon; Ogilvie, Gina; Hawe, Penelope; Bungay, Vicky; Shoveller, Jean A

    2018-01-30

    Online health services are a rapidly growing aspect of public health provision, including testing for sexually transmitted and other blood-borne infections (STBBI). Generally, healthcare providers, policymakers, and clients imbue online approaches with great positive potential (e.g., encouraging clients' agency; providing cost-effective services to more clients). However, the promise of online health services may vary across contexts and be perceived in negative or ambiguous ways (e.g., risks to 'gold standard' care provision; loss of provider control over an intervention; uncertainty related to budget implications). This study examines attitudes and perceptions regarding the development of a novel online STBBI testing service in Vancouver, Canada. We examine the perceptions about the intervention's potential by interviewing practitioners and planners who were engaged in the development and initial implementation of this testing service. We conducted in-depth interviews with 37 healthcare providers, administrators, policymakers, and community-based service providers engaged in the design and launch of the new online STBBI testing service. We also conducted observations during planning and implementation meetings for the new service. Thematic analysis techniques were employed to identify codes and broader discursive themes across the interview transcripts and observation notes. Some study participants expressed concern that the potential popularity of the new testing service might increase demand on existing sexual health services or become fiscally unsustainable. However, most participants regarded the new service as having the potential to improve STBBI testing in several ways, including reducing waiting times, enhancing privacy and confidentiality, appealing to more tech-savvy sub-populations, optimizing the redistribution of demands on face-to-face service provision, and providing patient-centred technology to empower clients to seek testing. Participants perceived this online STBBI testing service to have the potential to improve sexual health care provision. But, they also anticipated actions-and-reactions, revealing a need to monitor ongoing implementation dynamics. They also identified the larger, potentially system-transforming dimension of the new technology, which enables new system drivers (consumers) and reduces the amount of control health care providers have over online STBBI testing compared to conventional in-person testing.

  5. 42 CFR 2a.7 - Effect of Confidentiality Certificate.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Effect of Confidentiality Certificate. 2a.7 Section 2a.7 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS PROTECTION OF IDENTITY-RESEARCH SUBJECTS § 2a.7 Effect of Confidentiality Certificate. (a) A Confidentiality...

  6. 42 CFR 2a.7 - Effect of Confidentiality Certificate.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Effect of Confidentiality Certificate. 2a.7 Section 2a.7 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS PROTECTION OF IDENTITY-RESEARCH SUBJECTS § 2a.7 Effect of Confidentiality Certificate. (a) A Confidentiality...

  7. 42 CFR 2a.7 - Effect of Confidentiality Certificate.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Effect of Confidentiality Certificate. 2a.7 Section 2a.7 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS PROTECTION OF IDENTITY-RESEARCH SUBJECTS § 2a.7 Effect of Confidentiality Certificate. (a) A Confidentiality...

  8. 30 CFR 291.111 - How does MMS treat the confidential information I provide?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INTERIOR APPEALS OPEN AND NONDISCRIMINATORY ACCESS TO OIL AND GAS PIPELINES UNDER THE OUTER CONTINENTAL... a particular document is confidential. If you claim confidential treatment, then when you provide... that copy that you are making a request for confidential treatment for some or all of the information...

  9. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Confidentiality of identity of research subjects... Confidentiality of identity of research subjects. (a) Any person conducting a bona fide research project directly.... 1242; 21 U.S.C. 801) who intends to maintain the confidentiality of the identity of those persons who...

  10. 76 FR 44001 - Protection of Stratospheric Ozone: Request for Applications for Essential Use Allowances for 2013...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-22

    ...,'' ``proprietary,'' or ``company confidential.'' Information covered by a claim of business confidentiality will be treated in accordance with the procedures for handling information claimed as confidential under 40 CFR... the nomination to the Parties. If no claim of confidentiality accompanies the information when it is...

  11. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal... Confidential Business Information (APR 1996). As prescribed in 1535.007(b), insert the following provision: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform...

  12. 40 CFR 53.15 - Trade secrets and confidential or privileged information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 6 2013-07-01 2013-07-01 false Trade secrets and confidential or... Provisions § 53.15 Trade secrets and confidential or privileged information. Any information submitted under this part that is claimed to be a trade secret or confidential or privileged information shall be...

  13. 40 CFR 53.15 - Trade secrets and confidential or privileged information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 6 2012-07-01 2012-07-01 false Trade secrets and confidential or... Provisions § 53.15 Trade secrets and confidential or privileged information. Any information submitted under this part that is claimed to be a trade secret or confidential or privileged information shall be...

  14. 40 CFR 53.15 - Trade secrets and confidential or privileged information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 5 2011-07-01 2011-07-01 false Trade secrets and confidential or... Provisions § 53.15 Trade secrets and confidential or privileged information. Any information submitted under this part that is claimed to be a trade secret or confidential or privileged information shall be...

  15. 40 CFR 53.15 - Trade secrets and confidential or privileged information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 6 2014-07-01 2014-07-01 false Trade secrets and confidential or... Provisions § 53.15 Trade secrets and confidential or privileged information. Any information submitted under this part that is claimed to be a trade secret or confidential or privileged information shall be...

  16. 40 CFR 53.15 - Trade secrets and confidential or privileged information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 5 2010-07-01 2010-07-01 false Trade secrets and confidential or... Provisions § 53.15 Trade secrets and confidential or privileged information. Any information submitted under this part that is claimed to be a trade secret or confidential or privileged information shall be...

  17. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Confidentiality of identity of research subjects... Confidentiality of identity of research subjects. (a) Any person conducting a bona fide research project directly.... 1242; 21 U.S.C. 801) who intends to maintain the confidentiality of the identity of those persons who...

  18. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Confidentiality of identity of research subjects... Confidentiality of identity of research subjects. (a) Any person conducting a bona fide research project directly.... 1242; 21 U.S.C. 801) who intends to maintain the confidentiality of the identity of those persons who...

  19. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Confidentiality of identity of research subjects... Confidentiality of identity of research subjects. (a) Any person conducting a bona fide research project directly.... 1242; 21 U.S.C. 801) who intends to maintain the confidentiality of the identity of those persons who...

  20. 21 CFR 1316.23 - Confidentiality of identity of research subjects.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Confidentiality of identity of research subjects... Confidentiality of identity of research subjects. (a) Any person conducting a bona fide research project directly.... 1242; 21 U.S.C. 801) who intends to maintain the confidentiality of the identity of those persons who...

  1. 77 FR 32089 - Information Collections Being Submitted for Review and Approval to the Office of Management and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-31

    ... Burden: 21,465 hours. Total Annual Cost: None. Nature and Extent of Confidentiality: Confidentiality is... the SORN. Nature and Extent of Confidentiality: Some assurances of confidentiality are being provided... would be economically burdensome: (i) The nature and cost of the closed captions for the programming...

  2. Confidentiality with Minors: Mental Health Counselors' Attitudes toward Breaching or Preserving Confidentiality.

    ERIC Educational Resources Information Center

    Isaacs, Madelyn L.; Stone, Carolyn

    2001-01-01

    Describes the results of research that explored how mental health counselors consider the confidentiality of minors and conditions under which they would breach it. Results indicate that mental health counselors are protective of their minor clients' confidentiality rights with variation based on degree of seriousness and age of the client.…

  3. 42 CFR 2a.7 - Effect of Confidentiality Certificate.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Effect of Confidentiality Certificate. 2a.7 Section 2a.7 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS PROTECTION OF IDENTITY-RESEARCH SUBJECTS § 2a.7 Effect of Confidentiality Certificate. (a) A Confidentiality...

  4. 42 CFR 2a.7 - Effect of Confidentiality Certificate.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Effect of Confidentiality Certificate. 2a.7 Section 2a.7 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS PROTECTION OF IDENTITY-RESEARCH SUBJECTS § 2a.7 Effect of Confidentiality Certificate. (a) A Confidentiality...

  5. An analysis of the management and leadership roles of nurses relative to the health insurance portability and accountability act.

