32 CFR 806b.11 - When to give Privacy Act Statements (PAS).
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false When to give Privacy Act Statements (PAS). 806b... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.11 When to give Privacy Act Statements... information. Give a copy of the Privacy Act Statement if asked. Do not ask the person to sign the Privacy Act...
32 CFR 806b.11 - When to give Privacy Act Statements (PAS).
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false When to give Privacy Act Statements (PAS). 806b... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.11 When to give Privacy Act Statements... information. Give a copy of the Privacy Act Statement if asked. Do not ask the person to sign the Privacy Act...
32 CFR 806b.11 - When to give Privacy Act Statements (PAS).
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false When to give Privacy Act Statements (PAS). 806b... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.11 When to give Privacy Act Statements... information. Give a copy of the Privacy Act Statement if asked. Do not ask the person to sign the Privacy Act...
32 CFR Appendix C to Part 505 - Privacy Act Statement Format
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 3 2013-07-01 2013-07-01 false Privacy Act Statement Format C Appendix C to... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM Pt. 505, App. C Appendix C to Part 505—Privacy Act... he or she chooses not to provide the requested information. (1) Example of a Privacy Act Statement (i...
32 CFR Appendix C to Part 505 - Privacy Act Statement Format
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 3 2014-07-01 2014-07-01 false Privacy Act Statement Format C Appendix C to... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM Pt. 505, App. C Appendix C to Part 505—Privacy Act... he or she chooses not to provide the requested information. (1) Example of a Privacy Act Statement (i...
32 CFR Appendix C to Part 505 - Privacy Act Statement Format
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Privacy Act Statement Format C Appendix C to Part... AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM Pt. 505, App. C Appendix C to Part 505—Privacy Act... he or she chooses not to provide the requested information. (1) Example of a Privacy Act Statement (i...
32 CFR Appendix C to Part 505 - Privacy Act Statement Format
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 3 2012-07-01 2009-07-01 true Privacy Act Statement Format C Appendix C to Part... AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM Pt. 505, App. C Appendix C to Part 505—Privacy Act... he or she chooses not to provide the requested information. (1) Example of a Privacy Act Statement (i...
Rains, Stephen A; Bosch, Leslie A
2009-07-01
This article reports a content analysis of the privacy policy statements (PPSs) from 97 general reference health Web sites that was conducted to examine the ways in which visitors' privacy is constructed by health organizations. PPSs are formal documents created by the Web site owner to describe how information regarding site visitors and their behavior is collected and used. The results show that over 80% of the PPSs in the sample indicated automatically collecting or requesting that visitors voluntarily provide information about themselves, and only 3% met all five of the Federal Trade Commission's Fair Information Practices guidelines. Additionally, the results suggest that the manner in which PPSs are framed and the use of justifications for collecting information are tropes used by health organizations to foster a secondary exchange of visitors' personal information for access to Web site content.
Any information you provide to the Environmental Protection Agency’s (EPA) Suspension and Debarment Program will be governed by the Privacy Act and will be included in the EPA Debarment and Suspension Files, a Privacy Act system of records.
Reading level of privacy policies on Internet health Web sites.
Graber, Mark A; D'Alessandro, Donna M; Johnson-West, Jill
2002-07-01
Most individuals would like to maintain the privacy of their medical information on the World Wide Web (WWW). In response, commercial interests and other sites post privacy policies that are designed to inform users of how their information will be used. However, it is not known if these statements are comprehensible to most WWW users. The purpose of this study was to determine the reading level of privacy statements on Internet health Web sites and to determine whether these statements can inform users of their rights. This was a descriptive study. Eighty Internet health sites were examined and the readability of their privacy policies was determined. The selected sample included the top 25 Internet health sites as well as other sites that a user might encounter while researching a common problem such as high blood pressure. Sixty percent of the sites were commercial (.com), 17.5% were organizations (.org), 8.8% were from the United Kingdom (.uk), 3.8% were United States governmental (.gov), and 2.5% were educational (.edu). The readability level of the privacy policies was calculated using the Flesch, the Fry, and the SMOG readability levels. Of the 80 Internet health Web sites studied, 30% (including 23% of the commercial Web sites) had no privacy policy posted. The average readability level of the remaining sites required 2 years of college level education to comprehend, and no Web site had a privacy policy that was comprehensible by most English-speaking individuals in the United States. The privacy policies of health Web sites are not easily understood by most individuals in the United States and do not serve to inform users of their rights. Possible remedies include rewriting policies to make them comprehensible and protecting online health information by using legal statutes or standardized insignias indicating compliance with a set of privacy standards (eg, "Health on the Net" [HON] http://www.hon.ch).
76 FR 2309 - Consumer Information Regulations; Fees for Use of Traction Skid Pads
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-13
....regulations.gov , including any personal information provided. Privacy Act: Anyone is able to search the....). You may review DOT's complete Privacy Act Statement in the Federal Register published on April 11, 2000 (65 FR 19477-78) or you may visit http://www.dot.gov/privacy.html . Docket: For access to the...
Privacy Statement for Nova Southeastern University
and information sciences, and pharmacy. Professional Programs in high demand fields such as medicine conducted at NSU. Translational Research and Economic Development Information on basic, applied, and privacy and recognizes the importance of your personal information. We are committed to protecting your
Privacy Policy of NOAA's National Weather Service - NOAA's National Weather
Safety Weather Radio Hazard Assmt... StormReady / TsunamiReady Skywarn(tm) Education/Outreach Information , and National Weather Service information collection practices. This Privacy Policy Statement applies only to National Weather Service web sites. Some organizations within NOAA may have other information
Assistant Secretary of Defense-Public Affairs. Information presented on this website is considered public information and may be distributed or copied unless otherwise specified. Use of appropriate byline/photo/image credits is requested. Privacy Act Statement - If you choose to provide us with personal information - like
Dietary Supplement Ingredient Database
... ARS Site Map | ARS Policies and Links | Plain Writing | FOIA | Accessibility Statement | Privacy Policy | Nondiscrimination Statement | Information Quality | USA.gov | White House | Technical Support Last updated: 8/14/2017
75 FR 22577 - Proposed Privacy Policy Statement
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-29
... ELECTION ASSISTANCE COMMISSION Proposed Privacy Policy Statement AGENCY: U.S. Election Assistance Commission. ACTION: Notice and request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy...
10 CFR 9.54 - Verification of identity of individuals making requests.
Code of Federal Regulations, 2011 CFR
2011-01-01
....54 Section 9.54 Energy NUCLEAR REGULATORY COMMISSION PUBLIC RECORDS Privacy Act Regulations... statements may be obtained on request from the Freedom of Information Act and Privacy Act Officer, and sent... to establishing the identity of the minor, or other individual he represents as required in paragraph...
A Model Privacy Statement for Ohio Library Web Sites.
ERIC Educational Resources Information Center
Monaco, Michael J.
The purpose of this research was to develop a model privacy policy statement for library World Wide Web sites. First, standards of privacy protection were identified. These standards were culled from the privacy and confidentiality policies of the American Library Association, the Federal Trade Commission's online privacy reports, the guidelines…
ERIC Educational Resources Information Center
Fields, Cheryl
2005-01-01
In this era when many Americans seem resigned to greater encroachments on their personal privacy due to the growth and ubiquity of electronic databases with information about almost every aspect of their lives, a recent statement from the American Association of University Professors (AAUP) seems timely. The statement highlighted the issue of…
Code of Federal Regulations, 2014 CFR
2014-07-01
... data subject to this part, an appropriate Privacy Act Statement must be added. ... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY... provides guidance for preparing Privacy Act Statements for use with forms (see also paragraph (b) of this...
Code of Federal Regulations, 2011 CFR
2011-07-01
... data subject to this part, an appropriate Privacy Act Statement must be added. ... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY... provides guidance for preparing Privacy Act Statements for use with forms (see also paragraph (b) of this...
32 CFR 327.6 - Collecting personal information
Code of Federal Regulations, 2012 CFR
2012-07-01
... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to...
32 CFR 327.6 - Collecting personal information.
Code of Federal Regulations, 2014 CFR
2014-07-01
... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to...
32 CFR 327.6 - Collecting personal information
Code of Federal Regulations, 2010 CFR
2010-07-01
... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to...
32 CFR 327.6 - Collecting personal information
Code of Federal Regulations, 2011 CFR
2011-07-01
... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to...
32 CFR 327.6 - Collecting personal information.
Code of Federal Regulations, 2013 CFR
2013-07-01
... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to...
Joint Replacement Surgery: Health Information Basics for You and Your Family
... information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy Open Source Data Public Data Listing NIH... ...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY... provides guidance for preparing Privacy Act Statements for use with forms (see also paragraph (b) of this... Privacy Act Statement shall appear as follows (listed in the order of preference): (i) In the body of the...
... this research; and the dissemination of information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy ...
... this research; and the dissemination of information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy ...
Customer privacy on UK healthcare websites.
Mundy, Darren P
2006-09-01
Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.
... this research; and the dissemination of information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy ...
... this research; and the dissemination of information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy ...
... this research; and the dissemination of information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy ...
... information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy Open Source Data Public Data Listing NIH... ...
... information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy Open Source Data Public Data Listing NIH... ...
... information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy Open Source Data Public Data Listing NIH... ...
... information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy Open Source Data Public Data Listing NIH... ...
... information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy Open Source Data Public Data Listing NIH... ...
... information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy Open Source Data Public Data Listing NIH... ...
User account | National Agricultural Library
Skip to main content Home National Agricultural Library United States Department of Agriculture Ag | Agricultural Research Service | Plain Language | FOIA | Accessibility Statement | Information Quality | Privacy
Charbonneau, Deborah H
2016-08-01
While online communities for social support continue to grow, little is known about the state of privacy practices of health social networking sites. This article reports on a structured content analysis of privacy policies and disclosure practices for 25 online ovarian cancer communities. All of the health social networking sites in the study sample provided privacy statements to users, yet privacy practices varied considerably across the sites. The majority of sites informed users that personal information was collected about participants and shared with third parties (96%, n = 24). Furthermore, more than half of the sites (56%, n = 14) stated that cookies technology was used to track user behaviors. Despite these disclosures, only 36% (n = 9) offered opt-out choices for sharing data with third parties. In addition, very few of the sites (28%, n = 7) allowed individuals to delete their personal information. Discussions about specific security measures used to protect personal information were largely missing. Implications for privacy, confidentiality, consumer choice, and data safety in online environments are discussed. Overall, nurses and other health professionals can utilize these findings to encourage individuals seeking online support and participating in social networking sites to build awareness of privacy risks to better protect their personal health information in the digital age.
... this publication may be reproduced, stored in a retrieval system, posted on the Internet, or transmitted, in ... Students For Patients About Us Contact Us Copyright Information Privacy Statement RSS Advertising Opportunities Careers at ACOG ...
... this research; and the dissemination of information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy ...
Understanding Autoimmune Diseases
... information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy Open Source Data Public Data Listing NIH... ...
... this publication may be reproduced, stored in a retrieval system, posted on the Internet, or transmitted, in ... Students For Patients About Us Contact Us Copyright Information Privacy Statement RSS Advertising Opportunities Careers at ACOG ...
Scoliosis in Children and Adolescents
... this research; and the dissemination of information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy ...
... information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy Open Source Data Public Data Listing NIH... ...
... this publication may be reproduced, stored in a retrieval system, posted on the Internet, or transmitted, in ... Students For Patients About Us Contact Us Copyright Information Privacy Statement RSS Advertising Opportunities Careers at ACOG ...
Preventing Deep Vein Thrombosis
... this publication may be reproduced, stored in a retrieval system, posted on the Internet, or transmitted, in ... Students For Patients About Us Contact Us Copyright Information Privacy Statement RSS Advertising Opportunities Careers at ACOG ...
Polymyalgia Rheumatica and Giant Cell Arteritis
... information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy Open Source Data Public Data Listing NIH... ...
12 CFR 332.12 - Limits on sharing account number information for marketing purposes.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Limits on sharing account number information... REGULATIONS AND STATEMENTS OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 332.12 Limits on sharing account number information for marketing purposes. (a) General prohibition on...
Perimenopausal Bleeding and Bleeding After Menopause
... this publication may be reproduced, stored in a retrieval system, posted on the Internet, or transmitted, in ... Students For Patients About Us Contact Us Copyright Information Privacy Statement RSS Advertising Opportunities Careers at ACOG ...
NIAMS Kids Pages on Muscles, Joints, Skin and Bones
... this research; and the dissemination of information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy ...
4/4/2018: The Ag Data Commons Metrics | National Agricultural Library
Skip to main content Home National Agricultural Library United States Department of Agriculture Ag | Agricultural Research Service | Plain Language | FOIA | Accessibility Statement | Information Quality | Privacy
Common Laundry Detergent Ingredient May Help Preserve Muscle Tissue After Severe Injury
... this research; and the dissemination of information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy ...
Insights Into Severe Form of Dwarfism Could Lead to New Treatment Strategies
... this research; and the dissemination of information on research progress in these diseases. Contact Us NIAMS Archive Viewers and Players Social Media Moderation Policy FOIA Privacy Statement Accessibility Disclaimer Digital Strategy ...
NASA Astrophysics Data System (ADS)
Peikari, Hamid Reza
Customer satisfaction and loyalty have been cited as the e-commerce critical success factors and various studies have been conducted to find the antecedent determinants of these concepts in the online transactions. One of the variables suggested by some studies is perceived security. However, these studies have referred to security from a broad general perspective and no attempts have been made to study the specific security related variables. This paper intends to study the influence on security statement and technical protection on satisfaction, loyalty and privacy. The data was collected from 337 respondents and after the reliability and validity tests, path analysis was applied to examine the hypotheses. The results suggest that loyalty is influenced by satisfaction and security statement and no empirical support was found for the influence on technical protection and privacy on loyalty. Moreover, it was found that security statement and technical protection have a positive significant influence on satisfaction while no significant effect was found for privacy. Furthermore, the analysis indicated that security statement have a positive significant influence on technical protection while technical protection was found to have a significant negative impact on perceived privacy.
32 CFR 806b.27 - When to include a Privacy Act warning statement in publications.
Code of Federal Regulations, 2010 CFR
2010-07-01
... include the Warning Statement when publications direct collection of the Social Security Number, or any part of the Social Security Number, from the individual. The warning statement will cite legal authority and when part of a record system, the Privacy Act system of records number and title. You can use...
With Protein Foods, Variety Is Key: 10 Tips for Choosing Protein
... or seeds can be considered as 1 ounce-equivalent from the Protein Foods Group. Revised January 2016 ... Us Advanced Search Help Search Tips Privacy Policy Non-Discrimination Statement Information Quality USA.gov WhiteHouse.gov
76 FR 4446 - Privacy Act of 1974; Report of Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-25
... the information for the purpose of assisting the Department's efforts to respond to a suspected or...--Report of Modified or Altered System of Records Narrative Statement I. Background and Purpose of the... information for the purpose of assisting the Department's efforts to respond to a suspected or confirmed...
