Sample records for data protection

  1. 40 CFR 161.390 - Reentry protection data requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Reentry protection data requirements. 161.390 Section 161.390 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Data Requirement Tables...

  2. 40 CFR 161.540 - Plant protection data requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Plant protection data requirements...) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Data Requirement Tables § 161.540 Plant protection data requirements. (a) Table. Sections 161.100 through 161.102 describe how...

  3. 40 CFR 161.540 - Plant protection data requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Plant protection data requirements...) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Data Requirement Tables § 161.540 Plant protection data requirements. (a) Table. Sections 161.100 through 161.102 describe how...

  4. 75 FR 31458 - Infrastructure Protection Data Call Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-03

    ...-0022] Infrastructure Protection Data Call Survey AGENCY: National Protection and Programs Directorate... New Information Collection Request, Infrastructure Protection Data Call Survey. DHS previously... territories are able to achieve this mission, IP requests opinions and information in a survey from IP Data...

  5. Data Protection Compliance in the Age of Digital Health.

    PubMed

    Hordern, Victoria

    2016-06-01

    Advances in technology are transforming the way that health data is collected and used. This includes improvements in existing technology as well as innovations in mobile technology such as smartphone apps and wearables. Health data is strictly regulated under the EU Data Protection Directive 95/46/EC. Under current data protection rules, health data is broadly interpreted and will, in most circumstances not connected to the provision of healthcare, require organisations to obtain explicit consent from individuals for its collection and use. Further data protection compliance issues arise such as identifying who is a controller, ensuring transparency, using health data for research purposes and keeping health data secure. As the EU data protection landscape is due to change in the next few years and will affect the collection and use of health data, the forthcoming Data Protection Regulation also deserves attention.

  6. Autonomous Information Unit: Why Making Data Smart Can also Make Data Secured?

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.

    2006-01-01

    In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and self-manage. In our approach, we decompose data into smaller pieces and provide individualized protection. We also provide a policy control mechanism to allow 'smart' access control and context based re-assembly of the decomposed data. By combining smart policy with individually protected data, we are able to provide better protection of sensitive information and achieve more flexible access during emergency conditions. As a result, this new fine-grain protection mechanism can enable us to achieve better solutions for problems such as distributed information protection and identity theft.

  7. 45 CFR 61.1 - The Healthcare Integrity and Protection Data Bank.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false The Healthcare Integrity and Protection Data Bank... HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON HEALTH CARE PROVIDERS, SUPPLIERS AND PRACTITIONERS General Provisions § 61.1 The Healthcare Integrity and Protection Data Bank. (a...

  8. 45 CFR 61.1 - The Healthcare Integrity and Protection Data Bank.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false The Healthcare Integrity and Protection Data Bank... HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON HEALTH CARE PROVIDERS, SUPPLIERS AND PRACTITIONERS General Provisions § 61.1 The Healthcare Integrity and Protection Data Bank. (a...

  9. 45 CFR 61.1 - The Healthcare Integrity and Protection Data Bank.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false The Healthcare Integrity and Protection Data Bank... HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON HEALTH CARE PROVIDERS, SUPPLIERS AND PRACTITIONERS General Provisions § 61.1 The Healthcare Integrity and Protection Data Bank. (a...

  10. Developing Privacy Solutions for Sharing and Analyzing Healthcare Data

    PubMed Central

    Motiwalla, Luvai; Li, Xiao-Bai

    2013-01-01

    The extensive use of electronic health data has increased privacy concerns. While most healthcare organizations are conscientious in protecting their data in their databases, very few organizations take enough precautions to protect data that is shared with third party organizations. Recently the regulatory environment has tightened the laws to enforce privacy protection. The goal of this research is to explore the application of data masking solutions for protecting patient privacy when data is shared with external organizations for research, analysis and other similar purposes. Specifically, this research project develops a system that protects data without removing sensitive attributes. Our application allows high quality data analysis with the masked data. Dataset-level properties and statistics remain approximately the same after data masking; however, individual record-level values are altered to prevent privacy disclosure. A pilot evaluation study on large real-world healthcare data shows the effectiveness of our solution in privacy protection. PMID:24285983

  11. Protecting privacy in a clinical data warehouse.

    PubMed

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.

  12. Regulatory Disruption and Arbitrage in Health-Care Data Protection.

    PubMed

    Terry, Nicolas P

    This article explains how the structure of U.S. health-care data protection (specifically its sectoral and downstream properties) has led to a chronically uneven policy environment for different types of health-care data. It examines claims for health-care data protection exceptionalism and competing demands such as data liquidity. In conclusion, the article takes the position that healthcare- data exceptionalism remains a valid imperative and that even current concerns about data liquidity can be accommodated in an exceptional protective model. However, re-calibrating our protection of health-care data residing outside of the traditional health-care domain is challenging, currently even politically impossible. Notwithstanding, a hybrid model is envisioned with downstream HIPAA model remaining the dominant force within the health-care domain, but being supplemented by targeted upstream and point-of-use protections applying to health-care data in disrupted spaces.

  13. Effects of errors and gaps in spatial data sets on assessment of conservation progress.

    PubMed

    Visconti, P; Di Marco, M; Álvarez-Romero, J G; Januchowski-Hartley, S R; Pressey, R L; Weeks, R; Rondinini, C

    2013-10-01

    Data on the location and extent of protected areas, ecosystems, and species' distributions are essential for determining gaps in biodiversity protection and identifying future conservation priorities. However, these data sets always come with errors in the maps and associated metadata. Errors are often overlooked in conservation studies, despite their potential negative effects on the reported extent of protection of species and ecosystems. We used 3 case studies to illustrate the implications of 3 sources of errors in reporting progress toward conservation objectives: protected areas with unknown boundaries that are replaced by buffered centroids, propagation of multiple errors in spatial data, and incomplete protected-area data sets. As of 2010, the frequency of protected areas with unknown boundaries in the World Database on Protected Areas (WDPA) caused the estimated extent of protection of 37.1% of the terrestrial Neotropical mammals to be overestimated by an average 402.8% and of 62.6% of species to be underestimated by an average 10.9%. Estimated level of protection of the world's coral reefs was 25% higher when using recent finer-resolution data on coral reefs as opposed to globally available coarse-resolution data. Accounting for additional data sets not yet incorporated into WDPA contributed up to 6.7% of additional protection to marine ecosystems in the Philippines. We suggest ways for data providers to reduce the errors in spatial and ancillary data and ways for data users to mitigate the effects of these errors on biodiversity assessments. © 2013 Society for Conservation Biology.

  14. National Perspectives on Data Protection.

    ERIC Educational Resources Information Center

    Yurow, Jane

    1983-01-01

    Discussion of different approaches to protecting personal information in Europe and the United States highlights data protection laws and agreements (international transfer of personal data, European laws, United States state and federal laws), United States and European views of privacy protection, national economic and political goals, and…

  15. 40 CFR 161.540 - Plant protection data requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... conditions are met: (i) Phytotoxicity problems concerning the product arise and open literature data are not... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Plant protection data requirements...) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Data Requirement Tables...

  16. 40 CFR 161.540 - Plant protection data requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... conditions are met: (i) Phytotoxicity problems concerning the product arise and open literature data are not... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Plant protection data requirements...) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Data Requirement Tables...

  17. Protecting personal data in epidemiological research: DataSHIELD and UK law.

    PubMed

    Wallace, Susan E; Gaye, Amadou; Shoush, Osama; Burton, Paul R

    2014-01-01

    Data from individual collections, such as biobanks and cohort studies, are now being shared in order to create combined datasets which can be queried to ask complex scientific questions. But this sharing must be done with due regard for data protection principles. DataSHIELD is a new technology that queries nonaggregated, individual-level data in situ but returns query data in an anonymous format. This raises questions of the ability of DataSHIELD to adequately protect participant confidentiality. An ethico-legal analysis was conducted that examined each step of the DataSHIELD process from the perspective of UK case law, regulations, and guidance. DataSHIELD reaches agreed UK standards of protection for the sharing of biomedical data. All direct processing of personal data is conducted within the protected environment of the contributing study; participating studies have scientific, ethics, and data access approvals in place prior to the analysis; studies are clear that their consents conform with this use of data, and participants are informed that anonymisation for further disclosure will take place. DataSHIELD can provide a flexible means of interrogating data while protecting the participants' confidentiality in accordance with applicable legislation and guidance. © 2014 S. Karger AG, Basel.

  18. 10 CFR 1016.21 - Protection of Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...

  19. 10 CFR 1016.21 - Protection of Restricted Data in storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...

  20. 10 CFR 1016.21 - Protection of Restricted Data in storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...

  1. 10 CFR 1016.21 - Protection of Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...

  2. 10 CFR 1016.21 - Protection of Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Protection of Restricted Data in storage. 1016.21 Section 1016.21 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.21 Protection of Restricted Data in storage. (a) Persons who possess Restricted Data...

  3. Privacy online: up, close and personal.

    PubMed

    Tikk, Eneken

    2017-01-01

    In the era of information, administration of personal data protection mingles with expectations of access to information as well as the overall sense of cyber (in)security. A failure to appropriately consider the system of data processing relationships easily reduces personal data protection to assurances in letter. The complexity of contemporary data transactions demands a systemic and structured normative approach to personal data protection. Any evaluation of relevant norms should not be isolated from factors that determine or condition their implementation. As privacy is an intrinsically subjective claim, enforcing data privacy is premised on data subject's personal participation in the protection of her data.

  4. WASP (Write a Scientific Paper): Data protection, a guide for health researchers.

    PubMed

    Grech, Victor; Agius-Muscat, Hugo

    2018-05-02

    Data protection (DP) protects crucial and humane fundamentals - the respect of human rights, particularly protecting aspects of privacy and confidentiality for living and identifiable persons. DP is enshrined in legislation, and this paper will outline the duties of potential data controllers (researchers) when applying for access to data, when processing said data, and what to do with it at the end of the study. Copyright © 2018 Elsevier B.V. All rights reserved.

  5. 30 CFR 551.14 - Protecting and disclosing data and information submitted to BOEM under a permit.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 2 2012-07-01 2012-07-01 false Protecting and disclosing data and information... SHELF § 551.14 Protecting and disclosing data and information submitted to BOEM under a permit. (a... of development for competitive reservoirs; (iv) Promote operational safety; (v) Protect the...

  6. 40 CFR 158.33 - Confidential data.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Confidential data. 158.33 Section 158.33 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES General Provisions § 158.33 Confidential data. (a) Definitions. For the purposes of...

  7. Protection of Proprietary Data Rights for Data Used to Support Tolerance Exemptions for Inert Ingredients

    EPA Pesticide Factsheets

    The FFDCA provides both exclusive use and data compensation protections for data that inert ingredient manufacturers submit to EPA to establish or maintain tolerances or tolerance exemptions for these ingredients. Find information about these protections.

  8. 40 CFR 158.33 - Confidential data.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Confidential data. 158.33 Section 158.33 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES General Provisions § 158.33 Confidential data. (a) Definitions. For the purposes of...

  9. A Decade of Data Protection for Innovative Drugs in Canada: Issues, Limitations, and Time for a Reassessment

    PubMed Central

    Kendall, Megan; Hamill, Declan

    2016-01-01

    Abstract Drug regulators in Canada and in other nations require innovative pharmaceutical companies to submit undisclosed clinical or other data as a condition of approving the marketing of new pharmaceutical products—the origination of which involves considerable effort and investment. Data protection regulations were enacted in Canada in 2006, which—to some extent—closed a loophole in intellectual property law that had previously left innovative companies with no effective data protection for their clinical data. Although the regulations were intended to clarify and effectively implement Canada's international treaty obligations in the spirit of innovation, a review of Canada's first decade of effective data protection shows that Health Canada and Canadian courts have interpreted the scope of data protection for innovative drugs in a narrow manner that undermines and is inconsistent with the intent of the regulations. As the 10-year anniversary of data protection in Canada is this year (2016), this article demonstrates the need to advance Canada's data protection regime into one that consistently contributes to the promotion of investment in pharmaceutical research and development, to the mutual advantage of innovators and patients, in a manner conducive to the social and economic welfare of Canadians. PMID:28077911

  10. A Decade of Data Protection for Innovative Drugs in Canada: Issues, Limitations, and Time for a Reassessment.

    PubMed

    Kendall, Megan; Hamill, Declan

    2016-12-01

    Drug regulators in Canada and in other nations require innovative pharmaceutical companies to submit undisclosed clinical or other data as a condition of approving the marketing of new pharmaceutical products-the origination of which involves considerable effort and investment. Data protection regulations were enacted in Canada in 2006, which-to some extent-closed a loophole in intellectual property law that had previously left innovative companies with no effective data protection for their clinical data. Although the regulations were intended to clarify and effectively implement Canada's international treaty obligations in the spirit of innovation, a review of Canada's first decade of effective data protection shows that Health Canada and Canadian courts have interpreted the scope of data protection for innovative drugs in a narrow manner that undermines and is inconsistent with the intent of the regulations. As the 10-year anniversary of data protection in Canada is this year (2016), this article demonstrates the need to advance Canada's data protection regime into one that consistently contributes to the promotion of investment in pharmaceutical research and development, to the mutual advantage of innovators and patients, in a manner conducive to the social and economic welfare of Canadians.

  11. Sampling alien species inside and outside protected areas: Does it matter?

    NASA Astrophysics Data System (ADS)

    Moustakas, Aristides; Voutsela, Anneta; Katsanevakis, Stelios

    2018-06-01

    Data of alien species presences are generally more readily available in protected than non-protected areas due to higher sampling efforts inside protected areas. Are the results and conclusions based on analyses of data collected in protected areas representative of wider non-protected regions? We address this question by analysing some recently published data of alien plants in Greece. Mixed effects models were used with alien species presences in 8.25 x 8.25 km cells as dependent variable and the percentage of protected area, as well as the agricultural and artificial land cover types richness (as indicators of human presence) as independent variables. In addition, the spatial cross-correlation between the percentage of protected area and alien species richness was examined across scales. Results indicated that the percentage of protected area per cell is a poor predictor of alien species richness. Spatial analysis indicated that cells with higher percentage of protected areas have slightly less alien species than cells with lower percentage of protected areas. This result is likely to be driven by the overall negative correlation between habitat protection and anthropogenic activities. Thus, the conclusions deduced by data deriving from protected areas are likely to hold true for patterns of alien species in non-protected areas when the human pressures are accounted for.

  12. 40 CFR 161.101 - Required vs. conditionally required data.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Required vs. conditionally required data. 161.101 Section 161.101 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES How To Use Data Tables...

  13. Electronic Health Record in Italy and Personal Data Protection.

    PubMed

    Bologna, Silvio; Bellavista, Alessandro; Corso, Pietro Paolo; Zangara, Gianluca

    2016-06-01

    The present article deals with the Italian Electronic Health Record (hereinafter EHR), recently introduced by Act 221/2012, with a specific focus on personal data protection. Privacy issues--e.g., informed consent, data processing, patients' rights and minors' will--are discussed within the framework of recent e-Health legislation, national Data Protection Code, the related Data Protection Authority pronouncements and EU law. The paper is aimed at discussing the problems arising from a complex, fragmentary and sometimes uncertain legal framework on e-Health.

  14. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or...

  15. Trajectory data privacy protection based on differential privacy mechanism

    NASA Astrophysics Data System (ADS)

    Gu, Ke; Yang, Lihao; Liu, Yongzhi; Liao, Niandong

    2018-05-01

    In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.

  16. 40 CFR 161.100 - How to determine registration data requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false How to determine registration data requirements. 161.100 Section 161.100 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES How To Use Data Tables...

  17. Data-protection standards and confidentiality of HIV/AIDS status in the workplace - a South African case study.

    PubMed

    Muskat-Gorska, Zuzanna

    2008-11-01

    The article contextualises an emerging new regime for information privacy in South Africa (i.e. the draft Protection of Personal Information Bill). Subsequently, it discusses the possibility of successful implementation of international data-protection standards in an environment where there is an urgent need to balance HIV/AIDS confidentiality rights with public health requirements. Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on workplace data-protection practices, and it identifies some spaces for social dialogue on HIV/AIDS-data treatment in South Africa. The study methods comprise an analysis of legal documents (concerning international data-protection standards and the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade union representatives, in Johannesburg, in 2007.

  18. 40 CFR 158.210 - Experimental use permit data requirements for product chemistry.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Experimental use permit data requirements for product chemistry. 158.210 Section 158.210 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for product chemistry. All product chemistry data, as described in...

  19. 40 CFR 158.210 - Experimental use permit data requirements for product chemistry.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Experimental use permit data requirements for product chemistry. 158.210 Section 158.210 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for product chemistry. All product chemistry data, as described in...

  20. 40 CFR 158.210 - Experimental use permit data requirements for product chemistry.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Experimental use permit data requirements for product chemistry. 158.210 Section 158.210 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for product chemistry. All product chemistry data, as described in...

  1. 40 CFR 158.210 - Experimental use permit data requirements for product chemistry.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Experimental use permit data requirements for product chemistry. 158.210 Section 158.210 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for product chemistry. All product chemistry data, as described in...

  2. 40 CFR 158.210 - Experimental use permit data requirements for product chemistry.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 24 2014-07-01 2014-07-01 false Experimental use permit data requirements for product chemistry. 158.210 Section 158.210 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for product chemistry. All product chemistry data, as described in...

  3. 40 CFR 158.250 - Experimental use permit data requirements for human exposure.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Experimental use permit data requirements for human exposure. 158.250 Section 158.250 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for human exposure. No data for applicator exposure and post...

  4. 40 CFR 158.250 - Experimental use permit data requirements for human exposure.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Experimental use permit data requirements for human exposure. 158.250 Section 158.250 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for human exposure. No data for applicator exposure and post...

  5. 40 CFR 158.250 - Experimental use permit data requirements for human exposure.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Experimental use permit data requirements for human exposure. 158.250 Section 158.250 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for human exposure. No data for applicator exposure and post...

  6. 40 CFR 158.250 - Experimental use permit data requirements for human exposure.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 24 2014-07-01 2014-07-01 false Experimental use permit data requirements for human exposure. 158.250 Section 158.250 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for human exposure. No data for applicator exposure and post...

  7. 10 CFR 603.855 - Protected data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Protected data. 603.855 Section 603.855 Energy DEPARTMENT... Other Administrative Matters Intellectual Property § 603.855 Protected data. In accordance with law and regulation, the contracting officer must not release or disclose data marked with a restrictive legend (as...

  8. 10 CFR 603.855 - Protected data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Protected data. 603.855 Section 603.855 Energy DEPARTMENT... Other Administrative Matters Intellectual Property § 603.855 Protected data. In accordance with law and regulation, the contracting officer must not release or disclose data marked with a restrictive legend (as...

  9. 10 CFR 603.855 - Protected data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Protected data. 603.855 Section 603.855 Energy DEPARTMENT... Other Administrative Matters Intellectual Property § 603.855 Protected data. In accordance with law and regulation, the contracting officer must not release or disclose data marked with a restrictive legend (as...

  10. 40 CFR 792.190 - Storage and retrieval of records and data.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ....190 Storage and retrieval of records and data. (a) All raw data, documentation, records, protocols... 40 Protection of Environment 33 2012-07-01 2012-07-01 false Storage and retrieval of records and data. 792.190 Section 792.190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED...

  11. 40 CFR 792.190 - Storage and retrieval of records and data.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ....190 Storage and retrieval of records and data. (a) All raw data, documentation, records, protocols... 40 Protection of Environment 32 2011-07-01 2011-07-01 false Storage and retrieval of records and data. 792.190 Section 792.190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED...

  12. 40 CFR 792.190 - Storage and retrieval of records and data.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ....190 Storage and retrieval of records and data. (a) All raw data, documentation, records, protocols... 40 Protection of Environment 33 2013-07-01 2013-07-01 false Storage and retrieval of records and data. 792.190 Section 792.190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED...

  13. 40 CFR 792.190 - Storage and retrieval of records and data.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ....190 Storage and retrieval of records and data. (a) All raw data, documentation, records, protocols... 40 Protection of Environment 32 2014-07-01 2014-07-01 false Storage and retrieval of records and data. 792.190 Section 792.190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED...

  14. 10 CFR 603.855 - Protected data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Protected data. 603.855 Section 603.855 Energy DEPARTMENT... Other Administrative Matters Intellectual Property § 603.855 Protected data. In accordance with law and regulation, the contracting officer must not release or disclose data marked with a restrictive legend (as...

  15. 10 CFR 603.855 - Protected data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Protected data. 603.855 Section 603.855 Energy DEPARTMENT... Other Administrative Matters Intellectual Property § 603.855 Protected data. In accordance with law and regulation, the contracting officer must not release or disclose data marked with a restrictive legend (as...

  16. 40 CFR 98.46 - Data reporting requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 22 2012-07-01 2012-07-01 false Data reporting requirements. 98.46 Section 98.46 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Electricity Generation § 98.46 Data reporting requirements...

  17. 40 CFR 98.46 - Data reporting requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 21 2011-07-01 2011-07-01 false Data reporting requirements. 98.46 Section 98.46 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Electricity Generation § 98.46 Data reporting requirements...

  18. 40 CFR 98.46 - Data reporting requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 22 2013-07-01 2013-07-01 false Data reporting requirements. 98.46 Section 98.46 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Electricity Generation § 98.46 Data reporting requirements...

  19. 40 CFR 98.46 - Data reporting requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 21 2014-07-01 2014-07-01 false Data reporting requirements. 98.46 Section 98.46 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Electricity Generation § 98.46 Data reporting requirements...

  20. 40 CFR 98.46 - Data reporting requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Data reporting requirements. 98.46 Section 98.46 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Electricity Generation § 98.46 Data reporting requirements...

  1. A data protection framework for trans-European genetic research projects.

    PubMed

    Claerhout, Brecht; Forgó, Nikolaus; Krügel, Tina; Arning, Marian; De Moor, Georges

    2008-01-01

    The paper proposes a data protection framework for trans-European medical research projects, which is based on a technical security infrastructure as well as on organizational measures and contractual obligations. It mainly relies on pseudonymization, an internal Data Protection Authority and on a Trusted Third Party. The outcome is an environment that combines both good research conditions and an extensive protection of patients' privacy.

  2. 40 CFR 161.75 - Requirements for additional data.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Requirements for additional data. 161.75 Section 161.75 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES General Provisions § 161.75...

  3. 40 CFR 98.66 - Data reporting requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 21 2011-07-01 2011-07-01 false Data reporting requirements. 98.66 Section 98.66 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Aluminum Production § 98.66 Data reporting requirements. In...

  4. 40 CFR 98.416 - Data reporting requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 21 2014-07-01 2014-07-01 false Data reporting requirements. 98.416 Section 98.416 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Suppliers of Industrial Greenhouse Gases § 98.416 Data...

  5. 40 CFR 98.416 - Data reporting requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 21 2011-07-01 2011-07-01 false Data reporting requirements. 98.416 Section 98.416 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Suppliers of Industrial Greenhouse Gases § 98.416 Data...

  6. 40 CFR 98.416 - Data reporting requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 22 2013-07-01 2013-07-01 false Data reporting requirements. 98.416 Section 98.416 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Suppliers of Industrial Greenhouse Gases § 98.416 Data...

  7. 40 CFR 98.416 - Data reporting requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 22 2012-07-01 2012-07-01 false Data reporting requirements. 98.416 Section 98.416 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Suppliers of Industrial Greenhouse Gases § 98.416 Data...

  8. 76 FR 52953 - Sheena Shipley; Transfer of Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-24

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPP-2011-0038; FRL-8885-7] Sheena Shipley; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This notice announces that... all other data produced under this contract will be the property of the Environmental Protection...

  9. [Human genetic data from a data protection law perspective].

    PubMed

    Schulte In den Bäumen, Tobias

    2007-02-01

    The collection and use of genetic data have caused much concern in the German population. Data protection is widely seen as the tool to address these fears. The term genetic data is not self-explanatory, as it depends on the different types of genetic diseases. The protection of genetic data as defined with regard to the different sets of diseases needs to fit into the preexisting data protection legislation. Still, the particularities of genetic data such as the multipersonal impact need to be considered. A balance between the information needs of society and the right to privacy requires a medically driven criteria. The medical term of indication which corresponds with the data protection term of purpose should serve as a tool in order to balance the rights of the patients and their relatives or between clients and third persons involved. Some countries have set up new legislative acts to address the challenges of human genetics. The current state of German data protection law leaves citizen rather unprotected as long as the data are used for medical purposes in a wider sense. A special law on the collection of genetic data has been discussed for several years, but it should be questioned whether the scope of a sector-specific law would serve citizens better. It seems to be preferable to adjust the existing Data Protection Act rather than drafting a specific law which covers the field of human genetics. This adaptation should reflect upon the different technical ways in which genetic data are collected and used.

  10. 40 CFR 161.85 - Revision of data requirements and guidelines.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Revision of data requirements and guidelines. 161.85 Section 161.85 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES General Provisions § 161...

  11. 40 CFR 161.33 - Procedures for claims of confidentiality of data.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Procedures for claims of confidentiality of data. 161.33 Section 161.33 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES General...

  12. 40 CFR 58.16 - Data submittal and archiving requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 5 2011-07-01 2011-07-01 false Data submittal and archiving requirements. 58.16 Section 58.16 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) AMBIENT AIR QUALITY SURVEILLANCE Monitoring Network § 58.16 Data submittal and...

  13. Certificates of confidentiality: a valuable tool for protecting genetic data.

    PubMed

    Earley, C L; Strong, L C

    1995-09-01

    Protecting the confidentiality of genetic research data is an important aspect of genetic research that has been discussed in various forums. Research data must be protected to prevent discrimination and its use in litigation. The certificate of confidentiality was created to protect the subjects of alcohol- and drug-abuse studies, who may be engaging in illegal activities. As revised in 1988, the certificate protects investigators engaging in other kinds of studies from being compelled to reveal information about subjects. Because the certificate protects information that could damage a subject's financial or social standing or employability, it is an appropriate tool to use to maintain the confidentiality of genetic data. The Department of Health and Human Services issues the certificates; the procedure for applying for a certificate of confidentiality is presented.

  14. The Effect of the General Data Protection Regulation on Medical Research

    PubMed Central

    2017-01-01

    Background The enactment of the General Data Protection Regulation (GDPR) will impact on European data science. Particular concerns relating to consent requirements that would severely restrict medical data research have been raised. Objective Our objective is to explain the changes in data protection laws that apply to medical research and to discuss their potential impact. Methods Analysis of ethicolegal requirements imposed by the GDPR. Results The GDPR makes the classification of pseudonymised data as personal data clearer, although it has not been entirely resolved. Biomedical research on personal data where consent has not been obtained must be of substantial public interest. Conclusions The GDPR introduces protections for data subjects that aim for consistency across the EU. The proposed changes will make little impact on biomedical data research. PMID:28235748

  15. Rail-dbGaP: analyzing dbGaP-protected data in the cloud with Amazon Elastic MapReduce.

    PubMed

    Nellore, Abhinav; Wilks, Christopher; Hansen, Kasper D; Leek, Jeffrey T; Langmead, Ben

    2016-08-15

    Public archives contain thousands of trillions of bases of valuable sequencing data. More than 40% of the Sequence Read Archive is human data protected by provisions such as dbGaP. To analyse dbGaP-protected data, researchers must typically work with IT administrators and signing officials to ensure all levels of security are implemented at their institution. This is a major obstacle, impeding reproducibility and reducing the utility of archived data. We present a protocol and software tool for analyzing protected data in a commercial cloud. The protocol, Rail-dbGaP, is applicable to any tool running on Amazon Web Services Elastic MapReduce. The tool, Rail-RNA v0.2, is a spliced aligner for RNA-seq data, which we demonstrate by running on 9662 samples from the dbGaP-protected GTEx consortium dataset. The Rail-dbGaP protocol makes explicit for the first time the steps an investigator must take to develop Elastic MapReduce pipelines that analyse dbGaP-protected data in a manner compliant with NIH guidelines. Rail-RNA automates implementation of the protocol, making it easy for typical biomedical investigators to study protected RNA-seq data, regardless of their local IT resources or expertise. Rail-RNA is available from http://rail.bio Technical details on the Rail-dbGaP protocol as well as an implementation walkthrough are available at https://github.com/nellore/rail-dbgap Detailed instructions on running Rail-RNA on dbGaP-protected data using Amazon Web Services are available at http://docs.rail.bio/dbgap/ : anellore@gmail.com or langmea@cs.jhu.edu Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press.

  16. Multi-level discrepancies with sharing data on protected areas: what we have and what we need for the global village.