    PubMed

    Kiel, Joan M

    2015-01-01

    Nurses have a great deal of interaction with patients. Given this, nurses play a vital role in conveying to patients knowledge of their privacy, security, and confidentiality of patient health information rights under the Health Insurance Portability and Accountability Act (HIPAA). Nurses also can be "at the head of the table" in their own organization and professional organizations in regard to facilitating the implementation of the HIPAA and making access to patient information more "consumer friendly." This article discusses the role that nurses can develop into concerning HIPAA implementation in an ever-burgeoning arena of consumer advocacy and consumer information.

  6. Designing Smart Health Care Technology into the Home of the Future

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Warren, S.; Craft, R.L.; Bosma, J.T.

    1999-04-07

    The US health care industry is experiencing a substantial paradigm shift with regard to home care due to the convergence of several technology areas. Increasingly-capable telehealth systems and the internet are not only moving the point of care closer to the patient, but the patient can now assume a more active role in his or her own care. These technologies, coupled with (1) the migration of the health care industry to electronic patient records and (2) the emergence of a growing number of enabling health care technologies (e.g., novel biosensors, wearable devices, and intelligent software agents), demonstrate unprecedented potential formore » delivering highly automated, intelligent health care in the home. This editorial paper presents a vision for the implementation of intelligent health care technology in the home of the future, focusing on areas of research that have the highest potential payoff given targeted government funding over the next ten years. Here, intelligent health care technology means smart devices and systems that are aware of their context and can therefore assimilate information to support care decisions. A systems perspective is used to describe a framework under which devices can interact with one another in a plug-and-play manner. Within this infrastructure, traditionally passive sensors and devices will have read/write access to appropriate portions of an individual's electronic medical record. Through intelligent software agents, plug-and-play mechanisms, messaging standards, and user authentication tools, these smart home-based medical devices will be aware of their own capabilities, their relationship to the other devices in the home system, and the identity of the individual(s) from whom they acquire data. Information surety technology will be essential to maintain the confidentiality of patient-identifiable medical information and to protect the integrity of geographically dispersed electronic medical records with which each home-based system will interact.« less

  7. Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues?

    PubMed

    Brumen, Bostjan; Heričko, Marjan; Sevčnikar, Andrej; Završnik, Jernej; Hölbl, Marko

    2013-12-16

    Medical data are gold mines for deriving the knowledge that could change the course of a single patient's life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner. Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data. Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N=30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different. The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P=.19). The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results show that the results of analyses on original and on protected data are identical or comparably similar. The approach addresses the privacy and confidentiality issues that arise with medical data and is adherent to strict legal rules in the United States and Europe regarding the processing of the medical data.

  8. Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?

    PubMed Central

    2013-01-01

    Background Medical data are gold mines for deriving the knowledge that could change the course of a single patient’s life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner. Objective Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data. Methods Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N=30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different. Results The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P=.19). Conclusions The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results show that the results of analyses on original and on protected data are identical or comparably similar. The approach addresses the privacy and confidentiality issues that arise with medical data and is adherent to strict legal rules in the United States and Europe regarding the processing of the medical data. PMID:24342053

  9. Nationwide telecare for diabetics: a pilot implementation of the HOLON architecture.

    PubMed Central

    Jones, P. C.; Silverman, B. G.; Athanasoulis, M.; Drucker, D.; Goldberg, H.; Marsh, J.; Nguyen, C.; Ravichandar, D.; Reis, L.; Rind, D.; Safran, C.

    1998-01-01

    This paper presents results from a demonstration project of nationwide exchange of health data for the home care of diabetic patients. A consortium of industry, academic, and health care partners has developed reusable middleware components integrated using the HOLON architecture. Engineering approaches for multi-organization systems development, lessons learned in developing layered object-oriented systems, security and confidentiality considerations, and functionality for nationwide telemedicine applications are discussed. PMID:9929239

  10. Triple symmetric key cryptosystem for data security

    NASA Astrophysics Data System (ADS)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  11. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... microorganism identity or use is confidential or uncertain. 725.15 Section 725.15 Protection of Environment... microorganism identity or use is confidential or uncertain. (a) Consulting EPA. Persons intending to conduct... on the Inventory, in § 725.239 or in subpart M of this part. (1) Confidential identity or use. In...

  12. 29 CFR 4901.24 - Special rules for trade secrets and confidential commercial or financial information submitted to...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 9 2014-07-01 2014-07-01 false Special rules for trade secrets and confidential commercial... Special rules for trade secrets and confidential commercial or financial information submitted to the PBGC... secret or is commercial or financial information that is privileged or confidential. Facts asserted...

  13. 29 CFR 4901.24 - Special rules for trade secrets and confidential commercial or financial information submitted to...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 9 2011-07-01 2011-07-01 false Special rules for trade secrets and confidential commercial... Special rules for trade secrets and confidential commercial or financial information submitted to the PBGC... secret or is commercial or financial information that is privileged or confidential. Facts asserted...

  14. 29 CFR 4901.24 - Special rules for trade secrets and confidential commercial or financial information submitted to...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 9 2013-07-01 2013-07-01 false Special rules for trade secrets and confidential commercial... Special rules for trade secrets and confidential commercial or financial information submitted to the PBGC... secret or is commercial or financial information that is privileged or confidential. Facts asserted...

  15. 29 CFR 4901.24 - Special rules for trade secrets and confidential commercial or financial information submitted to...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 9 2012-07-01 2012-07-01 false Special rules for trade secrets and confidential commercial... Special rules for trade secrets and confidential commercial or financial information submitted to the PBGC... secret or is commercial or financial information that is privileged or confidential. Facts asserted...

  16. 29 CFR 4901.24 - Special rules for trade secrets and confidential commercial or financial information submitted to...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Special rules for trade secrets and confidential commercial... Special rules for trade secrets and confidential commercial or financial information submitted to the PBGC... secret or is commercial or financial information that is privileged or confidential. Facts asserted...

  17. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... microorganism identity or use is confidential or uncertain. 725.15 Section 725.15 Protection of Environment... microorganism identity or use is confidential or uncertain. (a) Consulting EPA. Persons intending to conduct... on the Inventory, in § 725.239 or in subpart M of this part. (1) Confidential identity or use. In...

  18. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... microorganism identity or use is confidential or uncertain. 725.15 Section 725.15 Protection of Environment... microorganism identity or use is confidential or uncertain. (a) Consulting EPA. Persons intending to conduct... on the Inventory, in § 725.239 or in subpart M of this part. (1) Confidential identity or use. In...

  19. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... microorganism identity or use is confidential or uncertain. 725.15 Section 725.15 Protection of Environment... microorganism identity or use is confidential or uncertain. (a) Consulting EPA. Persons intending to conduct... on the Inventory, in § 725.239 or in subpart M of this part. (1) Confidential identity or use. In...

  20. 40 CFR 725.15 - Determining applicability when microorganism identity or use is confidential or uncertain.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... microorganism identity or use is confidential or uncertain. 725.15 Section 725.15 Protection of Environment... microorganism identity or use is confidential or uncertain. (a) Consulting EPA. Persons intending to conduct... on the Inventory, in § 725.239 or in subpart M of this part. (1) Confidential identity or use. In...

  1. 77 FR 42333 - Proposed Adjustment of the Assessment of Annual Needs for the List I Chemicals Ephedrine...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-18

    ... redacted. If you want to submit confidential business information as part of your comment, but do not want... ``CONFIDENTIAL BUSINESS INFORMATION'' in the first paragraph of your comment. You must also prominently identify confidential business information to be redacted within the comment. If a comment has so much confidential...

  2. The use of information and communication technology (ICT) in dentistry.

    PubMed

    Knott, N J

    2013-02-01

    As the use of information and communication technology (ICT) becomes more widespread in dentistry the risk of breaching electronic commerce laws and patient confidentiality increases. It is necessary to be aware of the responsibilities internet usage entails, especially within a dental practice where the protection of patient information is of the utmost importance. More should be done to outline the various precautions that should be taken to ensure ICT security within the professional domain, as it would appear dentistry has been neglected with regard to receiving the proper ICT education, training and support systems.