Animals & Livestock | National Agricultural Library
Skip to main content Home National Agricultural Library United States Department of Agriculture Ag (maps, tables, graphs), Agricultural Products html National Animal Nutrition Program (NANP) Feed | Agricultural Research Service | Plain Language | FOIA | Accessibility Statement | Information Quality | Privacy
78 FR 28532 - Freedom of Information, Privacy Act, and Government in the Sunshine Act Procedures
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-15
... to the best of your knowledge and belief, explaining in detail the basis for requesting expedited.... 1002.7 Penalties. Any person who makes a false statement in connection with any request for a record or...
76 FR 4478 - Privacy Act of 1974; Report of Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-25
... contractors that have a need to know the information for the purpose of assisting the Department's efforts to... Records Narrative Statement I. Background and Purpose of the System A. Background The Department of Health... information for the purpose of assisting the Department's efforts to respond to a suspected or confirmed...
76 FR 4445 - Privacy Act of 1974; Report of Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-25
... federal agencies and Department contractors that have a need to know the information for the purpose of... of Records Narrative Statement I. Background and Purpose of the System A. Background The Department... and Department contractors that have a need to know the information for the purpose of assisting the...
76 FR 4440 - Privacy Act of 1974; Report of Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-25
... that have a need to know the information for the purpose of assisting the Department's efforts to... Mycobacterioses--Report of Modified or Altered System of Records Narrative Statement I. Background and Purpose of... that have a need to know the information for the purpose of assisting the Department's efforts to...
National Nutrient Database for Standard Reference - Find Nutrient Value of Common Foods by Nutrient
... grams Household * required field USDA Food Composition Databases Software developed by the National Agricultural Library v.3.9.4.1 2018-06-11 NAL Home | USDA.gov | Agricultural Research Service | Plain Language | FOIA | Accessibility Statement | Information Quality | Privacy ...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-12
... design feature associated with the architecture and connectivity capabilities of the airplanes' computer... the comment for an association, business, labor union, etc.). DOT's complete Privacy Act Statement can...; facsimile 425-227-1149. SUPPLEMENTARY INFORMATION: The proposed network architecture includes the following...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-12
... the comment for an association, business, labor union, etc.). DOT's complete Privacy Act Statement can...; facsimile 425-227-1149. SUPPLEMENTARY INFORMATION: The network architecture is composed of several connected... business and administrative support, and 3. Passenger entertainment. The applicable airworthiness...
32 CFR 806b.51 - Privacy and the Web.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy and the Web. 806b.51 Section 806b.51 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT... security notices at major web site entry points and Privacy Act statements or Privacy Advisories when...
4 CFR 83.15 - Request for amendment of record.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 4 Accounts 1 2010-01-01 2010-01-01 false Request for amendment of record. 83.15 Section 83.15 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PRIVACY PROCEDURES FOR PERSONNEL RECORDS § 83.15 Request... disclosure containing information about which the individual has filed a statement of disagreement, occurring...
78 FR 46555 - Privacy Act Regulations
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-01
... sources to refrain from giving such information because of fear of reprisal, or fear of breach of promise... preparation of an environmental assessment or environmental impact statement under the requirements of the...) Litigation, Appeal and Case Files System, Interior/Office of the Solicitor-1 to the extent that it consists...
Locking it down: The privacy and security of mobile medication apps.
Grindrod, Kelly; Boersema, Jonathan; Waked, Khrystine; Smith, Vivian; Yang, Jilan; Gebotys, Catherine
2017-01-01
To explore the privacy and security of free medication applications (apps) available to Canadian consumers. The authors searched the Canadian iTunes store for iOS apps and the Canadian Google Play store for Android apps related to medication use and management. Using an Apple iPad Air 2 and a Google Nexus 7 tablet, 2 reviewers generated a list of apps that met the following inclusion criteria: free, available in English, intended for consumer use and related to medication management. Using a standard data collection form, 2 reviewers independently coded each app for the presence/absence of passwords, the storage of personal health information, a privacy statement, encryption, remote wipe and third-party sharing. A Cohen's Kappa statistic was used to measure interrater agreement. Of the 184 apps evaluated, 70.1% had no password protection or sign-in system. Personal information, including name, date of birth and gender, was requested by 41.8% (77/184) of apps. Contact information, such as address, phone number and email, was requested by 25% (46/184) of apps. Finally, personal health information, other than medication name, was requested by 89.1% (164/184) of apps. Only 34.2% (63/184) of apps had a privacy policy in place. Most free medication apps offer very limited authentication and privacy protocols. As a result, the onus currently falls on patients to input information in these apps selectively and to be aware of the potential privacy issues. Until more secure systems are built, health care practitioners cannot fully support patients wanting to use such apps.
17 CFR 146.4 - Procedures for identifying the individual making the request.
Code of Federal Regulations, 2011 CFR
2011-04-01
... statements to a Government agency and under the Privacy Act, section 552a(i)(3) of title 5 of the U.S. Code... notarized statements may be attained upon request from the FOI, Privacy and Sunshine Acts compliance staff..., NW., Washington, DC 20581. (c) The parent or guardian of a minor or a person judicially determined to...
12 CFR 332.13 - Exception to opt out requirements for service providers and joint marketing.
Code of Federal Regulations, 2010 CFR
2010-01-01
... this section may include marketing of your own products or services or marketing of financial products... providers and joint marketing. 332.13 Section 332.13 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Exceptions § 332.13...
76 FR 23354 - Notice of Request for the Extension of Currently Approved Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-26
... Administration (FTA), DOT. ACTION: Notice of Request for Comments. SUMMARY: In accordance with the Paperwork... electronic docket site. (Note: -The U.S. Department of Transportation's (DOT's) electronic docket is no....gov . You may review DOT's complete Privacy Act Statement in the Federal Register published April 11...
77 FR 40409 - Notice of Request for the Extension of a Currently Approved Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-09
... Administration (FTA), DOT. ACTION: Notice of request for comments. SUMMARY: In accordance with the Paperwork.... Government electronic docket site. (Note: The U.S. Department of Transportation's (DOT's) electronic docket... . You may review DOT's complete Privacy Act Statement in the Federal Register published April 11, 2000...
77 FR 70445 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-26
...-wide set of credentials and single sign-on capability for multiple CMS applications. In order to prove... and answers); 4. Provide the user a single sign-on, federated CMS EIDM ID and Password; 5... Terms of Service and CMS Privacy Statement on the Web. Form Numbers: CMS-10452 (OCN: 0938-New...
76 FR 4471 - Privacy Act of 1974; Report of Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-25
... the information for the purpose of assisting the Department's efforts to respond to a suspected or... purpose of this system is to perform medical and epidemiological research, statistical analysis, and to... Statement I. Background and Purpose of the System A. Background The Department of Health and Human Services...
44 CFR 6.3 - Collection and use of information (Privacy Act statements).
Code of Federal Regulations, 2010 CFR
2010-10-01
... identity of an individual, and the social security number will become a part of a system of records in... in compliance with the Act and these regulations. (c) Solicitation of Social Security numbers. Before... such individual refuses to disclose his/her social security account number, the employee of FEMA shall...
32 CFR Appendix C to Part 505 - Privacy Act Statement Format
Code of Federal Regulations, 2010 CFR
2010-07-01
... AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM Pt. 505, App. C Appendix C to Part 505—Privacy Act...) Authority: Emergency Supplement Act of 2000; Public Law 106-246; 5 U.S.C. 3013, Secretary of the Army; 10 U...
5 CFR 297.307 - Statement of disagreement.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Section 297.307 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PRIVACY... concise statement of disagreement. Such a statement should be filed with the appropriate system manager... system manager should provide a copy of the statement of disagreement to any individual or agency to whom...
5 CFR 297.307 - Statement of disagreement.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Section 297.307 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PRIVACY... concise statement of disagreement. Such a statement should be filed with the appropriate system manager... system manager should provide a copy of the statement of disagreement to any individual or agency to whom...
12 CFR 332.15 - Other exceptions to notice and opt out requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Reporting Act (15 U.S.C. 1681 et seq.), or (ii) From a consumer report reported by a consumer reporting... STATEMENTS OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Exceptions § 332.15 Other exceptions... consent or at the direction of the consumer, provided that the consumer has not revoked the consent or...
76 FR 4454 - Privacy Act of 1974; Report of Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-25
... Federal agencies and Department contractors that have a need to know the information for the purpose of.../NIOSH.'' The purpose of this system is to develop composite data summaries to support the development of... Records Narrative Statement I. Background and Purpose of the System A. Background The Department of Health...
76 FR 4474 - Privacy Act of 1974; Report of Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-25
... for the purpose of assisting the Department's efforts to respond to a suspected or confirmed breach of... Investigations, HHS/CDC/ NIOSH.'' The purpose of this system is to permit acquisition of information related to... Statement I. Background and Purpose of the System A. Background The Department of Health and Human Services...
76 FR 4438 - Privacy Act of 1974; Report of Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-25
... information for the purpose of assisting the Department's efforts to respond to a suspected or confirmed... Altered System of Records Narrative Statement I. Background and Purpose of the System A. Background The... for the purpose of assisting the Department's efforts to respond to a suspected or confirmed breach of...
49 CFR 802.14 - Review procedure and judicial review.
Code of Federal Regulations, 2010 CFR
2010-10-01
... concise statement enumerating the reasons for the requester's disagreement with the denial, pursuant to...) Statements of Disagreement. (1) Written Statements of Disagreement may be furnished by the individual within... envelope, “Privacy Act Statement of Disagreement.” (2) The Director, Bureau of Administration, or his...
78 FR 61447 - Petition for Waiver of Compliance
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-03
... outlying facilities. When possible, minor repairs are made at outlying facilities and this will continue to...://www.regulations.gov/#!privacyNotice for the privacy notice of regulations.gov or interested parties may review DOT's complete Privacy Act Statement in the Federal Register published on April 11, 2000...
Typology of end-of-life priorities in Saudi females: averaging analysis and Q-methodology.
Hammami, Muhammad M; Hammami, Safa; Amer, Hala A; Khodr, Nesrine A
2016-01-01
Understanding culture-and sex-related end-of-life preferences is essential to provide quality end-of-life care. We have previously explored end-of-life choices in Saudi males and found important culture-related differences and that Q-methodology is useful in identifying intraculture, opinion-based groups. Here, we explore Saudi females' end-of-life choices. A volunteer sample of 68 females rank-ordered 47 opinion statements on end-of-life issues into a nine-category symmetrical distribution. The ranking scores of the statements were analyzed by averaging analysis and Q-methodology. The mean age of the females in the sample was 30.3 years (range, 19-55 years). Among them, 51% reported average religiosity, 78% reported very good health, 79% reported very good life quality, and 100% reported high-school education or more. The extreme five overall priorities were to be able to say the statement of faith, be at peace with God, die without having the body exposed, maintain dignity, and resolve all conflicts. The extreme five overall dis-priorities were to die in the hospital, die well dressed, be informed about impending death by family/friends rather than doctor, die at peak of life, and not know if one has a fatal illness. Q-methodology identified five opinion-based groups with qualitatively different characteristics: "physical and emotional privacy concerned, family caring" (younger, lower religiosity), "whole person" (higher religiosity), "pain and informational privacy concerned" (lower life quality), "decisional privacy concerned" (older, higher life quality), and "life quantity concerned, family dependent" (high life quality, low life satisfaction). Out of the extreme 14 priorities/dis-priorities for each group, 21%-50% were not represented among the extreme 20 priorities/dis-priorities for the entire sample. Consistent with the previously reported findings in Saudi males, transcendence and dying in the hospital were the extreme end-of-life priority and dis-priority, respectively, in Saudi females. Body modesty was a major overall concern; however, concerns about pain, various types of privacy, and life quantity were variably emphasized by the five opinion-based groups but masked by averaging analysis.
Typology of end-of-life priorities in Saudi females: averaging analysis and Q-methodology
Hammami, Muhammad M; Hammami, Safa; Amer, Hala A; Khodr, Nesrine A
2016-01-01
Background Understanding culture-and sex-related end-of-life preferences is essential to provide quality end-of-life care. We have previously explored end-of-life choices in Saudi males and found important culture-related differences and that Q-methodology is useful in identifying intraculture, opinion-based groups. Here, we explore Saudi females’ end-of-life choices. Methods A volunteer sample of 68 females rank-ordered 47 opinion statements on end-of-life issues into a nine-category symmetrical distribution. The ranking scores of the statements were analyzed by averaging analysis and Q-methodology. Results The mean age of the females in the sample was 30.3 years (range, 19–55 years). Among them, 51% reported average religiosity, 78% reported very good health, 79% reported very good life quality, and 100% reported high-school education or more. The extreme five overall priorities were to be able to say the statement of faith, be at peace with God, die without having the body exposed, maintain dignity, and resolve all conflicts. The extreme five overall dis-priorities were to die in the hospital, die well dressed, be informed about impending death by family/friends rather than doctor, die at peak of life, and not know if one has a fatal illness. Q-methodology identified five opinion-based groups with qualitatively different characteristics: “physical and emotional privacy concerned, family caring” (younger, lower religiosity), “whole person” (higher religiosity), “pain and informational privacy concerned” (lower life quality), “decisional privacy concerned” (older, higher life quality), and “life quantity concerned, family dependent” (high life quality, low life satisfaction). Out of the extreme 14 priorities/dis-priorities for each group, 21%–50% were not represented among the extreme 20 priorities/dis-priorities for the entire sample. Conclusion Consistent with the previously reported findings in Saudi males, transcendence and dying in the hospital were the extreme end-of-life priority and dis-priority, respectively, in Saudi females. Body modesty was a major overall concern; however, concerns about pain, various types of privacy, and life quantity were variably emphasized by the five opinion-based groups but masked by averaging analysis. PMID:27274205
Grindrod, Kelly; Boersema, Jonathan; Waked, Khrystine; Smith, Vivian; Yang, Jilan; Gebotys, Catherine
2016-01-01
Objective: To explore the privacy and security of free medication applications (apps) available to Canadian consumers. Methods: The authors searched the Canadian iTunes store for iOS apps and the Canadian Google Play store for Android apps related to medication use and management. Using an Apple iPad Air 2 and a Google Nexus 7 tablet, 2 reviewers generated a list of apps that met the following inclusion criteria: free, available in English, intended for consumer use and related to medication management. Using a standard data collection form, 2 reviewers independently coded each app for the presence/absence of passwords, the storage of personal health information, a privacy statement, encryption, remote wipe and third-party sharing. A Cohen’s Kappa statistic was used to measure interrater agreement. Results: Of the 184 apps evaluated, 70.1% had no password protection or sign-in system. Personal information, including name, date of birth and gender, was requested by 41.8% (77/184) of apps. Contact information, such as address, phone number and email, was requested by 25% (46/184) of apps. Finally, personal health information, other than medication name, was requested by 89.1% (164/184) of apps. Only 34.2% (63/184) of apps had a privacy policy in place. Conclusion: Most free medication apps offer very limited authentication and privacy protocols. As a result, the onus currently falls on patients to input information in these apps selectively and to be aware of the potential privacy issues. Until more secure systems are built, health care practitioners cannot fully support patients wanting to use such apps. PMID:28286594
West, Darrell M; Miller, Edward Alan
2006-08-01
State health departments have placed a tremendous amount of information, data, and services online in recent years. With the significant increase in online resources at official health sites, though, have come questions concerning equity of access and the confidentiality of electronic medical materials. This paper reports on an examination of public health department websites maintained by the 50 state governments. Using a content analysis of health department sites undertaken each year from 2000 to 2005, we investigate several dimensions of accessibility and privacy: readability levels, disability access, non-English accessibility, and the presence of privacy and security statements. We argue that although progress has been made at improving the accessibility and confidentiality of health department electronic resources, there remains much work to be done to ensure quality access for all Americans in the area of public e-health.