    PubMed

    Bertzky, Monika; Stoll-Kleemann, Susanne

    2009-01-01

    Protected areas present a global heritage. Assessing conservation achievements in protected areas is of crucial importance with respect to the on-time delivery of international biodiversity conservation targets. However, monitoring data from publicly accessible databases for comparative studies of conservation achievements in the protected areas of the world are very scarce, if not non-existent. At first glance this is surprising because, with regards to protected areas, at least according to well established protected area management guidelines and widely accepted public mandates, a great deal of monitoring work and data gathering is to be conducted. This would imply that data on changes of biodiversity in protected areas could be expected to exist, and the constant progress in information technologies and Web tools engenders hope that some of it might even be available online for the global public. This review article presents the results of an extensive online search and review of existing monitoring data from freely accessible online databases for its use in an assessment of conservation achievements in a larger sample of protected areas. Results show two contrary sides to the status quo of accessible data from the World Wide Web for conservation science: data overkill and data scarcity with poor metadata provision. While ever more research is, in fact, based on open-access online data, such as extrapolations of species ranges used in conservation management and planning, it remains almost impossible to obtain a basic set of information for an assessment of conservation achievements within a larger number of protected areas. This awareness has triggered a detailed discussion about the discrepancies in sharing data at the level of protected areas; mismatching relationships between expected activities in protected areas and the capacity for delivering these requirements are certainly among the main challenges. In addition, the fear of data misuse potentially resulting in harm for nature, careers, and competencies still seems to be a critical barrier strictly controlling the willingness to share data. Various initiatives aimed at tackling technical and cultural obstacles are introduced and discussed to reach the goal of a modern resource management based on adaptive management using digital opportunities of the new millennium for a sustainable global village.

  17. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    ERIC Educational Resources Information Center

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  18. 32 CFR 37.855 - How should I handle protected data?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false How should I handle protected data? 37.855 Section 37.855 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND... Intellectual Property § 37.855 How should I handle protected data? Prior to releasing or disclosing data marked...

  19. 32 CFR 37.855 - How should I handle protected data?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false How should I handle protected data? 37.855 Section 37.855 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND... Intellectual Property § 37.855 How should I handle protected data? Prior to releasing or disclosing data marked...

  20. 32 CFR 37.855 - How should I handle protected data?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false How should I handle protected data? 37.855 Section 37.855 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND... Intellectual Property § 37.855 How should I handle protected data? Prior to releasing or disclosing data marked...

  1. Data protection and the patient's right to safety.

    PubMed

    Herveg, Jean

    2014-06-01

    The article investigates the issue of knowing whether or not the proposal for a general data protection regulation could improve the patient's safety. This has been analyzed through the four main contributions that should be expected at least from data protection to the patient's safety. In our view, data protection should help supporting efficient information systems in healthcare, increasing data quality, strengthening the patient's rights and drawing the legal framework for performing quality control procedures. Compared to the current legal framework, it is not sure that the proposal might improve any of these contributions to the patient's safety.

  2. Data Leakage Prevention: E-Mail Protection via Gateway

    NASA Astrophysics Data System (ADS)

    Kaur, Kamaljeet; Gupta, Ishu; Singh, Ashutosh Kumar

    2018-01-01

    Protection of digital assets and intellectual property is becoming a challenge for most of the companies. Due to increasing availability of database services on internet, data may be insecure after passing through precarious networks. To protect intellectual property (IP) is a major concern for today's organizations, because a leakage that compromises IP means, sensitive information of a company is in the hands of biggest competitors. Electronic information processing and communication is replacing paper in many applications increasingly. Instead of paper, an email is being used for communication at workplace and from social media logins to bank accounts. Nowadays an email is becoming a mainstream business tool. An email can be misused to leave company’s sensitive data open to compromise. So, it may be of little surprise that attacks on emails are common. So, here we need an email protection system (EPS) that will protect information to leave organization via mail. In this paper, we developed an algorithm that will offer email protection via gateway during data transfer. This algorithm matches the patterns with the keywords stored in the database and then takes the actions accordingly to protect the data. This paper describes why email protection is important? How companies can protect their confidential information from being leaked by insiders.

  3. Development of data acquisition and over-current protection systems for a suppressor-grid current with a neutral-beam ion source

    NASA Astrophysics Data System (ADS)

    Wei, LIU; Chundong, HU; Sheng, LIU; Shihua, SONG; Jinxin, WANG; Yan, WANG; Yuanzhe, ZHAO; Lizhen, LIANG

    2017-12-01

    Neutral beam injection is one of the effective auxiliary heating methods in magnetic-confinement-fusion experiments. In order to acquire the suppressor-grid current signal and avoid the grid being damaged by overheating, a data acquisition and over-current protection system based on the PXI (PCI eXtensions for Instrumentation) platform has been developed. The system consists of a current sensor, data acquisition module and over-current protection module. In the data acquisition module, the acquired data of one shot will be transferred in isolation and saved in a data-storage server in a txt file. It can also be recalled using NBWave for future analysis. The over-current protection module contains two modes: remote and local. This gives it the function of setting a threshold voltage remotely and locally, and the forbidden time of over-current protection also can be set by a host PC in remote mode. Experimental results demonstrate that the data acquisition and over-current protection system has the advantages of setting forbidden time and isolation transmission.

  4. 40 CFR 160.51 - Specimen and data storage facilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Specimen and data storage facilities. 160.51 Section 160.51 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS GOOD LABORATORY PRACTICE STANDARDS Facilities § 160.51 Specimen and data storage facilities. Space...

  5. 40 CFR 792.51 - Specimen and data storage facilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 31 2010-07-01 2010-07-01 true Specimen and data storage facilities. 792.51 Section 792.51 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT (CONTINUED) GOOD LABORATORY PRACTICE STANDARDS Facilities § 792.51 Specimen and data...

  6. 40 CFR 58.15 - Annual air monitoring data certification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 5 2010-07-01 2010-07-01 false Annual air monitoring data certification. 58.15 Section 58.15 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) AMBIENT AIR QUALITY SURVEILLANCE Monitoring Network § 58.15 Annual air monitoring data...

  7. 40 CFR 58.15 - Annual air monitoring data certification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 5 2011-07-01 2011-07-01 false Annual air monitoring data certification. 58.15 Section 58.15 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) AMBIENT AIR QUALITY SURVEILLANCE Monitoring Network § 58.15 Annual air monitoring data...

  8. 78 FR 27370 - Proposed Change to Data Protection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-10

    ... DEPARTMENT OF ENERGY U.S. Energy Information Administration Proposed Change to Data Protection... Production and Preparation Report--Coal Mines and Preparation Plants; and EIA-8A, the Coal Stocks Report-Traders and Brokers. EIA proposes to change and strengthen the data protection provisions on Forms EIA-3...

  9. Protect sensitive data with lightweight memory encryption

    NASA Astrophysics Data System (ADS)

    Zhou, Hongwei; Yuan, Jinhui; Xiao, Rui; Zhang, Kai; Sun, Jingyao

    2018-04-01

    Since current commercial processor is not able to deal with the data in the cipher text, the sensitive data have to be exposed in the memory. It leaves a window for the adversary. To protect the sensitive data, a direct idea is to encrypt the data when the processor does not access them. On the observation, we have developed a lightweight memory encryption, called LeMe, to protect the sensitive data in the application. LeMe marks the sensitive data in the memory with the page table entry, and encrypts the data in their free time. LeMe is built on the Linux with a 3.17.6 kernel, and provides four user interfaces as dynamic link library. Our evaluations show LeMe is effective to protect the sensitive data and incurs an acceptable performance overhead.

  10. 40 CFR 725.260 - Submission of health and environmental effects data.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Submission of health and environmental effects data. 725.260 Section 725.260 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... for Research and Development Activities § 725.260 Submission of health and environmental effects data...

  11. 40 CFR 158.80 - Use of other data.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Use of other data. 158.80 Section 158.80 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA... or a test material, such as a native soil, plant, or animal, that is not characteristic of the United...

  12. Data Protection Issues in Higher Education with Technological Advancements

    ERIC Educational Resources Information Center

    McKelvey, Nigel

    2014-01-01

    Adhering to laws whilst working or studying in an educational establishment is often fraught with challenges. The Irish Data Protection Act 1988 (Amendment 2003) strives to protect the individual where their personal data is potentially being abused. The advancements in technologies have facilitated educational establishments by improving…

  13. 40 CFR 172.8 - Program surveillance and reporting of data.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Program surveillance and reporting of data. 172.8 Section 172.8 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... surveillance and reporting of data. (a) The permittee shall supervise the test program and evaluate the results...

  14. 40 CFR 172.8 - Program surveillance and reporting of data.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Program surveillance and reporting of data. 172.8 Section 172.8 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... surveillance and reporting of data. (a) The permittee shall supervise the test program and evaluate the results...

  15. 40 CFR 172.8 - Program surveillance and reporting of data.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Program surveillance and reporting of data. 172.8 Section 172.8 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... surveillance and reporting of data. (a) The permittee shall supervise the test program and evaluate the results...

  16. 40 CFR 172.8 - Program surveillance and reporting of data.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Program surveillance and reporting of data. 172.8 Section 172.8 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... surveillance and reporting of data. (a) The permittee shall supervise the test program and evaluate the results...

  17. 40 CFR 172.8 - Program surveillance and reporting of data.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 24 2014-07-01 2014-07-01 false Program surveillance and reporting of data. 172.8 Section 172.8 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... surveillance and reporting of data. (a) The permittee shall supervise the test program and evaluate the results...

  18. 40 CFR 160.190 - Storage and retrieval of records and data.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... retained. (b) There shall be archives for orderly storage and expedient retrieval of all raw data... 40 Protection of Environment 24 2014-07-01 2014-07-01 false Storage and retrieval of records and data. 160.190 Section 160.190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED...

  19. 40 CFR 160.190 - Storage and retrieval of records and data.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... retained. (b) There shall be archives for orderly storage and expedient retrieval of all raw data... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Storage and retrieval of records and data. 160.190 Section 160.190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED...

  20. 40 CFR 160.190 - Storage and retrieval of records and data.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... retained. (b) There shall be archives for orderly storage and expedient retrieval of all raw data... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Storage and retrieval of records and data. 160.190 Section 160.190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED...

  1. 40 CFR 160.190 - Storage and retrieval of records and data.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... retained. (b) There shall be archives for orderly storage and expedient retrieval of all raw data... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Storage and retrieval of records and data. 160.190 Section 160.190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED...

  2. Medical data protection: a proposal for a deontology code.

    PubMed

    Gritzalis, D; Tomaras, A; Katsikas, S; Keklikoglou, J

    1990-12-01

    In this paper, a proposal for a Medical Data Protection Deontology Code in Greece is presented. Undoubtedly, this code should also be of interest to other countries. The whole effort for the composition of this code is based on what holds internationally, particularly in the EC countries, on recent data acquired from Greek sources and on the experience resulting from what is acceptable in Greece. Accordingly, policies and their influence on the protection of health data, as well as main problems related to that protection, have been considered.

  3. Certificates of Confidentiality: Protecting Human Subject Research Data in Law and Practice

    PubMed Central

    Patel, Mayank J.; Williams, Brett A.; Austin, Jeffrey L.; Dame, Lauren A.

    2014-01-01

    Researchers often require and collect sensitive information about individuals to answer important scientific questions that impact individual health and well-being and the public health. Researchers recognize they have a duty to maintain the confidentiality of the data they collect and typically make promises, which are documented in the consent form. The legal interests of others, however, can threaten researchers’ promises of confidentiality, if they seek access to the data through subpoena. Certificates of Confidentiality (Certificates), authorized by federal statute, are an important tool for protecting individually identifiable sensitive research data from compelled disclosure. However, questions persist in the research community about the strength of Certificate protections, and the evidence on which to judge the strength is scant. In this article, we address those questions through a careful examination of the legislation and regulations concerning Certificates and the reported and unreported cases we have identified through our legal research and interviews with legal counsel about their experiences with Certificates. We also analyze other statutes that protect research data to compare them to the Certificate’s protections, and we review other legal strategies available for protecting research data. Based on our analysis, we conclude with recommendations for how to strengthen protection of sensitive research data. PMID:25392705

  4. Predictive analytics and child protection: constraints and opportunities.

    PubMed

    Russell, Jesse

    2015-08-01

    This paper considers how predictive analytics might inform, assist, and improve decision making in child protection. Predictive analytics represents recent increases in data quantity and data diversity, along with advances in computing technology. While the use of data and statistical modeling is not new to child protection decision making, its use in child protection is experiencing growth, and efforts to leverage predictive analytics for better decision-making in child protection are increasing. Past experiences, constraints and opportunities are reviewed. For predictive analytics to make the most impact on child protection practice and outcomes, it must embrace established criteria of validity, equity, reliability, and usefulness. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. The European Union's Adequacy Approach to Privacy and International Data Sharing in Health Research.

    PubMed

    Stoddart, Jennifer; Chan, Benny; Joly, Yann

    2016-03-01

    The European Union (EU) approach to data protection consists of assessing the adequacy of the data protection offered by the laws of a particular jurisdiction against a set of principles that includes purpose limitation, transparency, quality, proportionality, security, access, and rectification. The EU's Data Protection Directive sets conditions on the transfer of data to third countries by prohibiting Member States from transferring to such countries as have been deemed inadequate in terms of the data protection regimes. In theory, each jurisdiction is evaluated similarly and must be found fully compliant with the EU's data protection principles to be considered adequate. In practice, the inconsistency with which these evaluations are made presents a hurdle to international data-sharing and makes difficult the integration of different data-sharing approaches; in the 20 years since the Directive was first adopted, the laws of only five countries from outside of the EU, Economic Area, or the European Free Trade Agreement have been deemed adequate to engage in data transfers without the need for further administrative safeguards. © 2016 American Society of Law, Medicine & Ethics.

  6. Certificates of confidentiality: legal counsels' experiences with and perspectives on legal demands for research data.

    PubMed

    Wolf, Leslie E; Dame, Lauren A; Patel, Mayank J; Williams, Brett A; Austin, Jefferey A; Beskow, Laura M

    2012-10-01

    The certificate of confidentiality (Certificate) is an important tool for protecting identifiable, sensitive human subjects research data in the United States. However, little is known about the Certificate's effectiveness in protecting identifiable data. We interviewed 24 legal counsel representing U.S. research institutions about their experiences with legal demands for research data. Our respondents reported few, if any, legal demands over the course of their tenure, but two-thirds had experience with legal demands for data protected by a Certificate. They reported such demands often were resolved without disclosure of identifiable research data, typically without court intervention. While our respondents reported similar success protecting identifiable data in court, they often did not rely on the Certificate to do so.

  7. Developments in Genetic and Epigenetic Data Protection in Behavioral and Mental Health Spaces.

    PubMed

    Terry, Nicolas

    2015-10-01

    The legal system has been preparing for an explosion of epigenetic issues in public health, environmental regulation and litigation. So far, this explosion has been muted, and for now epigenetic data protection merely seems to be "enjoying" the same technological and legal challenges experienced by other clinical and research data. However, three areas of development suggest where epigenetic data protection may prove problematic. This article examines these three issues, noting the rapid expansion of research based on EMR-sourced clinical data, the large number of data protection models that can apply to genetic data (including point-of-use prohibitions on discrimination and confidentiality), and the increasing and controversial dangers of deidentified information being reidentified. Copyright © 2015 John Wiley & Sons, Ltd.

  8. Geographic Data as Personal Data in Four EU Member States

    NASA Astrophysics Data System (ADS)

    de Jong, A. J.; van Loenen, B.; Zevenbergen, J. A.

    2016-06-01

    The EU Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data aims at harmonising data protection legislation in the European Union. This should promote the free flow of products and services within the EU. This research found a wide variety of interpretations of the application of data protection legislation to geographic data. The variety was found among the different EU Member States, the different stakeholders and the different types of geographic data. In the Netherlands, the Data Protection Authority (DPA) states that panoramic images of streets are considered personal data. While Dutch case law judges that the data protection legislation does not apply if certain features are blurred and no link to an address is provided. The topographic datasets studied in the case studies do not contain personal data, according to the Dutch DPA, while the German DPA and the Belgian DPA judge that topographic maps of a large scale can contain personal data, and impose conditions on the processing of topographic maps. The UK DPA does consider this data outside of the scope of legal definition of personal data. The patchwork of differences in data protection legislation can be harmonised by using a traffic light model. This model focuses on the context in which the processing of the data takes place and has four categories of data: (1) sensitive personal data, (2) personal data, (3), data that can possibly lead to identification, and (4) non-personal data. For some geographic data, for example factual data that does not reveal sensitive information about a person, can be categorised in the third category giving room to opening up data under the INSPIRE Directive.

  9. Cross-layer shared protection strategy towards data plane in software defined optical networks

    NASA Astrophysics Data System (ADS)

    Xiong, Yu; Li, Zhiqiang; Zhou, Bin; Dong, Xiancun

    2018-04-01

    In order to ensure reliable data transmission on the data plane and minimize resource consumption, a novel protection strategy towards data plane is proposed in software defined optical networks (SDON). Firstly, we establish a SDON architecture with hierarchical structure of data plane, which divides the data plane into four layers for getting fine-grained bandwidth resource. Then, we design the cross-layer routing and resource allocation based on this network architecture. Through jointly considering the bandwidth resource on all the layers, the SDN controller could allocate bandwidth resource to working path and backup path in an economical manner. Next, we construct auxiliary graphs and transform the shared protection problem into the graph vertex coloring problem. Therefore, the resource consumption on backup paths can be reduced further. The simulation results demonstrate that the proposed protection strategy can achieve lower protection overhead and higher resource utilization ratio.

  10. The importance of regulatory data protection or exclusive use and other forms of intellectual property rights in the crop protection industry.

    PubMed

    Carroll, Michael J

    2016-09-01

    In order for a chemical plant protection product to be authorised for sale a registration dossier has to be assembled to demonstrate safety and efficacy to the satisfaction of government regulators. These studies and tests are protected for a period of 10 years in Europe, North America and some other jurisdictions from the date of first product authorisation so that only the data owner can gain commercial benefit from the data. Subsequent regulatory reviews which require new studies should not result in further periods of regulatory data protection exclusive use for the new data but compensation should be payable to the data generator. © 2016 The Authors. Pest Management Science published by John Wiley & Sons Ltd on behalf of Society of Chemical Industry. © 2016 The Authors. Pest Management Science published by John Wiley & Sons Ltd on behalf of Society of Chemical Industry.

  11. Patient information, consents and privacy protection scheme for an information system dedicated to pervasive developmental disorders.

    PubMed

    Ben Said, Mohamed; Robel, Laurence; Messiaen, Claude; Craus, Yann; Jais, Jean Philippe; Golse, Bernard; Landais, Paul

    2014-01-01

    Patients explicit and unambiguous information, patients consents and privacy protection are reviewed in this article, in the frame of the deployment of the information system TEDIS dedicated to autism spectrum disorders. The role of the Delegate to the Protection of Data is essential at this stage. We developed a privacy protection scheme based on storing encrypted patients personal data on the server database and decrypting it on the Web browser. It tries to respond to the end-users request to manage nominative data in a human readable form and to meet with privacy protection framework.

  12. Annual Statistical Report, 1988. Client Assistance Program, Protection & Advocacy System for Persons with Mental Illness, Protection & Advocacy System for Persons with Developmental Disabilities.

    ERIC Educational Resources Information Center

    National Association of Protection and Advocacy Systems, Washington, DC.

    The report summarizes: (1) 1988 program data for state Protection and Advocacy Systems for persons with developmental disabilities and persons with mental illness, and (2) 1988 program data for Client Assistance Programs. The data are derived from reports from 56 states and territories. In addition to nationwide data totals, each state's…

  13. Data with a Mission: Building a Community for Interactive Data Visualization at the U.S. Environmental Protection Agency

    EPA Science Inventory

    The U.S Environmental Protection Agency’s (EPA) stated mission is to protect human health and the environment. A big part of our activities directed at fulfilling our mission directly involve using data. Environmental analysis, activity planning and communication are just a few o...

  14. LEA in Private: A Privacy and Data Protection Framework for a Learning Analytics Toolbox

    ERIC Educational Resources Information Center

    Steiner, Christina M.; Kickmeier-Rust, Michael D.; Albert, Dietrich

    2016-01-01

    To find a balance between learning analytics research and individual privacy, learning analytics initiatives need to appropriately address ethical, privacy, and data protection issues. A range of general guidelines, model codes, and principles for handling ethical issues and for appropriate data and privacy protection are available, which may…

  15. 40 CFR 1065.520 - Pre-test verification procedures and pre-test data collection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 34 2013-07-01 2013-07-01 false Pre-test verification procedures and pre-test data collection. 1065.520 Section 1065.520 Protection of Environment ENVIRONMENTAL PROTECTION... Specified Duty Cycles § 1065.520 Pre-test verification procedures and pre-test data collection. (a) If your...

  16. 40 CFR 1065.520 - Pre-test verification procedures and pre-test data collection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 34 2012-07-01 2012-07-01 false Pre-test verification procedures and pre-test data collection. 1065.520 Section 1065.520 Protection of Environment ENVIRONMENTAL PROTECTION... Specified Duty Cycles § 1065.520 Pre-test verification procedures and pre-test data collection. (a) If your...

  17. 40 CFR 1065.520 - Pre-test verification procedures and pre-test data collection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 33 2014-07-01 2014-07-01 false Pre-test verification procedures and pre-test data collection. 1065.520 Section 1065.520 Protection of Environment ENVIRONMENTAL PROTECTION... Specified Duty Cycles § 1065.520 Pre-test verification procedures and pre-test data collection. (a) For...

  18. 40 CFR 1066.420 - Pre-test verification procedures and pre-test data collection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 34 2013-07-01 2013-07-01 false Pre-test verification procedures and pre-test data collection. 1066.420 Section 1066.420 Protection of Environment ENVIRONMENTAL PROTECTION... Test § 1066.420 Pre-test verification procedures and pre-test data collection. (a) Follow the...

  19. 40 CFR 1065.520 - Pre-test verification procedures and pre-test data collection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Pre-test verification procedures and pre-test data collection. 1065.520 Section 1065.520 Protection of Environment ENVIRONMENTAL PROTECTION... Specified Duty Cycles § 1065.520 Pre-test verification procedures and pre-test data collection. (a) If your...

  20. 40 CFR 1065.520 - Pre-test verification procedures and pre-test data collection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 33 2011-07-01 2011-07-01 false Pre-test verification procedures and pre-test data collection. 1065.520 Section 1065.520 Protection of Environment ENVIRONMENTAL PROTECTION... Specified Duty Cycles § 1065.520 Pre-test verification procedures and pre-test data collection. (a) If your...

  1. 40 CFR 1066.420 - Pre-test verification procedures and pre-test data collection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 34 2012-07-01 2012-07-01 false Pre-test verification procedures and pre-test data collection. 1066.420 Section 1066.420 Protection of Environment ENVIRONMENTAL PROTECTION... Test § 1066.420 Pre-test verification procedures and pre-test data collection. (a) Follow the...

  2. Protecting Sensitive Information in Directory Services Using Virtual Directories

    NASA Astrophysics Data System (ADS)

    Claycomb, William; Shin, Dongwan

    Directory services are commonly used to store information related to individuals, and often act as a source for security services, such as authentication and access control, in collaborative applications within/across organizations. Hence, there is an urgent need to protect the sensitive information they contain. Existing solutions offer minimal protection against insider attacks, a growing threat to both government and industry data services. In this paper we present a solution for data protection that leverages virtual directories and data encryption to provide a user-centric approach to data protection, delegation, and collaboration. A security architecture is presented, along with the discussion of the benefits and vulnerabilities of our approach. We also discuss a proof-of-concept implementation and performance testing results.

  3. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.

    PubMed

    Malin, Bradley; Sweeney, Latanya

    2004-06-01

    The increasing integration of patient-specific genomic data into clinical practice and research raises serious privacy concerns. Various systems have been proposed that protect privacy by removing or encrypting explicitly identifying information, such as name or social security number, into pseudonyms. Though these systems claim to protect identity from being disclosed, they lack formal proofs. In this paper, we study the erosion of privacy when genomic data, either pseudonymous or data believed to be anonymous, are released into a distributed healthcare environment. Several algorithms are introduced, collectively called RE-Identification of Data In Trails (REIDIT), which link genomic data to named individuals in publicly available records by leveraging unique features in patient-location visit patterns. Algorithmic proofs of re-identification are developed and we demonstrate, with experiments on real-world data, that susceptibility to re-identification is neither trivial nor the result of bizarre isolated occurrences. We propose that such techniques can be applied as system tests of privacy protection capabilities.

  4. The Effect of the General Data Protection Regulation on Medical Research.

    PubMed

    Rumbold, John Mark Michael; Pierscionek, Barbara

    2017-02-24

    The enactment of the General Data Protection Regulation (GDPR) will impact on European data science. Particular concerns relating to consent requirements that would severely restrict medical data research have been raised. Our objective is to explain the changes in data protection laws that apply to medical research and to discuss their potential impact. Analysis of ethicolegal requirements imposed by the GDPR. The GDPR makes the classification of pseudonymised data as personal data clearer, although it has not been entirely resolved. Biomedical research on personal data where consent has not been obtained must be of substantial public interest. The GDPR introduces protections for data subjects that aim for consistency across the EU. The proposed changes will make little impact on biomedical data research. ©John Mark Michael Rumbold, Barbara Pierscionek. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 24.02.2017.

  5. Increasing Access and Usability of Remote Sensing Data: The NASA Protected Area Archive

    NASA Technical Reports Server (NTRS)

    Geller, Gary N.

    2004-01-01

    Although remote sensing data are now widely available, much of it at low or no-cost, many managers of protected conservation areas do not have the expertise or tools to view or analyze it. Thus access to it by the protected area management community is effectively blocked. The Protected Area Archive will increase access to remote sensing data by creating collections of satellite images of protected areas and packaging them with simple-to-use visualization and analytical tools. The user can easily locate the area and image of interest on a map, then display, roam, and zoom the image. A set of simple tools will be provided so the user can explore the data and employ it to assist in management and monitoring of their area. The 'Phase 1 ' version requires only a Windows-based computer and basic computer skills, and may be of particular help to protected area managers in developing countries.

  6. [Protection of genetic data in Spain. Analysis based on the general principles of personal data protection].

    PubMed

    García Amez, Javier

    2006-01-01

    The genetic data is Spain is not regulated specifically, rather, we must look at the regulation on the protection of data of a personal nature. This is turn, establishes a series of general principles to apply to any type of data. Analysing this with other regulations that are dispersed both in the national and international regulations, we can deduce the rights and obligations in this field. This highlights the fact that one can't dispose of the genetic data in the same manner as the personal data.

  7. Certificates of Confidentiality: Legal Counsels’ Experiences with and Perspectives on Legal Demands for Research Data

    PubMed Central

    Wolf, Leslie E.; Dame, Lauren A.; Patel, Mayank J.; Williams, Brett A.; Austin, Jeffrey A.; Beskow, Laura M.

    2013-01-01

    The Certificate of Confidentiality (Certificate) is an important tool for protecting identifiable, sensitive human subjects research data in the United States. However, little is known about the Certificate’s effectiveness in protecting identifiable data. We interviewed 24 legal counsel representing U.S. research institutions about their experiences with legal demands for research data. Our respondents reported few, if any, legal demands over the course of their tenure, but two-thirds had experience with legal demands for data protected by a Certificate. They reported such demands often were resolved without disclosure of identifiable research data, typically without court intervention. While our respondents reported similar success protecting identifiable data in court, they often did not rely on the Certificate to do so. PMID:23086043

  8. Device Data Protection in Mobile Healthcare Applications

    NASA Astrophysics Data System (ADS)

    Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin

    The rapid growth in mobile technology makes the delivery of healthcare data and services on mobile phones a reality. However, the healthcare data is very sensitive and has to be protected against unauthorized access. While most of the development work on security of mobile healthcare today focuses on the data encryption and secure authentication in remote servers, protection of data on the mobile device itself has gained very little attention. This paper analyses the requirements and the architecture for a secure mobile capsule, specially designed to protect the data that is already on the device. The capsule is a downloadable software agent with additional functionalities to enable secure external communication with healthcare service providers, network operators and other relevant communication parties.

  9. A data protection scheme for medical research networks. Review after five years of operation.

    PubMed

    Helbing, K; Demiroglu, S Y; Rakebrandt, F; Pommerening, K; Rienhoff, O; Sax, U

    2010-01-01

    The data protection requirements matured in parallel to new clinical tests generating more personal data since the 1960s. About ten years ago it was recognized that a generic data protection scheme for medical research networks is required, which reinforces patient rights but also allows economically feasible medical research compared to "hand-carved" individual solutions. To give recommendations for more efficient IT infrastructures for medical research networks in compliance with data protection requirements. The IT infrastructures of three medical research networks were reviewed with respect to the relevant data management modules. Recommendations are derived to increase cost efficiency in research networks assessing the consequences of a service provider approach without lowering the data protection level. The existing data protection schemes are very complex. Smaller research networks cannot afford the implementation of such schemes. Larger networks struggle to keep them sustainable. Due to a modular redesign in the medical research network community, a new approach offers opportunities for an efficient sustainable IT infrastructure involving a service provider concept. For standard components 70-80% of the costs could be cut down, for open source components about 37% over a three-year period. Future research networks should switch to a service-oriented approach to achieve a sustainable, cost-efficient IT infrastructure.

  10. 40 CFR 58.30 - Special considerations for data comparisons to the NAAQS.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 5 2011-07-01 2011-07-01 false Special considerations for data comparisons to the NAAQS. 58.30 Section 58.30 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... characteristics (see appendix D to this part, section 4.7.1) impact how the resulting PM2.5 data can be compared...