  3. Implementation of home-based medication order entry at a community hospital.

    PubMed

    Thorne, Alicia; Williamson, Sarah; Jellison, Tara; Jellison, Chris

    2009-11-01

    The implementation of a home-based order-entry program at a community hospital is described. Parkview Hospital is a 600-bed, community-based facility located in Fort Wayne, Indiana, that provides 24-hour pharmacy services. The main purpose for establishing a home-based order-entry program was to provide extra pharmacist coverage during the event of a spontaneous order surge in an effort to maintain excellent customer service. A virtual private network (VPN) was created to ensure the security and confidentiality of patients' health care information. The names of volunteer pharmacists who met specific criteria and who were capable of performing home-based order entry were collected. These pharmacists were trained and tested in the home-based order-entry process. When home-based order-entry is needed, the lead pharmacist contacts the pharmacists on the list by telephone. If available, the pharmacists (maximum of three) are notified to log into the Internet, access the VPN, and perform order entry with the same vigilance, confidentiality, and care as they would onsite. Home-based order entry is discontinued when off-trigger points are met. Pharmacists entering orders from home are paid by the time spent conducting order entry. Pharmacists reported that the program was easy to contact home-based order-entry volunteers, there were no problems with logging into the VPNs, and turnaround time was close to our target of 25 minutes. A community-based hospital successfully implemented a home-based medication order-entry program. The program alleviated the shortage of pharmacists during spontaneous surges of medication orders.

  4. Secret Sharing of a Quantum State.

    PubMed

    Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei

    2016-07-15

    Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.

  5. Breaching confidentiality to protect the public: evolving standards of medical confidentiality for military detainees.

    PubMed

    Wynia, Matthew K

    2007-08-01

    Confidentiality is a core value in medicine and public health yet, like other core values, it is not absolute. Medical ethics has typically allowed for breaches of confidentiality when there is a credible threat of significant harm to an identifiable third party. Medical ethics has been less explicit in spelling out criteria for allowing breaches of confidentiality to protect populations, instead tending to defer these decisions to the law. But recently, issues in military detention settings have raised the profile of decisions to breach medical confidentiality in efforts to protect the broader population. National and international ethics documents say little about the confidentiality of detainee medical records. But initial decisions to use detainee medical records to help craft coercive interrogations led to widespread condemnation, and might have contributed to detainee health problems, such as a large number of suicide attempts several of which have been successful. More recent military guidance seems to reflect lessons learned from these problems and does more to protect detainee records. For the public health system, this experience is a reminder of the importance of confidentiality in creating trustworthy, and effective, means to protect the public's health.

  6. Professional Ethics for Digital Age Psychiatry: Boundaries, Privacy, and Communication.

    PubMed

    Sabin, James E; Harland, Jonathan Clark

    2017-09-01

    Internet and social media use continue to expand rapidly. Many patients and psychiatrists are bringing digital technologies into the treatment process, but relatively little attention has been paid to the ethical challenges in doing this. This review presents ethical guidelines for psychiatry in the digital age. Surveys demonstrate that patients are eager to make digital technologies part of their treatment. Substantial numbers search for professional and personal information about their therapists. Attitudes among psychiatrists about using digital technologies with patients range from dread to enthusiastic adoption. Digital technologies create four major ethical challenges for psychiatry: managing clinical boundaries; maintaining privacy and confidentiality; establishing realistic expectations regarding digital communications; and upholding professional ideals. Traditional ethical expectations are valid for the evolving digital arena, but guidance must be adapted for actual application in practice.

  7. Managing information and knowledge within maternity services: Privacy and consent issues.

    PubMed

    Baskaran, Vikraman; Davis, Kim; Bali, Rajeev K; Naguib, Raouf N G; Wickramasinghe, Nilmini

    2013-09-01

    Electronic Patient Records have improved vastly the quality and efficiency of care delivered. However, the formation of single demographic database and the ease of electronic information sharing give rise to many concerns including issues of consent, by whom and how data are accessed and used. This paper examines the organizational and socio-technical issues related to privacy, confidentiality and security when employing electronic records within a maternity service hospital in England. A preliminary questionnaire was administered (n  =  52), in total, 24 responses were received. Sixteen responses were from personnel in the information technology department, 5 from health information department and 3 from midwifery managers. This was followed by a semi-structured interview with representatives from the clinical and technological side. A number of issues related to information governance (IG) have been identified, especially breaches on sharing personal information without consent from the patients have been identified as one immediate challenge that needs to be fixed. There is an immediate need for more robust, realistic, built-in accountability both locally and nationally on data sharing. A culture of ownership and strict adherence to IG principles is paramount. Focused training in the area of data, information and knowledge sharing will bring in a balance of legitimate usage against the individual's rights to confidentiality and privacy.

  8. Commitment of project participants to developing health care services based on the internet technology.

    PubMed

    Kouri, Pirkko; Karjalainen-Jurvelin, Ritva; Kinnunen, Juha

    2005-12-01

    When developing Information and Communication Technology (ICT), such as services for the decision-making process, skilled health care professionals with their comprehensive knowledge of patients/clients are essential contributors to the project. Careful evaluation is needed to assess the effectiveness of project management as well as to analyze the commitment of the personnel to goal attainment. In the course of the development of integrated maternity care services, the commitment of project participants (n=48) was evaluated. What factors enhanced or impaired their commitment to the project work? Questionnaire (n=80, response rate 60%) with quantitative analysis as well as open-ended questions with qualitative content analysis. Positive commitment was related to a confidential and open atmosphere during the project. The utilization of personal skills and experience was appreciated. Differences in the working principles and cultures between the participating organizations complicated fluent collaboration. To encourage commitment, a lot of attention should be paid to internal communication as well as the effective realization of project tasks. The strength of the project was the highly innovative and confidential atmosphere. The well-established project goals, the highly inspired project team, and the effective co-operation between the project manager and the core group helped to deepen overall commitment in the project.

  9. Integrating mHealth at point of care in low- and middle-income settings: the system perspective.

    PubMed

    Wallis, Lee; Blessing, Paul; Dalwai, Mohammed; Shin, Sang Do

    2017-06-01

    While the field represents a wide spectrum of products and services, many aspects of mHealth have great promise within resource-poor settings: there is an extensive range of cheap, widely available tools which can be used at the point of care delivery. However, there are a number of conditions which need to be met if such solutions are to be adequately integrated into existing health systems; we consider these from regulatory, technological and user perspectives. We explore the need for an appropriate legislative and regulatory framework, to avoid 'work around' solutions, which threaten patient confidentiality (such as the extensive use of instant messaging services to deliver sensitive clinical information and seek diagnostic and management advice). In addition, we will look at other confidentiality issues such as the need for applications to remove identifiable information (such as photos) from users' devices. Integration is dependent upon multiple technological factors, and we illustrate these using examples such as products made available specifically for adoption in low- and middle-income countries. Issues such as usability of the application, signal loss, data volume utilization, need to enter passwords, and the availability of automated or in-app context-relevant clinical advice will be discussed. From a user perspective, there are three groups to consider: experts, front-line clinicians, and patients. Each will accept, to different degrees, the use of technology in care - often with cultural or regional variation - and this is central to integration and uptake. For clinicians, ease of integration into daily work flow is critical, as are familiarity and acceptability of other technology in the workplace. Front-line staff tend to work in areas with more challenges around cell phone signal coverage and data availability than 'back-end' experts, and the effect of this is discussed.