78 FR 20355 - Meeting of the Compact Council for the National Crime Prevention and Privacy Compact
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-04
... discussion are expected to include: (1) Methods to Reduce the Civil Fingerprint Submission Reject Rate (2) Revised Privacy Act Statement for Applicants/Licensees and Other Civil Submitters of Fingerprints (3...
78 FR 13154 - Petition for Waiver of Compliance
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-26
...; Sleeping Quarters. (See Statement of Agency Policy Concerning Jurisdiction Over the Safety of Railroad... these proceedings by submitting written views, data, or comments. FRA does not anticipate scheduling a... regulations.gov or interested parties may review DOT's complete Privacy Act Statement in the Federal Register...
Code of Federal Regulations, 2010 CFR
2010-10-01
...; verification of identity of individuals making requests; accompanying persons; and procedures for... individuals making requests; accompanying persons; and procedures for acknowledgment of requests. (a) Requests... Request,” “Privacy Act Statement of Disagreement,” “Privacy Act Disclosure Accounting Request,” “Appeal...
75 FR 20040 - Waiver Extension Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-16
... equipment and testing, commencing in the summer of 2011, for a period of 39 months, or approval of a..., etc.). You may review the DOT's complete Privacy Act Statement in the Federal Register published on April 11, 2000 (Volume 65, Number 70; Pages 19477-78) or at http://dot.gov/privacy.html . Issued in...
78 FR 79412 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-30
... Defense Finance and Accounting Service proposes to alter a system of records, T7205, General Accounting and Finance System--Report Database for Financial Statements, in its inventory of record systems... transaction-driven financial statements in support of Defense Finance and Accounting Service financial mission...
14 CFR 1212.401 - Filing statements of dispute.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Filing statements of dispute. 1212.401 Section 1212.401 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION PRIVACY ACT-NASA... shall: (1) Be in writing; (2) Set forth reasons for the individual's disagreement with NASA's refusal to...
14 CFR 1212.401 - Filing statements of dispute.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Filing statements of dispute. 1212.401 Section 1212.401 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION PRIVACY ACT-NASA... shall: (1) Be in writing; (2) Set forth reasons for the individual's disagreement with NASA's refusal to...
77 FR 5293 - Establishment of an Emergency Relief Docket for Calendar Year 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-02
... minor modifications to Sec. 211.45 to the FRA's Rules of Practice published at 49 CFR part 211... response to petitions for emergency waivers are found at 49 CFR 211.45(h). Privacy Anyone is able to search... review DOT's complete Privacy Act Statement in the Federal Register published on April 11, 2000 (Volume...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-29
... DEPARTMENT OF TRANSPORTATION Office of the Secretary Privacy Act of 1974; System of Records... publishing two new general routine uses for all DOT systems of records and republishing all of its general... the following recommendations: (1) A recommendation in a memorandum issued by the Office of Management...
... Resources Resource Request System Contact Us Legal and Security Accessibility Accessibility Tools Disclaimer Privacy Act Statement & Security No Fear Act FOIA Inspector General Audits & Investigative ...
... Resources Resource Request System Contact Us Legal and Security Accessibility Accessibility Tools Disclaimer Privacy Act Statement & Security No Fear Act FOIA Inspector General Audits & Investigative ...
Code of Federal Regulations, 2011 CFR
2011-10-01
... requests and identification of records requested. (a) The General Counsel is the designated Privacy Act.... The words Privacy Act Request should be placed in capital letters on the face of the envelope in order... penalties for the making of false statements. (f) The parent or guardian of a minor or a person judicially...
76 FR 1209 - Establishment of an Emergency Relief Docket for Calendar Year 2011
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-07
... minor modifications to Sec. 211.45 to the FRA's Rules of Practice published at 49 CFR Part 211... petitions for emergency waivers are found at 49 CFR 211.45(h). Privacy Anyone is able to search all comments... complete Privacy Act Statement in the Federal Register published on April 11, 2000 (Volume 665, Number 7...
Code of Federal Regulations, 2010 CFR
2010-10-01
... requests and identification of records requested. (a) The General Counsel is the designated Privacy Act.... The words Privacy Act Request should be placed in capital letters on the face of the envelope in order... penalties for the making of false statements. (f) The parent or guardian of a minor or a person judicially...
Bert, Fabrizio; Passi, Stefano; Scaioli, Giacomo; Gualano, Maria R; Siliquini, Roberta
2016-09-01
Our article aims to give an overview of the most mentioned smartphones' pregnancy-related applications (Apps). A keywords string with selected keywords was entered both in a general search engine (Google(®)) and PubMed. While PubMed returned no pertinent results, a total of 370 web pages were found on Google(®), and 146 of them were selected. All the pregnancy-related Apps cited at least eight times were included. Information about App's producer, price, contents, privacy policy, and presence of a scientific board was collected. Finally, nine apps were considered. The majority of them were free and available in the two main online markets (Apple(®) App Store and Android(®) Google Play). Five apps presented a privacy policy statement, while a scientific board was mentioned in only three. Further studies are needed in order to deepen the knowledge regarding the main risks of these devices, such as privacy loss, contents control concerns, the digital divide and a potential humanization reduction. © The Author(s) 2015.
Knoppers, Bartha M; Isasi, Rosario; Benvenisty, Nissim; Kim, Ock-Joo; Lomax, Geoffrey; Morris, Clive; Murray, Thomas H; Lee, Eng Hin; Perry, Margery; Richardson, Genevra; Sipp, Douglas; Tanner, Klaus; Wahlström, Jan; de Wert, Guido; Zeng, Fanyi
2011-09-01
Novel methods and associated tools permitting individual identification in publicly accessible SNP databases have become a debatable issue. There is growing concern that current technical and ethical safeguards to protect the identities of donors could be insufficient. In the context of human embryonic stem cell research, there are no studies focusing on the probability that an hESC line donor could be identified by analyzing published SNP profiles and associated genotypic and phenotypic information. We present the International Stem Cell Forum (ISCF) Ethics Working Party's Policy Statement on "Publishing SNP Genotypes of Human Embryonic Stem Cell Lines (hESC)". The Statement prospectively addresses issues surrounding the publication of genotypic data and associated annotations of hESC lines in open access databases. It proposes a balanced approach between the goals of open science and data sharing with the respect for fundamental bioethical principles (autonomy, privacy, beneficence, justice and research merit and integrity).
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-20
..., organization, or individual for the purpose of performing audit or oversight operations related to this system...; System of Records; Statement of General Routine Uses; Notice of Establishment of Three New General... systems of records. Comment is invited on the three new routine uses. The three new routine uses are...
Code of Federal Regulations, 2011 CFR
2011-01-01
... OFFICE OF GOVERNMENT ETHICS ORGANIZATION AND PROCEDURES PRIVACY ACT RULES Amendment of Records § 2606.304... steps to advise the data subject, and to direct the appropriate system manager: (1) To amend the record... disagreement statement must be concise. The appropriate system manager has the authority to determine the...
... for available positions Contact Us Spondylitis Association of America 16360 Roscoe Blvd. Ste. 100 Van Nuys, CA ... Give With Confidence Copyright 2018 Spondylitis Association of America Privacy Statement Terms Of Use Login Register
... for available positions Contact Us Spondylitis Association of America 16360 Roscoe Blvd. Ste. 100 Van Nuys, CA ... Give With Confidence Copyright 2018 Spondylitis Association of America Privacy Statement Terms Of Use Login Register
Diagnosis of Ankylosing Spondylitis
... for available positions Contact Us Spondylitis Association of America 16360 Roscoe Blvd. Ste. 100 Van Nuys, CA ... Give With Confidence Copyright 2018 Spondylitis Association of America Privacy Statement Terms Of Use Login Register
Juvenile Spondyloarthritis: An Overview
... for available positions Contact Us Spondylitis Association of America 16360 Roscoe Blvd. Ste. 100 Van Nuys, CA ... Give With Confidence Copyright 2018 Spondylitis Association of America Privacy Statement Terms Of Use Login Register
... DC 20008-2326 202-833-2933 Contact Us | Jobs | About Us | Search | Donate Instagram Facebook Twitter YouTube Pinterest RSS Privacy Policy | Terms of Use | Nondiscrimination Statement | EOE/AA/M/F/D/V | Copyright © 2018 NEEF.
Alternative Treatments for Ankylosing Spondylitis
... for available positions Contact Us Spondylitis Association of America 16360 Roscoe Blvd. Ste. 100 Van Nuys, CA ... Give With Confidence Copyright 2018 Spondylitis Association of America Privacy Statement Terms Of Use Login Register
47 CFR 15.214 - Cordless telephones.
Code of Federal Regulations, 2011 CFR
2011-10-01
... for a cordless telephone system, provided the application clearly identifies and provides data for all... contain the following statement: “Privacy of communications may not be ensured when using this phone.” (d...
ERIC Educational Resources Information Center
American Council on Education, Washington, DC.
Guidelines for colleges concerning the privacy of employee records are presented in two policy statements. Institutional policy should minimize intrusiveness, maximize fairness, and create legitimate expectations of confidentiality. In addition to strengthening professional equity of treatment, confidentiality permits consideration of both adverse…
Bunions (Hallux Abducto Valgus)
... a city or last name. Use your current position? {{ps.position.alert.message}} Getting your location, one moment... Please ... and Ankle Surgeons (ACFAS), All Rights Reserved. Privacy Statement | Disclaimer | Terms and Conditions | Site Map 8725 West ...
16 CFR 313.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Information to be included in privacy... OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy notices...
12 CFR 216.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Information to be included in privacy notices... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy...
16 CFR 313.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Information to be included in privacy... OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy notices...
16 CFR 313.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Information to be included in privacy... OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy notices...
12 CFR 332.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Information to be included in privacy notices... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.6 Information to be included in privacy notices. (a) General rule. The initial, annual and revised privacy...
Keeping Noise Down on the Farm
... Disorders. Email Address Privacy statement It's a Noisy Planet. Protect Their Hearing.® This national public education campaign ... listening, leisure, and working habits. It's a Noisy Planet. Protect Their Hearing® and the Noisy Planet logo ...
17 CFR 160.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2011 CFR
2011-04-01
... privacy notices. 160.6 Section 160.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy notices that you...
Incorporation of privacy elements in space station design
NASA Technical Reports Server (NTRS)
Harrison, Albert A.; Caldwell, Barrett; Struthers, Nancy J.
1988-01-01
Privacy exists to the extent that individuals can control the degree of social contact that they have with one another. The opportunity to withdraw from other people serves a number of important psychological and social functions, and is in the interests of safety, high performance, and high quality of human life. Privacy requirements for Space Station crew members are reviewed, and architectual and other guidelines for helping astronauts achieve desired levels of privacy are suggested. In turn, four dimensions of privacy are discussed: the separation of activities by areas within the Space Station, controlling the extent to which astronauts have visual contact with one another, controlling the extent to which astronauts have auditory contact with one another, and odor control. Each section presents a statement of the problem, a review of general solutions, and specific recommendations. The report is concluded with a brief consideration of how selection, training, and other procedures can also help Space Station occupants achieve satisfactory levels of seclusion.
ERIC Educational Resources Information Center
Peltier, James W.; Milne, George R.; Phelps, Joseph E.; Barrett, Jennifer T.
2010-01-01
An "information privacy gap" exists in marketing education, with little research addressing the state of information privacy and how appropriate privacy strategies and tactics should be communicated to students. The primary purpose of this article is to provide educators an understanding of information privacy and how they can incorporate this…
12 CFR 216.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Information to be included in privacy notices... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.6 Information to be included in privacy notices. Link to an amendment published at 74 FR 62925, Dec. 1, 2009. (a...
The role of privacy protection in healthcare information systems adoption.
Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui
2013-10-01
Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.
45 CFR 164.520 - Notice of privacy practices for protected health information.
Code of Federal Regulations, 2014 CFR
2014-10-01
... DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.520 Notice of privacy practices for protected health information. (a) Standard... 45 Public Welfare 1 2014-10-01 2014-10-01 false Notice of privacy practices for protected health...
Privacy-Related Context Information for Ubiquitous Health
Nykänen, Pirkko; Ruotsalainen, Pekka
2014-01-01
Background Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing. Objective Our goal was to analyze privacy-related context information and to define the corresponding components and their properties that support privacy management in ubiquitous health. These properties should describe the privacy issues of information processing. With components and their properties, individuals can define context-aware privacy policies and set their privacy preferences that can change in different information-processing situations. Methods Scenarios and user stories are used to analyze typical activities in ubiquitous health to identify main actors, goals, tasks, and stakeholders. Context arises from an activity and, therefore, we can determine different situations, services, and systems to identify properties for privacy-related context information in information-processing situations. Results Privacy-related context information components are situation, environment, individual, information technology system, service, and stakeholder. Combining our analyses and previously identified characteristics of ubiquitous health, more detailed properties for the components are defined. Properties define explicitly what context information for different components is needed to create context-aware privacy policies that can control, limit, and constrain information processing. With properties, we can define, for example, how data can be processed or how components are regulated or in what kind of environment data can be processed. Conclusions This study added to the vision of ubiquitous health by analyzing information processing from the viewpoint of an individual’s privacy. We learned that health and wellness-related activities may happen in several environments and situations with multiple stakeholders, services, and systems. We have provided new knowledge regarding privacy-related context information and corresponding components by analyzing typical activities in ubiquitous health. With the identified components and their properties, individuals can define their personal preferences on information processing based on situational information, and privacy services can capture privacy-related context of the information-processing situation. PMID:25100084
Privacy-related context information for ubiquitous health.