  11. 40 CFR 58.30 - Special considerations for data comparisons to the NAAQS.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 5 2010-07-01 2010-07-01 false Special considerations for data comparisons to the NAAQS. 58.30 Section 58.30 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... characteristics (see appendix D to this part, section 4.7.1) impact how the resulting PM2.5 data can be compared...

  12. Forest Fire Occurrence in Southern Counties, 1966-1975

    Treesearch

    M.L. Doolittle

    1977-01-01

    Forest fire occurrence data for individual protection units generally are unavailable outside particular state organization. Number of fires, area protected and fire occurrence rate (fires per 1,000,000 acres) from 1966 to 1975, are presented in tables for the 993 counties under protection in 13 southern states. These data are compared with data for the preceeding...

  13. 40 CFR 161.153 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Definitions. 161.153 Section 161.153 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data Requirements § 161.153 Definitions...

  14. 40 CFR 161.153 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Definitions. 161.153 Section 161.153 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data Requirements § 161.153 Definitions...

  15. 40 CFR 161.180 - Enforcement analytical method.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Enforcement analytical method. 161.180 Section 161.180 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data Requirements...

  16. 40 CFR 161.180 - Enforcement analytical method.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Enforcement analytical method. 161.180 Section 161.180 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data Requirements...

  17. 40 CFR 161.180 - Enforcement analytical method.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Enforcement analytical method. 161.180 Section 161.180 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data Requirements...

  18. Differential Privacy Preserving in Big Data Analytics for Connected Health.

    PubMed

    Lin, Chi; Song, Zihao; Song, Houbing; Zhou, Yanhong; Wang, Yi; Wu, Guowei

    2016-04-01

    In Body Area Networks (BANs), big data collected by wearable sensors usually contain sensitive information, which is compulsory to be appropriately protected. Previous methods neglected privacy protection issue, leading to privacy exposure. In this paper, a differential privacy protection scheme for big data in body sensor network is developed. Compared with previous methods, this scheme will provide privacy protection with higher availability and reliability. We introduce the concept of dynamic noise thresholds, which makes our scheme more suitable to process big data. Experimental results demonstrate that, even when the attacker has full background knowledge, the proposed scheme can still provide enough interference to big sensitive data so as to preserve the privacy.

  19. Open consent, biobanking and data protection law: can open consent be 'informed' under the forthcoming data protection regulation?

    PubMed

    Hallinan, Dara; Friedewald, Michael

    2015-01-01

    This article focuses on whether a certain form of consent used by biobanks--open consent--is compatible with the Proposed Data Protection Regulation. In an open consent procedure, the biobank requests consent once from the data subject for all future research uses of genetic material and data. However, as biobanks process personal data, they must comply with data protection law. Data protection law is currently undergoing reform. The Proposed Data Protection Regulation is the culmination of this reform and, if voted into law, will constitute a new legal framework for biobanking. The Regulation puts strict conditions on consent--in particular relating to information which must be given to the data subject. It seems clear that open consent cannot meet these requirements. 4 categories of information cannot be provided with adequate specificity: purpose, recipient, possible third country transfers, data collected. However, whilst open consent cannot meet the formal requirements laid out by the Regulation, this is not to say that these requirements are substantially undebateable. Two arguments could be put forward suggesting the applicable consent requirements should be rethought. First, from policy documents regarding the drafting process, it seems that the informational requirements in the Regulation are so strict in order to protect the data subject from risks inherent in the use of the consent mechanism in a certain context--exemplified by the online context. There are substantial differences between this context and the biobanking context. Arguably, a consent transaction in the biobanking does not present the same type of risk to the data subject. If the risks are different, then perhaps there are also grounds for a reconsideration of consent requirements? Second, an argument can be made that the legislator drafted the Regulation based on certain assumptions as to the nature of 'data'. The authors argue that these assumptions are difficult to apply to genetic data and accordingly a different approach to consent might be preferable. Such an approach might be more open consent friendly.

  20. 40 CFR 161.190 - Physical and chemical characteristics.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Physical and chemical characteristics. 161.190 Section 161.190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data...

  1. 40 CFR 161.165 - Description of formulation process.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Description of formulation process. 161.165 Section 161.165 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data...

  2. 40 CFR 161.155 - Product composition.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Product composition. 161.155 Section 161.155 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data Requirements § 161.155 Product...

  3. 40 CFR 161.175 - Certified limits.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Certified limits. 161.175 Section 161.175 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data Requirements § 161.175...

  4. 40 CFR 161.175 - Certified limits.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Certified limits. 161.175 Section 161.175 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data Requirements § 161.175...

  5. 40 CFR 161.162 - Description of production process.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Description of production process. 161.162 Section 161.162 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data Requirements...

  6. 40 CFR 161.170 - Preliminary analysis.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Preliminary analysis. 161.170 Section 161.170 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data Requirements § 161.170...

  7. 40 CFR 161.170 - Preliminary analysis.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Preliminary analysis. 161.170 Section 161.170 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data Requirements § 161.170...

  8. 40 CFR 161.155 - Product composition.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Product composition. 161.155 Section 161.155 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data Requirements § 161.155 Product...

  9. 40 CFR 161.190 - Physical and chemical characteristics.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Physical and chemical characteristics. 161.190 Section 161.190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data...

  10. 40 CFR 161.165 - Description of formulation process.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Description of formulation process. 161.165 Section 161.165 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data...

  11. 40 CFR 161.165 - Description of formulation process.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Description of formulation process. 161.165 Section 161.165 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data...

  12. 40 CFR 98.436 - Data reporting requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 22 2012-07-01 2012-07-01 false Data reporting requirements. 98.436 Section 98.436 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Importers and Exporters of Fluorinated Greenhouse Gases...

  13. The impact of the EU general data protection regulation on scientific research.

    PubMed

    Chassang, Gauthier

    2017-01-01

    The use of personal data is critical to ensure quality and reliability in scientific research. The new Regulation [European Union (EU)] 2016/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data [general data protection regulation (GDPR)], repealing Directive 95/46/EC, strengthens and harmonises the rules for protecting individuals' privacy rights and freedoms within and, under certain conditions, outside the EU territory. This new and historic legal milestone both prolongs and updates the EU acquis of the previous Data Protection Directive 95/46/EC. The GDPR fixes both general rules applying to any kind of personal data processing and specific rules applying to the processing of special categories of personal data such as health data taking place in the context of scientific research, this including clinical and translational research areas. This article aims to provide an overview of the new rules to consider where scientific projects include the processing of personal health data, genetic data or biometric data and other kinds of sensitive information whose use is strictly regulated by the GDPR in order to give the main key facts to researchers to adapt their practices and ensure compliance to the EU law to be enforced in May 2018.

  14. The impact of the EU general data protection regulation on scientific research

    PubMed Central

    Chassang, Gauthier

    2017-01-01

    The use of personal data is critical to ensure quality and reliability in scientific research. The new Regulation [European Union (EU)] 2016/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data [general data protection regulation (GDPR)], repealing Directive 95/46/EC, strengthens and harmonises the rules for protecting individuals’ privacy rights and freedoms within and, under certain conditions, outside the EU territory. This new and historic legal milestone both prolongs and updates the EU acquis of the previous Data Protection Directive 95/46/EC. The GDPR fixes both general rules applying to any kind of personal data processing and specific rules applying to the processing of special categories of personal data such as health data taking place in the context of scientific research, this including clinical and translational research areas. This article aims to provide an overview of the new rules to consider where scientific projects include the processing of personal health data, genetic data or biometric data and other kinds of sensitive information whose use is strictly regulated by the GDPR in order to give the main key facts to researchers to adapt their practices and ensure compliance to the EU law to be enforced in May 2018. PMID:28144283

  15. 40 CFR 75.32 - Determination of monitor data availability for standard missing data procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... availability for standard missing data procedures. 75.32 Section 75.32 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTINUOUS EMISSION MONITORING Missing Data Substitution Procedures § 75.32 Determination of monitor data availability for standard missing data procedures...

  16. 40 CFR 75.32 - Determination of monitor data availability for standard missing data procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... availability for standard missing data procedures. 75.32 Section 75.32 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTINUOUS EMISSION MONITORING Missing Data Substitution Procedures § 75.32 Determination of monitor data availability for standard missing data procedures...

  17. 40 CFR 75.32 - Determination of monitor data availability for standard missing data procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... availability for standard missing data procedures. 75.32 Section 75.32 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTINUOUS EMISSION MONITORING Missing Data Substitution Procedures § 75.32 Determination of monitor data availability for standard missing data procedures...

  18. 40 CFR 75.32 - Determination of monitor data availability for standard missing data procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... availability for standard missing data procedures. 75.32 Section 75.32 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTINUOUS EMISSION MONITORING Missing Data Substitution Procedures § 75.32 Determination of monitor data availability for standard missing data procedures...

  19. 40 CFR 75.32 - Determination of monitor data availability for standard missing data procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... availability for standard missing data procedures. 75.32 Section 75.32 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTINUOUS EMISSION MONITORING Missing Data Substitution Procedures § 75.32 Determination of monitor data availability for standard missing data procedures...

  20. 40 CFR 161.167 - Discussion of formation of impurities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Discussion of formation of impurities. 161.167 Section 161.167 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data...

  1. Managing personal health information in distributed research network environments.

    PubMed

    Bredfeldt, Christine E; Butani, Amy L; Pardee, Roy; Hitz, Paul; Padmanabhan, Sandy; Saylor, Gwyn

    2013-10-08

    Studying rare outcomes, new interventions and diverse populations often requires collaborations across multiple health research partners. However, transferring healthcare research data from one institution to another can increase the risk of data privacy and security breaches. A working group of multi-site research programmers evaluated the need for tools to support data security and data privacy. The group determined that data privacy support tools should: 1) allow for a range of allowable Protected Health Information (PHI); 2) clearly identify what type of data should be protected under the Health Insurance Portability and Accountability Act (HIPAA); and 3) help analysts identify which protected health information data elements are allowable in a given project and how they should be protected during data transfer. Based on these requirements we developed two performance support tools to support data programmers and site analysts in exchanging research data. The first tool, a workplan template, guides the lead programmer through effectively communicating the details of multi-site programming, including how to run the program, what output the program will create, and whether the output is expected to contain protected health information. The second performance support tool is a checklist that site analysts can use to ensure that multi-site program output conforms to expectations and does not contain protected health information beyond what is allowed under the multi-site research agreements. Together the two tools create a formal multi-site programming workflow designed to reduce the chance of accidental PHI disclosure.

  2. 75 FR 68297 - Pesticides; Satisfaction of Data Requirements; Procedures To Ensure Protection of Data Submitters...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-05

    ... Pesticides; Satisfaction of Data Requirements; Procedures To Ensure Protection of Data Submitters' Rights... regulations governing procedures for the satisfaction of data requirements under the Federal Insecticide... ground water. C. Satisfaction of Data Requirements EPA regulations in 40 CFR part 152, subpart E...

  3. 76 FR 302 - Pesticides; Satisfaction of Data Requirements; Procedures To Ensure Protection of Data Submitters...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-04

    ... Pesticides; Satisfaction of Data Requirements; Procedures To Ensure Protection of Data Submitters' Rights..., concerning the revision of its regulations which govern procedures for the satisfaction of data requirements... regulations which govern procedures for the satisfaction of data requirements under the Federal Insecticide...

  4. Unresolved legal questions in cross-border health care in Europe: liability and data protection.

    PubMed

    van der Molen, I N; Commers, M J

    2013-11-01

    Directive 2011/24/EU was designed to clarify the rights of EU citizens in evaluating, accessing and obtaining reimbursement for cross-border care. Based on three regional case studies, the authors attempted to assess the added value of the Directive in helping clarify issues in to two key areas that have been identified as barriers to cross-border care: liability and data protection. Qualitative case study employing secondary data sources including research of jurisprudence, that set up a Legal framework as a base to investigate liability and data protection in the context of cross-border projects. By means of three case studies that have tackled liability and data protection hurdles in cross-border care implementation, this article attempts to provide insight into legal certainty and uncertainty regarding cross-border care in Europe. The case studies reveal that the Directive has not resolved core uncertainties related to liability and data protection issues within cross-border health care. Some issues related to the practice of cross-border health care in Europe have been further clarified by the Directive and some direction has been given to possible solutions for issues connected to liability and data protection. Directive 2011/24/EU is clearly a transposition of existing regulations on data protection and ECJ case law, plus a set of additional, mostly, voluntary rules that might enhance regional border cooperation. Therefore, as shown in the case studies, a practical and case by case approach is still necessary in designing and providing cross-border care. © 2013 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  5. 32 CFR 37.850 - Should I require recipients to mark data?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Intellectual Property § 37.850 Should I require recipients to mark data? To protect the recipient's interests in data, your TIA should require the recipient to mark any particular data that it wishes to protect...

  6. Data surveillance in child protection systems development: an Indonesian case study.

    PubMed

    Boothby, Neil; Stark, Lindsay

    2011-12-01

    Successful implementation of child protection program interventions and child and family welfare services is contingent upon the availability and use of good quality information, as emphasized by the recent Convention on the Rights of the Child's General Comment 13. Yet, the role of information within child protection is not well understood, and ongoing efforts to strengthen child protection systems have not systematically examined this critical function. Recognizing these shortcomings, the Government of Indonesia and UNICEF commissioned a study to identify a "road map" for a national child protection information system. The used desk review, semi-structured interviews, focus groups and site visits to identify existing data collection practices, and analyze the appropriateness and efficiency of information management mechanisms from the national down to the community level. The results show that the prevailing situation in Indonesia is characterized by a lack of accurate information on all necessary aspects of child care and protection including magnitude of problems, causality analysis and impact of programmatic responses. There is no lead actor for child protection at the national level, and there are no agreed upon data collection priorities, procedures or methods for a shared data collection system. The study suggests a need to reframe the dominant language from a "child protection information management system" to a "child protection surveillance system" to promote clearer data collection objectives and activities. Identifying a government ministry to lead child protection efforts and to forge closer partnerships among relevant actors will be required to support a national surveillance system. Additionally, addressing obstacles that limit child protection incident detection at the community level is critical. In addition to strengthening Indonesia's system, this study's approach and findings have the potential to help to inform ongoing child protection system development initiatives in other countries as well. Copyright © 2011 Elsevier Ltd. All rights reserved.

  7. 40 CFR 141.707 - Grandfathering previously collected data.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... determines that a previously collected data set submitted for grandfathering was generated during source... additional source water monitoring data, as determined by the State, to ensure that the data set used under... data. 141.707 Section 141.707 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED...

  8. 40 CFR 141.707 - Grandfathering previously collected data.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... determines that a previously collected data set submitted for grandfathering was generated during source... additional source water monitoring data, as determined by the State, to ensure that the data set used under... data. 141.707 Section 141.707 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED...

  9. 40 CFR 141.707 - Grandfathering previously collected data.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... determines that a previously collected data set submitted for grandfathering was generated during source... additional source water monitoring data, as determined by the State, to ensure that the data set used under... data. 141.707 Section 141.707 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED...

  10. 40 CFR 98.75 - Procedures for estimating missing data.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 21 2011-07-01 2011-07-01 false Procedures for estimating missing data. 98.75 Section 98.75 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Ammonia Manufacturing § 98.75 Procedures for...

  11. 40 CFR 98.75 - Procedures for estimating missing data.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 21 2014-07-01 2014-07-01 false Procedures for estimating missing data. 98.75 Section 98.75 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Ammonia Manufacturing § 98.75 Procedures for...

  12. 40 CFR 98.75 - Procedures for estimating missing data.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 22 2013-07-01 2013-07-01 false Procedures for estimating missing data. 98.75 Section 98.75 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Ammonia Manufacturing § 98.75 Procedures for...

  13. 40 CFR 98.75 - Procedures for estimating missing data.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 22 2012-07-01 2012-07-01 false Procedures for estimating missing data. 98.75 Section 98.75 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Ammonia Manufacturing § 98.75 Procedures for...

  14. 40 CFR 98.75 - Procedures for estimating missing data.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Procedures for estimating missing data. 98.75 Section 98.75 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Ammonia Manufacturing § 98.75 Procedures for...

  15. 40 CFR 158.100 - Pesticide use patterns.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Pesticide use patterns. 158.100 Section 158.100 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES How To Use Data Tables § 158.100 Pesticide use patterns. (a) General...

  16. 40 CFR 158.100 - Pesticide use patterns.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 24 2014-07-01 2014-07-01 false Pesticide use patterns. 158.100 Section 158.100 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES How To Use Data Tables § 158.100 Pesticide use patterns. (a) General...

  17. 40 CFR 610.24 - Validity of test data.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 30 2011-07-01 2011-07-01 false Validity of test data. 610.24 Section 610.24 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY RETROFIT DEVICES Test Procedures and Evaluation Criteria Evaluation Criteria for the Preliminary...

  18. 40 CFR 610.24 - Validity of test data.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 31 2012-07-01 2012-07-01 false Validity of test data. 610.24 Section 610.24 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY RETROFIT DEVICES Test Procedures and Evaluation Criteria Evaluation Criteria for the Preliminary...

  19. 40 CFR 610.24 - Validity of test data.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 30 2014-07-01 2014-07-01 false Validity of test data. 610.24 Section 610.24 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY RETROFIT DEVICES Test Procedures and Evaluation Criteria Evaluation Criteria for the Preliminary...

  20. 40 CFR 610.24 - Validity of test data.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 31 2013-07-01 2013-07-01 false Validity of test data. 610.24 Section 610.24 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY RETROFIT DEVICES Test Procedures and Evaluation Criteria Evaluation Criteria for the Preliminary...

  1. 40 CFR 98.45 - Procedures for estimating missing data.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 22 2012-07-01 2012-07-01 false Procedures for estimating missing data. 98.45 Section 98.45 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Electricity Generation § 98.45 Procedures for...

  2. 40 CFR 98.45 - Procedures for estimating missing data.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Procedures for estimating missing data. 98.45 Section 98.45 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Electricity Generation § 98.45 Procedures for...

  3. 40 CFR 98.45 - Procedures for estimating missing data.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 21 2014-07-01 2014-07-01 false Procedures for estimating missing data. 98.45 Section 98.45 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Electricity Generation § 98.45 Procedures for...

  4. 40 CFR 98.45 - Procedures for estimating missing data.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 21 2011-07-01 2011-07-01 false Procedures for estimating missing data. 98.45 Section 98.45 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Electricity Generation § 98.45 Procedures for...

  5. 40 CFR 98.45 - Procedures for estimating missing data.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 22 2013-07-01 2013-07-01 false Procedures for estimating missing data. 98.45 Section 98.45 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) MANDATORY GREENHOUSE GAS REPORTING Electricity Generation § 98.45 Procedures for...

  6. 40 CFR 161.60 - Minor uses.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Minor uses. 161.60 Section 161.60 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS... until it is applied to the major use registrations. (3) EPA will accept extrapolations and regional data...

  7. 40 CFR 610.24 - Validity of test data.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 29 2010-07-01 2010-07-01 false Validity of test data. 610.24 Section 610.24 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY RETROFIT DEVICES Test Procedures and Evaluation Criteria Evaluation Criteria for the Preliminary...

  8. 40 CFR 610.20 - General.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 30 2011-07-01 2011-07-01 false General. 610.20 Section 610.20 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY RETROFIT...) Operator interaction effects; (d) Validity of test data; (e) Evaluation of test data; as these concepts are...

  9. Educational Outcomes for Children in Care: Linking 2013 Child Protection and NAPLAN Data. Cat. No. CWS 54

    ERIC Educational Resources Information Center

    Hunter, Nicole

    2015-01-01

    This report presents a snapshot of the academic performance of Australian children in the care of child protection services in 2013. Findings are based on the linkage of data from the Child Protection National Minimum Data Set and the National Assessment Program--Literacy and Numeracy. This report shows that the proportion of children in care…

  10. Developing a template for National Child Protection Index Reports.

    PubMed

    Ager, Alastair; Stark, Lindsay; Chu, Erin; Dewan, Shweta; Boothby, Neil

    2011-12-01

    What impact does the strengthening of child rights have on the experience and circumstances of children? CRC General Comment 13 emphasizes that defining measurable targets for improvements in child protection is a key element of efforts to strengthen child rights and well-being across the world. This paper describes an attempt to identify key domains relevant to such mapping of child protection indicators, and the feasibility of collecting data-from existing data sources or otherwise-to complete a "National Child Protection Index Report" summarizing achievements and concerns at a national level. A process of inter-agency consultation was facilitated by the CPC Learning Network to establish a template for the Index Report. The template was modeled on that used for the "Countdown to 2015" maternal, neonatal and child health initiative, aiming to capture indices not only of key protection risks but also implementation and coverage of key protection measures. The work drew on indicator development and policy initiatives by a number of international child protection agencies. The template developed was used as a basis to pilot national data collection in Indonesia and, at a sub-national level, in northern Uganda. The template provides a concise summary of protection issues of relevance to a broad range of constituencies, global and national. However, in the pilot settings, existing routine data collection was inadequate to effectively populate a large proportion of indicators. Mechanisms of collating findings from discrete assessments-another potential source of data for completion of the index report-were also generally underdeveloped. In settings where state infrastructure allows the collection and analysis of routine data in such domains as health and economic activity, such efforts should be extended to the child protection sector. Discrete assessments by governmental or non-governmental agencies also provide significant potential for more effective sharing and collation of information. National Child Protection sub-clusters or equivalent structures can play an important role in facilitating both of these processes. Copyright © 2011 Elsevier Ltd. All rights reserved.

  11. 32 CFR 37.855 - How should I handle protected data?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms Related to Other Administrative Matters Intellectual Property § 37.855 How should I handle protected data? Prior to releasing or disclosing data marked...

  12. 32 CFR 37.855 - How should I handle protected data?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Award Terms Related to Other Administrative Matters Intellectual Property § 37.855 How should I handle protected data? Prior to releasing or disclosing data marked...

  13. 40 CFR 86.1822-01 - Durability data vehicle selection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 19 2010-07-01 2010-07-01 false Durability data vehicle selection. 86.1822-01 Section 86.1822-01 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... engineering judgment in making this selection. (b) The manufacturer may select, using good engineering...

  14. 40 CFR 61.94 - Compliance and reporting.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 8 2011-07-01 2011-07-01 false Compliance and reporting. 61.94 Section 61.94 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED... parameters for the computer models (e.g., meteorological data) and the source of these data. (8) A brief...

  15. 40 CFR 61.94 - Compliance and reporting.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 9 2014-07-01 2014-07-01 false Compliance and reporting. 61.94 Section 61.94 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED... parameters for the computer models (e.g., meteorological data) and the source of these data. (8) A brief...

  16. 40 CFR 61.94 - Compliance and reporting.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 8 2010-07-01 2010-07-01 false Compliance and reporting. 61.94 Section 61.94 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED... parameters for the computer models (e.g., meteorological data) and the source of these data. (8) A brief...

  17. 40 CFR 61.94 - Compliance and reporting.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 9 2013-07-01 2013-07-01 false Compliance and reporting. 61.94 Section 61.94 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED... parameters for the computer models (e.g., meteorological data) and the source of these data. (8) A brief...

  18. 40 CFR 161.35 - Flexibility of the data requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Flexibility of the data requirements. 161.35 Section 161.35 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE... periodically to reflect new scientific knowledge, new trends in pesticide development, and new Agency policies...

  19. 40 CFR 600.010 - Vehicle test requirements and minimum data requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 31 2012-07-01 2012-07-01 false Vehicle test requirements and minimum data requirements. 600.010 Section 600.010 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND GREENHOUSE GAS EXHAUST EMISSIONS OF MOTOR VEHICLES General...

  20. 40 CFR 600.010 - Vehicle test requirements and minimum data requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 31 2013-07-01 2013-07-01 false Vehicle test requirements and minimum data requirements. 600.010 Section 600.010 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND GREENHOUSE GAS EXHAUST EMISSIONS OF MOTOR VEHICLES General...

  1. 40 CFR 600.509-12 - Voluntary submission of additional data.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 30 2014-07-01 2014-07-01 false Voluntary submission of additional data. 600.509-12 Section 600.509-12 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND GREENHOUSE GAS EXHAUST EMISSIONS OF MOTOR VEHICLES Procedures for...

  2. 40 CFR 600.010 - Vehicle test requirements and minimum data requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 30 2014-07-01 2014-07-01 false Vehicle test requirements and minimum data requirements. 600.010 Section 600.010 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND GREENHOUSE GAS EXHAUST EMISSIONS OF MOTOR VEHICLES General...

  3. Data protection, privacy.

    PubMed

    La Monaca, G; Schiralli, I

    2010-01-01

    The topic of data protection is referred closely to the concept of privacy--characterized by the American political philosophy in order to indicate a sphere recognized as personal, and therefore private or intimate, of the person, which exclude other individuals or society--whose protection has deep roots in the international right. The technological progress in the field of telecommunication has increased the facility of acquisition and spreading of information, the exchange of data, and the possibility of access to confidential information by other people. This made it made necessary the regulation of the management and the transfer of these information in order to protect individual rights and, on the other hand, an easy circulation of data for legitimate and useful goals.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Okhravi, Hamed; Sheldon, Frederick T.; Haines, Joshua

    Data diodes provide protection of critical cyber assets by the means of physically enforcing traffic direction on the network. In order to deploy data diodes effectively, it is imperative to understand the protection they provide, the protection they do not provide, their limitations, and their place in the larger security infrastructure. In this work, we study data diodes, their functionalities and limitations. We then propose two critical infrastructure systems that can benefit from the additional protection offered by data diodes: process control networks and net-centric cyber decision support systems. We review the security requirements of these systems, describe the architectures,more » and study the trade-offs. Finally, the architectures are evaluated against different attack patterns.« less

  5. Beyond Line-of-Sight Information Dissemination for Force Protection

    DTIC Science & Technology

    2012-11-01

    utilize ad hoc, mesh networks to support data-in-motion and remote data storage and access. These types of sensors are common among Force Protection...Operations and Forward Operating Base security . Current Force Protection Kits include a rich set of sensors that can be monitored from a core operator...and tactical war fighters in tactical network environments . Marti has the potential to improve situation awareness and Force Protection for

  6. Social media reveal that charismatic species are not the main attractor of ecotourists to sub-Saharan protected areas.

    PubMed

    Hausmann, Anna; Toivonen, Tuuli; Heikinheimo, Vuokko; Tenkanen, Henrikki; Slotow, Rob; Di Minin, Enrico

    2017-04-10

    Charismatic megafauna are arguably considered the primary attractor of ecotourists to sub-Saharan African protected areas. However, the lack of visitation data across the whole continent has thus far prevented the investigation of whether charismatic species are indeed a key attractor of ecotourists to protected areas. Social media data can now be used for this purpose. We mined data from Instagram, and used generalized linear models with site- and country-level deviations to explore which socio-economic, geographical and biological factors explain social media use in sub-Saharan African protected areas. We found that charismatic species richness did not explain social media usage. On the other hand, protected areas that were more accessible, had sparser vegetation, where human population density was higher, and that were located in wealthier countries, had higher social media use. Interestingly, protected areas with lower richness in non-charismatic species had more users. Overall, our results suggest that more factors than simply charismatic species might explain attractiveness of protected areas, and call for more in-depth content analysis of the posts. With African countries projected to develop further in the near-future, more social media data will become available, and could be used to inform protected area management and marketing.

  7. The Fitbit Fault Line: Two Proposals to Protect Health and Fitness Data at Work.

    PubMed

    Brown, Elizabeth A

    2016-01-01

    Employers are collecting and using their employees' health data, mined from wearable fitness devices and health apps, in new, profitable, and barely regulated ways. The importance of protecting employee health and fitness data will grow exponentially in the future. This is the moment for a robust discussion of how law can better protect employees from the potential misuse of their health data. While scholars have just begun to examine the problem of health data privacy, this Article contributes to the academic literature in three important ways. First, it analyzes the convergence of three trends resulting in an unprecedented growth of health-related data: the Internet of Things, the Quantified Self movement, and the Rise of Health Platforms. Second, it describes the insufficiencies of specific data privacy laws and federal agency actions in the context of protecting employee health data from employer misuse. Finally, it provides two detailed and workable solutions for remedying the current lack of protection of employee health data that will realign employer use with reasonable expectations of health and fitness privacy. The Article proceeds in four Parts. Part I describes the growth of self-monitoring apps, devices, and other sensor-enabled technology that can monitor a wide range of data related to an employee's health and fitness and the relationship of this growth to both the Quantified Self movement and the Internet of Things. Part II explains the increasing use of employee monitoring through a wide range of sensors, including wearable devices, and the potential uses of that health and fitness data. Part III explores the various regulations and agency actions that might protect employees from the potential misuse of their health and fitness data and the shortcomings of each. Part IV proposes two specific measures that would help ameliorate the ineffective legal protections that currently exist in this context. In order to improve employee notice of and control over the disclosure of their health data, I recommend the adoption of a mandatory privacy labeling law for health-related devices and apps to be enacted and enforced by the Federal Trade Commission (FTC). As a complementary measure, I also recommend that be amended so that its protections extend to the health-related data that employers may acquire about their employees. The Article concludes with suggestions for additional scholarly discussion.

  8. 76 FR 17933 - Infrastructure Protection Data Call Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... Survey AGENCY: National Protection and Programs Directorate, DHS. ACTION: 60-Day Notice and request for... mission, IP requests opinions and information in a survey from IP Data Call participants regarding the IP Data Call process and the web-based application used to collect the CIKR data. The survey data...