  10. Attitudes toward information and communication technology (ICT) in residential aged care in Western Australia.

    PubMed

    Loh, Poh-Kooi; Flicker, Leon; Horner, Barbara

    2009-07-01

    Determine why introduction of health consulting services via Telehealth video conference consultations failed in residential aged care facilities (RACF). Semistructured interview groups and quantitative survey. Two participating not-for-profit RACF. Managers, employed carers, physiotherapist, occupational therapist, registered nurses, and residents from RACF. A survey initially followed by focus groups that centered on 4 questions. How can computers help improve care? What kind of electronic services and products could help improve care? Who should have access to the technology and why was the technology not used? The survey revealed there was awareness of information and communication technology (ICT) in RACF. However, respondents were uncertain of potential benefits provided to their clients. Only 43% of respondents thought a minority of clients would receive the benefits of ICT use. The focus groups revealed several themes regarding the attitudes toward ICT in RACF. Positive attitudes to ICT included themes of saving time, easier doctor access, cost saving, and improved communications. Negative attitudes included themes of loss of human contact, inadequate training, security barriers, not user friendly, limited ability to comply with suggestions, privacy issues, and capital cost. Residents were also concerned about confidentiality and loss of human interaction with the use of Telehealth in residential aged facilities. More training for staff is required to enable them to use ICT efficiently. ICT hardware and software at the user interface must be designed to maintain confidentiality with ease of access. Access to Telehealth services should not impede the routine delivery of personal care and human contact for residents. Studies are required as to where human input to residents is unable to be replaced by Telehealth services.

  11. Confidentiality: a survey in a research hospital.

    PubMed

    Grady, C; Jacob, J; Romano, C

    1991-01-01

    Despite the many justifications for protecting patient confidentiality, we recognize that confidentiality cannot be absolute. Our world of automated information and easy access and storage poses many threats to confidentiality. This paper has described a survey conducted at the NIH Clinical Center to assess the knowledge, attitudes, and behaviors of clinical physicians and nurses about confidentiality of patient information. The survey findings demonstrate the need for reminders and increased awareness about confidentiality in our setting. Most of the survey respondents had a good knowledge of what was expected of them, and they believed that confidentiality was important and maintaining it was their responsibility. Of interest was that in several simulated clinical situations, there was a discrepancy between what respondents indicated they should do and what they thought they would do. The biggest discrepancies appeared in situations that involved overhearing a patient conversation on the elevator, approaching an unfamiliar person who is reading a medical record in the nurses' station, and answering a patient's inquiry about the status of another patient. The findings support the speculation that this difference may be attributed to discomfort or decreased awareness, and not necessarily to lack of knowledge. Results indicate that policies and administrative expectations should be frequently communicated and enforced, and that educational programs that address issues of confidentiality should be provided. The results of this survey have been influential in guiding educational strategies and administrative activities at the clinical center. The clinical center initiated a confidentiality awareness campaign, displaying a new poster every three months in strategic locations and distributing other tangible reminders (such as pens, magnets, and buttons) containing the same confidentiality message.(ABSTRACT TRUNCATED AT 250 WORDS)

  12. Physician Knowledge and Attitudes around Confidential Care for Minor Patients.

    PubMed

    Riley, Margaret; Ahmed, Sana; Reed, Barbara D; Quint, Elisabeth H

    2015-08-01

    Minor adolescent patients have a legal right to access certain medical services confidentially without parental consent or notification. We sought to assess physicians' knowledge of these laws, attitudes around the provision of confidential care to minors, and barriers to providing confidential care. An anonymous online survey was sent to physicians in the Departments of Family Medicine, Internal Medicine-Pediatrics, Obstetrics/Gynecology, and Pediatrics at the University of Michigan. Response rate was 40% (259/650). The majority of physicians felt comfortable addressing sexual health, mental health, and substance use with adolescent patients. On average, physicians answered just over half of the legal knowledge questions correctly (mean 56.6% ± 16.7%). The majority of physicians approved of laws allowing minors to consent for confidential care (90.8% ± 1.7% approval), while substantially fewer (45.1% ± 4.5%) approved of laws allowing parental notification of this care at the physician's discretion. Most physicians agreed that assured access to confidential care should be a right for adolescents. After taking the survey most physicians (76.6%) felt they needed additional training on confidentiality laws. The provision of confidential care to minors was perceived to be most inhibited by insurance issues, parental concerns/relationships with the family, and issues with the electronic medical record. Physicians are comfortable discussing sensitive issues with adolescents and generally approve of minor consent laws, but lack knowledge about what services a minor can access confidentially. Further research is needed to assess best methods to educate physicians about minors' legal rights to confidential healthcare services. Copyright © 2015 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  13. Confidential donation confirmation as an alternative to confidential unit exclusion: 15 months experience of the HEMOMINAS foundation.

    PubMed

    Loureiro, Flávia Cristine Martineli; Oliveira, Cláudia Di Lorenzo; Proietti, Anna Bárbara F Carneiro; Proietti, Fernando Augusto

    2011-01-01

    Confidential unit exclusion remains a controversial strategy to reduce the residual risk of transfusion-transmitted infections. This study aimed to analyze confidential unit exclusion from its development in a large institution in light of confidential donation confirmation. Data of individuals who donated from October 1, 2008 to December 31, 2009 were analyzed in a case-control study. The serological results and sociodemographic characteristics of donors who did not confirm their donations were compared to those who did. Variables with p-values < 0.20 in univariate analysis were included in a logistic multivariate analysis. In the univariate analysis there was a statically significant association between positive serological results and response to confidential donation confirmation of "No". Donation type, (firsttime or return donor - OR 1.69, CI 1.37-2.09), gender (OR 1.66, CI 1.35-2.04), education level (OR 2.82, CI 2.30-3.47) and ethnic background (OR 0.67, CI 0.55-0.82) were included in the final logistic regression model. In all logistic regression models analyzed, the serological suitability and confidential donation confirmation were not found to be statistically associated. The adoption of new measures of clinical classification such as audiovisual touch-screen computer-assisted self-administered interviews might be more effective than confidential unit exclusion in the identification of donor risk behavior. The requirement that transfusion services continue to use confidential unit exclusion needs to be debated in countries where more specific and sensitive clinical and serological screening methods are available. Our findings suggest that there are not enough benefits to justify continued use of confidential donation confirmation in the analyzed institution.

  14. Confidential donation confirmation as an alternative to confidential unit exclusion: 15 months experience of the HEMOMINAS foundation

    PubMed Central

    Loureiro, Flávia Cristine Martineli; Oliveira, Cláudia Di Lorenzo; Proietti, Anna Bárbara F. Carneiro; Proietti, Fernando Augusto

    2011-01-01

    Background Confidential unit exclusion remains a controversial strategy to reduce the residual risk of transfusion-transmitted infections. Objective This study aimed to analyze confidential unit exclusion from its development in a large institution in light of confidential donation confirmation. Methods Data of individuals who donated from October 1, 2008 to December 31, 2009 were analyzed in a case-control study. The serological results and sociodemographic characteristics of donors who did not confirm their donations were compared to those who did. Variables with p-values < 0.20 in univariate analysis were included in a logistic multivariate analysis. Results In the univariate analysis there was a statically significant association between positive serological results and response to confidential donation confirmation of "No". Donation type, (firsttime or return donor - OR 1.69, CI 1.37-2.09), gender (OR 1.66, CI 1.35-2.04), education level (OR 2.82, CI 2.30-3.47) and ethnic background (OR 0.67, CI 0.55-0.82) were included in the final logistic regression model. In all logistic regression models analyzed, the serological suitability and confidential donation confirmation were not found to be statistically associated. The adoption of new measures of clinical classification such as audiovisual touch-screen computer-assisted self-administered interviews might be more effective than confidential unit exclusion in the identification of donor risk behavior. The requirement that transfusion services continue to use confidential unit exclusion needs to be debated in countries where more specific and sensitive clinical and serological screening methods are available. Conclusion Our findings suggest that there are not enough benefits to justify continued use of confidential donation confirmation in the analyzed institution. PMID:23049316

  15. Confidentiality and parental involvement in adolescent sexual and reproductive health care: a cross-sectional study of Lithuanian general practitioners.