Seppälä, Antto; Nykänen, Pirkko; Ruotsalainen, Pekka
2014-03-11
Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing. Our goal was to analyze privacy-related context information and to define the corresponding components and their properties that support privacy management in ubiquitous health. These properties should describe the privacy issues of information processing. With components and their properties, individuals can define context-aware privacy policies and set their privacy preferences that can change in different information-processing situations. Scenarios and user stories are used to analyze typical activities in ubiquitous health to identify main actors, goals, tasks, and stakeholders. Context arises from an activity and, therefore, we can determine different situations, services, and systems to identify properties for privacy-related context information in information-processing situations. Privacy-related context information components are situation, environment, individual, information technology system, service, and stakeholder. Combining our analyses and previously identified characteristics of ubiquitous health, more detailed properties for the components are defined. Properties define explicitly what context information for different components is needed to create context-aware privacy policies that can control, limit, and constrain information processing. With properties, we can define, for example, how data can be processed or how components are regulated or in what kind of environment data can be processed. This study added to the vision of ubiquitous health by analyzing information processing from the viewpoint of an individual's privacy. We learned that health and wellness-related activities may happen in several environments and situations with multiple stakeholders, services, and systems. We have provided new knowledge regarding privacy-related context information and corresponding components by analyzing typical activities in ubiquitous health. With the identified components and their properties, individuals can define their personal preferences on information processing based on situational information, and privacy services can capture privacy-related context of the information-processing situation.
GEONETCast Americas - Architecture
Oceanic and Atmospheric Administration whose goal is to enable enhanced dissemination, application, and Management; Public Health Surveillance; Sustainable Urban Development and Water Resources Management. Privacy Act Statement Copyright 2008 © NOAA. All rights reserved. the National Oceanic and Atmospheric
77 FR 72319 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-05
... the vetting of directors, officers, or other employees of non-governmental organizations who apply for..., filing of petitions and applications and agency #0;statements of organization and functions are examples... / Wednesday, December 5, 2012 / Notices#0;#0; [[Page 72319
Ethical Principles of Psychologists and Code of Conduct.
ERIC Educational Resources Information Center
American Psychologist, 2002
2002-01-01
Describes the American Psychological Association's Ethical Principles of Psychologists and Code of Conduct, focusing on introduction and applicability; preamble; general principles; and ethical standards (resolving ethical issues, competence, human relations, privacy and confidentiality, advertising and other public statements, record keeping and…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-17
... entered into this docket is available on the World Wide Web at http://www.regulations.gov . FOR FURTHER... of an association, business, labor union, etc.). You may review DOT's complete Privacy Act Statement...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-17
... entered into this docket is available on the World Wide Web at http://www.regulations.gov . FOR FURTHER... association, business, labor union, etc.). You may review DOT's complete Privacy Act Statement in the Federal...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-28
... entered into this docket is available on the World Wide Web at http://www.regulations.gov . FOR FURTHER... of an association, business, labor union, etc.). You may review DOT's complete Privacy Act Statement...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-22
... entered into this docket is available on the World Wide Web at http://www.regulations.gov . FOR FURTHER... of an association, business, labor union, etc.). You may review DOT's complete Privacy Act Statement...
Code of Federal Regulations, 2010 CFR
2010-10-01
... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C... operation of a system of records using commercial information technology services or information technology...
17 CFR 160.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2012 CFR
2012-04-01
... privacy notices. 160.6 Section 160.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.6 Information to be included in privacy notices. (a) General rule. The initial...
17 CFR 160.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2014 CFR
2014-04-01
... privacy notices. 160.6 Section 160.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.6 Information to be included in privacy notices. (a) General rule. The...
17 CFR 160.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2013 CFR
2013-04-01
... privacy notices. 160.6 Section 160.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.6 Information to be included in privacy notices. (a) General rule. The initial...
Privacy of genetic information: a review of the laws in the United States.
Fuller, B; Ip, M
2001-01-01
This paper examines the privacy of genetic information and the laws in the United States designed to protect genetic privacy. While all 50 states have laws protecting the privacy of health information, there are many states that have additional laws that carve out additional protections specifically for genetic information. The majority of the individual states have enacted legislation to protect individuals from discrimination on the basis of genetic information, and most of this legislation also has provisions to protect the privacy of genetic information. On the Federal level, there has been no antidiscrimination or genetic privacy legislation. Secretary Donna Shalala of the Department of Health and Human Services has issued proposed regulations to protect the privacy of individually identifiable health information. These regulations encompass individually identifiable health information and do not make specific provisions for genetic information. The variety of laws regarding genetic privacy, some found in statutes to protect health information and some found in statutes to prevent genetic discrimination, presents challenges to those charged with administering and executing these laws.
Byrd, Gary D; Winkelstein, Peter
2014-10-01
Based on the authors' shared interest in the interprofessional challenges surrounding health information management, this study explores the degree to which librarians, informatics professionals, and core health professionals in medicine, nursing, and public health share common ethical behavior norms grounded in moral principles. Using the "Principlism" framework from a widely cited textbook of biomedical ethics, the authors analyze the statements in the ethical codes for associations of librarians (Medical Library Association [MLA], American Library Association, and Special Libraries Association), informatics professionals (American Medical Informatics Association [AMIA] and American Health Information Management Association), and core health professionals (American Medical Association, American Nurses Association, and American Public Health Association). This analysis focuses on whether and how the statements in these eight codes specify core moral norms (Autonomy, Beneficence, Non-Maleficence, and Justice), core behavioral norms (Veracity, Privacy, Confidentiality, and Fidelity), and other norms that are empirically derived from the code statements. These eight ethical codes share a large number of common behavioral norms based most frequently on the principle of Beneficence, then on Autonomy and Justice, but rarely on Non-Maleficence. The MLA and AMIA codes share the largest number of common behavioral norms, and these two associations also share many norms with the other six associations. The shared core of behavioral norms among these professions, all grounded in core moral principles, point to many opportunities for building effective interprofessional communication and collaboration regarding the development, management, and use of health information resources and technologies.
Byrd, Gary D.; Winkelstein, Peter
2014-01-01
Objective: Based on the authors' shared interest in the interprofessional challenges surrounding health information management, this study explores the degree to which librarians, informatics professionals, and core health professionals in medicine, nursing, and public health share common ethical behavior norms grounded in moral principles. Methods: Using the “Principlism” framework from a widely cited textbook of biomedical ethics, the authors analyze the statements in the ethical codes for associations of librarians (Medical Library Association [MLA], American Library Association, and Special Libraries Association), informatics professionals (American Medical Informatics Association [AMIA] and American Health Information Management Association), and core health professionals (American Medical Association, American Nurses Association, and American Public Health Association). This analysis focuses on whether and how the statements in these eight codes specify core moral norms (Autonomy, Beneficence, Non-Maleficence, and Justice), core behavioral norms (Veracity, Privacy, Confidentiality, and Fidelity), and other norms that are empirically derived from the code statements. Results: These eight ethical codes share a large number of common behavioral norms based most frequently on the principle of Beneficence, then on Autonomy and Justice, but rarely on Non-Maleficence. The MLA and AMIA codes share the largest number of common behavioral norms, and these two associations also share many norms with the other six associations. Implications: The shared core of behavioral norms among these professions, all grounded in core moral principles, point to many opportunities for building effective interprofessional communication and collaboration regarding the development, management, and use of health information resources and technologies. PMID:25349543
Privacy information management for video surveillance
NASA Astrophysics Data System (ADS)
Luo, Ying; Cheung, Sen-ching S.
2013-05-01
The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.
75 FR 57904 - Announcing a Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-23
... Office, --Update of NIST Computer Security Division, and --Information Security and Privacy Advisory... Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB) will meet...
Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities
Vermeulen, Ivar E; Beekers, Nienke
2014-01-01
Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on anonymity rather than privacy in online communities. PMID:24828114
Anonymity versus privacy: selective information sharing in online cancer communities.
Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke
2014-05-14
Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on anonymity rather than privacy in online communities.
Doping control, providing whereabouts and the importance of privacy for elite athletes.
Valkenburg, Diane; de Hon, Olivier; van Hilvoorde, Ivo
2014-03-01
To improve anti-doping efforts in sports, the World Anti-Doping Agency (WADA) introduced the World Anti-Doping Program, in which (among others) regulations for providing athletes' whereabouts are described. Because the effectiveness and efficiency of this system depends on the co-operation and compliance of athletes, the perspective of elite athletes is important. This paper answers the following research questions: What is the perspective of Dutch elite athletes on the current whereabouts system in general and how important is their privacy in providing whereabouts in particular? In addition, this study explores how far the whereabouts system can be developed in the future. Are athletes willing to accept greater invasions of their privacy in order to reduce administrative effort and whereabouts failures? A structured questionnaire was completed by 129 Dutch elite athletes registered in the national and/or international testing pool. The results of this study indicate widespread dissatisfaction with the whereabouts system. Most respondents support anti-doping testing in general, but many athletes feel that WADA's whereabouts system is unacceptable in several respects. In terms of physical privacy, there was a great dissatisfaction. Nearly half of the athletes felt that the '1-hour time slot' limits their freedom, but on the other hand, most athletes disagreed with the statement that the distinction between their sport and private life is disturbed. For almost one in three respondents, the whereabouts system has a negative influence on the pleasure they experience in being an elite athlete. In terms of informational privacy, almost all athletes had confidence in the confidential treatment of their whereabouts information. Almost all athletes would accept giving their phone number to Doping Control Officials, but only half of the athletes would accept sharing their location on their mobile phone. Furthermore, almost two in ten of the athletes would accept wearing a permanent wrist or ankle bracelet or accept being implanted with a GPS chip in order to facilitate future anti-doping testing. The current whereabouts system needs to be improved in order to increase athletes' satisfaction with the anti-doping rules. The athletes themselves need to be engaged in this process. The results of this study indicate that a majority of the athletes are not likely to accept a greater violation of their privacy than the current whereabouts regulations already entail. Copyright © 2013 Elsevier B.V. All rights reserved.
GEONETCast Americas - Architecture
. GEONETCast Americas is a contribution from the United States National Oceanic and Atmospheric Administration Surveillance; Sustainable Urban Development and Water Resources Management. Privacy Act Statement Copyright 2008 © NOAA. All rights reserved. the National Oceanic and Atmospheric Administration (NOAA) Last
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-27
... entered into this docket is available on the World Wide Web at http://www.regulations.gov . FOR FURTHER... association, business, labor union, etc.). You may review DOT's complete Privacy Act Statement in the Federal...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-22
... entered into this docket is available on the World Wide Web at http://www.regulations.gov . FOR FURTHER... association, business, labor union, etc.). You may review DOT's complete Privacy Act Statement in the Federal...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-28
... entered into this docket is available on the World Wide Web at http://www.regulations.gov . FOR FURTHER... association, business, labor union, etc.). You may review DOT's complete Privacy Act Statement in the Federal...
JACOBS, KAREN; CASON, JANA; MCCULLOUGH, ANN
2015-01-01
The World Federation of Occupational Therapists (WFOT) consists of 84 member organizations representing over 420,000 occupational therapists internationally (WFOT, 2014). In 2014, WFOT published the WFOT Telehealth Position Statement on the use of telehealth in occupational therapy. The process for the formulation of the official document involved reviewing WFOT member organizations’ telehealth position statements and data collected from a survey sent to member organizations’ delegates in April 2014. Qualitative data from 39 countries yielded factors to consider in five key areas: licensure/registration requirements, the cost of technology, privacy and security, reimbursement/payment models, and other issues (e.g., need for collaboration/transfer of knowledge, client selection, provider competencies, standard of care). The WFOT Telehealth Position Statement addressed each of these areas. The collaborative effort resulting in the development of the WFOT Telehealth Position Statement serves as a model for other international organizations. PMID:27563380
32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.
Code of Federal Regulations, 2013 CFR
2013-07-01
....107.pdf. (1) Developing or procuring information technology systems or projects that collect, maintain... 32 National Defense 6 2013-07-01 2013-07-01 false Evaluating information systems for Privacy Act... FORCE ADMINISTRATION PRIVACY ACT PROGRAM Privacy Impact Assessments § 806b.30 Evaluating information...
32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.
Code of Federal Regulations, 2014 CFR
2014-07-01
....107.pdf. (1) Developing or procuring information technology systems or projects that collect, maintain... 32 National Defense 6 2014-07-01 2014-07-01 false Evaluating information systems for Privacy Act... FORCE ADMINISTRATION PRIVACY ACT PROGRAM Privacy Impact Assessments § 806b.30 Evaluating information...
32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.
Code of Federal Regulations, 2012 CFR
2012-07-01
....107.pdf. (1) Developing or procuring information technology systems or projects that collect, maintain... 32 National Defense 6 2012-07-01 2012-07-01 false Evaluating information systems for Privacy Act... FORCE ADMINISTRATION PRIVACY ACT PROGRAM Privacy Impact Assessments § 806b.30 Evaluating information...
32 CFR 724.811 - Privacy Act information.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 5 2012-07-01 2012-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of SECNAVINST...
32 CFR 724.811 - Privacy Act information.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 5 2014-07-01 2014-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of SECNAVINST...
32 CFR 865.119 - Privacy Act information.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of 32...
32 CFR 865.119 - Privacy Act information.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of 32...
32 CFR 724.811 - Privacy Act information.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 5 2011-07-01 2011-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of SECNAVINST...
32 CFR 865.119 - Privacy Act information.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of 32...
32 CFR 724.811 - Privacy Act information.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 5 2013-07-01 2013-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of SECNAVINST...
32 CFR 865.119 - Privacy Act information.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of 32...
32 CFR 724.811 - Privacy Act information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of SECNAVINST...
32 CFR 865.119 - Privacy Act information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of 32...
How do patients respond to violation of their information privacy?
Kuo, Kuang-Ming; Ma, Chen-Chung; Alexander, Judith W
The introduction of electronic medical records (EMRs) can expose patients to the risk of infringement of their privacy. The purpose of this study was to explore the relationship between patients' concerns about information privacy and their protective responses. A questionnaire survey conducted in a Taiwanese hospital revealed that, regarding information privacy, patients' concerns about the collection of information about themselves, the secondary use of this information and the possibility of errors in the recorded information were associated with their information privacy-protective responses, while concern for unauthorised access to their information by other staff in the medical facility was not. Medical facilities should devote every effort to alleviate patients' concerns about the invasion of their information privacy to avoid eroding the reputation of medical facilities and impeding the promotion of EMRs.
Modelling information dissemination under privacy concerns in social media
NASA Astrophysics Data System (ADS)
Zhu, Hui; Huang, Cheng; Lu, Rongxing; Li, Hui
2016-05-01
Social media has recently become an important platform for users to share news, express views, and post messages. However, due to user privacy preservation in social media, many privacy setting tools are employed, which inevitably change the patterns and dynamics of information dissemination. In this study, a general stochastic model using dynamic evolution equations was introduced to illustrate how privacy concerns impact the process of information dissemination. Extensive simulations and analyzes involving the privacy settings of general users, privileged users, and pure observers were conducted on real-world networks, and the results demonstrated that user privacy settings affect information differently. Finally, we also studied the process of information diffusion analytically and numerically with different privacy settings using two classic networks.