  9. Alternative Fuels Data Center: Coalition Leader Establishes Unique

    Science.gov Websites

    Initiatives to Effect Change and Protect Ecosystem Coalition Leader Establishes Unique Initiatives to Effect Change and Protect Ecosystem to someone by E-mail Share Alternative Fuels Data Center : Coalition Leader Establishes Unique Initiatives to Effect Change and Protect Ecosystem on Facebook Tweet

  10. 40 CFR 792.190 - Storage and retrieval of records and data.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 31 2010-07-01 2010-07-01 true Storage and retrieval of records and data. 792.190 Section 792.190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... mutagenicity tests, specimens of soil, water, and plants, and wet specimens of blood, urine, feces, and...

  11. 40 CFR 160.190 - Storage and retrieval of records and data.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Storage and retrieval of records and data. 160.190 Section 160.190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... soil, water, and plants, and wet specimens of blood, urine, feces, and biological fluids, do not need...

  12. 10 CFR 1016.22 - Protection while in use.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Protection while in use. 1016.22 Section 1016.22 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.22 Protection while in use. While in use, documents and material containing Restricted Data shall be under the...

  13. 10 CFR 1016.22 - Protection while in use.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Protection while in use. 1016.22 Section 1016.22 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.22 Protection while in use. While in use, documents and material containing Restricted Data shall be under the...

  14. 40 CFR 51.114 - Emissions data and projections.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... emissions from point and area sources. Lead requirements are specified in § 51.117. The inventory must be... 40 Protection of Environment 2 2012-07-01 2012-07-01 false Emissions data and projections. 51.114 Section 51.114 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS...

  15. 40 CFR 51.114 - Emissions data and projections.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... emissions from point and area sources. Lead requirements are specified in § 51.117. The inventory must be... 40 Protection of Environment 2 2014-07-01 2014-07-01 false Emissions data and projections. 51.114 Section 51.114 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS...

  16. 40 CFR 60.1780 - How are the stack test data used?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... for carbon monoxide, nitrogen oxides, and sulfur dioxide, see § 60.1725. ... 40 Protection of Environment 7 2014-07-01 2014-07-01 false How are the stack test data used? 60.1780 Section 60.1780 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS...

  17. 40 CFR 60.1780 - How are the stack test data used?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... for carbon monoxide, nitrogen oxides, and sulfur dioxide, see § 60.1725. ... 40 Protection of Environment 7 2012-07-01 2012-07-01 false How are the stack test data used? 60.1780 Section 60.1780 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS...

  18. 40 CFR 60.1780 - How are the stack test data used?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... for carbon monoxide, nitrogen oxides, and sulfur dioxide, see § 60.1725. ... 40 Protection of Environment 6 2010-07-01 2010-07-01 false How are the stack test data used? 60.1780 Section 60.1780 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS...

  19. 40 CFR 60.1780 - How are the stack test data used?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... for carbon monoxide, nitrogen oxides, and sulfur dioxide, see § 60.1725. ... 40 Protection of Environment 6 2011-07-01 2011-07-01 false How are the stack test data used? 60.1780 Section 60.1780 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS...

  20. 40 CFR 60.1780 - How are the stack test data used?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... for carbon monoxide, nitrogen oxides, and sulfur dioxide, see § 60.1725. ... 40 Protection of Environment 7 2013-07-01 2013-07-01 false How are the stack test data used? 60.1780 Section 60.1780 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS...

  1. 40 CFR 600.009 - Hearing on acceptance of test data.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 30 2014-07-01 2014-07-01 false Hearing on acceptance of test data. 600.009 Section 600.009 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND GREENHOUSE GAS EXHAUST EMISSIONS OF MOTOR VEHICLES General Provisions § 600.009...

  2. 40 CFR 600.009 - Hearing on acceptance of test data.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 31 2013-07-01 2013-07-01 false Hearing on acceptance of test data. 600.009 Section 600.009 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND GREENHOUSE GAS EXHAUST EMISSIONS OF MOTOR VEHICLES General Provisions § 600.009...

  3. 40 CFR 600.009 - Hearing on acceptance of test data.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 31 2012-07-01 2012-07-01 false Hearing on acceptance of test data. 600.009 Section 600.009 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND GREENHOUSE GAS EXHAUST EMISSIONS OF MOTOR VEHICLES General Provisions § 600.009...

  4. Chemical, Calcium Phosphate Cements for Geothermal Wells - Corrosion Protection, Bond Strength and Matrix Self-Healing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sugama, Toshifumi

    The data set shows performance of economical calcium phosphate cement (Fondu) blended with fly ash, class F (FAF) in carbon steel corrosion protection tests (corrosion rate, corrosion current and potential), bond- and matrix strength, as well as matrix strength recovery after imposed damage at 300C. The corrosion protection and lap-shear bond strength data are given for different Fondu/FAF ratios, the matrix strength data recoveries are reported for 60/40 weight % Fondu/FAF ratios. Effect of sodium phosphate on bond strength, corrosion protection and self-healing is demonstrated.

  5. 40 CFR Appendix D to Part 75 - Optional SO2 Emissions Data Protocol for Gas-Fired and Oil-Fired Units

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 17 2014-07-01 2014-07-01 false Optional SO2 Emissions Data Protocol for Gas-Fired and Oil-Fired Units D Appendix D to Part 75 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTINUOUS EMISSION MONITORING Pt. 75, App. D Appendix D to Part 75—Optional SO2 Emissions Data...

  6. Error protection capability of space shuttle data bus designs

    NASA Technical Reports Server (NTRS)

    Proch, G. E.

    1974-01-01

    Error protection assurance in the reliability of digital data communications is discussed. The need for error protection on the space shuttle data bus system has been recognized and specified as a hardware requirement. The error protection techniques of particular concern are those designed into the Shuttle Main Engine Interface (MEI) and the Orbiter Multiplex Interface Adapter (MIA). The techniques and circuit design details proposed for these hardware are analyzed in this report to determine their error protection capability. The capability is calculated in terms of the probability of an undetected word error. Calculated results are reported for a noise environment that ranges from the nominal noise level stated in the hardware specifications to burst levels which may occur in extreme or anomalous conditions.

  7. Rules for processing genetic data for research purposes in view of the new EU General Data Protection Regulation.

    PubMed

    Shabani, Mahsa; Borry, Pascal

    2018-02-01

    Genetic data contain sensitive health and non-health-related information about the individuals and their family members. Therefore, adopting adequate privacy safeguards is paramount when processing genetic data for research or clinical purposes. One of the major legal instruments for personal data protection in the EU is the new General Data Protection Regulation (GDPR), which has entered into force in May 2016 and repealed the Directive 95/46/EC, with an ultimate goal of enhancing effectiveness and harmonization of personal data protection in the EU. This paper explores the major provisions of the new Regulation with regard to processing genetic data, and assesses the influence of such provisions on reinforcing the legal safeguards when sharing genetic data for research purposes. The new Regulation attempts to elucidate the scope of personal data, by recognizing pseudonymized data as personal (identifiable) data, and including genetic data in the catalog of special categories of data (sensitive data). Moreover, a set of new rules is laid out in the Regulation for processing personal data under the scientific research exemption. For instance, further use of genetic data for scientific research purposes, without obtaining additional consent will be allowed, if the specific conditions is met. The new Regulation has already fueled concerns among various stakeholders, owing to the challenges that may emerge when implementing the Regulation across the countries. Notably, the provided definition for pseudonymized data has been criticized because it leaves too much room for interpretations, and it might undermine the harmonization of the data protection across the countries.

  8. 40 CFR 152.97 - Rights and obligations regarding the Data Submitters List.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., the type(s) of study he has previously submitted (identified by reference to data/information... Data Submitters List. 152.97 Section 152.97 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PESTICIDE REGISTRATION AND CLASSIFICATION PROCEDURES Satisfaction of Data...

  9. RAID Unbound: Storage Fault Tolerance in a Distributed Environment

    NASA Technical Reports Server (NTRS)

    Ritchie, Brian

    1996-01-01

    Mirroring, data replication, backup, and more recently, redundant arrays of independent disks (RAID) are all technologies used to protect and ensure access to critical company data. A new set of problems has arisen as data becomes more and more geographically distributed. Each of the technologies listed above provides important benefits; but each has failed to adapt fully to the realities of distributed computing. The key to data high availability and protection is to take the technologies' strengths and 'virtualize' them across a distributed network. RAID and mirroring offer high data availability, which data replication and backup provide strong data protection. If we take these concepts at a very granular level (defining user, record, block, file, or directory types) and them liberate them from the physical subsystems with which they have traditionally been associated, we have the opportunity to create a highly scalable network wide storage fault tolerance. The network becomes the virtual storage space in which the traditional concepts of data high availability and protection are implemented without their corresponding physical constraints.

  10. 40 CFR 158.2200 - Applicability.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ....2200 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Antimicrobial Pesticide Data Requirements § 158.2200 Applicability. Part 158, subpart W establishes data requirements for any pesticide product that is: (a) A pesticide that is...

  11. Company's Data Security - Case Study

    NASA Astrophysics Data System (ADS)

    Stera, Piotr

    This paper describes a computer network and data security problems in an existing company. Two main issues were pointed out: data loss protection and uncontrolled data copying. Security system was designed and implemented. The system consists of many dedicated programs. This system protect from data loss and detected unauthorized file copying from company's server by a dishonest employee.

  12. 40 CFR 600.010-08 - Vehicle test requirements and minimum data requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... data requirements. 600.010-08 Section 600.010-08 Protection of Environment ENVIRONMENTAL PROTECTION... requirements and minimum data requirements. (a) Unless otherwise exempted from specific emission compliance... applicable): (1) The manufacturer shall generate FTP fuel economy data by testing according to the applicable...

  13. 38 CFR 75.118 - Other credit protection services.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... harm. (c) The Secretary will take action to obtain data mining and data breach analyses services, as... (CONTINUED) INFORMATION SECURITY MATTERS Data Breaches § 75.118 Other credit protection services. (a) With... relevant credit bureau reports; (2) Data breach analysis; (3) Fraud resolution services, including writing...

  14. 38 CFR 75.118 - Other credit protection services.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... harm. (c) The Secretary will take action to obtain data mining and data breach analyses services, as... (CONTINUED) INFORMATION SECURITY MATTERS Data Breaches § 75.118 Other credit protection services. (a) With... relevant credit bureau reports; (2) Data breach analysis; (3) Fraud resolution services, including writing...

  15. 38 CFR 75.118 - Other credit protection services.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... harm. (c) The Secretary will take action to obtain data mining and data breach analyses services, as... (CONTINUED) INFORMATION SECURITY MATTERS Data Breaches § 75.118 Other credit protection services. (a) With... relevant credit bureau reports; (2) Data breach analysis; (3) Fraud resolution services, including writing...

  16. 38 CFR 75.118 - Other credit protection services.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... harm. (c) The Secretary will take action to obtain data mining and data breach analyses services, as... (CONTINUED) INFORMATION SECURITY MATTERS Data Breaches § 75.118 Other credit protection services. (a) With... relevant credit bureau reports; (2) Data breach analysis; (3) Fraud resolution services, including writing...

  17. 38 CFR 75.118 - Other credit protection services.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... harm. (c) The Secretary will take action to obtain data mining and data breach analyses services, as... (CONTINUED) INFORMATION SECURITY MATTERS Data Breaches § 75.118 Other credit protection services. (a) With... relevant credit bureau reports; (2) Data breach analysis; (3) Fraud resolution services, including writing...

  18. Guidelines for the selection of chemical-protective clothing. Volume 2. Technical and reference manual. (3rd Edition). Report for January 1985-March 1987

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schwope, A.D.; Costas, P.P.; Jackson, J.O.

    1987-02-01

    A variety of protective-clothing items are commercially available for emergency response and other applications where chemical hazards may be encountered. Data and information for selecting chemical-protective clothing is either not available or is inconsistant from source to source. In 1983, the U.S. Environmental Protection Agency sponsored the development of chemical-protective clothing selection guidelines to assist their own Office of Health and Safety in providing guidance to personnel, primarily EPA employees and contractors, working on hazardous-waste sites. These guidelines allowed a user to select an appropriate protective material for a specific chemical, select a clothing item (glove, suit, etc.), and thenmore » determine which manufacturers offered the clothing item in the recommended material. The U.S, Coast Guard Office of Research and Development and the EPA have supplemented these guidelines with additional data on material chemical resistance, material physical properties, clothing design features, and specific-vendor products. A chapter has been added for selecting chemical-protective suits. These guidelines contain data for over 750 chemicals and 700 clothing products. Volume I provides performance information and recommendations for selecting different types of protective clothing. Volume II contains a detailed technical discussion, and the data on which Volume I recommendations are based. The U.S. Coast Guard intends to use these guidelines for protective-clothing selection by its National Strike Force and Marine Safety Offices.« less

  19. Patterns of Risk in Adult Protection Referrals for Sexual Abuse and People with Intellectual Disability

    ERIC Educational Resources Information Center

    Cambridge, Paul; Beadle-Brown, Julie; Milne, Alisoun; Mansell, Jim; Whelton, Beckie

    2011-01-01

    Background: Adult protection monitoring data held by local authorities in England provide opportunities to examine referrals for alleged sexual abuse for people with intellectual disability to identify patterns of risk. Methods: Adult protection monitoring data collected by two local authorities was analysed, with referrals for alleged sexual…

  20. 40 CFR 158.260 - Experimental use permit data requirements for environmental fate.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Experimental use permit data requirements for environmental fate. 158.260 Section 158.260 Protection of Environment ENVIRONMENTAL PROTECTION... R R TGAI or PAIRA 1 Metabolism Studies - Laboratory 835.4100 Aerobic soil R CR NR NR R NR TGAI or...

  1. 40 CFR 63.7946 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 14 2013-07-01 2013-07-01 false How do I monitor and collect data to demonstrate continuous compliance? 63.7946 Section 63.7946 Protection of Environment ENVIRONMENTAL PROTECTION... SOURCE CATEGORIES (CONTINUED) National Emission Standards for Hazardous Air Pollutants: Site Remediation...

  2. 40 CFR 63.7946 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 13 2011-07-01 2011-07-01 false How do I monitor and collect data to demonstrate continuous compliance? 63.7946 Section 63.7946 Protection of Environment ENVIRONMENTAL PROTECTION... SOURCE CATEGORIES (CONTINUED) National Emission Standards for Hazardous Air Pollutants: Site Remediation...

  3. 40 CFR 63.7946 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 14 2012-07-01 2011-07-01 true How do I monitor and collect data to demonstrate continuous compliance? 63.7946 Section 63.7946 Protection of Environment ENVIRONMENTAL PROTECTION... SOURCE CATEGORIES (CONTINUED) National Emission Standards for Hazardous Air Pollutants: Site Remediation...

  4. 40 CFR 63.7946 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 14 2014-07-01 2014-07-01 false How do I monitor and collect data to demonstrate continuous compliance? 63.7946 Section 63.7946 Protection of Environment ENVIRONMENTAL PROTECTION... SOURCE CATEGORIES (CONTINUED) National Emission Standards for Hazardous Air Pollutants: Site Remediation...

  5. 40 CFR 51.5 - What tools are available to help prepare and report emissions data?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... PLANS Air Emissions Reporting Requirements General Information for Inventory Preparers § 51.5 What tools... 40 Protection of Environment 2 2014-07-01 2014-07-01 false What tools are available to help prepare and report emissions data? 51.5 Section 51.5 Protection of Environment ENVIRONMENTAL PROTECTION...

  6. 40 CFR 51.5 - What tools are available to help prepare and report emissions data?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... PLANS Air Emissions Reporting Requirements General Information for Inventory Preparers § 51.5 What tools... 40 Protection of Environment 2 2012-07-01 2012-07-01 false What tools are available to help prepare and report emissions data? 51.5 Section 51.5 Protection of Environment ENVIRONMENTAL PROTECTION...

  7. 40 CFR 51.5 - What tools are available to help prepare and report emissions data?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PLANS Air Emissions Reporting Requirements General Information for Inventory Preparers § 51.5 What tools... 40 Protection of Environment 2 2013-07-01 2013-07-01 false What tools are available to help prepare and report emissions data? 51.5 Section 51.5 Protection of Environment ENVIRONMENTAL PROTECTION...

  8. 40 CFR 60.1290 - How are the stack test data used?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 6 2011-07-01 2011-07-01 false How are the stack test data used? 60.1290 Section 60.1290 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Modification or Reconstruction is Commenced After June 6, 2001 Stack Testing § 60.1290 How are the stack test...

  9. 40 CFR 60.1290 - How are the stack test data used?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 7 2014-07-01 2014-07-01 false How are the stack test data used? 60.1290 Section 60.1290 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Modification or Reconstruction is Commenced After June 6, 2001 Stack Testing § 60.1290 How are the stack test...

  10. 40 CFR 60.1290 - How are the stack test data used?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 6 2010-07-01 2010-07-01 false How are the stack test data used? 60.1290 Section 60.1290 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Modification or Reconstruction is Commenced After June 6, 2001 Stack Testing § 60.1290 How are the stack test...

  11. 40 CFR 60.1290 - How are the stack test data used?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 7 2012-07-01 2012-07-01 false How are the stack test data used? 60.1290 Section 60.1290 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Modification or Reconstruction is Commenced After June 6, 2001 Stack Testing § 60.1290 How are the stack test...

  12. 40 CFR 60.1290 - How are the stack test data used?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 7 2013-07-01 2013-07-01 false How are the stack test data used? 60.1290 Section 60.1290 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Modification or Reconstruction is Commenced After June 6, 2001 Stack Testing § 60.1290 How are the stack test...

  13. 40 CFR 600.313-08 - Timetable for data and information submittal and review.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 30 2014-07-01 2014-07-01 false Timetable for data and information submittal and review. 600.313-08 Section 600.313-08 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND GREENHOUSE GAS EXHAUST EMISSIONS OF MOTOR VEHICLES Fuel...

  14. 40 CFR 600.313-08 - Timetable for data and information submittal and review.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 31 2013-07-01 2013-07-01 false Timetable for data and information submittal and review. 600.313-08 Section 600.313-08 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND GREENHOUSE GAS EXHAUST EMISSIONS OF MOTOR VEHICLES Fuel...

  15. 40 CFR 600.313-08 - Timetable for data and information submittal and review.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 31 2012-07-01 2012-07-01 false Timetable for data and information submittal and review. 600.313-08 Section 600.313-08 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND GREENHOUSE GAS EXHAUST EMISSIONS OF MOTOR VEHICLES Fuel...

  16. 76 FR 60004 - Proposed Information Collection; Comment Request; Data Collection and Verification for the Marine...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ... Collection; Comment Request; Data Collection and Verification for the Marine Protected Areas Inventory AGENCY... developing a national system of marine protected areas (MPAs). These departments are working closely with... Administration (NOAA) and DOI have created the Marine Protected Areas Inventory, an online spatial database that...

  17. 40 CFR 158.2260 - Applicator exposure.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... exposure data, provided the human pharmacokinetics of the pesticide or metabolite/analog compounds (i.e... 158.2260 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Antimicrobial Pesticide Data Requirements § 158.2260 Applicator exposure. (a...

  18. 40 CFR 158.2260 - Applicator exposure.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... exposure data, provided the human pharmacokinetics of the pesticide or metabolite/analog compounds (i.e... 158.2260 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Antimicrobial Pesticide Data Requirements § 158.2260 Applicator exposure. (a...

  19. 40 CFR 158.30 - Flexibility.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS..., or not require, data and information for the purposes of making regulatory judgments for pesticide products. EPA has the authority to establish or modify data needs for individual pesticide chemicals. The...

  20. 40 CFR 158.30 - Flexibility.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS..., or not require, data and information for the purposes of making regulatory judgments for pesticide products. EPA has the authority to establish or modify data needs for individual pesticide chemicals. The...

  1. 40 CFR 158.30 - Flexibility.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS..., or not require, data and information for the purposes of making regulatory judgments for pesticide products. EPA has the authority to establish or modify data needs for individual pesticide chemicals. The...

  2. 40 CFR 158.30 - Flexibility.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS..., or not require, data and information for the purposes of making regulatory judgments for pesticide products. EPA has the authority to establish or modify data needs for individual pesticide chemicals. The...

  3. 40 CFR 158.30 - Flexibility.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS..., or not require, data and information for the purposes of making regulatory judgments for pesticide products. EPA has the authority to establish or modify data needs for individual pesticide chemicals. The...

  4. 10 CFR 1016.25 - Protective personnel.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Protective personnel. 1016.25 Section 1016.25 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.25 Protective personnel. Whenever protective personnel are required by § 1016.23, such protective personnel...

  5. 10 CFR 1016.25 - Protective personnel.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Protective personnel. 1016.25 Section 1016.25 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.25 Protective personnel. Whenever protective personnel are required by § 1016.23, such protective personnel...

  6. 40 CFR 600.010-08 - Vehicle test requirements and minimum data requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., US06, SC03 and Cold temperature FTP data from each subconfiguration included within the model type. (2... data requirements. 600.010-08 Section 600.010-08 Protection of Environment ENVIRONMENTAL PROTECTION... Provisions § 600.010-08 Vehicle test requirements and minimum data requirements. (a) Unless otherwise...

  7. 40 CFR 600.010-86 - Vehicle test requirements and minimum data requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... additional model types established under § 600.207(a)(2), data from each subconfiguration included within the... data requirements. 600.010-86 Section 600.010-86 Protection of Environment ENVIRONMENTAL PROTECTION... requirements and minimum data requirements. (a) For each certification vehicle defined in this part, and for...

  8. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States and...

  9. 40 CFR 158.270 - Experimental use permit data requirements for residue chemistry.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... requirements for residue chemistry. 158.270 Section 158.270 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for residue chemistry. All residue chemistry data, as described in... section 408(r) is sought. Residue chemistry data are not required for an experimental use permit issued on...

  10. 40 CFR 158.270 - Experimental use permit data requirements for residue chemistry.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... requirements for residue chemistry. 158.270 Section 158.270 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for residue chemistry. All residue chemistry data, as described in... section 408(r) is sought. Residue chemistry data are not required for an experimental use permit issued on...

  11. 40 CFR 158.270 - Experimental use permit data requirements for residue chemistry.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... requirements for residue chemistry. 158.270 Section 158.270 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for residue chemistry. All residue chemistry data, as described in... section 408(r) is sought. Residue chemistry data are not required for an experimental use permit issued on...

  12. 40 CFR 158.270 - Experimental use permit data requirements for residue chemistry.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... requirements for residue chemistry. 158.270 Section 158.270 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for residue chemistry. All residue chemistry data, as described in... section 408(r) is sought. Residue chemistry data are not required for an experimental use permit issued on...

  13. 40 CFR 158.270 - Experimental use permit data requirements for residue chemistry.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... requirements for residue chemistry. 158.270 Section 158.270 Protection of Environment ENVIRONMENTAL PROTECTION... Experimental use permit data requirements for residue chemistry. All residue chemistry data, as described in... section 408(r) is sought. Residue chemistry data are not required for an experimental use permit issued on...

  14. Home

    Science.gov Websites

    Help Transfer, Protect Medical Research Data Science DMZ Design Could Help Transfer, Protect Medical Research Data As medicine becomes more data-intensive, a Medical Science DMZ design proposed by ESnet's Sean Peisert and Eli Dart could provide a secure solution for medical science data transfers. Read More

  15. 40 CFR 158.2080 - Experimental use permit data requirements-biochemical pesticides.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... requirements-biochemical pesticides. 158.2080 Section 158.2080 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Biochemical Pesticides § 158.2080 Experimental use permit data requirements—biochemical pesticides. (a) Sections 158.2081...

  16. 40 CFR 158.2080 - Experimental use permit data requirements-biochemical pesticides.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... requirements-biochemical pesticides. 158.2080 Section 158.2080 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Biochemical Pesticides § 158.2080 Experimental use permit data requirements—biochemical pesticides. (a) Sections 158.2081...

  17. 40 CFR 158.2080 - Experimental use permit data requirements-biochemical pesticides.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... requirements-biochemical pesticides. 158.2080 Section 158.2080 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Biochemical Pesticides § 158.2080 Experimental use permit data requirements—biochemical pesticides. (a) Sections 158.2081...

  18. 40 CFR 158.2080 - Experimental use permit data requirements-biochemical pesticides.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... requirements-biochemical pesticides. 158.2080 Section 158.2080 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Biochemical Pesticides § 158.2080 Experimental use permit data requirements—biochemical pesticides. (a) Sections 158.2081...

  19. 40 CFR 158.2080 - Experimental use permit data requirements-biochemical pesticides.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... requirements-biochemical pesticides. 158.2080 Section 158.2080 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Biochemical Pesticides § 158.2080 Experimental use permit data requirements—biochemical pesticides. (a) Sections 158.2081...

  20. Financial protection in Europe: a systematic review of the literature and mapping of data availability.

    PubMed

    Yerramilli, Pooja; Fernández, Óscar; Thomson, Sarah

    2018-05-01

    A comprehensive and context-specific approach to monitoring financial protection can provide valuable evidence on progress towards universal health coverage. This article systematically reviews the literature on financial protection in Europe to identify trends across countries and over time. It also maps the availability of data for regular monitoring in 53 countries. Two people independently searched for studies using a standard strategy. Results were extracted from 54 publications and studies analysed in terms of geographical focus, data sources, methods and depth of analysis. Financial protection varies across countries in Europe; substantial changes over time have mainly taken place in the east of the region. Although the data required for regular monitoring are widely available, the literature presents major gaps in geographical scope - most studies focus on middle-income countries; it is not up to date - the latest year of data analysed is 2011; and cross-national comparison is only possible for a handful of countries due to variation in data sources and methods. The literature is also limited in depth. Very few studies go beyond analysing how many people incur catastrophic or impoverishing out-of-pocket payments. Only a small minority analyse who is most likely to experience financial hardship and what drives lack of financial protection. The literature provides little actionable evidence on financial protection in Europe. Copyright © 2018 World Health Organization. Published by Elsevier B.V. All rights reserved.

  1. The disclosure of diagnosis codes can breach research participants' privacy.

    PubMed

    Loukides, Grigorios; Denny, Joshua C; Malin, Bradley

    2010-01-01

    De-identified clinical data in standardized form (eg, diagnosis codes), derived from electronic medical records, are increasingly combined with research data (eg, DNA sequences) and disseminated to enable scientific investigations. This study examines whether released data can be linked with identified clinical records that are accessible via various resources to jeopardize patients' anonymity, and the ability of popular privacy protection methodologies to prevent such an attack. The study experimentally evaluates the re-identification risk of a de-identified sample of Vanderbilt's patient records involved in a genome-wide association study. It also measures the level of protection from re-identification, and data utility, provided by suppression and generalization. Privacy protection is quantified using the probability of re-identifying a patient in a larger population through diagnosis codes. Data utility is measured at a dataset level, using the percentage of retained information, as well as its description, and at a patient level, using two metrics based on the difference between the distribution of Internal Classification of Disease (ICD) version 9 codes before and after applying privacy protection. More than 96% of 2800 patients' records are shown to be uniquely identified by their diagnosis codes with respect to a population of 1.2 million patients. Generalization is shown to reduce further the percentage of de-identified records by less than 2%, and over 99% of the three-digit ICD-9 codes need to be suppressed to prevent re-identification. Popular privacy protection methods are inadequate to deliver a sufficiently protected and useful result when sharing data derived from complex clinical systems. The development of alternative privacy protection models is thus required.

  2. Guidelines for the selection of chemical-protective clothing. Volume 1. (3rd Edition). Report for January 1985-May 1987

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schwope, A.D.; Costas, P.P.; Jackson, J.O.

    1987-02-01

    A variety of protective-clothing items are commerically available for emergency response and other applications where chemical hazards may be encountered. Data and information for selecting chemical-protective clothing is either not available or is inconsistant from source to source. In 1983, the U.S. Environmental Protection Agency sponsored the development of chemical-protective clothing selection guidelines to assist their own Office of Health and Safety in providing guidance to personnel, primarily EPA employees and contractors, working on hazardous-waste sites. These guidelines allowed a user to select an appropriate protective material for a specific chemical, select a clothing item (glove, suit, etc.) and thenmore » determine which manufacturers offered the clothing item in the selected material. The U.S. Coast Guard Office of Research and Development and the EPA have supplemented these guidelines with additional data on material chemical resistance, material physical properties, clothing design features, and specific-vendor products. A chapter has been added for selecting chemical protective suits. These guidelines contain data for over 750 chemicals and 700 clothing products. Volume I provides the performance information and recommendations for selecting different types of protective clothing.« less

  3. An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future.

    PubMed

    Malin, Bradley A

    2005-01-01

    The incorporation of genomic data into personal medical records poses many challenges to patient privacy. In response, various systems for preserving patient privacy in shared genomic data have been developed and deployed. Although these systems de-identify the data by removing explicit identifiers (e.g., name, address, or Social Security number) and incorporate sound security design principles, they suffer from a lack of formal modeling of inferences learnable from shared data. This report evaluates the extent to which current protection systems are capable of withstanding a range of re-identification methods, including genotype-phenotype inferences, location-visit patterns, family structures, and dictionary attacks. For a comparative re-identification analysis, the systems are mapped to a common formalism. Although there is variation in susceptibility, each system is deficient in its protection capacity. The author discovers patterns of protection failure and discusses several of the reasons why these systems are susceptible. The analyses and discussion within provide guideposts for the development of next-generation protection methods amenable to formal proofs.