    PubMed

    Jaruseviciene, Lina; Lazarus, Jeffrey V; Zaborskis, Apolinaras

    2011-07-01

    We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. In this cross-sectional study, a 41-item questionnaire was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit of confidentiality protection in patient-provider settings was also assessed. Although 67.5% of the responding GPs (response rate 73.5%) stated that they inform the parents or guardians of adolescent patients about the importance of confidentiality, 82.9% of them only did so if the opportunity arose. When consulting on general sexual issues, more than 70% stated that they would guarantee their minor patients confidentiality. However, when cases involved sexually transmitted infections or pregnancy, nearly the same percentage said they would inform the parents. 62.3% of GPs incorrectly believed that the law only protects the right to confidentiality for patients who are 18 or older. Our findings indicate that Lithuanian GPs frequently violate adolescents' right to confidential health services. The study highlights the need for a comprehensive strategy to strengthen the confidentiality of sexual and reproductive health services for this group in Lithuanian primary care.

  16. Oil and gas reserves estimates

    USGS Publications Warehouse

    Harrell, R.; Gajdica, R.; Elliot, D.; Ahlbrandt, T.S.; Khurana, S.

    2005-01-01

    This article is a summary of a panel session at the 2005 Offshore Technology Conference. Oil and gas reserves estimates are further complicated with the expanding importance of the worldwide deepwater arena. These deepwater reserves can be analyzed, interpreted, and conveyed in a consistent, reliable way to investors and other stakeholders. Continually improving technologies can lead to improved estimates of production and reserves, but the estimates are not necessarily recognized by regulatory authorities as an indicator of "reasonable certainty," a term used since 1964 to describe proved reserves in several venues. Solutions are being debated in the industry to arrive at a reporting mechanism that generates consistency and at the same time leads to useful parameters in assessing a company's value without compromising confidentiality. Copyright 2005 Offshore Technology Conference.

  17. 12 CFR 1070.2 - General definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... civil investigative demand. (f) Confidential information means confidential consumer complaint... by an employee with the authority to do so. (g) Confidential consumer complaint information means... documents consumer complaints or inquiries concerning financial institutions or consumer financial products...

  18. 12 CFR 1070.2 - General definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... civil investigative demand. (f) Confidential information means confidential consumer complaint... by an employee with the authority to do so. (g) Confidential consumer complaint information means... documents consumer complaints or inquiries concerning financial institutions or consumer financial products...

  19. Security and Dependability Solutions for Networks and Devices

    NASA Astrophysics Data System (ADS)

    Gücrgens, Sigrid; Fuchs, Andreas

    In this chapter we give an overview over the denotation of the SERENITY artefacts S&D Classes, Patterns and Implementations in the context of networks and devices. In order to demonstrate their necessity we sketch an example for confidential and authentic communication and storage that utilizes a trusted platform module, and model the relevant pattern. We then dissociate solutions for network and device related S&D requirements from those targeting the context of organizational or workflow and web services based solutions. Then we give a summary of the broad field of application for network and device solutions. Finally we clarify the meaning and interaction between classes, patterns and implementations by giving some concrete examples.

  20. Medical confidentiality: an intransigent and absolute obligation.

    PubMed Central

    Kottow, M H

    1986-01-01

    Clinicians' work depends on sincere and complete disclosures from their patients; they honour this candidness by confidentially safeguarding the information received. Breaching confidentiality causes harms that are not commensurable with the possible benefits gained. Limitations or exceptions put on confidentiality would destroy it, for the confider would become suspicious and un-co-operative, the confidant would become untrustworthy and the whole climate of the clinical encounter would suffer irreversible erosion. Excusing breaches of confidence on grounds of superior moral values introduces arbitrariness and ethical unreliability into the medical context. Physicians who breach the agreement of confidentiality are being unfair, thus opening the way for, and becoming vulnerable to, the morally obtuse conduct of others. Confidentiality should not be seen as the cosy but dispensable atmosphere of clinical settings; rather, it constitutes a guarantee of fairness in medical actions. Possible perils that might accrue to society are no greater than those accepted when granting inviolable custody of information to priests, lawyers and bankers. To jeopardize the integrity of confidential medical relationships is too high a price to pay for the hypothetical benefits this might bring to the prevailing social order. PMID:3761330

  1. 21 CFR 26.76 - Confidentiality.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... public, information exchanged under this part that constitutes trade secrets, confidential commercial or... OF PHARMACEUTICAL GOOD MANUFACTURING PRACTICE REPORTS, MEDICAL DEVICE QUALITY SYSTEM AUDIT REPORTS... under its laws, the confidentiality of information exchanged under this part. (b) In particular, neither...

  2. 77 FR 5460 - Federal Firearms License Proceedings-Hearings (2008R-15P)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-03

    ... material that is confidential under law (e.g., trade secrets, processes, etc.). Any portion of a comment... shall be prominently marked ``confidential'' at the top of each page. Confidential information will be...

  3. 7 CFR 400.702 - Confidentiality of submission and duration of confidentiality.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... approval process, may be released to the public, including any mathematical modeling and data, unless it remains confidential business information under 5 U.S.C. 552(b). (c) Any submission disapproved by the...

  4. A challenge to unqualified medical confidentiality.

    PubMed

    Bozzo, Alexander

    2018-04-01

    Medical personnel sometimes face a seeming conflict between a duty to respect patient confidentiality and a duty to warn or protect endangered third parties. The conventional answer to dilemmas of this sort is that, in certain circumstances, medical professionals have an obligation to breach confidentiality. Kenneth Kipnis has argued, however, that the conventional wisdom on the nature of medical confidentiality is mistaken. Kipnis argues that the obligation to respect patient confidentiality is unqualified or absolute, since unqualified policies can save more lives in the long run. In this paper, I identify the form of Kipnis's argument and present a challenge to it. I conclude that, as matters stand now, a qualified confidentiality policy is the more rational choice. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  5. HIV/AIDS reduces the relevance of the principle of individual medical confidentiality among the Bantu people of Southern Africa.

    PubMed

    Ndebele, Paul; Mfutso-Bengo, Joseph; Masiye, Francis

    2008-01-01

    The principle of individual medical confidentiality is one of the moral principles that Africa inherited unquestioningly from the West as part of Western medicine. The HIV/AIDS pandemic in Southern Africa has reduced the relevance of the principle of individual medical confidentiality. Individual medical confidentiality has especially presented challenges for practitioners among the Bantu communities that are well known for their social inter-connectedness and the way they value their extended family relations. Individual confidentiality has raised several unforeseen problems for persons living with HIV/AIDS, ranging from stigma and isolation to feelings of dejection as it drives them away from their families as a way of trying to keep information about their conditions confidential. The involvement of family members in treatment decisions is in line with the philosophy of Ubuntu and serves to respect patients' and families' autonomy while at the same time benefiting the individual patient.

  6. Analysis of medical confidentiality from the islamic ethics perspective.

    PubMed

    Tavaokkoli, Saeid Nazari; Nejadsarvari, Nasrin; Ebrahimi, Ali

    2015-04-01

    Confidentiality is one of the old rules of the medical profession. While emphasizing the necessity of confidentiality in religious teachings, disclosure of other's secrets to commit sin deserves punishment hereafter known. Today, progress in medical science and invention of new diagnostic and therapeutic procedures, as well as the extent of information and disclosure of the secrets of the patients, have provided more than ever. After explaining the concepts and principles of confidentiality in medical ethics, the Islamic-oriented Virtue Ethics, in a comparative review, share the differences in these two sets of ethical review and explain the issue of confidentiality. In professional medical ethics, only the behaviors of health staff are evaluated and moral evaluation of the features cannot be evaluated, but in Islamic ethics, the moral evaluation of the features that are sensual, confidentiality is more stable, without any external supervision will maintain its efficiency.

  7. Security and Cloud Outsourcing Framework for Economic Dispatch

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sarker, Mushfiqur R.; Wang, Jianhui; Li, Zuyi

    The computational complexity and problem sizes of power grid applications have increased significantly with the advent of renewable resources and smart grid technologies. The current paradigm of solving these issues consist of inhouse high performance computing infrastructures, which have drawbacks of high capital expenditures, maintenance, and limited scalability. Cloud computing is an ideal alternative due to its powerful computational capacity, rapid scalability, and high cost-effectiveness. A major challenge, however, remains in that the highly confidential grid data is susceptible for potential cyberattacks when outsourced to the cloud. In this work, a security and cloud outsourcing framework is developed for themore » Economic Dispatch (ED) linear programming application. As a result, the security framework transforms the ED linear program into a confidentiality-preserving linear program, that masks both the data and problem structure, thus enabling secure outsourcing to the cloud. Results show that for large grid test cases the performance gain and costs outperforms the in-house infrastructure.« less

  8. Security and Cloud Outsourcing Framework for Economic Dispatch

    DOE PAGES

    Sarker, Mushfiqur R.; Wang, Jianhui; Li, Zuyi; ...