12 CFR 1016.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Information to be included in privacy notices. 1016.6 Section 1016.6 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.6 Information to be included in...
Gunn, Patrick P; Fremont, Allen M; Bottrell, Melissa; Shugarman, Lisa R; Galegher, Jolene; Bikson, Tora
2004-04-01
The Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule, intended to address potential threats to patient privacy posed by the computerization and standardization of medical records, provides a new floor level of federal protection for health information in all 50 states. In most cases, compliance with the Privacy Rule was required as of April 2003. Yet considerable confusion and concern remain about the Privacy Rule and the specific changes it requires in the way healthcare providers, health plans, and others use, maintain, and disclose health information. Researchers worry that the Privacy Rule could hinder their access to health information needed to conduct their research. In this article, we explain how the final version of the Privacy Rule governs disclosure of health information, assess implications of the Privacy Rule for research, and offer practical suggestions for researchers who require access to health information. The Privacy Rule is fundamentally changing the way that healthcare providers, health plans, and others use, maintain, and disclose health information and the steps that researchers must take to obtain health data. The Privacy Rule requires researchers who seek access to identifiable health information to obtain written authorization from subjects, or, alternatively, to demonstrate that their research protocols meet certain Privacy Rule requirements that permit access without written authorization. To ensure continued access to data, researchers will need to work more closely than before with healthcare providers, health plans, and other institutions that generate and maintain health information.
The benefits, risks and costs of privacy: patient preferences and willingness to pay.
Trachtenbarg, David E; Asche, Carl; Ramsahai, Shweta; Duling, Joy; Ren, Jinma
2017-05-01
Multiple surveys show that patients want medical privacy; however, there are costs to maintaining privacy. There are also risks if information is not shared. A review of previous surveys found that most surveys asked questions about patient's privacy concerns and willingness to share their medical information. We found only one study that asked about sharing medical information for better care and no survey that asked patients about the risk, cost or comparison between medical privacy and privacy in other areas. To fill this gap, we designed a survey to: (1) compare medical privacy preferences to privacy preferences in other areas; (2) measure willingness to pay the cost of additional privacy measures; and (3) measure willingness to accept the risks of not sharing information. A total of 834 patients attending physician offices at 14 sites completed all or part of an anonymous questionnaire. Over 95% of patients were willing to share all their medical information with their treating physicians. There was no difference in willingness to share between primary care and specialty sites including psychiatry and an HIV clinic. In our survey, there was no difference in sharing preference between standard medical information and information with additional legal protections including genetic testing, drug/alcohol treatment and HIV results. Medical privacy was ranked lower than sharing social security and credit card numbers, but was deemed more private than other information including tax returns and handgun purchases. There was no statistical difference for any questions by site except for HIV/AIDS clinic patients ranking privacy of the medical record more important than reducing high medical costs and risk of medical errors (p < .05). Most patients were willing to spend a modest amount of additional time for privacy, but few were willing to pay more for additional medical privacy. Most patients were unwilling to take on additional risks to keep medical information hidden. Patients were very willing to share medical information with their providers. They were able to see the importance of sharing medical information to provide the best possible care. They were unwilling to hide information from providers if there was increased medical risk. Patients were willing to spend additional time for privacy, but most were unwilling to spend extra money. Sixty-eight percent of patients favored reducing medical costs over privacy.
Code of Federal Regulations, 2010 CFR
2010-07-01
... him or her with knowledge concerning the nature of the investigation and the coordinated investigative... with a form containing a Privacy Act Statement would tend to inhibit cooperation by many individuals... subject in providing him or her with knowledge concerning the nature of the investigation and the...
77 FR 14770 - Notice of Proposed Information Collection Requests
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-13
... Collection Clearance Division, Privacy, Information and Records Management Services, Office of Management... Collection Clearance Division, Privacy, Information and Records Management Services, Office of Management..., Acting Director, Information Collection Clearance Division, Privacy, Information and Records Management...
12 CFR 40.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Information to be included in privacy notices. 40.6 Section 40.6 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.6 Information to be included in...
12 CFR 40.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Information to be included in privacy notices. 40.6 Section 40.6 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.6 Information to be included in...
12 CFR 573.6 - Information to be included in privacy notices.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Information to be included in privacy notices. 573.6 Section 573.6 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.6 Information to be included in...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...
17 CFR 248.4 - Initial privacy notice to consumers required.
Code of Federal Regulations, 2010 CFR
2010-04-01
... COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.4 Initial privacy notice to consumers... section; and (2) Consumer. A consumer, before you disclose any nonpublic personal information about the...
NOAA Homeland Security Program Office
Emergency Managment Institute IS 100.b - Introduction to Incident Command System IS 700.a - NIMS An Introduction IS 701.b - NIMS Multiagency Coordination System (MACS) Course IS 800.b - National Response Framework, An Introduction United States Coast Guard; Maritime Domain Awareness Privacy Act Statement
75 FR 36535 - Freedom of Information Act, Privacy Act of 1974; Implementation
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
... Freedom of Information Act (FOIA) and its regulations concerning the Privacy Act of 1974 (Privacy Act). It..., Privacy Act of 1974; Implementation AGENCY: Department of the Treasury. ACTION: Final rule; correcting... the Privacy Act. In addition, that document revised the list of Treasury offices and bureaus found...
Noblin, Alice M
2007-01-01
Regional Health Information Organizations (RHIOs) are forming in response to President George W. Bush's 2004 mandate that medical information be made available electronically to facilitate continuity of care. Privacy concerns are a deterrent to widespread acceptance of RHIOs. The Health Information Portability and Accountability Act of 1996 provides some guidelines for privacy protection. However, most states have stricter guidelines, causing difficulty when RHIOs form across these jurisdictions. This article compares several RHIOs including their privacy policies where available. In addition, studies were reviewed considering privacy concerns of people in the United States and elsewhere. Surveys reveal that Americans are concerned about the privacy of their personal health information and ultimately feel it is the role of the government to provide protection. The purpose of this article is to look at the privacy issues and recommend a policy that may help to resolve some of the concerns of both providers and patients. Policy research and action are needed to move the National Health Information Network toward reality. Efforts to provide consistency in privacy laws are a necessary early step to facilitate the construction and maintenance of RHIOs and the National Health Information Network.
Pereira, Stacey; Robinson, Jill Oliver; Gutierrez, Amanda M.; Majumder, Mary A.; McGuire, Amy L.; Rothstein, Mark A.
2017-01-01
Background The importance of health privacy protections in the era of the “Facebook Generation” has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents’ views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Methods Using Amazon’s Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. Results 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P < 0.05). Time spent online and social media use were not predictors of level of concern about privacy or security of online or health information (all P > 0.05). Limitations This study is limited by the non-representativeness of our sample. Conclusions Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously. PMID:28926626
Pereira, Stacey; Robinson, Jill Oliver; Peoples, Hayley A; Gutierrez, Amanda M; Majumder, Mary A; McGuire, Amy L; Rothstein, Mark A
2017-01-01
The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Using Amazon's Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P < 0.05). Time spent online and social media use were not predictors of level of concern about privacy or security of online or health information (all P > 0.05). This study is limited by the non-representativeness of our sample. Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously.
Through Patients' Eyes: Regulation, Technology, Privacy, and the Future.
Petersen, Carolyn
2018-04-22
Privacy is commonly regarded as a regulatory requirement achieved via technical and organizational management practices. Those working in the field of informatics often play a role in privacy preservation as a result of their expertise in information technology, workflow analysis, implementation science, or related skills. Viewing privacy from the perspective of patients whose protected health information is at risk broadens the considerations to include the perceived duality of privacy; the existence of privacy within a context unique to each patient; the competing needs inherent within privacy management; the need for particular consideration when data are shared; and the need for patients to control health information in a global setting. With precision medicine, artificial intelligence, and other treatment innovations on the horizon, health care professionals need to think more broadly about how to preserve privacy in a health care environment driven by data sharing. Patient-reported privacy preferences, privacy portability, and greater transparency around privacy-preserving functionalities are potential strategies for ensuring that privacy regulations are met and privacy is preserved. Georg Thieme Verlag KG Stuttgart.
The Role of Cognitive Disposition in Re-Examining the Privacy Paradox: A Neuroscience Study
ERIC Educational Resources Information Center
Mohammed, Zareef
2017-01-01
The privacy paradox is a phenomenon whereby individuals continue to disclose their personal information, contrary to their claim of concerns for the privacy of their personal information. This study investigated the privacy paradox to better understand individuals' decisions to disclose or withhold their personal information. The study argued that…
28 CFR 513.50 - Privacy Act requests by inmates.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...
17 CFR 248.8 - Revised privacy notices.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...
28 CFR 513.50 - Privacy Act requests by inmates.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...
17 CFR 248.8 - Revised privacy notices.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P, S-AM, AND S-ID Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except...
28 CFR 513.50 - Privacy Act requests by inmates.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...
17 CFR 248.8 - Revised privacy notices.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...
28 CFR 513.50 - Privacy Act requests by inmates.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...
17 CFR 248.8 - Revised privacy notices.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...
17 CFR 248.8 - Revised privacy notices.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...
28 CFR 513.50 - Privacy Act requests by inmates.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-18
... INFORMATION CONTACT: For general questions and privacy issues please contact: Mary Ellen Callahan (703-235...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--001 Freedom of Information Act and Privacy Act Records System of Records AGENCY: Privacy Office, DHS. ACTION: Final rule...
75 FR 743 - Freedom of Information Act, Privacy Act of 1974; Implementation
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-06
... of Information Act (FOIA) and its regulations concerning the Privacy Act of 1974 (Privacy Act). It..., Privacy Act of 1974; Implementation AGENCY: Department of the Treasury. ACTION: Final rule. SUMMARY: This... implement the Privacy Act. In addition, the document revises the list of Treasury offices and bureaus found...
76 FR 21714 - Notice of Proposed Information Collection Requests
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-18
... Collection Clearance Division, Information Management and Privacy Services, Office of Management, invites... Management and Privacy Services, Office of Management, publishes this notice containing proposed information... Division, Information Management and Privacy Services, Office of Management. Office of Postsecondary...
Beckjord, Ellen; Moser, Richard P; Hughes, Penelope; Hesse, Bradford W
2015-01-01
Background Providers’ adoption of electronic health records (EHRs) is increasing and consumers have expressed concerns about the potential effects of EHRs on privacy and security. Yet, we lack a comprehensive understanding regarding factors that affect individuals’ perceptions regarding the privacy and security of their medical information. Objective The aim of this study was to describe national perceptions regarding the privacy and security of medical records and identify a comprehensive set of factors associated with these perceptions. Methods Using a nationally representative 2011-2012 survey, we reported on adults’ perceptions regarding privacy and security of medical records and sharing of health information between providers, and whether adults withheld information from a health care provider due to privacy or security concerns. We used multivariable models to examine the association between these outcomes and sociodemographic characteristics, health and health care experience, information efficacy, and technology-related variables. Results Approximately one-quarter of American adults (weighted n=235,217,323; unweighted n=3959) indicated they were very confident (n=989) and approximately half indicated they were somewhat confident (n=1597) in the privacy of their medical records; we found similar results regarding adults’ confidence in the security of medical records (very confident: n=828; somewhat confident: n=1742). In all, 12.33% (520/3904) withheld information from a health care provider and 59.06% (2100/3459) expressed concerns about the security of both faxed and electronic health information. Adjusting for other characteristics, adults who reported higher quality of care had significantly greater confidence in the privacy and security of their medical records and were less likely to withhold information from their health care provider due to privacy or security concerns. Adults with higher information efficacy had significantly greater confidence in the privacy and security of medical records and less concern about sharing of health information by both fax and electronic means. Individuals’ perceptions of whether their providers use an EHR was not associated with any privacy or security outcomes. Conclusions Although most adults are confident in the privacy and security of their medical records, many express concerns regarding sharing of information between providers; a minority report withholding information from their providers due to privacy and security concerns. Whether individuals thought their provider was using an EHR was not associated with negative privacy/security perceptions or withholding, suggesting the transition to EHRs is not associated with negative perceptions regarding the privacy and security of medical information. However, monitoring to see how this evolves will be important. Given that positive health care experiences and higher information efficacy were associated with more favorable perceptions of privacy and security, efforts should continue to encourage providers to secure medical records, provide patients with a “meaningful choice” in how their data are shared, and enable individuals to access information they need to manage their care. PMID:25843686
Patel, Vaishali; Beckjord, Ellen; Moser, Richard P; Hughes, Penelope; Hesse, Bradford W
2015-04-02
Providers' adoption of electronic health records (EHRs) is increasing and consumers have expressed concerns about the potential effects of EHRs on privacy and security. Yet, we lack a comprehensive understanding regarding factors that affect individuals' perceptions regarding the privacy and security of their medical information. The aim of this study was to describe national perceptions regarding the privacy and security of medical records and identify a comprehensive set of factors associated with these perceptions. Using a nationally representative 2011-2012 survey, we reported on adults' perceptions regarding privacy and security of medical records and sharing of health information between providers, and whether adults withheld information from a health care provider due to privacy or security concerns. We used multivariable models to examine the association between these outcomes and sociodemographic characteristics, health and health care experience, information efficacy, and technology-related variables. Approximately one-quarter of American adults (weighted n=235,217,323; unweighted n=3959) indicated they were very confident (n=989) and approximately half indicated they were somewhat confident (n=1597) in the privacy of their medical records; we found similar results regarding adults' confidence in the security of medical records (very confident: n=828; somewhat confident: n=1742). In all, 12.33% (520/3904) withheld information from a health care provider and 59.06% (2100/3459) expressed concerns about the security of both faxed and electronic health information. Adjusting for other characteristics, adults who reported higher quality of care had significantly greater confidence in the privacy and security of their medical records and were less likely to withhold information from their health care provider due to privacy or security concerns. Adults with higher information efficacy had significantly greater confidence in the privacy and security of medical records and less concern about sharing of health information by both fax and electronic means. Individuals' perceptions of whether their providers use an EHR was not associated with any privacy or security outcomes. Although most adults are confident in the privacy and security of their medical records, many express concerns regarding sharing of information between providers; a minority report withholding information from their providers due to privacy and security concerns. Whether individuals thought their provider was using an EHR was not associated with negative privacy/security perceptions or withholding, suggesting the transition to EHRs is not associated with negative perceptions regarding the privacy and security of medical information. However, monitoring to see how this evolves will be important. Given that positive health care experiences and higher information efficacy were associated with more favorable perceptions of privacy and security, efforts should continue to encourage providers to secure medical records, provide patients with a "meaningful choice" in how their data are shared, and enable individuals to access information they need to manage their care.
Information privacy in organizations: empowering creative and extrarole performance.