  4. An Evaluation of the Current State of Genomic Data Privacy Protection Technology and a Roadmap for the Future

    PubMed Central

    Malin, Bradley A.

    2005-01-01

    The incorporation of genomic data into personal medical records poses many challenges to patient privacy. In response, various systems for preserving patient privacy in shared genomic data have been developed and deployed. Although these systems de-identify the data by removing explicit identifiers (e.g., name, address, or Social Security number) and incorporate sound security design principles, they suffer from a lack of formal modeling of inferences learnable from shared data. This report evaluates the extent to which current protection systems are capable of withstanding a range of re-identification methods, including genotype–phenotype inferences, location–visit patterns, family structures, and dictionary attacks. For a comparative re-identification analysis, the systems are mapped to a common formalism. Although there is variation in susceptibility, each system is deficient in its protection capacity. The author discovers patterns of protection failure and discusses several of the reasons why these systems are susceptible. The analyses and discussion within provide guideposts for the development of next-generation protection methods amenable to formal proofs. PMID:15492030

  5. 40 CFR 158.660 - Nontarget plant protection data requirements table.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... vigor R R R TEP 1, 2, 3, 7 850.4400850.5400 Aquatic plant growth (algal and aquatic vascular plant... plant growth (algal and aquatic vascular plant toxicity) CR CR CR TEP or TGAI 1, 4, 6, 7 Nontarget Area... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Nontarget plant protection data...

  6. 40 CFR 158.660 - Nontarget plant protection data requirements table.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... vigor R R R TEP 1, 2, 3, 7 850.4400850.5400 Aquatic plant growth (algal and aquatic vascular plant... plant growth (algal and aquatic vascular plant toxicity) CR CR CR TEP or TGAI 1, 4, 6, 7 Nontarget Area... 40 Protection of Environment 24 2014-07-01 2014-07-01 false Nontarget plant protection data...

  7. 40 CFR 158.660 - Nontarget plant protection data requirements table.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... vigor R R R TEP 1, 2, 3, 7 850.4400850.5400 Aquatic plant growth (algal and aquatic vascular plant... plant growth (algal and aquatic vascular plant toxicity) CR CR CR TEP or TGAI 1, 4, 6, 7 Nontarget Area... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Nontarget plant protection data...

  8. 40 CFR 600.006-08 - Data and information requirements for fuel economy vehicles.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 29 2010-07-01 2010-07-01 false Data and information requirements for fuel economy vehicles. 600.006-08 Section 600.006-08 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND CARBON-RELATED EXHAUST EMISSIONS OF MOTOR VEHICLES Fuel Economy Regulations for 1977 and Later...

  9. 40 CFR 600.006-89 - Data and information requirements for fuel economy vehicles.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 29 2010-07-01 2010-07-01 false Data and information requirements for fuel economy vehicles. 600.006-89 Section 600.006-89 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND CARBON-RELATED EXHAUST EMISSIONS OF MOTOR VEHICLES Fuel Economy Regulations for 1977 and Later...

  10. 40 CFR 600.006-87 - Data and information requirements for fuel economy vehicles.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 29 2010-07-01 2010-07-01 false Data and information requirements for fuel economy vehicles. 600.006-87 Section 600.006-87 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND CARBON-RELATED EXHAUST EMISSIONS OF MOTOR VEHICLES Fuel Economy Regulations for 1977 and Later...

  11. 40 CFR 600.006-86 - Data and information requirements for fuel economy vehicles.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 29 2010-07-01 2010-07-01 false Data and information requirements for fuel economy vehicles. 600.006-86 Section 600.006-86 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND CARBON-RELATED EXHAUST EMISSIONS OF MOTOR VEHICLES Fuel Economy Regulations for 1977 and Later...

  12. 40 CFR 158.660 - Nontarget plant protection data requirements table.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... vigor R R R TEP 1, 2, 3, 7 850.4400850.5400 Aquatic plant growth (algal and aquatic vascular plant... plant growth (algal and aquatic vascular plant toxicity) CR CR CR TEP or TGAI 1, 4, 6, 7 Nontarget Area... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Nontarget plant protection data...

  13. Cybersecurity: Authoritative Reports and Resources

    DTIC Science & Technology

    2013-10-25

    Security Technologies Reporting Data Breaches: Is Federal Legislation Needed to Protect Consumers ? July 18, 2013 Energy and Commerce Commerce ...Protect Consumers ? July 18, 2013 Energy and Commerce Oversight and Investigation Cyber Espionage and the Theft of U.S. Intellectual Property and...protection for sensitive consumer data and timely notification in case of breach June 15, 2011 Energy and Commerce Commerce , Manufacturing, and

  14. 40 CFR 63.2170 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 12 2011-07-01 2009-07-01 true How do I monitor and collect data to demonstrate continuous compliance? 63.2170 Section 63.2170 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES National Emission...

  15. 40 CFR 63.9035 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 14 2010-07-01 2010-07-01 false How do I monitor and collect data to demonstrate continuous compliance? 63.9035 Section 63.9035 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES (CONTINUED)...

  16. 40 CFR 63.9035 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 14 2011-07-01 2011-07-01 false How do I monitor and collect data to demonstrate continuous compliance? 63.9035 Section 63.9035 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES (CONTINUED)...

  17. 40 CFR 63.7535 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 13 2010-07-01 2010-07-01 false How do I monitor and collect data to demonstrate continuous compliance? 63.7535 Section 63.7535 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES (CONTINUED)...

  18. 40 CFR 63.7332 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 13 2010-07-01 2010-07-01 false How do I monitor and collect data to demonstrate continuous compliance? 63.7332 Section 63.7332 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES (CONTINUED)...

  19. 40 CFR 63.6635 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 13 2010-07-01 2010-07-01 false How do I monitor and collect data to demonstrate continuous compliance? 63.6635 Section 63.6635 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES (CONTINUED)...

  20. 40 CFR 63.7120 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 13 2010-07-01 2010-07-01 false How do I monitor and collect data to demonstrate continuous compliance? 63.7120 Section 63.7120 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES (CONTINUED)...

  1. 40 CFR 63.5560 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 12 2010-07-01 2010-07-01 true How do I monitor and collect data to demonstrate continuous compliance? 63.5560 Section 63.5560 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES National Emission...

  2. 40 CFR 63.6135 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 12 2010-07-01 2010-07-01 true How do I monitor and collect data to demonstrate continuous compliance? 63.6135 Section 63.6135 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES National Emission...

  3. 40 CFR 63.5355 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 12 2011-07-01 2009-07-01 true How do I monitor and collect data to demonstrate continuous compliance? 63.5355 Section 63.5355 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES National Emission...

  4. 40 CFR 63.5560 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 12 2011-07-01 2009-07-01 true How do I monitor and collect data to demonstrate continuous compliance? 63.5560 Section 63.5560 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES National Emission...

  5. 40 CFR 63.2170 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 12 2010-07-01 2010-07-01 true How do I monitor and collect data to demonstrate continuous compliance? 63.2170 Section 63.2170 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES National Emission...

  6. 40 CFR 63.7946 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 13 2010-07-01 2010-07-01 false How do I monitor and collect data to demonstrate continuous compliance? 63.7946 Section 63.7946 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES (CONTINUED)...

  7. 40 CFR 63.9922 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 14 2011-07-01 2011-07-01 false How do I monitor and collect data to demonstrate continuous compliance? 63.9922 Section 63.9922 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES (CONTINUED)...

  8. 40 CFR 63.6135 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 12 2011-07-01 2009-07-01 true How do I monitor and collect data to demonstrate continuous compliance? 63.6135 Section 63.6135 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES National Emission...

  9. 40 CFR 63.9633 - How do I monitor and collect data to demonstrate continuous compliance?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 14 2011-07-01 2011-07-01 false How do I monitor and collect data to demonstrate continuous compliance? 63.9633 Section 63.9633 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES (CONTINUED)...

  10. Blind Data Attack on BGP Routers

    DTIC Science & Technology

    2017-03-01

    implement blind attack protection, leaving long -standing connections, such as Border Gateway Protocol (BGP) sessions, vulnerable to exploitation. This...protection measures should a discovered vulnerability reduce attack complexity. 14. SUBJECT TERMS BGP, TCP, blind attack, blind data attack 15. NUMBER OF...implementations may not properly implement blind attack protection, leaving long -standing connections, such as BorderGateway Protocol (BGP) sessions

  11. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  12. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  13. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  14. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  15. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  16. 40 CFR 3.20 - How will EPA provide notice of changes to the Central Data Exchange?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false How will EPA provide notice of changes to the Central Data Exchange? 3.20 Section 3.20 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL CROSS-MEDIA ELECTRONIC REPORTING Electronic Reporting to EPA § 3.20 How will EPA provide...

  17. 40 CFR 158.660 - Nontarget plant protection data requirements table.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... vigor R R R TEP 1, 2, 3, 7 850.4400850.5400 Aquatic plant growth (algal and aquatic vascular plant... plant growth (algal and aquatic vascular plant toxicity) CR CR CR TEP or TGAI 1, 4, 6, 7 Nontarget Area... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Nontarget plant protection data...

  18. Protected interoperability of telecommunications and digital products

    NASA Astrophysics Data System (ADS)

    Hampel, Viktor E.; Cartier, Gene N.; Craft, James P.

    1994-11-01

    New federal standards for the protection of sensitive data now make it possible to ensure the authenticity, integrity and confidentiality of digital products, and non-repudiation of digital telecommunications. Under review and comment since 1991, the new Federal standards were confirmed this year and provide standard means for the protection of voice and data communications from accidental and wilful abuse. The standards are initially tailored to protect only `sensitive-but-unclassified' (SBU) data in compliance with the Computer Security Act of 1987. These data represent the majority of transactions in electronic commerce, including sensitive procurement information, trade secrets, financial data, product definitions, and company-proprietary information classified as `intellectual property.' Harmonization of the new standards with international requirements is in progress. In the United States, the confirmation of the basic standards marks the beginning of a long-range program to assure discretionary and mandatory access controls to digital resources. Upwards compatibility into the classified domain with multi-level security is a core requirement of the National Information Infrastructure. In this report we review the powerful capabilities of standard Public-Key-Cryptology, the availability of commercial and Federal products for data protection, and make recommendations for their cost-effective use to assure reliable telecommunications and process controls.

  19. 40 CFR 161.20 - Overview.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... product chemistry, residue chemistry, environmental fate, toxicology, reentry protection, aerial drift... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Overview. 161.20 Section 161.20 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS...

  20. Preventing a data breach from becoming a disaster.

    PubMed

    Goldberg, Ed

    2013-01-01

    Organisations have traditionally dealt with data breaches by investing in protective measures without a great deal of attention to mitigation of breach consequences and response. Conversely, business continuity (BC) planning has traditionally focused on mitigating disasters, not on preventing them. From a BC planning perspective, organisations need to assume that a data breach is inevitable and plan accordingly. The spate of data breaches in these past few years hit many organisations that were well protected. Those that suffered disastrous consequences as a result of a data breach lacked effective mitigation and response, not protection. The complexity and speed of an effective data breach response require that detailed planning takes place in advance of a breach.

  1. Korean anatomical reference data for adults for use in radiological protection

    NASA Astrophysics Data System (ADS)

    Choi, Chansoo; Yeom, Yeon Soo; Nguyen, Thang Tat; Lee, Hanjin; Han, Haegin; Shin, Bangho; Zhang, Xujia; Kim, Chan Hyeong; Chung, Beom Sun

    2018-01-01

    For radiological protection from exposure to ionizing radiation, in which a population-averaged dose evaluation is used, establishing a system of reference anatomical and physiological data for a specific population of interest is important. Some studies were done in the past to establish Korean reference data; however, the data provided the mass values only for a limited number of organs/tissues. In addition, the standing height and total body mass are based on 20-year-old data. In the present study, a new set of Korean reference anatomical values was established for use in the radiological protection of Korean workers and members of the public. The established Korean reference data provide the masses of 58 organs/tissues, including those needed to calculate the effective dose, which were derived by collecting and analyzing various scientific reports in the literature and data. In addition, the data provide not only standing height and total body mass, but also 131 additional anthropometric parameters; these values were derived from the most recent Korean national survey project, 7 th Size Korea. The characteristics of the data were also compared with several other population data, including the Asian and the International Commission on Radiological Protection (ICRP) reference data.

  2. 76 FR 16409 - Summitec Corporation; Transfer of Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPP-2011-0038; FRL-8868-3] Summitec Corporation; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This notice announces... their components to human health and the environment. In addition, the contractor shall create Data...

  3. 7 CFR 800.99 - Checkweighing sacked grain.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the instructions. (c) Protecting samples and data. Official personnel and other employees of an agency or the Service shall protect official weight samples and data from manipulation, substitution, and improper and careless handling which might deprive the samples and sample data of their representativeness...

  4. 7 CFR 800.99 - Checkweighing sacked grain.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... the instructions. (c) Protecting samples and data. Official personnel and other employees of an agency or the Service shall protect official weight samples and data from manipulation, substitution, and improper and careless handling which might deprive the samples and sample data of their representativeness...

  5. [Telematics in the public health sector. Where is the protection of health data?].

    PubMed

    Voßhoff, Andrea; Raum, Bertram; Ernestus, Walter

    2015-10-01

    There is a long history of telematics in the German health system. Apart from the growing technical possibilities in the field, it is important to concentrate on the protection of health data in telematics applications. Health data in the hands of service providers or other third parties entails certain risks for the patient's personality rights, because these institutions may not be bound by the practice of medical confidentiality. In addition, big data processing risks make the individual lives of patients and insured persons totally transparent. Measures to reduce these risks have to be taken by the providers as well as by the users of telematics infrastructure; they are the ones who should explicitly address the relevant risks and dangers in a data protection and IT-security concept and develop adequate strategies to cope with these dangers. Additionally, the German legislator remains obliged to create a regulatory framework for the protection of patients' rights.

  6. WASP (Write a Scientific Paper): The right to privacy.

    PubMed

    Mallia, Pierre

    2018-05-09

    The data protection directive of the EU was set up to allow the freedom of movement of people between member states. This has the consequence of allowing the freedom of transfer of data between member states in research. The paper discusses three cases discussed during the project to see whether RECs can refuse research based on concern for data protection in some member states. Since the directive is not, as commonly thought, intended to protect the rights and freedoms of individuals - something which is the function of the Data Protection Acts of individual states, Member States do not have a right to prohibit research based on data laws. One must express concerns directly to Brussels. Conversely it is debated whether some research considered unlawful in one particular member state can be refused by this same state. Copyright © 2018. Published by Elsevier B.V.

  7. Linking temporal medical records using non-protected health information data.

    PubMed

    Bonomi, Luca; Jiang, Xiaoqian

    2017-01-01

    Modern medical research relies on multi-institutional collaborations which enhance the knowledge discovery and data reuse. While these collaborations allow researchers to perform analytics otherwise impossible on individual datasets, they often pose significant challenges in the data integration process. Due to the lack of a unique identifier, data integration solutions often have to rely on patient's protected health information (PHI). In many situations, such information cannot leave the institutions or must be strictly protected. Furthermore, the presence of noisy values for these attributes may result in poor overall utility. While much research has been done to address these challenges, most of the current solutions are designed for a static setting without considering the temporal information of the data (e.g. EHR). In this work, we propose a novel approach that uses non-PHI for linking patient longitudinal data. Specifically, our technique captures the diagnosis dependencies using patterns which are shown to provide important indications for linking patient records. Our solution can be used as a standalone technique to perform temporal record linkage using non-protected health information data or it can be combined with Privacy Preserving Record Linkage solutions (PPRL) when protected health information is available. In this case, our approach can solve ambiguities in results. Experimental evaluations on real datasets demonstrate the effectiveness of our technique.

  8. 40 CFR 600.010-86 - Vehicle test requirements and minimum data requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... base level, and (iii) For additional model types established under § 600.207(a)(2), data from each... data requirements. 600.010-86 Section 600.010-86 Protection of Environment ENVIRONMENTAL PROTECTION... Provisions § 600.010-86 Vehicle test requirements and minimum data requirements. (a) For each certification...

  9. Certificates of Confidentiality: Protecting Human Subject Research Data in Law and Practice.

    PubMed

    Wolf, Leslie E; Patel, Mayank J; Williams Tarver, Brett A; Austin, Jeffrey L; Dame, Lauren A; Beskow, Laura M

    2015-01-01

    The federal Certificate of Confidentiality plays an important role in research on sensitive topics by authorizing researchers to refuse to disclose identifiable research data in response to subpoenas in any legal setting. However, there is little known about how effective Certificates are in practice. This article draws on our legal and empirical research on this topic to fill this information gap. It includes a description of the purpose of Certificates, their legislative and regulatory history, and a summary of the few reported and unreported cases that have dealt with Certificates. In addition, we outline other statutory confidentiality protections, compare them to the Certificate's protections, and analyze some of the vulnerabilities of a Certificate's protections. This analysis allows us to make specific recommendations for strengthening the protections afforded to research data. © 2015 American Society of Law, Medicine & Ethics, Inc.

  10. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  11. Compelling truth: legal protection of the infosphere against big data spills

    PubMed Central

    2016-01-01

    The paper explores whether legal and ethical concepts that have been used to protect the natural environment can also be leveraged to protect the ‘infosphere’, a neologism used by Luciano Floridi to characterize the totality of the informational environment. We focus, in particular, on the interaction between allocation of (intellectual) property rights and ‘communication duties’, in particular, data breach notification duties. This article is part of the themed issue ‘The ethical impact of data science’. PMID:28336793

  12. Compelling truth: legal protection of the infosphere against big data spills.

    PubMed

    Schafer, Burkhard

    2016-12-28

    The paper explores whether legal and ethical concepts that have been used to protect the natural environment can also be leveraged to protect the 'infosphere', a neologism used by Luciano Floridi to characterize the totality of the informational environment. We focus, in particular, on the interaction between allocation of (intellectual) property rights and 'communication duties', in particular, data breach notification duties.This article is part of the themed issue 'The ethical impact of data science'. © 2016 The Author(s).

  13. Audit Report on "Protection of the Department of Energy's Unclassified Sensitive Electronic Information"

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    The Department of Energy and its contractors store and process massive quantities of sensitive information to accomplish national security, energy, science, and environmental missions. Sensitive unclassified data, such as personally identifiable information (PII), official use only, and unclassified controlled nuclear information require special handling and protection to prevent misuse of the information for inappropriate purposes. Industry experts have reported that more than 203 million personal privacy records have been lost or stolen over the past three years, including information maintained by corporations, educational institutions, and Federal agencies. The loss of personal and other sensitive information can result in substantial financialmore » harm, embarrassment, and inconvenience to individuals and organizations. Therefore, strong protective measures, including data encryption, help protect against the unauthorized disclosure of sensitive information. Prior reports involving the loss of sensitive information have highlighted weaknesses in the Department's ability to protect sensitive data. Our report on Security Over Personally Identifiable Information (DOE/IG-0771, July 2007) disclosed that the Department had not fully implemented all measures recommended by the Office of Management and Budget (OMB) and required by the National Institute of Standards and Technology (NIST) to protect PII, including failures to identify and encrypt PII maintained on information systems. Similarly, the Government Accountability Office recently reported that the Department had not yet installed encryption technology to protect sensitive data on the vast majority of laptop computers and handheld devices. Because of the potential for harm, we initiated this audit to determine whether the Department and its contractors adequately safeguarded sensitive electronic information. The Department had taken a number of steps to improve protection of PII. Our review, however, identified opportunities to strengthen the protection of all types of sensitive unclassified electronic information and reduce the risk that such data could fall into the hands of individuals with malicious intent. In particular, for the seven sites we reviewed: (1) Four sites had either not ensured that sensitive information maintained on mobile devices was encrypted. Or, they had improperly permitted sensitive unclassified information to be transmitted unencrypted through email or to offsite backup storage facilities; (2) One site had not ensured that laptops taken on foreign travel, including travel to sensitive countries, were protected against security threats; and, (3) Although required by the OMB since 2003, we learned that programs and sites were still working to complete Privacy Impact Assessments - analyses designed to examine the risks and ramifications of using information systems to collect, maintain, and disseminate personal information. Our testing revealed that the weaknesses identified were attributable, at least in part, to Headquarters programs and field sites that had not implemented existing policies and procedures requiring protection of sensitive electronic information. In addition, a lack of performance monitoring contributed to the inability of the Department and the National Nuclear Security Administration (NNSA) to ensure that measures were in place to fully protect sensitive information. As demonstrated by previous computer intrusion-related data losses throughout the Department, without improvements, the risk or vulnerability for future losses remains unacceptably high. In conducting this audit, we recognized that data encryption and related techniques do not provide absolute assurance that sensitive data is fully protected. For example, encryption will not necessarily protect data in circumstances where organizational access controls are weak or are circumvented through phishing or other malicious techniques. However, as noted by NIST, when used appropriately, encryption is an effective tool that can, as part of an overall risk-management strategy, enhance security over critical personal and other sensitive information. The audit disclosed that Sandia National Laboratories had instituted a comprehensive program to protect laptops taken on foreign travel. In addition, the Department issued policy after our field work was completed that should standardize the Privacy Impact Assessment process, and, in so doing, provide increased accountability. While these actions are positive steps, additional effort is needed to help ensure that the privacy of individuals is adequately protected and that sensitive operational data is not compromised. To that end, our report contains several recommendations to implement a risk-based protection scheme for the protection of sensitive electronic information.« less

  14. Access and Use of FIA Data Through FIA Spatial Data Services

    Treesearch

    Elizabeth LaPoint

    2005-01-01

    Forest Inventory and Analysis (FIA) Spatial Data Services (SDS) was established in May 2002 to facilitate outside access to FIA data and allow use of georeferenced plot data while protecting the confidentiality of plot locations. Modification of the Food Security Act of 1985 legislated the protection of information on plot location and ownership. Penalties were put in...

  15. 40 CFR 158.2173 - Experimental use permit microbial pesticides toxicology data requirements table.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... combination of inert ingredients is not likely to pose any significant human health risks. Where appropriate... pesticides toxicology data requirements table. 158.2173 Section 158.2173 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Microbial...

  16. 40 CFR 158.2173 - Experimental use permit microbial pesticides toxicology data requirements table.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... combination of inert ingredients is not likely to pose any significant human health risks. Where appropriate... pesticides toxicology data requirements table. 158.2173 Section 158.2173 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Microbial...

  17. 40 CFR 158.2173 - Experimental use permit microbial pesticides toxicology data requirements table.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... combination of inert ingredients is not likely to pose any significant human health risks. Where appropriate... pesticides toxicology data requirements table. 158.2173 Section 158.2173 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Microbial...

  18. 40 CFR 158.2173 - Experimental use permit microbial pesticides toxicology data requirements table.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... combination of inert ingredients is not likely to pose any significant human health risks. Where appropriate... pesticides toxicology data requirements table. 158.2173 Section 158.2173 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Microbial...

  19. 40 CFR 158.2173 - Experimental use permit microbial pesticides toxicology data requirements table.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... combination of inert ingredients is not likely to pose any significant human health risks. Where appropriate... pesticides toxicology data requirements table. 158.2173 Section 158.2173 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Microbial...

  20. 77 FR 70745 - Proposed Change to Data Protection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... DEPARTMENT OF ENERGY U.S. Energy Information Administration Proposed Change to Data Protection... Coal Production and Preparation Report--Coal Mines and Preparation Plants; and EIA-8A, the Coal Stocks Report--Traders and Brokers. DOE's proposed changes will release or publish data received from mandatory...

  1. 40 CFR 600.008-77 - Review of fuel economy data, testing by the Administrator.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 29 2010-07-01 2010-07-01 false Review of fuel economy data, testing by the Administrator. 600.008-77 Section 600.008-77 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND CARBON-RELATED EXHAUST EMISSIONS OF MOTOR VEHICLES Fuel Economy Regulations for 1977 and Later...

  2. 40 CFR 600.008-08 - Review of fuel economy data, testing by the Administrator.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 29 2010-07-01 2010-07-01 false Review of fuel economy data, testing by the Administrator. 600.008-08 Section 600.008-08 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND CARBON-RELATED EXHAUST EMISSIONS OF MOTOR VEHICLES Fuel Economy Regulations for 1977 and Later...

  3. 40 CFR 600.008-01 - Review of fuel economy data, testing by the Administrator.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 29 2010-07-01 2010-07-01 false Review of fuel economy data, testing by the Administrator. 600.008-01 Section 600.008-01 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND CARBON-RELATED EXHAUST EMISSIONS OF MOTOR VEHICLES Fuel Economy Regulations for 1977 and Later...

  4. A review: Development of a microdose model for analysis of adaptive response and bystander dose response behavior.

    PubMed

    Leonard, Bobby E

    2008-02-27

    Prior work has provided incremental phases to a microdosimetry modeling program to describe the dose response behavior of the radio-protective adaptive response effect. We have here consolidated these prior works (Leonard 2000, 2005, 2007a, 2007b, 2007c) to provide a composite, comprehensive Microdose Model that is also herein modified to include the bystander effect. The nomenclature for the model is also standardized for the benefit of the experimental cellular radio-biologist. It extends the prior work to explicitly encompass separately the analysis of experimental data that is 1.) only dose dependent and reflecting only adaptive response radio-protection, 2.) both dose and dose-rate dependent data and reflecting only adaptive response radio-protection for spontaneous and challenge dose damage, 3.) only dose dependent data and reflecting both bystander deleterious damage and adaptive response radio-protection (AR-BE model). The Appendix cites the various applications of the model. Here we have used the Microdose Model to analyze the, much more human risk significant, Elmore et al (2006) data for the dose and dose rate influence on the adaptive response radio-protective behavior of HeLa x Skin cells for naturally occurring, spontaneous chromosome damage from a Brachytherapy type (125)I photon radiation source. We have also applied the AR-BE Microdose Model to the Chromosome inversion data of Hooker et al (2004) reflecting both low LET bystander and adaptive response effects. The micro-beam facility data of Miller et al (1999), Nagasawa and Little (1999) and Zhou et al (2003) is also examined. For the Zhou et al (2003) data, we use the AR-BE model to estimate the threshold for adaptive response reduction of the bystander effect. The mammogram and diagnostic X-ray induction of AR and protective BE are observed. We show that bystander damage is reduced in the similar manner as spontaneous and challenge dose damage as shown by the Azzam et al (1996) data. We cite primary unresolved questions regarding adaptive response behavior and bystander behavior. The five features of major significance provided by the Microdose Model so far are 1. Single Specific Energy Hits initiate Adaptive Response. 2. Mammogram and diagnostic X-rays induce a protective Bystander Effect as well as Adaptive Response radio-protection. 3. For mammogram X-rays the Adaptive Response protection is retained at high primer dose levels. 4. The dose range of the AR protection depends on the value of the Specific Energy per Hit, 1 >. 5. Alpha particle induced deleterious Bystander damage is modulated by low LET radiation.

  5. Accommodating Dynamic Oceanographic Processes and Pelagic Biodiversity in Marine Conservation Planning

    PubMed Central

    Grantham, Hedley S.; Game, Edward T.; Lombard, Amanda T.; Hobday, Alistair J.; Richardson, Anthony J.; Beckley, Lynnath E.; Pressey, Robert L.; Huggett, Jenny A.; Coetzee, Janet C.; van der Lingen, Carl D.; Petersen, Samantha L.; Merkle, Dagmar; Possingham, Hugh P.

    2011-01-01

    Pelagic ecosystems support a significant and vital component of the ocean's productivity and biodiversity. They are also heavily exploited and, as a result, are the focus of numerous spatial planning initiatives. Over the past decade, there has been increasing enthusiasm for protected areas as a tool for pelagic conservation, however, few have been implemented. Here we demonstrate an approach to plan protected areas that address the physical and biological dynamics typical of the pelagic realm. Specifically, we provide an example of an approach to planning protected areas that integrates pelagic and benthic conservation in the southern Benguela and Agulhas Bank ecosystems off South Africa. Our aim was to represent species of importance to fisheries and species of conservation concern within protected areas. In addition to representation, we ensured that protected areas were designed to consider pelagic dynamics, characterized from time-series data on key oceanographic processes, together with data on the abundance of small pelagic fishes. We found that, to have the highest likelihood of reaching conservation targets, protected area selection should be based on time-specific data rather than data averaged across time. More generally, we argue that innovative methods are needed to conserve ephemeral and dynamic pelagic biodiversity. PMID:21311757

  6. 10 CFR 603.850 - Marking of data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Other Administrative Matters Intellectual Property § 603.850 Marking of data. To protect the recipient's... protect from disclosure as specified in 10 CFR 600.15(b). [76 FR 26582, May 9, 2011] ...

  7. Details on Exclusive Use Data Protection for Minor Use Registrations

    EPA Pesticide Factsheets

    This document provides information about issues related to exclusive use data protection for minor use registrations, including extension of the exclusive use period and establishing a new exclusive use period.