    2017-04-24

    The computational complexity and problem sizes of power grid applications have increased significantly with the advent of renewable resources and smart grid technologies. The current paradigm of solving these issues consist of inhouse high performance computing infrastructures, which have drawbacks of high capital expenditures, maintenance, and limited scalability. Cloud computing is an ideal alternative due to its powerful computational capacity, rapid scalability, and high cost-effectiveness. A major challenge, however, remains in that the highly confidential grid data is susceptible for potential cyberattacks when outsourced to the cloud. In this work, a security and cloud outsourcing framework is developed for themore » Economic Dispatch (ED) linear programming application. As a result, the security framework transforms the ED linear program into a confidentiality-preserving linear program, that masks both the data and problem structure, thus enabling secure outsourcing to the cloud. Results show that for large grid test cases the performance gain and costs outperforms the in-house infrastructure.« less

  9. Use of Smartphones in Hospitals.

    PubMed

    Thomairy, Noora Al; Mummaneni, Mounica; Alsalamah, Sami; Moussa, Nicole; Coustasse, Alberto

    2015-01-01

    Mobile technology has begun to change the landscape of the medical profession, with more than two-thirds of physicians regularly using smartphones. Smartphones have allowed health care professionals and the general public to communicate more efficiently, collect data, and facilitate clinical decision making. The methodology for this study was a qualitative literature review following a systematic approach of smartphone use among physicians in hospitals. Fifty-one articles were selected for this study based on inclusion criteria. The findings were classified and described into 7 categories: use of smartphone in obstetrics, pediatrics, surgery, internal medicine, radiology, and dermatology, which were chosen based on the documented use of smartphone application in different health care practices. A last section of patient safety and issues with confidentiality is also described. This study suggests that smartphones have been playing an increasingly important role in health care. Medical professionals have become more dependent upon medical smartphone applications. However, concerns of patient safety and confidentiality will likely lead to increased oversight of mobile device use by regulatory agencies and accrediting bodies.

  10. Ultralong room temperature phosphorescence from amorphous organic materials toward confidential information encryption and decryption

    PubMed Central

    Li, Youbing; Zhou, Xianju; Jana, Deblin; Liu, Guofeng; Lim, Wei Qi; Ong, Wee Kong

    2018-01-01

    Ultralong room temperature phosphorescence (URTP) emitted from pure amorphous organic molecules is very rare. Although a few crystalline organic molecules could realize URTP with long lifetimes (>100 ms), practical applications of these crystalline organic phosphors are still challenging because the formation and maintenance of high-quality crystals are very difficult and complicated. Herein, we present a rational design for minimizing the vibrational dissipation of pure amorphous organic molecules to achieve URTP. By using this strategy, a series of URTP films with long lifetimes and high phosphorescent quantum yields (up to 0.75 s and 11.23%, respectively) were obtained from amorphous organic phosphors without visible fluorescence and phosphorescence under ambient conditions. On the basis of the unique features of URTP films, a new green screen printing technology without using any ink was developed toward confidential information encryption and decryption. This work presents a breakthrough strategy in applying amorphous organic materials for URTP. PMID:29736419

  11. Attitudes of First-year Medical Students Toward the Confidentiality of Computerized Patient Records

    PubMed Central

    Davis, Luke; Domm, Jennifer A.; Konikoff, Michael R.; Miller, Randolph A.

    1999-01-01

    Objectives: To investigate the attitudes of students entering medical school toward the confidentiality of computerized medical records. Design: First-year medical students at the Vanderbilt University School of Medicine responded to a series of questions about a hypothetic breach of patient's privacy through a computerized patient record system. Measurements: The individual authors independently grouped the blinded responses according to whether they were consistent with then-current institutional policy. These preliminary groupings were discussed, and final categorizations were made by consensus. Results: While most students had a sense of what was right and wrong in absolute terms, half the class suggested at least one course of action that was deemed to be inconsistent with institutional policies. Conclusions: The authors believe that medical schools should directly address ethical and legal issues related to the use of computers in clinical practice as an integral part of medical school curricula. Several teaching approaches can facilitate a greater awareness of the issues surrounding technology and medicine. PMID:9925228

  12. Psychosocial Research on the International Space Station: Special Privacy Considerations

    NASA Astrophysics Data System (ADS)

    Kanas, N.; Salnitskiy, V.; Ritsher, J.; Grund, E.; Weiss, D.; Gushin, V.; Kozerenko, O.

    Conducting psychosocial research with astronauts and cosmonauts requires special privacy and confidentiality precautions due to the high profile nature of the subject population and to individual crewmember perception of the risks inherent in divulging sensitive psychological information. Sampling from this small population necessitates subject protections above and beyond standard scientific human subject protocols. Many of these protections have relevance for psychosocial research on the International Space Station. In our previous study of psychosocial issues involving crewmembers on the Mir space station, special precautions were taken during each phase of the missions. These were implemented in order to gain the trust necessary to ameliorate the perceived risks of divulging potentially sensitive psychological information and to encourage candid responses. Pre-flight, a standard confidentiality agreement was provided along with a special layman's summary indicating that only group-level data would be presented, and subjects chose their own ID codes known only to themselves. In-flight, special procedures and technologies (such as encryption) were employed to protect the data during the collection. Post-flight, an analytic strategy was chosen to further mask subject identifiers, and draft manuscripts were reviewed by the astronaut office prior to publication. All of the eligible five astronauts and eight cosmonauts who flew joint US/Russian missions on the Mir were successfully recruited to participate, and their data completion rate was 76%. Descriptive analyses of the data indicated that there was sufficient variability in all of the measures to indicate that thoughtful, discriminating responses were being provided (e.g., the full range of response options was used in 63 of the 65 items of the Profile of Mood States measure, and both true and false response options were used in all 126 items of the Group Environment and the Work Environment measures). This presentation will discuss and expand on the lessons learned during the Mir study and relate them to future long-duration space missions.

  13. An evaluation of a family planning mobile job aid for community health workers in Tanzania.

    PubMed

    Braun, Rebecca; Lasway, Christine; Agarwal, Smisha; L'Engle, Kelly; Layer, Erica; Silas, Lucy; Mwakibete, Anna; Kudrati, Mustafa

    2016-07-01

    The global rapid growth in mobile technology provides unique opportunities to support community health workers (CHWs) in providing family planning (FP) services. FHI 360, Pathfinder International and D-tree International developed an evidence-based mobile job aid to support CHW counseling, screening, service provision and referrals, with mobile forms for client and service data, and text-message reporting and reminders. The purpose of this study is to evaluate the acceptability and potential benefits to service quality from the perspective of CHWs and their clients. The mobile job aid was piloted in Dar es Salaam, Tanzania. Data collection tools included a demographic survey of all 25 CHWs trained to use the mobile job aid, in-depth interviews with 20 of the CHWs after 3 months and a survey of 176 clients who received FP services from a CHW using the mobile job aid after 6 months. Both CHWs and their clients reported that the mobile job aid was a highly acceptable FP support tool. CHWs perceived benefits to service quality, including timelier and more convenient care; better quality of information; increased method choice; and improved privacy, confidentiality and trust with clients. Most clients discussed multiple FP methods with CHWs; only 1 in 10 clients reported discussion of all 9 methods. This research suggests that mobile phones can be effective tools to support CHWs with FP counseling, screening and referrals, data collection and reporting, and communication. Challenges remain to support informed contraceptive choice. Future research should focus on implementation, including scale-up and sustainability. Mobile job aids can uniquely enhance FP service provision at the community level through adherence to standard protocols, real-time feedback and technical assistance, and provision of confidential care. This study can inform future efforts to support and expand the role of CHWs in increasing FP access and informed contraceptive choice. Copyright © 2016 Elsevier Inc. All rights reserved.