Alge, Bradley J; Ballinger, Gary A; Tangirala, Subrahmaniam; Oakley, James L
2006-01-01
This article examines the relationship of employee perceptions of information privacy in their work organizations and important psychological and behavioral outcomes. A model is presented in which information privacy predicts psychological empowerment, which in turn predicts discretionary behaviors on the job, including creative performance and organizational citizenship behavior (OCB). Results from 2 studies (Study 1: single organization, N=310; Study 2: multiple organizations, N=303) confirm that information privacy entails judgments of information gathering control, information handling control, and legitimacy. Moreover, a model linking information privacy to empowerment and empowerment to creative performance and OCBs was supported. Findings are discussed in light of organizational attempts to control employees through the gathering and handling of their personal information. (c) 2006 APA, all rights reserved.
77 FR 72334 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-05
.... Title, Form, and OMB Number: Militarily Critical Technical Data Agreement, DD Form 2354; OMB Control... unclassified DoD-controlled militarily critical technical data must certify on DD Form 2345, Militarily... requirements and is so indicated on the Privacy Act Statement of DD Form 2345. Affected Public: Individuals or...
Code of Ethical Conduct for Computer-Using Educators: An ICCE Policy Statement.
ERIC Educational Resources Information Center
Computing Teacher, 1987
1987-01-01
Prepared by the International Council for Computers in Education's Ethics and Equity Committee, this code of ethics for educators using computers covers nine main areas: curriculum issues, issues relating to computer access, privacy/confidentiality issues, teacher-related issues, student issues, the community, school organizational issues,…
78 FR 63307 - Qualification of Drivers; Exemption Applications; Vision
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
..., business, labor union, etc.). You may review DOT's Privacy Act Statement for the Federal Docket Management... requested comments from the public (78 FR 47818). That notice listed 25 applicants' case histories. The 25... predicting crash proneness from crash history coupled with other factors. These factors--such as age, sex...
Code of Federal Regulations, 2010 CFR
2010-07-01
... temporarily in the hands of a non-law enforcement element for adjudicative or personnel actions, shall be... can be notified of compliance or denial within the 10-day period. Whenever practical, the decision... her right to file a statement of the reason for disagreeing with the OSD/JS Privacy Office's decision...
76 FR 3111 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-19
.... Storage: Maintained in paper and electronic storage media. Retrievability: Retrieved by name and or Social... Program.'' Categories of records in the system: Delete entry and replace with ``Individual's name, Social..., and award records. Statement of good standing before the bar and other State Bar records, law school...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-18
... architecture and connectivity capabilities of the airplane's computer systems and networks, which may allow... an association, business, labor union, etc.). DOT's complete Privacy Act Statement can be found in... or unusual design features: Digital systems architecture composed of several connected networks. The...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-17
... Management Facility, U.S. Department of Transportation, 1200 New Jersey Avenue, SE., West Building Ground..., Aerospace Engineer, Los Angeles Aircraft Certification Office, FAA, Transport Airplane Directorate, 3960... an association, business, labor union, etc.). You may review the DOT's complete Privacy Act Statement...
45 CFR 164.522 - Rights to request privacy protection for protected health information.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 1 2011-10-01 2011-10-01 false Rights to request privacy protection for protected health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights...
45 CFR 164.522 - Rights to request privacy protection for protected health information.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 1 2013-10-01 2013-10-01 false Rights to request privacy protection for protected health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights...
45 CFR 164.522 - Rights to request privacy protection for protected health information.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 1 2012-10-01 2012-10-01 false Rights to request privacy protection for protected health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights...
45 CFR 164.522 - Rights to request privacy protection for protected health information.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 1 2014-10-01 2014-10-01 false Rights to request privacy protection for protected health information. 164.522 Section 164.522 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights...
32 CFR 635.12 - Release of information under the Privacy Act of 1974.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) The release and denial authorities for all Privacy Act cases concerning military police records are... 32 National Defense 4 2010-07-01 2010-07-01 true Release of information under the Privacy Act of... § 635.12 Release of information under the Privacy Act of 1974. (a) Military police records may be...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-10
... in a system of records in the possession or under the control of DHS by complying with DHS Privacy... 1974; Privacy Act of 1974: Department of Homeland Security/ALL-031 Information Sharing Environment Suspicious Activity Reporting Initiative System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...
A Progress Report on Information Privacy and Data Security.
ERIC Educational Resources Information Center
Salton, Gerard
1980-01-01
Describes the role of information privacy in modern society, examines recent legal cases to illustrate how privacy cases are adjudicated and to identify the limits of available privacy protection, and raises issues regarding techniques for insuring data confidentiality. (FM)
Health information: reconciling personal privacy with the public good of human health.
Gostin, L O
2001-01-01
The success of the health care system depends on the accuracy, correctness and trustworthiness of the information, and the privacy rights of individuals to control the disclosure of personal information. A national policy on health informational privacy should be guided by ethical principles that respect individual autonomy while recognizing the important collective interests in the use of health information. At present there are no adequate laws or constitutional principles to help guide a rational privacy policy. The laws are scattered and fragmented across the states. Constitutional law is highly general, without important specific safeguards. Finally, a case study is provided showing the important trade-offs that exist between public health and privacy. For a model public health law, see www.critpath.org/msphpa/privacy.
Privacy and Personal Information Held by Government: A Comparative Study, Japan and New Zealand
NASA Astrophysics Data System (ADS)
Cullen, Rowena
This chapter reports on the concepts of information privacy and trust in government among citizens in Japan and New Zealand in a transnational, crosscultural study. Data from both countries are presented, and cultural and other factors are sought that might explain differences in attitudes shown. In both countries, citizens display a range of views, not related to age or gender. New Zealand citizens express concern about information privacy in relation to information held by government, but show a higher level of trust in government overall, and most attribute breaches of privacy to incompetence, rather than deliberate malfeasance. Japanese citizens interviewed also indicated that they had major concerns about information privacy, and had considerably less trust in government than New Zealand respondents showed. They were more inclined to attribute breaches of privacy to lax behavior in individuals than government systems. In both countries citizens showed an awareness of the tradeoffs necessary between personal privacy and the needs of the state to hold information for the benefit of all citizens, but knew little about the protection offered by privacy legislation, and expressed overall concern about privacy practices in the modern state. The study also provides evidence of cultural differences that can be related to Hofstede's dimensions of culture.
Protecting Privacy in Computerized Medical Information.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Office of Technology Assessment.
This report analyzes the implications of computerized medical information and the challenges it brings to individual privacy. The report examines the nature of the privacy interest in health care information and the current state of the law protecting that information; the nature of proposals to computerize health care information and the…
Altered states: state health privacy laws and the impact of the Federal Health Privacy Rule.
Pritts, Joy L
2002-01-01
Although the Federal Health Privacy Rule has evened out some of the inconsistencies between states' health privacy laws, gaps in protection still remain. Furthermore, the Federal Rule contains some lax standards for the disclosure of health information. State laws can play a vital role in filling these gaps and strengthening the protections afforded health information. By enacting legislation that has higher privacy-protective standards than the Federal Health Privacy Rule, states can play three important roles. First, because they can directly regulate entities that are beyond HHS's mandate, states can afford their citizens a broader degree of privacy protection than the Federal Health Privacy Rule. Second, by having state health privacy laws, states can enforce privacy protections at the local level. Finally, action by the states can positively influence health privacy policies at the federal level by raising the standard as to what constitutes sufficient privacy protection. High privacy protections imposed by states may serve as the standard for comprehensive federal legislation, if and when Congress reconsiders the issue. So far, states' reactions to the Federal Privacy Rule have been mixed. Only time will tell whether states will assume the mantle of leadership on health privacy or relinquish their role as the primary protectors of health information.
Unveiling consumer's privacy paradox behaviour in an economic exchange.
Motiwalla, Luvai F; Li, Xiao-Bai
2016-01-01
Privacy paradox is of great interest to IS researchers and firms gathering personal information. It has been studied from social, behavioural, and economic perspectives independently. However, prior research has not examined the degrees of influence these perspectives contribute to the privacy paradox problem. We combine both economic and behavioural perspectives in our study of the privacy paradox with a price valuation of personal information through an economic experiment combined with a behavioural study on privacy paradox. Our goal is to reveal more insights on the privacy paradox through economic valuation on personal information. Results indicate that general privacy concerns or individual disclosure concerns do not have a significant influence on the price valuation of personal information. Instead, prior disclosure behaviour in specific scenario, like with healthcare providers or social networks, is a better indicator of consumer price valuations.
Unveiling consumer’s privacy paradox behaviour in an economic exchange
Li, Xiao-Bai
2015-01-01
Privacy paradox is of great interest to IS researchers and firms gathering personal information. It has been studied from social, behavioural, and economic perspectives independently. However, prior research has not examined the degrees of influence these perspectives contribute to the privacy paradox problem. We combine both economic and behavioural perspectives in our study of the privacy paradox with a price valuation of personal information through an economic experiment combined with a behavioural study on privacy paradox. Our goal is to reveal more insights on the privacy paradox through economic valuation on personal information. Results indicate that general privacy concerns or individual disclosure concerns do not have a significant influence on the price valuation of personal information. Instead, prior disclosure behaviour in specific scenario, like with healthcare providers or social networks, is a better indicator of consumer price valuations. PMID:27708687
Will the new Australian health privacy law provide adequate protection?
Bomba, David; Hallit, George
2002-01-01
Amendments to the original Privacy Act (1988) come at a key point in time, as a national medical record system looms on the Australian horizon. Changes to The Privacy Act have the potential to define a level of information privacy prior to the implementation of such a system. We have therefore collected expert opinions on the ability of the Health Privacy Guidelines (enacted in December 2001 under The Privacy Act and hereafter more specifically known as Health Privacy Legislation) to ensure the privacy and security of patient information. We conclude that the legislation is flawed in its capacity to withstand an increasingly corporatised health sector. Deficiencies in consent requirements, together with feeble enforcement capabilities, mean The Legislation cannot effectively ensure that personally identifiable information will not end up in corporate third party hands. To significantly bolster the new legislation, we argue that it should be supplemented with explicit health data legislation and privacy auditing.
Patients want granular privacy control over health information in electronic medical records.
Caine, Kelly; Hanania, Rima
2013-01-01
To assess patients' desire for granular level privacy control over which personal health information should be shared, with whom, and for what purpose; and whether these preferences vary based on sensitivity of health information. A card task for matching health information with providers, questionnaire, and interview with 30 patients whose health information is stored in an electronic medical record system. Most patients' records contained sensitive health information. No patients reported that they would prefer to share all information stored in an electronic medical record (EMR) with all potential recipients. Sharing preferences varied by type of information (EMR data element) and recipient (eg, primary care provider), and overall sharing preferences varied by participant. Patients with and without sensitive records preferred less sharing of sensitive versus less-sensitive information. Patients expressed sharing preferences consistent with a desire for granular privacy control over which health information should be shared with whom and expressed differences in sharing preferences for sensitive versus less-sensitive EMR data. The pattern of results may be used by designers to generate privacy-preserving EMR systems including interfaces for patients to express privacy and sharing preferences. To maintain the level of privacy afforded by medical records and to achieve alignment with patients' preferences, patients should have granular privacy control over information contained in their EMR.
Weaver, Meaghann
2016-03-01
Genetic testing reveals information about a patient's health status and predictions about the patient's future wellness, while also potentially disclosing health information relevant to other family members. With the increasing availability and affordability of genetic testing and the integration of genetics into mainstream medicine, the importance of clarifying the scope of confidentiality and the rules regarding disclosure of genetic findings to genetic relatives is prime. The United Nations International Declaration on Human Genetic Data urges an appreciation for principles of equality, justice, solidarity and responsibility in the context of genetic testing, including a commitment to honoring the privacy and security of the person tested. Considering this global mandate and recent professional statements in the context of a legal amendment to patient privacy policies in Australia, a fresh scrutiny of the legal history of a physician's duty to warn is warranted. This article inquiries whether there may be anything ethically or socially amiss with a potential future recommendation for health professionals or patients to universally disclose particular cancer predisposition genetic diagnosis to genetic family members. While much of the discussion remains applicable to all genetic diagnosis, the article focuses on the practice of disclosure within the context of BRCA1/2 diagnosis. An 'ethic of care' interpretation of legal tradition and current practice will serve to reconcile law and medical policy on the issue of physician disclosure of genetic results to family members without patient consent. © 2015 John Wiley & Sons Ltd.
Roche, P A; Annas, G J
2001-05-01
This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.
Beyond Concern: K-12 Faculty and Staff's Perspectives on Privacy Topics and Cybersafety
ERIC Educational Resources Information Center
Hipsky, Shellie; Younes, Wiam
2015-01-01
In a time when discussions about information privacy dominate the media, research on Cybersafety education reveals that K-12 teachers and staff are concerned about information privacy in schools and they seek to learn more about the protection of their students' and own personal information online. Privacy topics are typically introduced to the…
Legal issues concerning electronic health information: privacy, quality, and liability.
Hodge, J G; Gostin, L O; Jacobson, P D
1999-10-20
Personally identifiable health information about individuals and general medical information is increasingly available in electronic form in health databases and through online networks. The proliferation of electronic data within the modern health information infrastructure presents significant benefits for medical providers and patients, including enhanced patient autonomy, improved clinical treatment, advances in health research and public health surveillance, and modern security techniques. However, it also presents new legal challenges in 3 interconnected areas: privacy of identifiable health information, reliability and quality of health data, and tortbased liability. Protecting health information privacy (by giving individuals control over health data without severely restricting warranted communal uses) directly improves the quality and reliability of health data (by encouraging individual uses of health services and communal uses of data), which diminishes tort-based liabilities (by reducing instances of medical malpractice or privacy invasions through improvements in the delivery of health care services resulting in part from better quality and reliability of clinical and research data). Following an analysis of the interconnectivity of these 3 areas and discussing existing and proposed health information privacy laws, recommendations for legal reform concerning health information privacy are presented. These include (1) recognizing identifiable health information as highly sensitive, (2) providing privacy safeguards based on fair information practices, (3) empowering patients with information and rights to consent to disclosure (4) limiting disclosures of health data absent consent, (5) incorporating industry-wide security protections, (6) establishing a national data protection authority, and (7) providing a national minimal level of privacy protections.
Informational privacy and the public's health: the Model State Public Health Privacy Act.
Gostin, L O; Hodge, J G; Valdiserri, R O
2001-09-01
Protecting public health requires the acquisition, use, and storage of extensive health-related information about individuals. The electronic accumulation and exchange of personal data promises significant public health benefits but also threatens individual privacy; breaches of privacy can lead to individual discrimination in employment, insurance, and government programs. Individuals concerned about privacy invasions may avoid clinical or public health tests, treatments, or research. Although individual privacy protections are critical, comprehensive federal privacy protections do not adequately protect public health data, and existing state privacy laws are inconsistent and fragmented. The Model State Public Health Privacy Act provides strong privacy safeguards for public health data while preserving the ability of state and local public health departments to act for the common good.