  8. 40 CFR 51.40 - In what form and format should my state report the data to EPA?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... report the data to EPA? 51.40 Section 51.40 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS REQUIREMENTS FOR PREPARATION, ADOPTION, AND SUBMITTAL OF IMPLEMENTATION PLANS Air... state report the data to EPA? (a) You must report your emission inventory data to us in electronic form...

  9. 40 CFR 51.40 - In what form and format should my state report the data to EPA?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... report the data to EPA? 51.40 Section 51.40 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS REQUIREMENTS FOR PREPARATION, ADOPTION, AND SUBMITTAL OF IMPLEMENTATION PLANS Air... state report the data to EPA? (a) You must report your emission inventory data to us in electronic form...

  10. Decrypting Information Sensitivity: Risk, Privacy, and Data Protection Law in the United States and the European Union

    ERIC Educational Resources Information Center

    Fazlioglu, Muge

    2017-01-01

    This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…

  11. Multi-Level Data-Security and Data-Protection in a Distributed Search Infrastructure for Digital Medical Samples.

    PubMed

    Witt, Michael; Krefting, Dagmar

    2016-01-01

    Human sample data is stored in biobanks with software managing digital derived sample data. When these stand-alone components are connected and a search infrastructure is employed users become able to collect required research data from different data sources. Data protection, patient rights, data heterogeneity and access control are major challenges for such an infrastructure. This dissertation will investigate concepts for a multi-level security architecture to comply with these requirements.

  12. Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues?

    PubMed

    Brumen, Bostjan; Heričko, Marjan; Sevčnikar, Andrej; Završnik, Jernej; Hölbl, Marko

    2013-12-16

    Medical data are gold mines for deriving the knowledge that could change the course of a single patient's life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner. Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data. Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N=30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different. The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P=.19). The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results show that the results of analyses on original and on protected data are identical or comparably similar. The approach addresses the privacy and confidentiality issues that arise with medical data and is adherent to strict legal rules in the United States and Europe regarding the processing of the medical data.

  13. Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?

    PubMed Central

    2013-01-01

    Background Medical data are gold mines for deriving the knowledge that could change the course of a single patient’s life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner. Objective Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data. Methods Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N=30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different. Results The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P=.19). Conclusions The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results show that the results of analyses on original and on protected data are identical or comparably similar. The approach addresses the privacy and confidentiality issues that arise with medical data and is adherent to strict legal rules in the United States and Europe regarding the processing of the medical data. PMID:24342053

  14. 40 CFR Table 10 to Subpart Wwww of... - Data Requirements for New and Existing Continuous Lamination Lines and Continuous Casting Lines...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 13 2014-07-01 2014-07-01 false Data Requirements for New and Existing Continuous Lamination Lines and Continuous Casting Lines Complying With a Percent Reduction Limit on a Per Line Basis 10 Table 10 to Subpart WWWW of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS ...

  15. 40 CFR Table 10 to Subpart Wwww of... - Data Requirements for New and Existing Continuous Lamination Lines and Continuous Casting Lines...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 13 2012-07-01 2012-07-01 false Data Requirements for New and Existing Continuous Lamination Lines and Continuous Casting Lines Complying With a Percent Reduction Limit on a Per Line Basis 10 Table 10 to Subpart WWWW of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS ...

  16. HIV-positive status and preservation of privacy: a recent decision from the Italian Data Protection Authority on the procedure of gathering personal patient data in the dental office.

    PubMed

    Conti, Adelaide; Delbon, Paola; Laffranchi, Laura; Paganelli, Corrado; De Ferrari, Francesco

    2012-06-01

    The processing of sensitive information in the health field is subject to rigorous standards that guarantee the protection of information confidentiality. Recently, the Italian Data Protection Authority (Garante per la Protezione dei Dati Personali) stated their formal opinion on a standard procedure in dental offices involving the submission of a questionnaire that includes the patient's health status. HIV infection status is included on the form. The Authority has stated that all health data collection must be in accordance with the current Italian normative framework for personal data protection and respect the patient's freedom. This freedom allows the patient to decide, in a conscious and responsible way, whether to share health information with health personnel without experiencing any prejudice in the provision of healthcare requested. Moreover, data collection must be relevant and cannot exceed the principles of treatment goals with reference to the specific care of the concerned person. However, the need for recording information regarding HIV infection at the first appointment, regardless of the clinical intervention or therapeutic plan that needs to be conducted, should not alter the standard protection measures of the healthcare staff. In fact, these measures are adopted for every patient.

  17. Privacy Protection by Matrix Transformation

    NASA Astrophysics Data System (ADS)

    Yang, Weijia

    Privacy preserving is indispensable in data mining. In this paper, we present a novel clustering method for distributed multi-party data sets using orthogonal transformation and data randomization techniques. Our method can not only protect privacy in face of collusion, but also achieve a higher level of accuracy compared to the existing methods.

  18. 40 CFR 600.006 - Data and information requirements for fuel economy data vehicles.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... for electric vehicles, plug-in hybrid electric vehicles, and fuel cell vehicles to allow for properly... fuel economy data vehicles. 600.006 Section 600.006 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND GREENHOUSE GAS EXHAUST EMISSIONS OF MOTOR VEHICLES...

  19. 40 CFR 600.006 - Data and information requirements for fuel economy data vehicles.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... for electric vehicles, plug-in hybrid electric vehicles, and fuel cell vehicles to allow for properly... fuel economy data vehicles. 600.006 Section 600.006 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND GREENHOUSE GAS EXHAUST EMISSIONS OF MOTOR VEHICLES...

  20. 40 CFR 600.006 - Data and information requirements for fuel economy data vehicles.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... for electric vehicles, plug-in hybrid electric vehicles, and fuel cell vehicles to allow for properly... fuel economy data vehicles. 600.006 Section 600.006 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND GREENHOUSE GAS EXHAUST EMISSIONS OF MOTOR VEHICLES...

  1. 40 CFR 600.006-08 - Data and information requirements for fuel economy data vehicles.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... fuel economy data vehicles. 600.006-08 Section 600.006-08 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND CARBON-RELATED EXHAUST EMISSIONS OF MOTOR VEHICLES Fuel Economy and Carbon-Related Exhaust Emission Regulations for 1977 and Later Model Year...

  2. 40 CFR 158.2172 - Experimental use permit microbial pesticides residue data requirements table.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... results of testing: i. Indicate the potential to cause adverse human health effects or the product... pesticides residue data requirements table. 158.2172 Section 158.2172 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Microbial Pesticides § 158...

  3. 40 CFR 158.2172 - Experimental use permit microbial pesticides residue data requirements table.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... results of testing: i. Indicate the potential to cause adverse human health effects or the product... pesticides residue data requirements table. 158.2172 Section 158.2172 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Microbial Pesticides § 158...

  4. 40 CFR 158.2172 - Experimental use permit microbial pesticides residue data requirements table.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... results of testing: i. Indicate the potential to cause adverse human health effects or the product... pesticides residue data requirements table. 158.2172 Section 158.2172 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Microbial Pesticides § 158...

  5. 40 CFR 158.2172 - Experimental use permit microbial pesticides residue data requirements table.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... results of testing: i. Indicate the potential to cause adverse human health effects or the product... pesticides residue data requirements table. 158.2172 Section 158.2172 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Microbial Pesticides § 158...

  6. 40 CFR 158.2172 - Experimental use permit microbial pesticides residue data requirements table.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... results of testing: i. Indicate the potential to cause adverse human health effects or the product... pesticides residue data requirements table. 158.2172 Section 158.2172 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Microbial Pesticides § 158...

  7. 40 CFR 51.5 - What tools are available to help prepare and report emissions data?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... prepare and report emissions data? 51.5 Section 51.5 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS REQUIREMENTS FOR PREPARATION, ADOPTION, AND SUBMITTAL OF IMPLEMENTATION... are available to help prepare and report emissions data? (a) We urge your state to use estimation...

  8. 40 CFR 51.5 - What tools are available to help prepare and report emissions data?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... prepare and report emissions data? 51.5 Section 51.5 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS REQUIREMENTS FOR PREPARATION, ADOPTION, AND SUBMITTAL OF IMPLEMENTATION... are available to help prepare and report emissions data? (a) We urge your state to use estimation...

  9. Safety of nursing staff and determinants of adherence to personal protective equipment.

    PubMed

    Neves, Heliny Carneiro Cunha; Souza, Adenícia Custódia Silva e; Medeiros, Marcelo; Munari, Denize Bouttelet; Ribeiro, Luana Cássia Miranda; Tipple, Anaclara Ferreira Veiga

    2011-01-01

    A qualitative study conducted in a teaching hospital with 15 nursing professionals. Attempted to analyze the reasons, attitudes and beliefs of nursing staff regarding adherence to personal protective equipment. Data were collected through focus groups, analyzed by the method of interpretation of meanings, considering Rosenstock's model of health beliefs as a reference framework. Data revealed two themes: Occupational safety and Interpersonal Relationship. We identified several barriers that interfere in matters of safety and personal protective equipment, such as communication, work overload, physical structure, accessibility of protective equipment and organizational and management aspects. Adherence to personal protective equipment is determined by the context experienced in the workplace, as well as by individual values and beliefs, but the decision to use the personal protective equipment is individual.

  10. Plant-Incorporated Protectants Data Symposium

    EPA Pesticide Factsheets

    EPA held a public symposium on data that support registration of plant incorporated protectants (PIPs). It provided firsthand information on the scope of the scientific review process regarding the safety of PIPs and on the pesticide registration process.

  11. openEHR Based Systems and the General Data Protection Regulation (GDPR).

    PubMed

    Sousa, Mariana; Ferreira, Duarte; Santos-Pereira, Cátia; Bacelar, Gustavo; Frade, Samuel; Pestana, Olívia; Cruz-Correia, Ricardo

    2018-01-01

    The concerns about privacy and personal data protection resulted in reforms of the existing legislation in European Union (EU). The General Data Protection Regulation (GDPR) aims to reform the existing measures on the topic of personal data protection of the European Union citizens, with a strong input on the rights and freedoms of people and in the establishment of rules for the processing of personal data. OpenEHR is a standard that embodies many principles of interoperable and secure software for electronic health records. This work aims to understand to what extent the openEHR standard can be considered a solution for the requirements needed by GDPR. A list of requirements for a Hospital Information Systems (HIS) compliant with GDPR and an identification of openEHR specifications was made. The requirements were categorized and compared with the specifications. The requirements identified for the systems were matched with the openEHR specifications, which result in 16 requirements matched with openEHR. All the specifications identified matched at least one requirement. OpenEHR is a solution for the development of HIS that reinforce privacy and personal data protection, ensuring that they are contemplated in the system development. The institutions can secure that their Eletronic Health Record are compliant with GDPR while safeguarding the medical data quality and, as a result, the healthcare delivery.

  12. Protection from sunburn with beta-Carotene--a meta-analysis.

    PubMed

    Köpcke, Wolfgang; Krutmann, Jean

    2008-01-01

    Nutritional protection against skin damage from sunlight is increasingly advocated to the general public, but its effectiveness is controversial. In this meta-analysis, we have systematically reviewed the existing literature on human supplementation studies on dietary protection against sunburn by beta-carotene. A review of literature until June 2007 was performed in PubMed, ISI Web of Science and EBM Cochrane library and identified a total of seven studies which evaluated the effectiveness of beta-carotene in protection against sunburn. Data were abstracted from these studies by means of a standardized data collection protocol. The subsequent meta-analysis showed that (1) beta-carotene supplementation protects against sunburn and (2) the study duration had a significant influence on the effected size. Regression plot analysis revealed that protection required a minimum of 10 weeks of supplementation with a mean increase of the protective effect of 0.5 standard deviations with every additional month of supplementation. Thus, dietary supplementation of humans with beta-carotene provides protection against sunburn in a time-dependent manner.

  13. Informational privacy and the public's health: the Model State Public Health Privacy Act.

    PubMed

    Gostin, L O; Hodge, J G; Valdiserri, R O

    2001-09-01

    Protecting public health requires the acquisition, use, and storage of extensive health-related information about individuals. The electronic accumulation and exchange of personal data promises significant public health benefits but also threatens individual privacy; breaches of privacy can lead to individual discrimination in employment, insurance, and government programs. Individuals concerned about privacy invasions may avoid clinical or public health tests, treatments, or research. Although individual privacy protections are critical, comprehensive federal privacy protections do not adequately protect public health data, and existing state privacy laws are inconsistent and fragmented. The Model State Public Health Privacy Act provides strong privacy safeguards for public health data while preserving the ability of state and local public health departments to act for the common good.

  14. Protecting children's rights in the collection of health and welfare data.

    PubMed

    Schenk, Katie; Murove, Tapfuma; Williamson, Jan

    2006-01-01

    Program managers and researchers promoting children's rights to health, education, and an adequate standard of living often gather data directly from children to assess their needs and develop responsive services. Gathering information within a participatory framework recognizing children's views contributes to protection of their rights. Extra precautions, however, are needed to protect children because of the vulnerabilities associated with their developmental needs. Using case studies of ethical challenges faced by program implementers and sociobehavioral researchers, this article explores ways in which data collection activities among children may affect their rights. We suggest ways in which rights-based principles may be used to derive safeguards to protect against unintentional harm and abuses, based on a multidisciplinary consultation with researchers and service providers.

  15. mSieve: Differential Behavioral Privacy in Time Series of Mobile Sensor Data.

    PubMed

    Saleheen, Nazir; Chakraborty, Supriyo; Ali, Nasir; Mahbubur Rahman, Md; Hossain, Syed Monowar; Bari, Rummana; Buder, Eugene; Srivastava, Mani; Kumar, Santosh

    2016-09-01

    Differential privacy concepts have been successfully used to protect anonymity of individuals in population-scale analysis. Sharing of mobile sensor data, especially physiological data, raise different privacy challenges, that of protecting private behaviors that can be revealed from time series of sensor data. Existing privacy mechanisms rely on noise addition and data perturbation. But the accuracy requirement on inferences drawn from physiological data, together with well-established limits within which these data values occur, render traditional privacy mechanisms inapplicable. In this work, we define a new behavioral privacy metric based on differential privacy and propose a novel data substitution mechanism to protect behavioral privacy. We evaluate the efficacy of our scheme using 660 hours of ECG, respiration, and activity data collected from 43 participants and demonstrate that it is possible to retain meaningful utility, in terms of inference accuracy (90%), while simultaneously preserving the privacy of sensitive behaviors.

  16. mSieve: Differential Behavioral Privacy in Time Series of Mobile Sensor Data

    PubMed Central

    Saleheen, Nazir; Chakraborty, Supriyo; Ali, Nasir; Mahbubur Rahman, Md; Hossain, Syed Monowar; Bari, Rummana; Buder, Eugene; Srivastava, Mani; Kumar, Santosh

    2016-01-01

    Differential privacy concepts have been successfully used to protect anonymity of individuals in population-scale analysis. Sharing of mobile sensor data, especially physiological data, raise different privacy challenges, that of protecting private behaviors that can be revealed from time series of sensor data. Existing privacy mechanisms rely on noise addition and data perturbation. But the accuracy requirement on inferences drawn from physiological data, together with well-established limits within which these data values occur, render traditional privacy mechanisms inapplicable. In this work, we define a new behavioral privacy metric based on differential privacy and propose a novel data substitution mechanism to protect behavioral privacy. We evaluate the efficacy of our scheme using 660 hours of ECG, respiration, and activity data collected from 43 participants and demonstrate that it is possible to retain meaningful utility, in terms of inference accuracy (90%), while simultaneously preserving the privacy of sensitive behaviors. PMID:28058408

  17. Georgia's Balancing Act: Using, Protecting, and Legislating Student Data

    ERIC Educational Resources Information Center

    Rickman, Dana

    2016-01-01

    By combining an overall vision for the use of data, a commitment to protecting student privacy and data integrity, and supportive legislation, Georgia emerged as a leader in the effective use of student data. But it easily could have gone another way. None of the three elements could be taken for granted when Georgia set out to develop its state…

  18. 40 CFR 161.175 - Certified limits.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... how the certified limits were arrived at (e.g., sample analysis, quantitative estimate based on....175 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES Product Chemistry Data Requirements § 161.175...

  19. A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining

    NASA Astrophysics Data System (ADS)

    Tsiafoulis, S.; Zorkadis, V. C.; Karras, D. A.

    The increasing use of fast and efficient data mining algorithms in huge collections of personal data, facilitated through the exponential growth of technology, in particular in the field of electronic data storage media and processing power, has raised serious ethical, philosophical and legal issues related to privacy protection. To cope with these concerns, several privacy preserving methodologies have been proposed, classified in two categories, methodologies that aim at protecting the sensitive data and those that aim at protecting the mining results. In our work, we focus on sensitive data protection and compare existing techniques according to their anonymity degree achieved, the information loss suffered and their performance characteristics. The ℓ-diversity principle is combined with k-anonymity concepts, so that background information can not be exploited to successfully attack the privacy of data subjects data refer to. Based on Kohonen Self Organizing Feature Maps (SOMs), we firstly organize data sets in subspaces according to their information theoretical distance to each other, then create the most relevant classes paying special attention to rare sensitive attribute values, and finally generalize attribute values to the minimum extend required so that both the data disclosure probability and the information loss are possibly kept negligible. Furthermore, we propose information theoretical measures for assessing the anonymity degree achieved and empirical tests to demonstrate it.

  20. A secure steganography for privacy protection in healthcare system.

    PubMed

    Liu, Jing; Tang, Guangming; Sun, Yifeng

    2013-04-01

    Private data in healthcare system require confidentiality protection while transmitting. Steganography is the art of concealing data into a cover media for conveying messages confidentially. In this paper, we propose a steganographic method which can provide private data in medical system with very secure protection. In our method, a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then divided into non-overlapping embedding units with three consecutive pixels. We use adaptive pixel pair match (APPM) method to embed digits in the pixel value differences (PVD) of the three pixels and the base of embedded digits is dependent on the differences among the three pixels. By solving an optimization problem, minimal distortion of the pixel ternaries caused by data embedding can be obtained. The experimental results show our method is more suitable to privacy protection of healthcare system than prior steganographic works.

  1. Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components.

    PubMed

    Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios

    2009-01-01

    Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers.

  2. Data Protection-Aware Design for Cloud Services

    NASA Astrophysics Data System (ADS)

    Creese, Sadie; Hopkins, Paul; Pearson, Siani; Shen, Yun

    The Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. This paper seeks to begin the process of designing data protection controls into clouds from the outset so as to avoid the costs associated with bolting on security as an afterthought. Our approach is firstly to consider cloud maturity from an enterprise level perspective, describing a novel capability maturity model. We use this model to explore privacy controls within an enterprise cloud deployment, and explore where there may be opportunities to design in data protection controls as exploitation of the Cloud matures. We demonstrate how we might enable such controls via the use of design patterns. Finally, we consider how Service Level Agreements (SLAs) might be used to ensure that third party suppliers act in support of such controls.

  3. 78 FR 10538 - Protections for Subjects in Human Research Involving Pesticides

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-14

    ... the basis of animal data or human observational research. (2) Whether the proposed research is... Protections for Subjects in Human Research Involving Pesticides AGENCY: Environmental Protection Agency (EPA... for the protection of human subjects of research applying to third parties who conduct or support...

  4. 24 CFR 81.76 - FOIA requests and protection of GSE information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... FOIA requests and protection of GSE information. (a) General. HUD shall process FOIA requests for... disclosure. (b) Protection of confidential business information other than mortgage data and AHAR information. When a GSE seeks to protect from disclosure confidential business information, the GSE may seek...

  5. Error-Resilient Unequal Error Protection of Fine Granularity Scalable Video Bitstreams

    NASA Astrophysics Data System (ADS)

    Cai, Hua; Zeng, Bing; Shen, Guobin; Xiong, Zixiang; Li, Shipeng

    2006-12-01

    This paper deals with the optimal packet loss protection issue for streaming the fine granularity scalable (FGS) video bitstreams over IP networks. Unlike many other existing protection schemes, we develop an error-resilient unequal error protection (ER-UEP) method that adds redundant information optimally for loss protection and, at the same time, cancels completely the dependency among bitstream after loss recovery. In our ER-UEP method, the FGS enhancement-layer bitstream is first packetized into a group of independent and scalable data packets. Parity packets, which are also scalable, are then generated. Unequal protection is finally achieved by properly shaping the data packets and the parity packets. We present an algorithm that can optimally allocate the rate budget between data packets and parity packets, together with several simplified versions that have lower complexity. Compared with conventional UEP schemes that suffer from bit contamination (caused by the bit dependency within a bitstream), our method guarantees successful decoding of all received bits, thus leading to strong error-resilience (at any fixed channel bandwidth) and high robustness (under varying and/or unclean channel conditions).

  6. The Secure Medical Research Workspace: An IT Infrastructure to Enable Secure Research on Clinical Data

    PubMed Central

    Owen, Phillips; Mostafa, Javed; Lamm, Brent; Wang, Xiaoshu; Schmitt, Charles P.; Ahalt, Stanley C.

    2013-01-01

    Abstract Clinical data have tremendous value for translational research, but only if security and privacy concerns can be addressed satisfactorily. A collaboration of clinical and informatics teams, including RENCI, NC TraCS, UNC's School of Information and Library Science, Information Technology Service's Research Computing and other partners at the University of North Carolina at Chapel Hill have developed a system called the Secure Medical Research Workspace (SMRW) that enables researchers to use clinical data securely for research. SMRW significantly minimizes the risk presented when using identified clinical data, thereby protecting patients, researchers, and institutions associated with the data. The SMRW is built on a novel combination of virtualization and data leakage protection and can be combined with other protection methodologies and scaled to production levels. PMID:23751029

  7. Methods for protecting subsea pipelines and installations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rochelle, W.R.; Simpson, D.M.

    1981-01-01

    The hazards for subsea pipelines and installations are described. Methods currently being used to protect subsea pipelines and installations are discussed with the emphasis on various trenching methods and equipment. Technical data on progress rates for trenching and feasible depths of trench are given. Possible methods for protection against icebergs are discussed. A case for more comprehensive data on icebergs is presented. Should a pipeline become damaged, repair methods are noted.

  8. 40 CFR Table 10 to Subpart Wwww of... - Data Requirements for New and Existing Continuous Lamination Lines and Continuous Casting Lines...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 12 2010-07-01 2010-07-01 true Data Requirements for New and Existing Continuous Lamination Lines and Continuous Casting Lines Complying With a Percent Reduction Limit on a Per Line Basis 10 Table 10 to Subpart WWWW of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUE...

  9. 40 CFR Table 10 to Subpart Wwww of... - Data Requirements for New and Existing Continuous Lamination Lines and Continuous Casting Lines...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 12 2011-07-01 2009-07-01 true Data Requirements for New and Existing Continuous Lamination Lines and Continuous Casting Lines Complying With a Percent Reduction Limit on a Per Line Basis 10 Table 10 to Subpart WWWW of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUE...

  10. 40 CFR Table 10 to Subpart Wwww of... - Data Requirements for New and Existing Continuous Lamination Lines and Continuous Casting Lines...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 13 2013-07-01 2012-07-01 true Data Requirements for New and Existing Continuous Lamination Lines and Continuous Casting Lines Complying With a Percent Reduction Limit on a Per Line Basis 10 Table 10 to Subpart WWWW of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUE...

  11. 40 CFR 97.76 - Additional requirements to provide heat input data.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... heat input data. 97.76 Section 97.76 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Monitoring and Reporting § 97.76 Additional requirements to provide heat input data. The owner or operator of... a flow system shall also monitor and report heat input rate at the unit level using the procedures...

  12. 40 CFR 97.76 - Additional requirements to provide heat input data.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... heat input data. 97.76 Section 97.76 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Monitoring and Reporting § 97.76 Additional requirements to provide heat input data. The owner or operator of... a flow system shall also monitor and report heat input rate at the unit level using the procedures...

  13. 40 CFR 97.76 - Additional requirements to provide heat input data.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... heat input data. 97.76 Section 97.76 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Monitoring and Reporting § 97.76 Additional requirements to provide heat input data. The owner or operator of... a flow system shall also monitor and report heat input rate at the unit level using the procedures...

  14. 40 CFR 97.76 - Additional requirements to provide heat input data.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... heat input data. 97.76 Section 97.76 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Monitoring and Reporting § 97.76 Additional requirements to provide heat input data. The owner or operator of... a flow system shall also monitor and report heat input rate at the unit level using the procedures...

  15. 40 CFR 97.76 - Additional requirements to provide heat input data.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... heat input data. 97.76 Section 97.76 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Monitoring and Reporting § 97.76 Additional requirements to provide heat input data. The owner or operator of... a flow system shall also monitor and report heat input rate at the unit level using the procedures...

  16. 75 FR 41213 - National Protection and Programs Directorate; Infrastructure Protection Data Call Survey; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-15

    ... (IP), Infrastructure Information Collection Division (IICD) published a 60-day comment period notice..., ``IP Data Call.'' This is a correction notice to correct the title of the published 60-day notice to read, ``IP Data Call Survey.'' There are no further updates. This correction notice is issued as...

  17. 40 CFR 60.1390 - What are the appropriate units of measurement for reporting my data?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... measurement for reporting my data? 60.1390 Section 60.1390 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) STANDARDS OF PERFORMANCE FOR NEW STATIONARY SOURCES Standards... § 60.1390 What are the appropriate units of measurement for reporting my data? See tables 1 and 2 of...

  18. 40 CFR 60.1865 - What are the appropriate units of measurement for reporting my data?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... measurement for reporting my data? 60.1865 Section 60.1865 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) STANDARDS OF PERFORMANCE FOR NEW STATIONARY SOURCES Emission..., 1999 Model Rule-Reporting § 60.1865 What are the appropriate units of measurement for reporting my data...

  19. Defining Child Neglect Based on Child Protective Services Data

    ERIC Educational Resources Information Center

    Dubowitz, H.; Pitts, S.C.; Litrownik, A.J.; Cox, C.E.; Runyan, D.; Black, M.M.

    2005-01-01

    Objectives:: To compare neglect defined by Child Protective Services official codes with neglect defined by a review of CPS narrative data, and to examine the validity of the different neglect measures using children's functioning at age 8 years. Methods:: Data are from 740 children participating in a consortium of longitudinal studies on child…

  20. Ensuring privacy in the study of pathogen genetics

    PubMed Central

    Mehta, Sanjay R.; Vinterbo, Staal A.; Little, Susan J.

    2014-01-01

    Rapid growth in the genetic sequencing of pathogens in recent years has led to the creation of large sequence databases. This aggregated sequence data can be very useful for tracking and predicting epidemics of infectious diseases. However, the balance between the potential public health benefit and the risk to personal privacy for individuals whose genetic data (personal or pathogen) are included in such work has been difficult to delineate, because neither the true benefit nor the actual risk to participants has been adequately defined. Existing approaches to minimise the risk of privacy loss to participants are based on de-identification of data by removal of a predefined set of identifiers. These approaches neither guarantee privacy nor protect the usefulness of the data. We propose a new approach to privacy protection that will quantify the risk to participants, while still maximising the usefulness of the data to researchers. This emerging standard in privacy protection and disclosure control, which is known as differential privacy, uses a process-driven rather than data-centred approach to protecting privacy. PMID:24721230

  1. Ensuring privacy in the study of pathogen genetics.

    PubMed

    Mehta, Sanjay R; Vinterbo, Staal A; Little, Susan J

    2014-08-01

    Rapid growth in the genetic sequencing of pathogens in recent years has led to the creation of large sequence databases. This aggregated sequence data can be very useful for tracking and predicting epidemics of infectious diseases. However, the balance between the potential public health benefit and the risk to personal privacy for individuals whose genetic data (personal or pathogen) are included in such work has been difficult to delineate, because neither the true benefit nor the actual risk to participants has been adequately defined. Existing approaches to minimise the risk of privacy loss to participants are based on de-identification of data by removal of a predefined set of identifiers. These approaches neither guarantee privacy nor protect the usefulness of the data. We propose a new approach to privacy protection that will quantify the risk to participants, while still maximising the usefulness of the data to researchers. This emerging standard in privacy protection and disclosure control, which is known as differential privacy, uses a process-driven rather than data-centred approach to protecting privacy. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. Spectral Anonymization of Data

    PubMed Central

    Lasko, Thomas A.; Vinterbo, Staal A.

    2011-01-01

    The goal of data anonymization is to allow the release of scientifically useful data in a form that protects the privacy of its subjects. This requires more than simply removing personal identifiers from the data, because an attacker can still use auxiliary information to infer sensitive individual information. Additional perturbation is necessary to prevent these inferences, and the challenge is to perturb the data in a way that preserves its analytic utility. No existing anonymization algorithm provides both perfect privacy protection and perfect analytic utility. We make the new observation that anonymization algorithms are not required to operate in the original vector-space basis of the data, and many algorithms can be improved by operating in a judiciously chosen alternate basis. A spectral basis derived from the data’s eigenvectors is one that can provide substantial improvement. We introduce the term spectral anonymization to refer to an algorithm that uses a spectral basis for anonymization, and we give two illustrative examples. We also propose new measures of privacy protection that are more general and more informative than existing measures, and a principled reference standard with which to define adequate privacy protection. PMID:21373375

  3. History, administration, goals, values, and long-term data of Russia's strictly protected scientific nature reserves

    Treesearch

    Martin A. Spetich; Anna E. Kvashnina; Y.D. Nukhimovskya; Olin E. Jr. Rhodes

    2009-01-01

    One of the most comprehensive attempts at biodiversity conservation in Russia and the former Soviet Union has been the establishment of an extensive network of protected natural areas. Among all types of protected areas in Russia, zapovedniks (strictly protected scientific preserve) have been the most effective in protecting biodiversity at the ecosystem scale. Russia...