  14. 14 CFR 413.9 - Confidentiality.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Confidentiality. 413.9 Section 413.9 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE APPLICATION PROCEDURES § 413.9 Confidentiality. (a) Any person furnishing...

  15. 49 CFR 537.12 - Confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 6 2012-10-01 2012-10-01 false Confidential information. 537.12 Section 537.12 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AUTOMOTIVE FUEL ECONOMY REPORTS § 537.12 Confidential information...

  16. 49 CFR 537.12 - Confidential information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 6 2011-10-01 2011-10-01 false Confidential information. 537.12 Section 537.12 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AUTOMOTIVE FUEL ECONOMY REPORTS § 537.12 Confidential information...

  17. 49 CFR 537.12 - Confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 6 2014-10-01 2014-10-01 false Confidential information. 537.12 Section 537.12 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AUTOMOTIVE FUEL ECONOMY REPORTS § 537.12 Confidential information...

  18. 49 CFR 537.12 - Confidential information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 6 2013-10-01 2013-10-01 false Confidential information. 537.12 Section 537.12 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AUTOMOTIVE FUEL ECONOMY REPORTS § 537.12 Confidential information...

  19. 7 CFR 28.960 - Confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Confidential information. 28.960 Section 28.960 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards... Tests § 28.960 Confidential information. No information concerning individual tests under the...

  20. 14 CFR 413.9 - Confidentiality.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Confidentiality. 413.9 Section 413.9 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE APPLICATION PROCEDURES § 413.9 Confidentiality. (a) Any person furnishing...

  1. 14 CFR 414.13 - Confidentiality.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Confidentiality. 414.13 Section 414.13 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING SAFETY APPROVALS Application Procedures § 414.13 Confidentiality. (a) To ensure...

  2. 12 CFR 1215.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... classification of National Security Information). Confidential supervisory information is used in part 1215 to...: Confidential supervisory information means information prepared or received by FHFA that meets all of the... examination, inspection and visitation, confidential operating and condition reports, and any information...

  3. 44 CFR 8.2 - Original classification authority.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Classification Authority in paragraph (b) of this section, are also delegated Original Secret and Confidential... Secret and Original Confidential Classification Authority: (1) Associate Director, State and Local...) of this section, are also delegated ORIGINAL SECRET and CONFIDENTIAL CLASSIFICATION AUTHORITY by...

  4. Confidentiality and the employee assistance program professional.

    PubMed

    Mistretta, E F; Inlow, L B

    1991-02-01

    During the last two decades EAPs have offered employees confidential assessment, counseling, and referral. Many occupational health nurses have taken on the role of EAP professional or function as the liaison between the EAP counselor and the employee. The occupational health nurse involved in any EAP issue must adhere to the standards of confidentiality. The federal and state laws, company policy, and professional codes of ethics regarding these clients must be clearly understood, especially related to the issue of confidentiality.

  5. Physician's Breakout Session

    NASA Technical Reports Server (NTRS)

    Barry, William

    2001-01-01

    Dr. William Barry, Manager, NASA Occupational Health Program, moderated this session. As in one of the opening sessions, he re-iterated that the overall theme for the next year will be facilitating and implementing NIAT-1 (NASA Integrated Action Team - Action 1). He presented a candidate list of topics for consideration and discussion: (1) NIAT-1; (2) Skin cancer detection and the NASA Solar Safe Program; (3) Weapons of mass destruction; (4) Quality assurance; (5) Audits; (6) Environment of care; (7) Infection control; (8) Medication management; and (9) Confidentiality of medical records.

  6. The Confidentiality of Interlibrary Loan Records.

    ERIC Educational Resources Information Center

    Nolan, Christopher W.

    1993-01-01

    Discusses potential problems for confidentiality within interlibrary loan requests, outlines legal issues related to confidentiality, and proposes guidelines intended to protect library users' rights to privacy. Interlibrary loan documentation procedures are considered; laws and professional standards are reviewed; and the disposition of…

  7. 29 CFR 1691.3 - Confidentiality.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 4 2013-07-01 2013-07-01 false Confidentiality. 1691.3 Section 1691.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION PROCEDURES FOR COMPLAINTS OF EMPLOYMENT DISCRIMINATION FILED AGAINST RECIPIENTS OF FEDERAL FINANCIAL ASSISTANCE § 1691.3 Confidentiality...

  8. 12 CFR 1214.3 - General rule.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Banking FEDERAL HOUSING FINANCE AGENCY ORGANIZATION AND OPERATIONS AVAILABILITY OF NON-PUBLIC INFORMATION... other confidential supervisory information is the property of FHFA and is provided to the regulated... control of confidential supervisory information make public or disclose, in any manner, the confidential...

  9. 40 CFR 710.38 - Confidentiality.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT TSCA CHEMICAL INVENTORY REGULATIONS 2002 Inventory Update Reporting § 710.38 Confidentiality. (a) Any person... if the identity of that substance is treated as confidential in the Master Inventory File as of the...

  10. 7 CFR 1206.107 - Confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1206.107 Section 1206.107 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... INFORMATION Referendum Procedures. § 1206.107 Confidential information. The ballots and other information or...

  11. 40 CFR 403.14 - Confidentiality.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 30 2013-07-01 2012-07-01 true Confidentiality. 403.14 Section 403.14 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS GENERAL PRETREATMENT REGULATIONS FOR EXISTING AND NEW SOURCES OF POLLUTION § 403.14 Confidentiality. (a...

  12. 15 CFR 705.6 - Confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... EFFECT OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 705.6 Confidential information. (a) Any... the investigation that would disclose national security classified information or business... Security Classified” or “Business Confidential,” as appropriate, marked at the top of each sheet. Any...

  13. 31 CFR 9.6 - Confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 9.6 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.6 Confidential information. Information submitted in confidence which... marked “Business Confidential.” [40 FR 50717, Oct. 31, 1975] ...

  14. 7 CFR 1150.278 - Confidential treatment.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other information...

  15. 7 CFR 54.1033 - Confidential treatment.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Confidential treatment. 54.1033 Section 54.1033 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards... and Poultry Products § 54.1033 Confidential treatment. Every design review specialist providing...

  16. 19 CFR 181.121 - Maintenance of confidentiality.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 181.121 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Confidentiality of Business... possession of confidential business information collected pursuant to this part shall, in accordance with...

  17. 15 CFR 718.2 - Identification of confidential business information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... business information. 718.2 Section 718.2 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION 718.2 Identification of confidential business...

  18. School Counselors' Constructions of Student Confidentiality

    ERIC Educational Resources Information Center

    Trice-Black, Shannon; Riechel, Morgan E. Kiper; Shillingford, M. Ann

    2013-01-01

    Confidentiality in counseling relationships helps ensure trust between clients and counselors. Yet, defining and understanding the boundaries of confidentiality in school settings is often difficult, as school counselors are engaged in multiple relationships with various stakeholders. This qualitative phenomenological study explores the…

  19. 47 CFR 76.9 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 4 2012-10-01 2012-10-01 false Confidentiality of proprietary information. 76.9 Section 76.9 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE General § 76.9 Confidentiality of proprietary...

  20. 47 CFR 76.9 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 4 2013-10-01 2013-10-01 false Confidentiality of proprietary information. 76.9 Section 76.9 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE General § 76.9 Confidentiality of proprietary...

  1. 47 CFR 76.9 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Confidentiality of proprietary information. 76.9 Section 76.9 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE General § 76.9 Confidentiality of proprietary...

  2. 47 CFR 76.9 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 4 2014-10-01 2014-10-01 false Confidentiality of proprietary information. 76.9 Section 76.9 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE General § 76.9 Confidentiality of proprietary...

  3. 47 CFR 76.9 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 4 2011-10-01 2011-10-01 false Confidentiality of proprietary information. 76.9 Section 76.9 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE General § 76.9 Confidentiality of proprietary...