Information Systems, Security, and Privacy.
ERIC Educational Resources Information Center
Ware, Willis H.
1984-01-01
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on the Judiciary.
This hearing was held to address two bills designed to protect the privacy of users of video and library services, H.R. 4947 and S. 2361. The report opens with the full text of both bills and opening statements made by Representative Robert W. Kastenmeier, Senator Patrick J. Leahy, and Representative Carlos J. Moorhead. Testimony and prepared…
Privacy Challenges for Wireless Medical Devices
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lagesse, Brent J
2010-01-01
Implantable medical devices are becoming more pervasive as new technologies increase their reliability and safety. Furthermore, these devices are becoming increasingly reliant on wireless communication for interaction with the device. Such technologies have the potential to leak information that could be utilized by an attacker to threaten the lives of patients. Privacy of patient information is essential; however, this information is not the only privacy issue that must be considered. In this paper, we discuss why information privacy is insufficient for protecting patients from some attacks and how information regarding the presence of individual devices can leak vulnerabilities. Furthermore, wemore » examine existing privacy enhancing algorithms and discuss their applicability to implantable medical devices.« less
Code of Federal Regulations, 2011 CFR
2011-10-01
... 43 Public Lands: Interior 1 2011-10-01 2011-10-01 false How will a bureau handle a request for information that is contained in a Privacy Act system of records? (See DOI's Privacy Act regulations (Subpart... system of records? (See DOI's Privacy Act regulations (Subpart G of this part) for additional information...
Disentangling privacy from property: toward a deeper understanding of genetic privacy.
Suter, Sonia M
2004-04-01
With the mapping of the human genome, genetic privacy has become a concern to many. People care about genetic privacy because genes play an important role in shaping us--our genetic information is about us, and it is deeply connected to our sense of ourselves. In addition, unwanted disclosure of our genetic information, like a great deal of other personal information, makes us vulnerable to unwanted exposure, stigmatization, and discrimination. One recent approach to protecting genetic privacy is to create property rights in genetic information. This Article argues against that approach. Privacy and property are fundamentally different concepts. At heart, the term "property" connotes control within the marketplace and over something that is disaggregated or alienable from the self. "Privacy," in contrast, connotes control over access to the self as well as things close to, intimately connected to, and about the self. Given these different meanings, a regime of property rights in genetic information would impoverish our understanding of that information, ourselves, and the relationships we hope will be built around and through its disclosure. This Article explores our interests in genetic information in order to deepen our understanding of the ongoing discourse about the distinction between property and privacy. It develops a conception of genetic privacy with a strong relational component. We ordinarily share genetic information in the context of relationships in which disclosure is important to the relationship--family, intimate, doctor-patient, researcher-participant, employer-employee, and insurer-insured relationships. Such disclosure makes us vulnerable to and dependent on the person to whom we disclose it. As a result, trust is essential to the integrity of these relationships and our sharing of genetic information. Genetic privacy can protect our vulnerability in these relationships and enhance the trust we hope to have in them. Property, in contrast, by connoting commodification, disaggregation, and arms-length dealings, can negatively affect the self and harm these relationships. This Article concludes that a deeper understanding of genetic privacy calls for remedies for privacy violations that address dignitary harm and breach of trust, as opposed to market harms, as the property model suggests.
King, Tatiana; Brankovic, Ljiljana; Gillard, Patricia
2012-04-01
The aim of this study was to discover the public's attitude and views towards privacy in health care. This is a part of a larger project which aims to gain an insight into what kind of privacy is needed and develop technical measures to provide such privacy. The study was a two-stage process which combined qualitative and quantitative research. Stage One of the study comprised arranging and facilitating focus groups while in Stage Two we conducted a social survey. We measured attitudes towards privacy, medical research and consent; privacy concern about sharing one's health information for research; privacy concern about the possibility that some specific information from medical records could be linked to the patient's name in a situation that was not related to medical treatment. The results of the study revealed both great support for medical research (98%), and concern about privacy of health information (66%). Participants prefer to be asked for their permission before their health information is used for any purpose other than medical treatment (92%), and they would like to know the organisation and details of the research before allowing the use of their health records (83%). Age, level of education, place of birth and employment status are most strongly associated with privacy concerns. The study showed that there are some particularly sensitive issues and there is a concern (42-60%) about any possibility of linking these kinds of data to the patient's name in a situation that is not related to medical treatment. Such issues include sexually transmitted diseases, abortions and infertility, family medical history/genetic disorders, mental illness, drug/alcohol related incidents, lists of previous operations/procedures/dates and current medications. Participants believe they should be asked for permission before their health information is used for any purpose other than medical treatment. However, consent and privacy concerns are not necessary related. Assuring individuals that their personal health information is de-identified reduces their concern about the necessity of consent for releasing health information for research purposes, but many people are not aware that removing their names and other direct identifiers from medical records does not guarantee full privacy protection for their health information. Privacy concerns decrease as extra security measures are introduced to protect privacy. Therefore, instead of "tailoring concern" as proposed by Willison we suggest improving privacy protection of personal information by introducing additional security measures in data publishing. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
16 CFR 313.5 - Annual privacy notice to customers required.
Code of Federal Regulations, 2010 CFR
2010-01-01
... continuation of the customer relationship. Annually means at least once in any period of 12 consecutive months... customer by December 31 of year 2. (b)(1) Termination of customer relationship. You are not required to... any statements or notices to the customer concerning that relationship; (iv) In the case of mortgage...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Social security numbers of... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.224-70 Social security numbers of consultants and...
12 CFR 573.5 - Annual privacy notice to customers required.
Code of Federal Regulations, 2010 CFR
2010-01-01
... customer relationship. Annually means at least once in any period of 12 consecutive months during which.... (b)(1) Termination of customer relationship. You are not required to provide an annual notice to a... provide any statements or notices to the customer concerning that relationship or you sell the credit card...
78 FR 3079 - Qualification of Drivers; Exemption Applications; Epilepsy and Seizure Disorders
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-15
..., business, labor union, etc.). You may review the DOT's complete Privacy Act Statement in the Federal... motor vehicle if that person has no established medical history or clinical diagnosis of epilepsy or any... medication. Drivers who have a history of epilepsy/ seizures, off anti-seizure medication and seizure-free...
78 FR 49319 - Qualification of Drivers; Exemption Applications; Epilepsy and Seizure Disorders
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-13
..., business, labor union, etc.). You may review the DOT's complete Privacy Act Statement in the Federal... qualified to drive a commercial motor vehicle if that person has no established medical history or clinical... history of epilepsy/ seizures, off anti-seizure medication and seizure-free for 10 years, may be qualified...
78 FR 56984 - Qualification of Drivers; Exemption Applications; Epilepsy and Seizure Disorders
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
..., business, labor union, etc.). You may review the DOT's complete Privacy Act Statement in the Federal... qualified to drive a commercial motor vehicle if that person has no established medical history or clinical... history of epilepsy/ seizures, off anti-seizure medication and seizure-free for 10 years, may be qualified...
32 CFR 806b.32 - Submitting notices for publication in the Federal Register.
Code of Federal Regulations, 2011 CFR
2011-07-01
... managers must send a proposed notice, through the Major Command Privacy Office, to Air Force Chief... in appendix B to this part. For new systems, system managers must include a statement that a risk assessment was accomplished and is available should the Office of Management and Budget request it. ...
32 CFR 806b.32 - Submitting notices for publication in the Federal Register.
Code of Federal Regulations, 2013 CFR
2013-07-01
... managers must send a proposed notice, through the Major Command Privacy Office, to Air Force Chief... in appendix B to this part. For new systems, system managers must include a statement that a risk assessment was accomplished and is available should the Office of Management and Budget request it. ...
76 FR 4449 - Privacy Act of 1974; Report of Modified or Altered System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-25
... for the purpose of assisting the Department's efforts to respond to a suspected or confirmed breach of... returned to submitter. Used between specialty units for research purposes; and for epidemiological... or Altered System of Records Narrative Statement I. Background and Purpose of the System A...
12 CFR 792.59 - Appeal of initial determination.
Code of Federal Regulations, 2010 CFR
2010-01-01
... General Counsel shall either advise the individual of a decision to amend or correct the record, or advise... accounting made as required by the Privacy Act of 1974 or any other accounting previously made, of the... concise statement of the reasons for not making the requested amendment may also be provided if deemed...
12 CFR 1016.5 - Annual privacy notice to customers required.
Code of Federal Regulations, 2012 CFR
2012-01-01
... relationship exists. You may define the 12-consecutive-month period, but you must apply it to the customer on a.... (b)(1) Termination of customer relationship. You are not required to provide an annual notice to a... statements or notices to the customer concerning that relationship or you sell the credit card receivables...
16 CFR 313.5 - Annual privacy notice to customers required.
Code of Federal Regulations, 2013 CFR
2013-01-01
... continuation of the customer relationship. Annually means at least once in any period of 12 consecutive months... customer by December 31 of year 2. (b)(1) Termination of customer relationship. You are not required to... any statements or notices to the customer concerning that relationship; (iv) In the case of mortgage...
12 CFR 1016.5 - Annual privacy notice to customers required.
Code of Federal Regulations, 2013 CFR
2013-01-01
... relationship exists. You may define the 12-consecutive-month period, but you must apply it to the customer on a.... (b)(1) Termination of customer relationship. You are not required to provide an annual notice to a... statements or notices to the customer concerning that relationship or you sell the credit card receivables...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-25
... design feature associated with the architecture and connectivity capabilities of the airplanes' computer... the comment for an association, business, labor union, etc.). DOT's complete Privacy Act Statement can... architecture for the Embraer Model EMB-550 series of airplanes is composed of several connected networks. This...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-17
..., business, labor union, etc.). DOT's complete Privacy Act Statement can be found in the Federal Register... unusual design feature: an electronics network system architecture which is new and novel for commercial... series architecture is new and novel for commercial transport airplanes because it allows connection to...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-31
... an association, business, labor union, etc.). DOT's complete Privacy Act Statement can be found in... supplemental type certificate (STC) change in the digital systems architecture in the Learjet Model 45 series... plus two crew members. The proposed Learjet Model 45 architecture is new and novel for commercial...
Display methods of electronic patient record screens: patient privacy concerns.
Niimi, Yukari; Ota, Katsumasa
2013-01-01
To provide adequate care, medical professionals have to collect not only medical information but also information that may be related to private aspects of the patient's life. With patients' increasing awareness of information privacy, healthcare providers have to pay attention to the patients' right of privacy. This study aimed to clarify the requirements of the display method of electronic patient record (EPR) screens in consideration of both patients' information privacy concerns and health professionals' information needs. For this purpose, semi-structured group interviews were conducted of 78 medical professionals. They pointed out that partial concealment of information to meet patients' requests for privacy could result in challenges in (1) safety in healthcare, (2) information sharing, (3) collaboration, (4) hospital management, and (5) communication. They believed that EPRs should (1) meet the requirements of the therapeutic process, (2) have restricted access, (3) provide convenient access to necessary information, and (4) facilitate interprofessional collaboration. This study provides direction for the development of display methods that balance the sharing of vital information and protection of patient privacy.
The study on privacy preserving data mining for information security
NASA Astrophysics Data System (ADS)
Li, Xiaohui
2012-04-01
Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.
Trust Information and Privacy Policies - Enablers for pHealth and Ubiquitous Health.
Ruotsalainen, Pekka; Blobel, Bernd
2014-01-01
pHealth occurs in uncontrolled and unsecure environment where predefined organizational trust does not exist. To be accepted by users, pHealth requires a privacy model where privacy is a personal property, i.e., a person can perform own will and define policies which regulate how personal health information (PHI) is used. Privacy and trust are interconnected concepts. Therefore, before beginning to use pHealth services, the person needs practical and reliable information that enables her or him to determine the trustworthiness level of services. To avoid the use of blind trust, organizations, researchers, policymakers, and standardization organizations have proposed the use of dynamic context-aware policies for privacy management in pHealth. To make meaningful privacy decision, a person should understand the impact of selected policy rules on the processing of PHI in different situations. In this paper, the use of computational trust information for defining privacy polies and reducing their number is proposed. A trust value and understandable trust attributes enable a person to tailor privacy policies requested for trustworthy use of pHealth services. Trust attributes proposed are derived from privacy concerns existing in open ubiquitous environment. These attributes also force pHealth services providers to publish information needed for trust calculation and in this way to support openness and transparency.
Naked on the Information Highway: The 6th Ian P. Sharp Lecture.
ERIC Educational Resources Information Center
Phillips, Bruce
1995-01-01
This lecture by the Privacy Commissioner of Canada addresses issues related to information technology and privacy, including privacy law, government role, surveillance techniques, and security measures to protect the privacy of electronic communications. The text of the question and answer period following the lecture is included. (MES)
76 FR 3098 - Privacy Act of 1974; Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-19
...: National Security Agency/Central Security Service, Freedom of Information Act and Privacy Act Office, 9800..., Privacy Act and Mandatory Declassification Review Records. System Location: National Security Agency... Information Act; 5 U.S.C. 552a, The Privacy Act of 1974 (as amended); E.O. 13526, Classified National Security...
42 CFR 423.136 - Privacy, confidentiality, and accuracy of enrollee records.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 42 Public Health 3 2012-10-01 2012-10-01 false Privacy, confidentiality, and accuracy of enrollee... BENEFIT Benefits and Beneficiary Protections § 423.136 Privacy, confidentiality, and accuracy of enrollee... information. The PDP sponsor must safeguard the privacy of any information that identifies a particular...
78 FR 19247 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-29
... Privacy Act system of records. SUMMARY: In accordance with the requirements of the Privacy Act of 1974, as... subject to the Privacy Act of 1974. This system of records maintains information on patent applicants and... notices. The storage and safeguard information has been updated to include electronic records. The...
Privacy and anonymity in the information society - challenges for the European Union.
Tsoukalas, Ioannis A; Siozos, Panagiotis D
2011-03-01
Electronic information is challenging traditional views on property and privacy. The explosion of digital data, driven by novel web applications, social networking, and mobile devices makes data security and the protection of privacy increasingly difficult. Furthermore, biometric data and radiofrequency identification applications enable correlations that are able to trace our cultural, behavioral, and emotional states. The concept of privacy in the digital realm is transformed and emerges as one of the biggest risks facing today's Information Society. In this context, the European Union (EU) policy-making procedures strive to adapt to the pace of technological advancement. The EU needs to improve the existing legal frameworks for privacy and data protection. It needs to work towards a "privacy by education" approach for the empowerment of "privacy-literate" European digital citizens.
Facilitating the appropriate use of e-health solutions.