  4. Analysis and Evaluation of Parameters Determining Maximum Efficiency of Fish Protection

    NASA Astrophysics Data System (ADS)

    Khetsuriani, E. D.; Kostyukov, V. P.; Khetsuriani, T. E.

    2017-11-01

    The article is concerned with experimental research findings. The efficiency of fish fry protection from entering water inlets is the main criterion of any fish protection facility or device. The research was aimed to determine an adequate mathematical model E = f(PCT, Vp, α), where PCT, Vp and α are controlled factors influencing the process of fish fry protection. The result of the processing of experimental data was an adequate regression model. We determined the maximum of fish protection Emax=94,21 and the minimum of optimization function Emin=44,41. As a result of the statistical processing of experimental data we obtained adequate dependences for determining an optimal rotational speed of tip and fish protection efficiency. The analysis of fish protection efficiency dependence E% = f(PCT, Vp, α) allowed the authors to recommend the following optimized operating modes for it: the maximum fish protection efficiency is achieved at the process pressure PCT=3 atm, stream velocity Vp=0,42 m/s and nozzle inclination angle α=47°49’. The stream velocity Vp has the most critical influence on fish protection efficiency. The maximum efficiency of fish protection is obtained at the tip rotational speed of 70.92 rpm.

  5. A Review: Development of a Microdose Model for Analysis of Adaptive Response and Bystander Dose Response Behavior

    PubMed Central

    Leonard, Bobby E.

    2008-01-01

    Prior work has provided incremental phases to a microdosimetry modeling program to describe the dose response behavior of the radio-protective adaptive response effect. We have here consolidated these prior works (Leonard 2000, 2005, 2007a, 2007b, 2007c) to provide a composite, comprehensive Microdose Model that is also herein modified to include the bystander effect. The nomenclature for the model is also standardized for the benefit of the experimental cellular radio-biologist. It extends the prior work to explicitly encompass separately the analysis of experimental data that is 1.) only dose dependent and reflecting only adaptive response radio-protection, 2.) both dose and dose-rate dependent data and reflecting only adaptive response radio-protection for spontaneous and challenge dose damage, 3.) only dose dependent data and reflecting both bystander deleterious damage and adaptive response radio-protection (AR-BE model). The Appendix cites the various applications of the model. Here we have used the Microdose Model to analyze the, much more human risk significant, Elmore et al (2006) data for the dose and dose rate influence on the adaptive response radio-protective behavior of HeLa x Skin cells for naturally occurring, spontaneous chromosome damage from a Brachytherapy type 125I photon radiation source. We have also applied the AR-BE Microdose Model to the Chromosome inversion data of Hooker et al (2004) reflecting both low LET bystander and adaptive response effects. The micro-beam facility data of Miller et al (1999), Nagasawa and Little (1999) and Zhou et al (2003) is also examined. For the Zhou et al (2003) data, we use the AR-BE model to estimate the threshold for adaptive response reduction of the bystander effect. The mammogram and diagnostic X-ray induction of AR and protective BE are observed. We show that bystander damage is reduced in the similar manner as spontaneous and challenge dose damage as shown by the Azzam et al (1996) data. We cite primary unresolved questions regarding adaptive response behavior and bystander behavior. The five features of major significance provided by the Microdose Model so far are 1.) Single Specific Energy Hits initiate Adaptive Response, 2.) Mammogram and diagnostic X-rays induce a protective Bystander Effect as well as Adaptive Response radio-protection. 3.) For mammogram X-rays the Adaptive Response protection is retained at high primer dose levels. 4.) The dose range of the AR protection depends on the value of the Specific Energy per Hit, . 5.) Alpha particle induced deleterious Bystander damage is modulated by low LET radiation. PMID:18648579

  6. A community assessment of privacy preserving techniques for human genomes

    PubMed Central

    2014-01-01

    To answer the need for the rigorous protection of biomedical data, we organized the Critical Assessment of Data Privacy and Protection initiative as a community effort to evaluate privacy-preserving dissemination techniques for biomedical data. We focused on the challenge of sharing aggregate human genomic data (e.g., allele frequencies) in a way that preserves the privacy of the data donors, without undermining the utility of genome-wide association studies (GWAS) or impeding their dissemination. Specifically, we designed two problems for disseminating the raw data and the analysis outcome, respectively, based on publicly available data from HapMap and from the Personal Genome Project. A total of six teams participated in the challenges. The final results were presented at a workshop of the iDASH (integrating Data for Analysis, 'anonymization,' and SHaring) National Center for Biomedical Computing. We report the results of the challenge and our findings about the current genome privacy protection techniques. PMID:25521230

  7. A community assessment of privacy preserving techniques for human genomes.

    PubMed

    Jiang, Xiaoqian; Zhao, Yongan; Wang, Xiaofeng; Malin, Bradley; Wang, Shuang; Ohno-Machado, Lucila; Tang, Haixu

    2014-01-01

    To answer the need for the rigorous protection of biomedical data, we organized the Critical Assessment of Data Privacy and Protection initiative as a community effort to evaluate privacy-preserving dissemination techniques for biomedical data. We focused on the challenge of sharing aggregate human genomic data (e.g., allele frequencies) in a way that preserves the privacy of the data donors, without undermining the utility of genome-wide association studies (GWAS) or impeding their dissemination. Specifically, we designed two problems for disseminating the raw data and the analysis outcome, respectively, based on publicly available data from HapMap and from the Personal Genome Project. A total of six teams participated in the challenges. The final results were presented at a workshop of the iDASH (integrating Data for Analysis, 'anonymization,' and SHaring) National Center for Biomedical Computing. We report the results of the challenge and our findings about the current genome privacy protection techniques.

  8. Quantifying the extent of protected-area downgrading, downsizing, and degazettement in Australia.

    PubMed

    Cook, Carly N; Valkan, Rebecca S; Mascia, Michael B; McGeoch, Melodie A

    2017-10-01

    The use of total area protected as the predominant indicator of progress in building protected area (PA) networks is receiving growing criticism. Documenting the full dynamics of PA networks, both in terms of the gains and losses in protection, provides a much more informative approach to tracking progress. To this end, documentation of PA downgrading, downsizing, and degazettement (PADDD) has increased. Studies of PADDD events generally fail to place these losses in the context of gains in protection; therefore, they omit important elements of PA network dynamics. To address this limitation, we used a spatially explicit approach to identify every parcel of land added to and excised from the Australian terrestrial PA network and PAs that had their level of protection changed over 17 years (1997-2014). By quantifying changes in the spatial configuration of the PA network with time-series data (spatial layers for nine separate time steps), ours is the first assessment of the dynamics (increases and decreases in area and level of protection) of a PA network and the first comprehensive assessment of PADDD in a developed country. We found that the Australian network was highly dynamic; there were 5233 changes in area or level of protection over 17 years. Against a background of enormous increases in area protected, we identified over 1500 PADDD events, which affected over one-third of the network, which were largely the result of widespread downgrading of protection. We believe our approach provides a mechanism for robust tracking of trends in the world's PAs through the use of data from the World Database on Protected Areas. However, this will require greater transparency and improved data standards in reporting changes to PAs. © 2017 Society for Conservation Biology.

  9. 40 CFR 152.83 - Definition of exclusive use study.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Protection of Data Submitters' Rights § 152.83 Definition of exclusive use study. A study is an exclusive use... 40 Protection of Environment 24 2014-07-01 2014-07-01 false Definition of exclusive use study. 152.83 Section 152.83 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE...

  10. Computer-Based Testing: Test Site Security.

    ERIC Educational Resources Information Center

    Rosen, Gerald A.

    Computer-based testing places great burdens on all involved parties to ensure test security. A task analysis of test site security might identify the areas of protecting the test, protecting the data, and protecting the environment as essential issues in test security. Protecting the test involves transmission of the examinations, identifying the…

  11. Military Readiness: DODs Readiness Rebuilding Efforts May Be at Risk without a Comprehensive Plan

    DTIC Science & Technology

    2016-09-01

    Congressional Committees September 2016 GAO-16-841 United States Government Accountability Office United States Government Accountability ...omits information DOD identified as SECRET, which must be protected from public disclosure . GAO analyzed and reviewed data on reported readiness...protected from public disclosure . Therefore, this report omits SECRET information and data such as readiness trend data, deployment data, and selected

  12. Data Integration Framework Data Management Plan Remote Sensing Dataset

    DTIC Science & Technology

    2016-07-01

    performed by the Coastal Observations and Analysis Branch (CEERD-HFA) of the Flood and Storm Protection Division (CEERD-HF), U.S. Army Engineer Research... Protection Division, Coastal Observations and Analysis Branch CESAM U.S. Army Corps of Engineers, Mobile District CESAM-OP-J U.S. Army Corps of Engineers...ER D C/ CH L SR -1 6- 2 Coastal Ocean Data Systems Program Data Integration Framework Data Management Plan Remote Sensing Dataset Co

  13. Review of Nuclear Physics Experiments for Space Radiation

    NASA Technical Reports Server (NTRS)

    Norbury, John W.; Miller, Jack; Adamczyk, Anne M.; Heilbronn, Lawrence H.; Townsend, Lawrence W.; Blattnig, Steve R.; Norman, Ryan B.; Guetersloh, Stephen B.; Zeitlin, Cary J.

    2011-01-01

    Human space flight requires protecting astronauts from the harmful effects of space radiation. The availability of measured nuclear cross section data needed for these studies is reviewed in the present paper. The energy range of interest for radiation protection is approximately 100 MeV/n to 10 GeV/n. The majority of data are for projectile fragmentation partial and total cross sections, including both charge changing and isotopic cross sections. The cross section data are organized into categories which include charge changing, elemental, isotopic for total, single and double differential with respect to momentum, energy and angle. Gaps in the data relevant to space radiation protection are discussed and recommendations for future experiments are made.

  14. Practical aspects of handling data protection and data security.

    PubMed

    Louwerse, C P

    1991-01-01

    Looking at practical applications of health care information systems, we must conclude that in the field of data protection there still is too large a gap between what is feasible and necessary on one hand, and what is achieved in actual realizations on the other. To illustrate this point, we sketch the actual data protection measures in a large hospital information system, and describe the effects of changes affecting the system, such as increasing use of personal computers, and growing intensity of use of the system. Trends in the development of new and additional systems are indicated, and a summary of possible weak points and gaps in the security is given, some suggestions for improvement are made.

  15. Report: Opportunities to Improve Data Quality and Children’s Health through the Food Quality Protection Act

    EPA Pesticide Factsheets

    Report #2006-P-00009, January 10, 2006. To meet the requirements of FQPA, EPA instituted numerous data requirements designed to provide infants and children with better protection against the health risks of pesticides.

  16. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-12

    ... Subjects Environmental protection, Business and industry, Government property, Security measures. Dated... Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This... Cosmetic Act (FFDCA), including information that may have been claimed as Confidential Business Information...

  17. 78 FR 10166 - Access Interpreting; Transfer of Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-13

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPP-2013-0036; FRL-9376-6] Access Interpreting; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This notice announces that pesticide related information submitted to EPA's Office of Pesticide Programs (OPP) pursuant to...

  18. 40 CFR 57.605 - Consent.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) PRIMARY... issuing agency and EPA and their contractors access to any information or data employed or generated in... discussions of progress, interpretation of data and results, and any other similar purposes as deemed...

  19. Implications of Spatial Data Variations for Protected Areas Management: An Example from East Africa

    NASA Astrophysics Data System (ADS)

    Dowhaniuk, Nicholas; Hartter, Joel; Ryan, Sadie J.

    2014-09-01

    Geographic information systems and remote sensing technologies have become an important tool for visualizing conservation management and developing solutions to problems associated with conservation. When multiple organizations separately develop spatial data representations of protected areas, implicit error arises due to variation between data sets. We used boundary data produced by three conservation organizations (International Union for the Conservation of Nature, World Resource Institute, and Uganda Wildlife Authority), for seven Ugandan parks, to study variation in the size represented and the location of boundaries. We found variation in the extent of overlapping total area encompassed by the three data sources, ranging from miniscule (0.4 %) differences to quite large ones (9.0 %). To underscore how protected area boundary discrepancies may have implications to protected area management, we used a landcover classification, defining crop, shrub, forest, savanna, and grassland. The total area in the different landcover classes varied most in smaller protected areas (those less than 329 km2), with forest and cropland area estimates varying up to 65 %. The discrepancies introduced by boundary errors could, in this hypothetical case, generate erroneous findings and could have a significant impact on conservation, such as local-scale management for encroachment and larger-scale assessments of deforestation.

  20. Implications of spatial data variations for protected areas management: an example from East Africa.

    PubMed

    Dowhaniuk, Nicholas; Hartter, Joel; Ryan, Sadie J

    2014-09-01

    Geographic information systems and remote sensing technologies have become an important tool for visualizing conservation management and developing solutions to problems associated with conservation. When multiple organizations separately develop spatial data representations of protected areas, implicit error arises due to variation between data sets. We used boundary data produced by three conservation organizations (International Union for the Conservation of Nature, World Resource Institute, and Uganda Wildlife Authority), for seven Ugandan parks, to study variation in the size represented and the location of boundaries. We found variation in the extent of overlapping total area encompassed by the three data sources, ranging from miniscule (0.4 %) differences to quite large ones (9.0 %). To underscore how protected area boundary discrepancies may have implications to protected area management, we used a landcover classification, defining crop, shrub, forest, savanna, and grassland. The total area in the different landcover classes varied most in smaller protected areas (those less than 329 km(2)), with forest and cropland area estimates varying up to 65 %. The discrepancies introduced by boundary errors could, in this hypothetical case, generate erroneous findings and could have a significant impact on conservation, such as local-scale management for encroachment and larger-scale assessments of deforestation.

  1. Protecting medical data for decision-making analyses.

    PubMed

    Brumen, Bostjan; Welzer, Tatjana; Druzovec, Marjan; Golob, Izidor; Jaakkola, Hannu; Rozman, Ivan; Kubalík, Jiri

    2005-02-01

    In this paper, we present a procedure for data protection, which can be applied before any model building based analyses are performed. In medical environments, abundant data exist, but because of the lack of knowledge, they are rarely analyzed, although they hide valuable and often life-saving knowledge. To be able to analyze the data, the analyst needs to have a full access to the relevant sources, but this may be in the direct contradiction with the demand that data remain secure, and more importantly in medical area, private. This is especially the case if the data analyst is outsourced and not directly affiliated with the data owner. We address this issue and propose a solution where the model-building process is still possible while data are better protected. We consider the case where the distributions of original data values are preserved while the values themselves change, so that the resulting model is equivalent to the one built with original data.

  2. Privacy protection for HealthGrid applications.

    PubMed

    Claerhout, B; De Moor, G J E

    2005-01-01

    This contribution aims at introducing the problem of privacy protection in e-Health and at describing a number of existing privacy enhancing techniques (PETs). The recognition that privacy constitutes a fundamental right is gradually entering public awareness. Because healthcare-related data are susceptible to being abused for many obvious reasons, public apprehension about privacy has focused on medical data. Public authorities have become convinced of the need to enforce privacy protection and make considerable efforts for promoting through privacy protection legislation the deployment of PETs. Based on the study of the specific features of Grid technology, ways in which PET services could be integrated in the HealthGrid are being analyzed. Grid technology aims at removing barriers between local and remote resources. The privacy and legal issues raised by the HealthGrid are caused by the transparent interchange and processing of sensitive medical information. PET technology has already proven its usefulness for privacy protection in health-related marketing and research data collection. While this paper does not describe market-ready solutions for privacy protection in the HealthGrid, it puts forward several cases in which the Grid may benefit from PETs. Early integration of privacy protection services into the HealthGrid can lead to a synergy that is beneficial for the development of the HealthGrid itself.

  3. Children and Young People at Risk of Social Exclusion: Links between Homelessness, Child Protection and Juvenile Justice. Data Linkage Series. Number 13

    ERIC Educational Resources Information Center

    Aalders, Rachel

    2012-01-01

    Current research demonstrates relationships between child abuse and neglect, homelessness and criminal activity. This report presents key findings from analysis of a data set linking three community-sector data collections: Supported Accommodation Assistance Program (SAAP), juvenile justice supervision, and child protection notifications and…

  4. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    PubMed

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  5. Status of radiation protection in various interventional cardiology procedures in the Asia Pacific region

    PubMed Central

    Tsapaki, Virginia; Faruque Ghulam, Mohammed; Lim, Soo Teik; Ngo Minh, Hung; Nwe, Nwe; Sharma, Anil; Sim, Kui-Hian; Srimahachota, Suphot; Rehani, Madan Mohan

    2011-01-01

    Objective Increasing use of interventional procedures in cardiology with unknown levels of radiation protection in many countries of Asia-Pacific region necessitates the need for status assessment. The study was part of an International Atomic Energy Agency (IAEA) project for achieving improved radiation protection in interventional cardiology (IC) in developing countries. Design The survey covers 18 cardiac catheterisation laboratories in seven countries (Bangladesh, India, Malaysia, Myanmar, Singapore, Thailand and Vietnam). An important step was the creation of the ‘Asian network of Cardiologists in Radiation Protection’ and a newsletter. Data were collected on: radiation protection tools, number of IC laboratories, and annual number of various IC paediatric and adult procedures in the hospital and in the country. Patient radiation dose data were collected in terms of Kerma Area Product (KAP) and cumulative dose (CD). Results It is encouraging that protection devices for staff are largely used in the routine practice. Only 39% of the angiographic machines were equipped with a KAP meter. Operators' initial lack of awareness on radiation-protection optimisation improved significantly after participation in IAEA radiation-protection training. Only two out of five countries reporting patient percutaneous coronary intervention radiation-dose data were fully within the international guidance levels. Data from 51 patients who underwent multiple therapeutic procedures (median 2–3) indicated a total KAP reaching 995 Gy.cm2 (range 10.1–995) and CD 15.1 Gy (range 0.4–15.1), stressing the importance of dose monitoring and optimisation. Conclusions There is a need for interventional cardiology societies to play an active role in training actions and implementation of radiation protection. PMID:27325974

  6. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge.

    PubMed

    Yu, Fei; Ji, Zhanglong

    2014-01-01

    In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu et al. 2014 to the challenge's data and analyze the data utility after the data are perturbed by the privacy-preserving methods. Major contributions of this paper include new interpretation of the χ2 statistic in a GWAS setting and new results about the Hamming distance score, a key component for one of the privacy-preserving methods.

  7. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge

    PubMed Central

    2014-01-01

    In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu et al. 2014 to the challenge's data and analyze the data utility after the data are perturbed by the privacy-preserving methods. Major contributions of this paper include new interpretation of the χ2 statistic in a GWAS setting and new results about the Hamming distance score, a key component for one of the privacy-preserving methods. PMID:25521367

  8. The Personal Protective Behaviors of College Student Drinkers: Evidence of Indigenous Protective Norms

    ERIC Educational Resources Information Center

    Haines, Michael P.; Barker, Gregory; Rice, Richard M.

    2006-01-01

    Given the prevalence of alcohol consumption and the relative infrequency of harm among college students, the authors sought to determine how most college students protect themselves from alcohol-related harm. An analysis of the aggregate National College Health Assessment data identified a cluster of personal protective behaviors that correlated…

  9. A Failure to "Do No Harm" -- India's Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S.

    PubMed

    Dixon, Pam

    2017-01-01

    It is important that digital biometric identity systems be used by governments with a Do no Harm mandate, and the establishment of regulatory, enforcement and restorative frameworks ensuring data protection and privacy needs to transpire prior to the implementation of technological programs and services. However, when, and where large government bureaucracies are involved, the proper planning and execution of public service programs very often result in ungainly outcomes, and are often qualitatively not guaranteeable. Several important factors, such as the strength of the political and legal systems, may affect such cases as the implementation of a national digital identity system. Digital identity policy development, as well as technical deployment of biometric technologies and enrollment processes, may all differ markedly, and could depend in some part at least, on the overall economic development of the country in question, or political jurisdiction, among other factors. This article focuses on the Republic of India's national digital biometric identity system, the Aadhaar , for its development, data protection and privacy policies, and impact. Two additional political jurisdictions, the European Union, and the United States are also situationally analyzed as they may be germane to data protection and privacy policies originated to safeguard biometric identities. Since biometrics are foundational elements in modern digital identity systems, expression of data protection policies that orient and direct how biometrics are to be utilized as unique identifiers are the focus of this analysis. As more of the world's economies create and elaborate capacities, capabilities and functionalities within their respective digital ambits, it is not enough to simply install suitable digital identity technologies; much, much more - is durably required. For example, both vigorous and descriptive means of data protection should be well situated within any jurisdictionally relevant deployment area, prior to in-field deployment of digital identity technologies. Toxic mixes of knowledge insufficiencies, institutional naïveté, political tomfoolery, cloddish logical constructs, and bureaucratic expediency must never overrun fundamental protections for human autonomy, civil liberties, data protection, and privacy.

  10. 40 CFR 75.39 - [Reserved

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 16 2011-07-01 2011-07-01 false [Reserved] 75.39 Section 75.39 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTINUOUS EMISSION MONITORING Missing Data Substitution Procedures § 75.39 [Reserved] ...

  11. 40 CFR 75.38 - [Reserved

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 16 2011-07-01 2011-07-01 false [Reserved] 75.38 Section 75.38 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTINUOUS EMISSION MONITORING Missing Data Substitution Procedures § 75.38 [Reserved] ...

  12. The new EU General Data Protection Regulation: what the radiologist should know.

    PubMed

    2017-06-01

    The European Society of Radiology (ESR) informs its membership and its associated Institutional Members about the new General Data Protection Regulation (GDPR) of the European Union (EU,) which will apply from 25 May 2018. Radiologists and radiology departments should be prepared to comply with several new rules for the protection of imaging data. Although the new GDPR applies to all domains of the public and private sectors, some specific derogations are defined for data concerning health, aiming at protecting the rights of data subjects and confidentiality of their personal health data, whilst preserving the benefits of processing data, including digital images for research and public health purposes. Specific new obligations which healthcare providers (including radiologists/radiology departments) should prepare for include data access for patients, rules for data processing including explicit consent of the data subject in the absence of derogations, or technical and organisational safeguards. National health authorities can define exceptions and derogations from certain obligations by means of national law. They will also define sanctions in the form of penalties or fines that may be applicable for organisations of the public and private sector that fail to comply with the rules of the GDPR. • Explicit consent prior to data processing will be necessary. • Explicit consent prior to communication of imaging data will be necessary. • Providing patient access to their personal data, including portability, will be required. • Certain derogations and exceptions exist for healthcare and research. • Additional specific rules may be defined by national law.

  13. On genomics, kin, and privacy

    PubMed Central

    Telenti, Amalio; Ayday, Erman; Hubaux, Jean Pierre

    2014-01-01

    The storage of greater numbers of exomes or genomes raises the question of loss of privacy for the individual and for families if genomic data are not properly protected. Access to genome data may result from a personal decision to disclose, or from gaps in protection. In either case, revealing genome data has consequences beyond the individual, as it compromises the privacy of family members. Increasing availability of genome data linked or linkable to metadata through online social networks and services adds one additional layer of complexity to the protection of genome privacy.  The field of computer science and information technology offers solutions to secure genomic data so that individuals, medical personnel or researchers can access only the subset of genomic information required for healthcare or dedicated studies. PMID:25254097

  14. From Data Privacy to Location Privacy

    NASA Astrophysics Data System (ADS)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  15. Lock It Up! Computer Security.

    ERIC Educational Resources Information Center

    Wodarz, Nan

    1997-01-01

    The data contained on desktop computer systems and networks pose security issues for virtually every district. Sensitive information can be protected by educating users, altering the physical layout, using password protection, designating access levels, backing up data, reformatting floppy disks, using antivirus software, and installing encryption…

  16. Report: EPA Lacks Processes to Validate Whether Contractors Receive Specialized Role-Based Training for Network and Data Protection

    EPA Pesticide Factsheets

    Report #17-P-0344, July 31, 2017. The EPA is unaware whether information security contractors possess the skills and training needed to protect the agency’s information, data and network from security breaches.

  17. Splash Safety During Dermatologic Procedures Among US Dermatology Residents.

    PubMed

    Korta, Dorota Z; Chapman, Lance W; Lee, Patrick K; Linden, Kenneth G

    2017-07-01

    Dermatologists are at potential risk of acquiring infections from contamination of the mucous membranes by blood and body fluids. However, there are little data on splash safety during procedural dermatology. To determine dermatology resident perceptions about splash risk during dermatologic procedures and to quantify the rate of protective equipment use. An anonymous on-line survey was sent to 108 United States ACGME-approved dermatology residency programs assessing frequency of facial protection during dermatologic procedures, personal history of splash injury, and, if applicable, reasons for not always wearing facial protection. A total of 153 dermatology residents responded. Rates of facial protection varied by procedure, with the highest rates during surgery and the lowest during local anesthetic injection. Over 54% of respondents reported suffering facial splash while not wearing facial protection during a procedure. In contrast, 88.9% of respondents correctly answered that there is a small risk of acquiring infection from mucosal splash. Residency program recommendations for facial protection seem to vary by procedure. The authors' results demonstrate that although facial splash is a common injury, facial protection rates and protective recommendations vary significantly by procedure. These data support the recommendation for enhanced facial protection guidelines during procedural dermatology.

  18. A multidomain approach to understanding risk for underage drinking: converging evidence from 5 data sets.

    PubMed

    Jones, Damon E; Feinberg, Mark E; Cleveland, Michael J; Cooper, Brittany Rhoades

    2012-11-01

    We examined the independent and combined influence of major risk and protective factors on youths' alcohol use. Five large data sets provided similar measures of alcohol use and risk or protective factors. We carried out analyses within each data set, separately for boys and girls in 8th and 10th grades. We included interaction and curvilinear predictive terms in final models if results were robust across data sets. We combined results using meta-analytic techniques. Individual, family, and peer risk factors and a community protective factor moderately predicted youths' alcohol use. Family and school protective factors did not predict alcohol use when combined with other factors. Youths' antisocial attitudes were more strongly associated with alcohol use for those also reporting higher levels of peer or community risk. For certain risk factors, the association with alcohol use varied across different risk levels. Efforts toward reducing youths' alcohol use should be based on robust estimates of the relative influence of risk and protective factors across adolescent environment domains. Public health advocates should focus on context (e.g., community factors) as a strategy for curbing underage alcohol use.

  19. Privacy in the digital world: medical and health data outside of HIPAA protections.

    PubMed

    Glenn, Tasha; Monteith, Scott

    2014-11-01

    Increasing quantities of medical and health data are being created outside of HIPAA protection, primarily by patients. Data sources are varied, including the use of credit cards for physician visit and medication co-pays, Internet searches, email content, social media, support groups, and mobile health apps. Most medical and health data not covered by HIPAA are controlled by third party data brokers and Internet companies. These companies combine this data with a wide range of personal information about consumer daily activities, transactions, movements, and demographics. The combined data are used for predictive profiling of individual health status, and often sold for advertising and other purposes. The rapid expansion of medical and health data outside of HIPAA protection is encroaching on privacy and the doctor-patient relationship, and is of particular concern for psychiatry. Detailed discussion of the appropriate handling of this medical and health data is needed by individuals with a wide variety of expertise.

  20. Cost-Effectiveness of Percutaneous Closure of the Left Atrial Appendage in Atrial Fibrillation Based on Results from PROTECT AF vs. PREVAIL

    PubMed Central

    Freeman, James V.; Hutton, David W.; Barnes, Geoffrey D.; Zhu, Ruo P.; Owens, Douglas K.; Garber, Alan M.; Go, Alan S.; Hlatky, Mark A.; Heidenreich, Paul A.; Wang, Paul J.; Al-Ahmad, Amin; Turakhia, Mintu P.

    2016-01-01

    Background Randomized trials of left atrial appendage (LAA) closure with the Watchman device have shown varying results, and its cost-effectiveness compared to anticoagulation has not been evaluated using all available contemporary trial data. Methods and Results We used a Markov decision model to estimate lifetime quality-adjusted survival, costs, and cost-effectiveness of LAA closure with Watchman, compared directly with warfarin and indirectly with dabigatran, using data from the long-term (mean 3.8 year) follow-up of PROTECT AF and PREVAIL randomized trials. Using data from PROTECT AF, the incremental cost-effectiveness ratios (ICER) compared to warfarin and dabigatran were $20,486 and $23,422 per quality adjusted life year (QALY), respectively. Using data from PREVAIL, LAA closure was dominated by warfarin and dabigatran, meaning that it was less effective (8.44, 8.54, and 8.59 QALYs, respectively) and more costly. At a willingness-to-pay-threshold of $50,000 per QALY, LAA closure was cost-effective 90% and 9% of the time under PROTECT AF and PREVAIL assumptions, respectively. These results were sensitive to the rates of ischemic stroke and intracranial hemorrhage for LAA closure and medical anticoagulation. Conclusions Using data from the PROTECT AF trial, LAA closure with the Watchman device was cost-effective; using PREVAIL trial data, Watchman was more costly and less effective than warfarin and dabigatran. PROTECT AF enrolled more patients and has substantially longer follow-up time, allowing greater statistical certainty with the cost-effectiveness results. However, longer term trial results and post-marketing surveillance of major adverse events will be vital to determining the value of the Watchman in clinical practice. PMID:27307517

  1. Health care fraud and abuse data collection program: technical revisions to Healthcare Integrity and Protection Data Bank data collection activities. Final rule.