  4. Too much information: visual research ethics in the age of wearable cameras.

    PubMed

    Mok, Tze Ming; Cornish, Flora; Tarr, Jen

    2015-06-01

    When everything you see is data, what ethical principles apply? This paper argues that first-person digital recording technologies challenge traditional institutional approaches to research ethics, but that this makes ethics governance more important, not less so. We review evolving ethical concerns across four fields: Visual ethics; ubiquitous computing; mobile health; and grey literature from applied or market research. Collectively, these bodies of literature identify new challenges to traditional notions of informed consent, anonymity, confidentiality, privacy, beneficence and maleficence. Challenges come from the ever-increasing power, breadth and multi-functional integration of recording technologies, and the ubiquity and normalization of their use by participants. Some authors argue that these evolving relationships mean that institutional ethics governance procedures are irrelevant or no longer apply. By contrast, we argue that the fundamental principles of research ethics frameworks have become even more important for the protection of research participants, and that institutional frameworks need to adapt to keep pace with the ever-increasing power of recording technologies and the consequent risks to privacy. We conclude with four recommendations for efforts to ensure that contemporary visual recording research is held appropriately accountable to ethical standards: (i) minimizing the detail, scope, integration and retention of captured data, and limiting its accessibility; (ii) formulating an approach to ethics that takes in both the 'common rule' approaches privileging anonymity and confidentiality together with principles of contextual judgement and consent as an ongoing process; (iii) developing stronger ethical regulation of research outside academia; (iv) engaging the public and research participants in the development of ethical guidelines.

  5. Application of Ethics for Providing Telemedicine Services and Information Technology.

    PubMed

    Langarizadeh, Mostafa; Moghbeli, Fatemeh; Aliabadi, Ali

    2017-10-01

    Advanced technology has increased the use of telemedicine and Information Technology (IT) in treating or rehabilitating diseases. An increased use of technology increases the importance of the ethical issues involved. The need for keeping patients' information confidential and secure, controlling a number of therapists' inefficiency as well as raising the quality of healthcare services necessitates adequate heed to ethical issues in telemedicine provision. The goal of this review is gathering all articles that are published through 5 years until now (2012-2017) for detecting ethical issues for providing telemedicine services and Information technology. The reason of this time is improvement of telemedicine and technology through these years. This article is important for clinical practice and also to world, because of knowing ethical issues in telemedicine and technology are always important factors for physician and health providers. the required data in this research were derived from published electronic sources and credible academic articles published in such databases as PubMed, Scopus and Science Direct. The following key words were searched for in separation and combination: tele-health, telemedicine, ethical issues in telemedicine. A total of 503 articles were found. After excluding the duplicates (n= 93), the titles and abstracts of 410 articles were skimmed according to the inclusion criteria. Finally, 64 articles remained. They were reviewed in full text and 36 articles were excluded. At the end, 28 articles were chosen which met our eligibility criteria and were included in this study. Ethics has been of a great significance in IT and telemedicine especially the Internet since there are more chances provided for accessing information. It is, however, accompanied by a threat to patients' personal information. Therefore, suggestions are made to investigate ethics in technology, to offer standards and guidelines to therapists. Due to the advancement in technology, access to information has become simpler than the past. This has prompted hackers to seize the opportunity. This research shows that the ethical issues in telemedicine can be investigated from several aspects like technology, doctor-patient relationship, data confidentiality and security, informed consent, patient's and family's satisfaction with telemedicine services. Following ethical issues in telemedicine is a primary aspect of high quality services. In other words, if therapists abide by ethical rules, they can provide better services for patients. Attention to ethical issues in telemedicine guarantees a safer use of the services.

  6. Delivery of Confidential Care to Adolescent Males

    PubMed Central

    Rubin, Susan E.; McKee, M. Diane; Campos, Giselle; O’Sullivan, Lucia F.

    2014-01-01

    Purpose Primary care providers’ (PCPs’) provision of time alone with an adolescent without the parents present (henceforth referred to as “confidential care”) has a significant impact on adolescents’ disclosure of risk behavior. To inform the development of interventions to improve PCPs’ delivery of confidential care, we obtained the perspectives of adolescent males and their mothers about the health care concerns of adolescent males and the provision of confidential care. Methods This focus-group study (5 groups: 2 with adolescent males and 2 with mothers) used standard qualitative methods for analysis. We recruited mother/son dyads who had been seen at urban primary care practices. Results Adolescents’ health concerns focused on pregnancy and sexually transmitted infections; mothers took a broader view. Many adolescents felt that PCPs often delivered safe sex counseling in a superficial, impersonal manner that did not add much value to what they already knew, and that their PCP’s principal role was limited to performing sexually transmitted infection testing. Though adolescents cited a number of advantages of confidential care and disclosure, they expressed some general mistrust in PCPs and concerns about limits of confidentiality. Rapport and relationship building with their PCP are key elements to adolescents’ comfort and increased disclosure. Overall, mothers viewed confidential care positively, especially in the context of continuity of care, but many felt excluded. Conclusions To increase adolescents’ perception of the relevance of primary care and to foster disclosure during health encounters, our participants described the critical nature of a strong doctor–patient relationship and positive physician demeanor and personalized messages, especially in the context of a continuity relationship. Regular, routine inclusion of confidential care time starting early in adolescence, as well as discussion of the purpose and limitations of confidentiality with parents and adolescents, could lead to greater parental comfort with confidential care and increased disclosure by the adolescent. PMID:21057068

  7. 76 FR 27745 - Wireless Innovation for Transportation; Request for Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-12

    ... claim to be confidential commercial information. When you submit information containing information identified as confidential commercial information, you should include a cover letter setting forth the reasons you believe the information qualifies as ``confidential commercial information.'' (49 CFR 7.13(c...

  8. 7 CFR 1221.234 - Confidentiality

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Confidentiality 1221.234 Section 1221.234 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  9. 7 CFR 1221.234 - Confidentiality

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Confidentiality 1221.234 Section 1221.234 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  10. 7 CFR 1280.634 - Confidentiality.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  11. 7 CFR 1280.634 - Confidentiality.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  12. 7 CFR 1280.634 - Confidentiality.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  13. 7 CFR 1280.634 - Confidentiality.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Confidentiality. 1280.634 Section 1280.634 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  14. 7 CFR 1221.234 - Confidentiality

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Confidentiality 1221.234 Section 1221.234 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  15. 7 CFR 1221.234 - Confidentiality

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Confidentiality 1221.234 Section 1221.234 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS... persons voting in the referendum and ballots shall be confidential and the contents of the ballots shall...

  16. 15 CFR 806.5 - Confidentiality.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 806.5 Section 806.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality. Information...

  17. 50 CFR 300.220 - Confidentiality of information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... met: (i) The employee has a need for confidential information to further the Department of Commerce's...) Homeland and national security activities. Confidential information may be made accessible to Federal... agency only if: (i) Providing the information promotes homeland security or national security purposes...

  18. 28 CFR 40.10 - Records-nature; confidentiality.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Records-nature; confidentiality. 40.10 Section 40.10 Judicial Administration DEPARTMENT OF JUSTICE STANDARDS FOR INMATE GRIEVANCE PROCEDURES Minimum Standards for Inmate Grievance Procedures § 40.10 Records—nature; confidentiality. (a) Nature...

  19. 28 CFR 40.10 - Records-nature; confidentiality.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Records-nature; confidentiality. 40.10 Section 40.10 Judicial Administration DEPARTMENT OF JUSTICE STANDARDS FOR INMATE GRIEVANCE PROCEDURES Minimum Standards for Inmate Grievance Procedures § 40.10 Records—nature; confidentiality. (a) Nature...

  20. 28 CFR 40.10 - Records-nature; confidentiality.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Records-nature; confidentiality. 40.10 Section 40.10 Judicial Administration DEPARTMENT OF JUSTICE STANDARDS FOR INMATE GRIEVANCE PROCEDURES Minimum Standards for Inmate Grievance Procedures § 40.10 Records—nature; confidentiality. (a) Nature...

Top