    PubMed

    2004-09-21

    The rule finalizes technical changes to the Healthcare Integrity and Protection Data Bank (HIPDB) data collection reporting requirements by clarifying the types of personal numeric identifiers that may be reported to the data bank in connection with adverse actions. The rule clarifies that in lieu of a Social Security Number (SSN), an individual taxpayer identification number (ITIN) may be reported to the data bank when, in those limited situations, an individual does not have an SSN.

  2. Large-Scale Trade in Legally Protected Marine Mollusc Shells from Java and Bali, Indonesia.

    PubMed

    Nijman, Vincent; Spaan, Denise; Nekaris, K Anne-Isola

    2015-01-01

    Tropical marine molluscs are traded globally. Larger species with slow life histories are under threat from over-exploitation. We report on the trade in protected marine mollusc shells in and from Java and Bali, Indonesia. Since 1987 twelve species of marine molluscs are protected under Indonesian law to shield them from overexploitation. Despite this protection they are traded openly in large volumes. We collected data on species composition, origins, volumes and prices at two large open markets (2013), collected data from wholesale traders (2013), and compiled seizure data by the Indonesian authorities (2008-2013). All twelve protected species were observed in trade. Smaller species were traded for 32,000 shells valued at USD500,000), chambered nautilus (Nautilus pompilius) (>3,000 shells, USD60,000) and giant clams (Tridacna spp.) (>2,000 shells, USD45,000) were traded in largest volumes. Two-thirds of this trade was destined for international markets, including in the USA and Asia-Pacific region. We demonstrated that the trade in protected marine mollusc shells in Indonesia is not controlled nor monitored, that it involves large volumes, and that networks of shell collectors, traders, middlemen and exporters span the globe. This impedes protection of these species on the ground and calls into question the effectiveness of protected species management in Indonesia; solutions are unlikely to be found only in Indonesia and must involve the cooperation of importing countries.

  3. The acceptability of conducting data linkage research without obtaining consent: lay people's views and justifications.

    PubMed

    Xafis, Vicki

    2015-11-17

    A key ethical issue arising in data linkage research relates to consent requirements. Patients' consent preferences in the context of health research have been explored but their consent preferences regarding data linkage specifically have been under-explored. In addition, the views on data linkage are often those of patient groups. As a result, little is known about lay people's views and their preferences about consent requirements in the context of data linkage. This study explores lay people's views and justifications regarding the acceptability of conducting data linkage research without obtaining consent. A qualitative study explored lay people's views regarding consent requirements in data linkage via four hypothetical data linkage scenarios of increasing complexity. Prior to considering the scenarios, participants were provided with information regarding best practice data linkage processes via discussion and a diagrammatic representation of the process. Lay people were able to understand the intricate processes involved in data linkage and the key protections afforded within a short amount of time. They were supportive of data linkage research and, on the whole, believed it should be conducted without consent provided a data linkage organization de-identifies the data used so that researchers do not handle identifiable data. Many thought that de-identified data holds a different status to identifiable data and should be used without specific consent in research that aims to benefit society. In weighing up conflicting values and interests, participants shifted consent preferences before arriving at their final consent preference for each scenario and provided justifications for their choices. They considered the protection of people's information, societal benefits, and the nature and constraints of research and recognized that these need to be balanced. With some exposure to the features of data linkage, lay people have the capacity to understand the processes sufficiently in order to consider ethical issues associated with consent preferences. Shifts in views reveal the complexity of such decisions. While privacy protection remained an important consideration for most participants, adequate protection measures adopted in best practice data linkage were viewed by most as protection enough for data linkage to proceed without specific individual consent.

  4. 45 CFR 164.302 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164..., implementation specifications, and requirements of this subpart with respect to electronic protected health...

  5. 45 CFR 164.302 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... specifications, and requirements of this subpart with respect to electronic protected health information. ...

  6. 76 FR 69736 - Primus Solutions, Inc., and Arctic Slope Regional Corp.; Transfer of Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-09

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPP-2011-0038; FRL-8891-5] Primus Solutions, Inc., and Arctic Slope Regional Corp.; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION... its subcontractor, Arctic Slope Regional Corporation (ASRC) in [[Page 69737

  7. Enhancing privacy and data protection in electronic medical environments.

    PubMed

    Gritzalis, Stefanos

    2004-12-01

    Raising awareness and providing guidance to on-line data protection is by all means a crucial issue worldwide. Equally important is the issue of applying privacy-related legislation in a coherent and coordinated way. Both these topics become even more critical when referring to medical environments and thus to the protection of patients' privacy and medical data. Electronic medical transactions require the transmission of personal and medical information over insecure communication channels like the Internet. It is therefore a rather straightforward task to construct "patient profiles " that capture the electronic medical behavior of a patient, or even reveal sensitive information in regard with her/his medical history. Clearly, the consequence from maintaining such profiles is the violation of the patient's privacy. This paper studies medical environments that can support electronic medical transactions or/and the provision of medical information through the Web. Specifically it focuses on the countermeasures that the various actor categories can employ for protecting the privacy of personal and medical data transmitted during electronic medical transactions.

  8. Search engine imaginary: Visions and values in the co-production of search technology and Europe.

    PubMed

    Mager, Astrid

    2017-04-01

    This article discusses the co-production of search technology and a European identity in the context of the EU data protection reform. The negotiations of the EU data protection legislation ran from 2012 until 2015 and resulted in a unified data protection legislation directly binding for all European member states. I employ a discourse analysis to examine EU policy documents and Austrian media materials related to the reform process. Using the concept 'sociotechnical imaginary', I show how a European imaginary of search engines is forming in the EU policy domain, how a European identity is constructed in the envisioned politics of control, and how national specificities contribute to the making and unmaking of a European identity. I discuss the roles that national technopolitical identities play in shaping both search technology and Europe, taking as an example Austria, a small country with a long history in data protection and a tradition of restrained technology politics.

  9. The legal and ethical aspects of telemedicine. 2: Data protection, security and European law.

    PubMed

    Stanberry, B

    1998-01-01

    The electronic record may be subject to abuses that can be carried out on a large scale and cause great damage. A wide range of data protection and information security measures will need to be taken to ensure the quality and integrity of such records. A European Union directive was formally adopted in 1995 which sets the obligations of those responsible for data processing as well as a number of important rights for individuals. The responsible teleconsultant or medical officer, as the data controller, must make sure these measures are enforced. In the case of the transmission of medical records to another location, the original data controller may remain liable for abuses. But as different elements of the records are spread throughout the different departments of a hospital or across different geographical locations, it may become difficult to ascertain who is responsible for protecting and controlling what. To this end, the designation of liability by contractual means, between the hospital and remote users of a telemedicine network, would be the clearest and most straightforward way of achieving uniformity and predictability in terms of the distribution of responsibility for data protection and security.

  10. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Rights to request privacy protection for protected health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights...

  11. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Rights to request privacy protection for protected health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights...

  12. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Rights to request privacy protection for protected health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights...

  13. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Rights to request privacy protection for protected health information. 164.522 Section 164.522 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights...

  14. Individual privacy versus public good: protecting confidentiality in health research.

    PubMed

    O'Keefe, Christine M; Rubin, Donald B

    2015-10-15

    Health and medical data are increasingly being generated, collected, and stored in electronic form in healthcare facilities and administrative agencies. Such data hold a wealth of information vital to effective health policy development and evaluation, as well as to enhanced clinical care through evidence-based practice and safety and quality monitoring. These initiatives are aimed at improving individuals' health and well-being. Nevertheless, analyses of health data archives must be conducted in such a way that individuals' privacy is not compromised. One important aspect of protecting individuals' privacy is protecting the confidentiality of their data. It is the purpose of this paper to provide a review of a number of approaches to reducing disclosure risk when making data available for research, and to present a taxonomy for such approaches. Some of these methods are widely used, whereas others are still in development. It is important to have a range of methods available because there is also a range of data-use scenarios, and it is important to be able to choose between methods suited to differing scenarios. In practice, it is necessary to find a balance between allowing the use of health and medical data for research and protecting confidentiality. This balance is often presented as a trade-off between disclosure risk and data utility, because methods that reduce disclosure risk, in general, also reduce data utility. Copyright © 2015 John Wiley & Sons, Ltd.

  15. Study to the current protection of personal data in the educational sector in Indonesia

    NASA Astrophysics Data System (ADS)

    Rosmaini, E.; Kusumasari, T. F.; Lubis, M.; Lubis, A. R.

    2018-03-01

    This study examines how legal expert interpret UU ITE to protect personal data based on privacy principle by using content analysis. This act has importance in order to govern the process of collection, use, transfer, disclose and store personal data for profit or other commercial purposes. By recognizing both the right of individual for privacy and the need of organization to utilize the customer data, the Act, which was amended by Parliament at October, 27th 2016 have critical role for protection guideline in Indonesia. Increasingly, with the use of advanced technology, data protection became one of the main issues on various sectors, especially in the educational sector. Educational institutions require large amount of personal data to run their business process to support learning, teaching, research and administration process. It involves wide range of personal data from institution, agencies, colleges, lecturers, students and parents, which might consist of several sensitive and confidential data such as historical, health, financial, academic and experience background. Underestimating and ignoring these issues can lead to disaster such as blackmailing, stalking, bullying or improper use of personal data. In aggregation, they might deliver huge loss to institution either financially or trust. Thus, this study analyse the privacy principle of UU ITE through 21 coders from legal expert to obtain more understanding of appropriate approach to implement privacy policy in the educational sector.

  16. A Study on the Lack of Enforcement of Data Protection Acts

    NASA Astrophysics Data System (ADS)

    Burghardt, Thorben; Böhm, Klemens; Buchmann, Erik; Kühling, Jürgen; Sivridis, Anastasios

    Data privacy is a fundamental human right, not only according to the EU perspective. Each EU state implements sophisticated data protection acts. Nevertheless, there are frequent media reports on data privacy violations. The scientific and the political community assume that data protection acts suffer from a lack of enforcement. This paper is an interdisciplinary study that examines this hypothesis by means of empirical facts on juridical assessment criteria - and validates it. We have inspected 100 service providers, from social online platforms to web shops. Our study considers legal requirements of the privacy policy and how providers ask for consent and react to requests for information or deletion of personal data. Our study is based on articles of German law that have a counterpart in the EU Directive 95/46/EC. Thus, our study is relevant for all EU states and all countries with similar regulations.

  17. Preserving Institutional Privacy in Distributed binary Logistic Regression.

    PubMed

    Wu, Yuan; Jiang, Xiaoqian; Ohno-Machado, Lucila

    2012-01-01

    Privacy is becoming a major concern when sharing biomedical data across institutions. Although methods for protecting privacy of individual patients have been proposed, it is not clear how to protect the institutional privacy, which is many times a critical concern of data custodians. Built upon our previous work, Grid Binary LOgistic REgression (GLORE)1, we developed an Institutional Privacy-preserving Distributed binary Logistic Regression model (IPDLR) that considers both individual and institutional privacy for building a logistic regression model in a distributed manner. We tested our method using both simulated and clinical data, showing how it is possible to protect the privacy of individuals and of institutions using a distributed strategy.

  18. Big Data in medical research and EU data protection law: challenges to the consent or anonymise approach.

    PubMed

    Mostert, Menno; Bredenoord, Annelien L; Biesaart, Monique C I H; van Delden, Johannes J M

    2016-07-01

    Medical research is increasingly becoming data-intensive; sensitive data are being re-used, linked and analysed on an unprecedented scale. The current EU data protection law reform has led to an intense debate about its potential effect on this processing of data in medical research. To contribute to this evolving debate, this paper reviews how the dominant 'consent or anonymise approach' is challenged in a data-intensive medical research context, and discusses possible ways forwards within the EU legal framework on data protection. A large part of the debate in literature focuses on the acceptability of adapting consent or anonymisation mechanisms to overcome the challenges within these approaches. We however believe that the search for ways forward within the consent or anonymise paradigm will become increasingly difficult. Therefore, we underline the necessity of an appropriate research exemption from consent for the use of sensitive personal data in medical research to take account of all legitimate interests. The appropriate conditions of such a research exemption are however subject to debate, and we expect that there will be minimal harmonisation of these conditions in the forthcoming EU Data Protection Regulation. Further deliberation is required to determine when a shift away from consent as a legal basis is necessary and proportional in a data-intensive medical research context, and what safeguards should be put in place when such a research exemption from consent is provided.

  19. Big Data in medical research and EU data protection law: challenges to the consent or anonymise approach

    PubMed Central

    Mostert, Menno; Bredenoord, Annelien L; Biesaart, Monique C I H; van Delden, Johannes J M

    2016-01-01

    Medical research is increasingly becoming data-intensive; sensitive data are being re-used, linked and analysed on an unprecedented scale. The current EU data protection law reform has led to an intense debate about its potential effect on this processing of data in medical research. To contribute to this evolving debate, this paper reviews how the dominant ‘consent or anonymise approach' is challenged in a data-intensive medical research context, and discusses possible ways forwards within the EU legal framework on data protection. A large part of the debate in literature focuses on the acceptability of adapting consent or anonymisation mechanisms to overcome the challenges within these approaches. We however believe that the search for ways forward within the consent or anonymise paradigm will become increasingly difficult. Therefore, we underline the necessity of an appropriate research exemption from consent for the use of sensitive personal data in medical research to take account of all legitimate interests. The appropriate conditions of such a research exemption are however subject to debate, and we expect that there will be minimal harmonisation of these conditions in the forthcoming EU Data Protection Regulation. Further deliberation is required to determine when a shift away from consent as a legal basis is necessary and proportional in a data-intensive medical research context, and what safeguards should be put in place when such a research exemption from consent is provided. PMID:26554881

  20. 40 CFR 161.45 - Waivers.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Waivers. 161.45 Section 161.45 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES General Provisions § 161.45 Waivers. (a) Rationale and...

  1. 40 CFR 158.300 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Definitions. 158.300 Section 158.300 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Product Chemistry § 158.300 Definitions. The following terms are defined for the...

  2. 40 CFR 158.355 - Enforcement analytical method.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Enforcement analytical method. 158.355 Section 158.355 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Product Chemistry § 158.355 Enforcement analytical method. An...

  3. 40 CFR 158.300 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Definitions. 158.300 Section 158.300 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Product Chemistry § 158.300 Definitions. The following terms are defined for the...

  4. 40 CFR 158.355 - Enforcement analytical method.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Enforcement analytical method. 158.355 Section 158.355 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Product Chemistry § 158.355 Enforcement analytical method. An...

  5. 40 CFR 158.1400 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 24 2014-07-01 2014-07-01 false Definitions. 158.1400 Section 158.1400 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Residue Chemistry § 158.1400 Definitions. The following terms are defined for the...

  6. 40 CFR 158.300 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 24 2014-07-01 2014-07-01 false Definitions. 158.300 Section 158.300 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Product Chemistry § 158.300 Definitions. The following terms are defined for the...

  7. 40 CFR 158.300 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Definitions. 158.300 Section 158.300 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Product Chemistry § 158.300 Definitions. The following terms are defined for the...

  8. 40 CFR 158.355 - Enforcement analytical method.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Enforcement analytical method. 158.355 Section 158.355 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Product Chemistry § 158.355 Enforcement analytical method. An...

  9. 40 CFR 158.300 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Definitions. 158.300 Section 158.300 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Product Chemistry § 158.300 Definitions. The following terms are defined for the...

  10. 40 CFR 158.1400 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Definitions. 158.1400 Section 158.1400 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Residue Chemistry § 158.1400 Definitions. The following terms are defined for the...

  11. 40 CFR 158.1400 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Definitions. 158.1400 Section 158.1400 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Residue Chemistry § 158.1400 Definitions. The following terms are defined for the...

  12. 40 CFR 158.355 - Enforcement analytical method.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Enforcement analytical method. 158.355 Section 158.355 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR PESTICIDES Product Chemistry § 158.355 Enforcement analytical method. An...

  13. 40 CFR 610.10 - Program purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... accumulation. (b) Data generated in an evaluation program by the Administrator of the Environmental Protection... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY RETROFIT DEVICES Test Procedures and Evaluation Criteria General Provisions § 610.10 Program purpose. (a) The...

  14. PAD-US: National Inventory of Protected Areas

    USGS Publications Warehouse

    Gergely, Kevin J.; McKerrow, Alexa

    2013-11-12

    The Gap Analysis Program produces data and tools that help meet critical national challenges such as biodiversity conservation, renewable energy development, climate change adaptation, and infrastructure investment. The Protected Areas Database of the United States (PAD-US) is the official inventory of protected open space in the United States. With over 715 million acres in thousands of holdings, the spatial data in PAD-US include public lands held in trust by national, State, and some local governments, and by some nonprofit conservation organizations.

  15. Personal Privacy in an Information Society. Final Report.

    ERIC Educational Resources Information Center

    Privacy Protection Study Commission, Washington, DC.

    This report of the Privacy Protection Study Commission was prepared in response to a Congressional mandate to study data banks, automatic data processing programs, and information systems of governmental, regional and private organizations to determine standards and procedures in force for the protection of personal information. Recommendations…

  16. 40 CFR Appendix J to Part 75... - [Reserved

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 16 2011-07-01 2011-07-01 false [Reserved] J Appendix J to Part 75-Compliance Dates for Revised Recordkeeping Requirements and Missing Data Procedures Protection of Environment... to Part 75—Compliance Dates for Revised Recordkeeping Requirements and Missing Data Procedures...

  17. 40 CFR Appendix J to Part 75... - [Reserved

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 16 2010-07-01 2010-07-01 false [Reserved] J Appendix J to Part 75-Compliance Dates for Revised Recordkeeping Requirements and Missing Data Procedures Protection of Environment... to Part 75—Compliance Dates for Revised Recordkeeping Requirements and Missing Data Procedures...

  18. 40 CFR Appendix J to Part 75... - [Reserved

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 17 2012-07-01 2012-07-01 false [Reserved] J Appendix J to Part 75-Compliance Dates for Revised Recordkeeping Requirements and Missing Data Procedures Protection of Environment... to Part 75—Compliance Dates for Revised Recordkeeping Requirements and Missing Data Procedures...

  19. 40 CFR Appendix J to Part 75... - [Reserved

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 17 2014-07-01 2014-07-01 false [Reserved] J Appendix J to Part 75-Compliance Dates for Revised Recordkeeping Requirements and Missing Data Procedures Protection of Environment... to Part 75—Compliance Dates for Revised Recordkeeping Requirements and Missing Data Procedures...

  20. 40 CFR Appendix J to Part 75... - [Reserved

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 17 2013-07-01 2013-07-01 false [Reserved] J Appendix J to Part 75-Compliance Dates for Revised Recordkeeping Requirements and Missing Data Procedures Protection of Environment... to Part 75—Compliance Dates for Revised Recordkeeping Requirements and Missing Data Procedures...

  1. 45 CFR 61.16 - Immunity.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Immunity. 61.16 Section 61.16 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK... Information by the Healthcare Integrity and Protection Data Bank § 61.16 Immunity. Individuals, entities or...

  2. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Confidentiality of Healthcare Integrity and... GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON HEALTH CARE PROVIDERS, SUPPLIERS AND PRACTITIONERS Disclosure of Information by the Healthcare Integrity...

  3. 45 CFR 61.16 - Immunity.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Immunity. 61.16 Section 61.16 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK... Information by the Healthcare Integrity and Protection Data Bank § 61.16 Immunity. Individuals, entities or...

  4. 45 CFR 61.16 - Immunity.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Immunity. 61.16 Section 61.16 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK... Information by the Healthcare Integrity and Protection Data Bank § 61.16 Immunity. Individuals, entities or...

  5. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of Healthcare Integrity and... GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON HEALTH CARE PROVIDERS, SUPPLIERS AND PRACTITIONERS Disclosure of Information by the Healthcare Integrity...

  6. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Confidentiality of Healthcare Integrity and... GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON HEALTH CARE PROVIDERS, SUPPLIERS AND PRACTITIONERS Disclosure of Information by the Healthcare Integrity...

  7. Backup, Archive, Recovery

    ERIC Educational Resources Information Center

    Pearring, John

    2012-01-01

    The education sector remains abuzz with cost-cutting expectations despite pressures to increase services. Automation of costly manual tasks could save funds for many of these institutions, specifically in data protection. The IT departments of schools and universities can take advantage of a proven cost-savings opportunity in data protection that…

  8. Control use of data to protect privacy.

    PubMed

    Landau, Susan

    2015-01-30

    Massive data collection by businesses and governments calls into question traditional methods for protecting privacy, underpinned by two core principles: (i) notice, that there should be no data collection system whose existence is secret, and (ii) consent, that data collected for one purpose not be used for another without user permission. But notice, designated as a fundamental privacy principle in a different era, makes little sense in situations where collection consists of lots and lots of small amounts of information, whereas consent is no longer realistic, given the complexity and number of decisions that must be made. Thus, efforts to protect privacy by controlling use of data are gaining more attention. I discuss relevant technology, policy, and law, as well as some examples that can illuminate the way. Copyright © 2015, American Association for the Advancement of Science.

  9. The public health information infrastructure. A national review of the law on health information privacy.

    PubMed

    Gostin, L O; Lazzarini, Z; Neslund, V S; Osterholm, M T

    1996-06-26

    Our objectives were to review and analyze the laws in the 50 states, the District of Columbia, and Puerto Rico that regulate the acquisition, storage, and use of public health data and to offer proposals for reform of the laws on public health information privacy. Virtually all states reported some statutory protection for governmentally maintained health data for public health information in general (49 states), communicable diseases (42 states), and sexually transmitted diseases (43 states). State statutes permitted disclosure of data for statistical purposes (42 states), contact tracing (39 states), epidemiologic investigations (22 states), and subpoena or court order (14 states). The survey revealed significant problems that affect both the development of fair and effective public health information systems and the protection of privacy. Statutes may be silent about the degree of privacy protection afforded, confer weaker privacy protection to certain kinds of information, or grant health officials broad discretion to disseminate personal information. Our proposals for law reform are based on a meeting of experts at the Carter Presidential Center under the auspices of the Centers for Disease Control and Prevention and the Council of State and Territorial Epidemiologists: (1) an independent data protection commission should be established, (2) health authorities should justify the collection of personally identifiable information, (3) subjects should be given basic information about data practices, (4) data should be held and used in accordance with fair information practices, (5) legally binding privacy and security assurances should attach to identifiable health information with significant penalties for breach of these assurances, (6) disclosure of data should be made only for purposes consistent with the original collection, and (7) secondary uses beyond those originally intended by the data collector should be permitted only with informed consent.

  10. Balancing access to health data and privacy: a review of the issues and approaches for the future.

    PubMed

    Lane, Julia; Schur, Claudia

    2010-10-01

    There has been a dramatic increase in the types of microdata, and this holds great promise for health services research. However, legislative efforts to protect individual privacy have reduced the flow of health care data for research purposes and increased costs and delays, affecting the quality of analysis. This paper provides an overview of the challenges raised by concerns about data confidentiality in the context of health services research, the current methodologies used to ensure data security, and a description of one successful approach to balancing access and privacy. Materials and Methods. We analyze the issues of access and privacy using a conceptual framework based on balancing the risk of reidentification with the utility associated with data analysis. The guiding principle should be to generate released data that are as close to the maximum acceptable risk as possible. HIPAA and other privacy measures can perhaps be seen as having had the effect of lowering the "maximum acceptable risk" level and rendering some data unreleasable. We discuss the levels of risk and utility associated with different types of data used in health services research and the ability to link data from multiple sources as well as current models of data sharing and their limitations. One particularly compelling approach is to establish a remote access "data enclave," where statistical protections are applied to the data, technical protections ensure compliance with data-sharing requirements, and operational controls limit researchers' access to the data they need for their specific research questions. We recommend reducing delays in access to data for research, increasing the use of remote access data enclaves, and disseminating knowledge and promulgating standards for best practices related to data protection. © Health Research and Educational Trust.

  11. International Data Sharing in Practice: New Technologies Meet Old Governance.

    PubMed

    Murtagh, Madeleine J; Turner, Andrew; Minion, Joel T; Fay, Michaela; Burton, Paul R

    2016-06-01

    The social structures that govern data/sample release aim to safeguard the confidentiality and privacy of cohort research participants (without whom there would be no data or samples) and enable the realization of societal benefit through optimizing the scientific use of those cohorts. Within collaborations involving multiple cohorts and biobanks, however, the local, national, and supranational institutional and legal guidelines for research (which produce a multiplicity of data access governance structures and guidelines) risk impeding the very science that is the raison d'etre of these consortia. We present an ethnographic study, which examined the epistemic and nonepistemic values driving decisions about data access and their consequences in the context of the pilot of an integrated approach to co-analysis of data. We demonstrate how the potential analytic flexibility offered by this approach was lost under contemporary data access governance. We identify three dominant values: protecting the research participant, protecting the study, and protecting the researcher. These values were both supported by and juxtaposed against a "public good" argument, and each was used as a rationale to both promote and inhibit sharing of data. While protection of the research participants was central to access permissions, decisions were also attentive to the desire of researchers to see their efforts in building population biobanks and cohorts realized in the form of scientific outputs. We conclude that systems for governing and enabling data access in large consortia need to (1) protect disclosure of research participant information or identity, (2) ensure the specific expectations of research participants are met, (3) embody systems of review that are transparent and not compromised by the specific interests of one particular group of stakeholders, and (4) facilitate data access procedures that are timely and efficient. Practical solutions are urgently needed. New approaches to data access governance should be trialed (and formally evaluated) with input from and discussion with stakeholders.

  12. UK National Data Guardian for Health and Care's Review of Data Security: Trust, better security and opt-outs.

    PubMed

    Chan, Tom; Di Iorio, Concetta Tania; De Lusignan, Simon; Lo Russo, Daniel; Kuziemsky, Craig; Liaw, Siaw-Teng

    2016-12-20

    Sharing health and social care data is essential to the delivery of high quality health care as well as disease surveillance, public health, and for conducting research. However, these societal benefits may be constrained by privacy and data protection principles. Hence, societies are striving to find a balance between the two competing public interests. Whilst the spread of IT advancements in recent decades has increased the demand for an increased privacy and data protection in many ways health is a special case. UK are adopting guidelines, codes of conduct and regulatory instruments aimed to implement privacy principles into practical settings and enhance public trust. Accordingly, in 2015, the UK National Data Guardian (NDG) requested to conduct a further review of data protection, referred to as Caldicott 3.  The scope of this review is to strengthen data security standards and confidentiality. It also proposes a consent system based on an "opt-out" model rather than on "opt-in.Across Europe as well as internationally the privacy-health data sharing balance is not fixed.  In Europe enactment of the new EU Data Protection Regulation in 2016 constitute a major breakthrough, which is likely to have a profound effect on European countries and beyond.  In Australia and across North America different ways are being sought to balance out these twin requirements of a modern society - to preserve privacy alongside affording high quality health care for an ageing population.  Whilst in the UK privacy legal framework remains complex and fragmented into different layers of legislation, which may negatively impact on both the rights to privacy and health the UK is at the forefront in the uptake of international and EU privacy and data protection principles. And, if the privacy regime were reorganised in a more comprehensive manner, it could be used as a sound implementation model for other countries.

  13. 40 CFR 161.55 - Agricultural vs. non-agricultural pesticides.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Agricultural vs. non-agricultural pesticides. 161.55 Section 161.55 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES General Provisions § 161...

  14. 40 CFR 161.40 - Consultation with the Agency.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Consultation with the Agency. 161.40 Section 161.40 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA REQUIREMENTS FOR REGISTRATION OF ANTIMICROBIAL PESTICIDES General Provisions § 161.40 Consultation...

  15. 40 CFR 716.60 - Reporting schedule.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 31 2014-07-01 2014-07-01 false Reporting schedule. 716.60 Section 716.60 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.60 Reporting schedule. (a) General requirements...

  16. 40 CFR 716.60 - Reporting schedule.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 32 2012-07-01 2012-07-01 false Reporting schedule. 716.60 Section 716.60 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.60 Reporting schedule. (a) General requirements...

  17. 40 CFR 716.65 - Reporting period.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Reporting period. 716.65 Section 716.65 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.65 Reporting period. Unless otherwise required...

  18. 40 CFR 716.65 - Reporting period.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 31 2011-07-01 2011-07-01 false Reporting period. 716.65 Section 716.65 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.65 Reporting period. Unless otherwise required...

  19. 40 CFR 716.60 - Reporting schedule.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Reporting schedule. 716.60 Section 716.60 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.60 Reporting schedule. (a) General requirements...

  20. 40 CFR 716.65 - Reporting period.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 32 2012-07-01 2012-07-01 false Reporting period. 716.65 Section 716.65 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.65 Reporting period. Unless otherwise required...

Top