Stern, Hartley S; Ceresia, Patrick; Lapner, Martin
2014-01-01
In this issue, the lead article proposes that e-health technologies should be used more broadly and that patients should have greater access to their information through such technologies. The Canadian Medical Protective Association (CMPA) agrees with this statement and suggests that to facilitate the timely and appropriate adoption of new technologies among healthcare providers to enhance patient care, barriers in the existing regulatory, legislative and legal frameworks must be addressed. While much of the discussion to date on e-health has focused primarily on high-level issues regarding regulatory compliance, "privacy by design" and the e-health "panacea," CMPA suggests that there needs to be a refocus on achieving more concrete change and gains through consideration of the specific impact on the drivers of healthcare delivery. An integrated or holistic approach is required involving healthcare providers, regulators, legislators, stakeholders, ministries of health, privacy commissioners and the courts. To better leverage potential advantages, efficiencies and enhanced, safer care for our healthcare system, all parties must work together to develop an acceptable and flexible approach to the "appropriate use" of e-health technologies that will facilitate adoption by healthcare professionals in a manner that is consistent with the expectations of the profession and applicable standards of practice.
Otlowski, Margaret F A
2015-04-06
There is growing understanding of the need for genetic information to be shared with genetic relatives in some circumstances. Since 2006, s 95AA of the Privacy Act 1988 (Cwlth) has permitted the disclosure of genetic information to genetic relatives without the patient's consent, provided that the health practitioner reasonably believes that disclosure is necessary to lessen or prevent a serious threat to the life, health or safety of the genetic relatives. Enabling guidelines were introduced in 2009. These were limited to the private sector, and excluded doctors working in the public sector at both Commonwealth and state and territory levels. Privacy legislation was amended in March 2014, and new Australian Privacy Principles, which replace the National Privacy Principles and Information Privacy Principles, now cover the collection and use of personal information. The Privacy Act and the Australian Privacy Principles now extend to practitioners employed by the Commonwealth but not to health practitioners working in state and territory public hospitals. In this article, I review these legislative developments and highlight the implications of the lack of uniformity and the consequent need for a collaborative, uniform approach by states and territories.
Privacy rules for DNA databanks. Protecting coded 'future diaries'.
Annas, G J
1993-11-17
In privacy terms, genetic information is like medical information. But the information contained in the DNA molecule itself is more sensitive because it contains an individual's probabilistic "future diary," is written in a code that has only partially been broken, and contains information about an individual's parents, siblings, and children. Current rules for protecting the privacy of medical information cannot protect either genetic information or identifiable DNA samples stored in DNA databanks. A review of the legal and public policy rationales for protecting genetic privacy suggests that specific enforceable privacy rules for DNA databanks are needed. Four preliminary rules are proposed to govern the creation of DNA databanks, the collection of DNA samples for storage, limits on the use of information derived from the samples, and continuing obligations to those whose DNA samples are in the databanks.
Workshop--E-leaks: the privacy of health information in the age of electronic information.
Vonn, Michael; Lang, Renée; Perras, Maude
2011-10-01
This workshop examined some of the new challenges to health-related privacy emerging as a result of the proliferation of electronic communications and data storage, including through social media, electronic health records and ready access to personal information on the internet. The right to privacy is a human right. As such, protecting privacy and enforcing the duty of confidentiality regarding health information are fundamental to treating people with autonomy, dignity and respect. For people living with HIV, unauthorized disclosure of their status can lead to discrimination and breaches of other human rights. While this is not new, in this information age a new breed of privacy violation is emerging and our legal protections are not necessarily keeping pace.
A patient privacy protection scheme for medical information system.
Lu, Chenglang; Wu, Zongda; Liu, Mingyong; Chen, Wei; Guo, Junfang
2013-12-01
In medical information systems, there are a lot of confidential information about patient privacy. It is therefore an important problem how to prevent patient's personal privacy information from being disclosed. Although traditional security protection strategies (such as identity authentication and authorization access control) can well ensure data integrity, they cannot prevent system's internal staff (such as administrators) from accessing and disclosing patient privacy information. In this paper, we present an effective scheme to protect patients' personal privacy for a medical information system. In the scheme, privacy data before being stored in the database of the server of a medical information system would be encrypted using traditional encryption algorithms, so that the data even if being disclosed are also difficult to be decrypted and understood. However, to execute various kinds of query operations over the encrypted data efficiently, we would also augment the encrypted data with additional index, so as to process as much of the query as possible at the server side, without the need to decrypt the data. Thus, in this paper, we mainly explore how the index of privacy data is constructed, and how a query operation over privacy data is translated into a new query over the corresponding index so that it can be executed at the server side immediately. Finally, both theoretical analysis and experimental evaluation validate the practicality and effectiveness of our proposed scheme.
A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing
ERIC Educational Resources Information Center
Zhu, Zutao
2010-01-01
In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…
39 CFR 7.8 - Open meetings, Freedom of Information, and Privacy of Information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 39 Postal Service 1 2010-07-01 2010-07-01 false Open meetings, Freedom of Information, and Privacy of Information. 7.8 Section 7.8 Postal Service UNITED STATES POSTAL SERVICE THE BOARD OF GOVERNORS OF THE U.S. POSTAL SERVICE PUBLIC OBSERVATION (ARTICLE VII) § 7.8 Open meetings, Freedom of Information, and Privacy of Information. The provisions o...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... Files System AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notification of a New Privacy..., 2012. Jerry E. Williams, Chief Information Officer. HUD/PD&R.01 SYSTEM NAME: Veterans Homelessness..., assistance, or inquiry about the existence of records, contact Harold Williams, Acting Chief Privacy Officer...
Effective Management of Information Security and Privacy
ERIC Educational Resources Information Center
Anderson, Alicia
2006-01-01
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
78 FR 43866 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
... INFORMATION CONTACT or at the Defense Privacy and Civil Liberties Web site at http://dpclo.defense.gov/privacy... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0136] Privacy Act of 1974; System of Records AGENCY: Defense Information Systems Agency, DoD. ACTION: Notice to delete a System of...
12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.
Code of Federal Regulations, 2010 CFR
2010-01-01
... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION... UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION The Privacy Act § 792.69 Training and employee standards of conduct with regard to...
32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Evaluating information systems for Privacy Act compliance. 806b.30 Section 806b.30 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR... privacy issues are unchanged. (d) The depth and content of the Privacy Impact Assessment should be...
32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Evaluating information systems for Privacy Act compliance. 806b.30 Section 806b.30 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR... privacy issues are unchanged. (d) The depth and content of the Privacy Impact Assessment should be...
New threats to health data privacy.
Li, Fengjun; Zou, Xukai; Liu, Peng; Chen, Jake Y
2011-11-24
Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.
New threats to health data privacy
2011-01-01
Background Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. Results We study how patient privacy could be compromised with the help of today’s information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. Conclusion We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection. PMID:22168526
Privacy and confidentiality in pragmatic clinical trials
McGraw, Deven; Greene, Sarah M.; Miner, Caroline S.; Staman, Karen L.; Welch, Mary Jane; Rubel, Alan
2015-01-01
With pragmatic clinical trials (PCTs) an opportunity exists to answer important questions about the relative risks, burdens, and benefits of therapeutic interventions. However, concerns about protecting the privacy of this information are significant and must be balanced with the imperative to learn from the data gathered in routine clinical practice. Traditional privacy protections for research uses of identifiable information rely disproportionately on informed consent or authorizations, based on a presumption that this is necessary to fulfill ethical principles of respect for persons. But frequently the ideal of informed consent is not realized in its implementation. Moreover, the principle of respect for persons,—which encompasses their interests in health information privacy,—can be honored through other mechanisms. Data anonymization also plays a role in protecting privacy but is not suitable for all research, particularly PCTs. In this paper we explore both the ethical foundation and regulatory framework intended to protect privacy in PCTs. We then review examples of novel approaches to respecting persons in research that may have the added benefit of honoring patient privacy considerations. PMID:26374682
Joint replacement recipients' views about health information privacy.
Terry, Amanda L; Chesworth, Bert M; Bourne, Robert B; Stolee, Paul; Speechley, Mark
2015-10-01
Researchers are concerned about the possibility of restricted access to data as a result of specific consent requirements in privacy legislation, potentially resulting in smaller samples and a lack of representativeness which could bias results. In addition, there is uncertainty about what influences individuals to give consent for the use of their personal health information. To measure joint replacement recipients' health information privacy views and to assess potential predictors of these views. Cross-sectional survey. Potential joint replacement recipients from two teaching hospitals in London, Ontario, Canada. Age, gender, education, employment status, anticipated joint replacement, and expectations for surgery. Privacy concerns as measured by the Concern Scale. The response rate was 182/253 or 72%. The mean Concern score was 143.9/235.0 for the total sample (range = 82-216). Women had higher levels of privacy concerns than men on slightly over half of the individual questionnaire items. In women, surgical joint, age and employment explained 15% of the variance in concerns about personal health information privacy (P = 0.001). The model explained 6% of the variance in concerns in men (P = 0.138) and was not statistically significant. This study indicates that demographic characteristics and health-care experiences play a role in the variability of health information privacy concerns. A greater understanding of patients' privacy views about health information could lead to a greater harmonization among privacy rules, research and data access, and the preferences of health-care consumers. © 2013 John Wiley & Sons Ltd.
Privacy and policy for genetic research.
DeCew, Judith Wagner
2004-01-01
I begin with a discussion of the value of privacy and what we lose without it. I then turn to the difficulties of preserving privacy for genetic information and other medical records in the face of advanced information technology. I suggest three alternative public policy approaches to the problem of protecting individual privacy and also preserving databases for genetic research: (1) governmental guidelines and centralized databases, (2) corporate self-regulation, and (3) my hybrid approach. None of these are unproblematic; I discuss strengths and drawbacks of each, emphasizing the importance of protecting the privacy of sensitive medical and genetic information as well as letting information technology flourish to aid patient care, public health and scientific research.
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services
NASA Astrophysics Data System (ADS)
Khoshgozaran, Ali; Shahabi, Cyrus
The ubiquity of smartphones and other location-aware hand-held devices has resulted in a dramatic increase in popularity of location-based services (LBS) tailored to user locations. The comfort of LBS comes with a privacy cost. Various distressing privacy violations caused by sharing sensitive location information with potentially malicious services have highlighted the importance of location privacy research aiming to protect user privacy while interacting with LBS.
Privacy, confidentiality, and security in information systems of state health agencies.
O'Brien, D G; Yasnoff, W A
1999-05-01
To assess the employment and status of privacy, confidentiality, security and fair information practices in electronic information systems of U.S. state health agencies. A survey instrument was developed and administered to key contacts within the state health agencies of each of the 50 U.S. states, Puerto Rico and the District of Columbia. About a third of U.S. state health agencies have no written policies in place regarding privacy and confidentiality in electronic information systems. The doctrines of fair information practice often seemed to be ignored. One quarter of the agencies reported at least one security breach during the past two years, and 16% experienced a privacy and confidentiality related transgression. Most of the breaches were committed by personnel from within the agencies. These results raise questions about the integrity of existing privacy, confidentiality and security measures in the information systems of U.S. state health agencies. Recommendations include the development and vigorous enforcement of written privacy and confidentiality policies, increased personnel training, and expanded implementation of security measures such as encryption and system firewalls. A discussion of the current status of U.S. privacy, confidentiality and security issues is offered.
Report on the National Symposium on Personal Privacy and Information Technology (October 4-7, 1981).
ERIC Educational Resources Information Center
American Federation of Information Processing Societies, Montvale, NJ.
A national symposium was held October 4-7, 1981, to explore the relationships among law, ethics, and informational technology as they relate to the individual's informational privacy. The introduction to this report describes the conference format; discusses the Privacy Act of 1974 and the Freedom of Information Act; and offers definitions of…
2013-01-25
The Department of Health and Human Services (HHS or ``the Department'') is issuing this final rule to: Modify the Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security, and Enforcement Rules to implement statutory amendments under the Health Information Technology for Economic and Clinical Health Act (``the HITECH Act'' or ``the Act'') to strengthen the privacy and security protection for individuals' health information; modify the rule for Breach Notification for Unsecured Protected Health Information (Breach Notification Rule) under the HITECH Act to address public comment received on the interim final rule; modify the HIPAA Privacy Rule to strengthen the privacy protections for genetic information by implementing section 105 of Title I of the Genetic Information Nondiscrimination Act of 2008 (GINA); and make certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on the regulated entities.
32 CFR 505.14 - Recordkeeping requirements under the Privacy Act.
Code of Federal Regulations, 2011 CFR
2011-07-01
... under the Privacy Act. (a) AR 25-400-2, The Army Records Information Management System (ARIMS). To maintain privacy records are required by the Army Records Information Management System (ARIMS) to provide...
32 CFR 505.14 - Recordkeeping requirements under the Privacy Act.
Code of Federal Regulations, 2013 CFR
2013-07-01
... under the Privacy Act. (a) AR 25-400-2, The Army Records Information Management System (ARIMS). To maintain privacy records are required by the Army Records Information Management System (ARIMS) to provide...
32 CFR 505.14 - Recordkeeping requirements under the Privacy Act.
Code of Federal Regulations, 2012 CFR
2012-07-01
... under the Privacy Act. (a) AR 25-400-2, The Army Records Information Management System (ARIMS). To maintain privacy records are required by the Army Records Information Management System (ARIMS) to provide...
32 CFR 505.14 - Recordkeeping requirements under the Privacy Act.
Code of Federal Regulations, 2014 CFR
2014-07-01
... under the Privacy Act. (a) AR 25-400-2, The Army Records Information Management System (ARIMS). To maintain privacy records are required by the Army Records Information Management System (ARIMS) to provide...
Information Parents Must Know about Online Privacy.
ERIC Educational Resources Information Center
Markell, Ginny
2000-01-01
Presents four tips to help parents monitor whether website operators are complying with the 1988 Children's Online Privacy Protection Act: look for privacy policies on children's websites; determine if they ask for parental consent to collect personal information; regularly monitor information being sent to children; and determine if web operators…
22 CFR 171.12 - Processing requests.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... Except for requests under the Privacy Act by a parent of a minor or by a legal guardian (§ 171.32(c... PUBLIC Freedom of Information Act Provisions § 171.12 Processing requests. The Information and Privacy... Information and Privacy Coordinator for not more than 10 days, excepting Saturdays, Sundays, or legal public...
22 CFR 171.12 - Processing requests.
Code of Federal Regulations, 2011 CFR
2011-04-01
.... Except for requests under the Privacy Act by a parent of a minor or by a legal guardian (§ 171.32(c... PUBLIC Freedom of Information Act Provisions § 171.12 Processing requests. The Information and Privacy... Information and Privacy Coordinator for not more than 10 days, excepting Saturdays, Sundays, or legal public...
32 CFR 321.3 - Information and procedures for requesting notification.
Code of Federal Regulations, 2014 CFR
2014-07-01
... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2014-07-01 2014-07-01 false Information and procedures for requesting...
32 CFR 321.3 - Information and procedures for requesting notification.
Code of Federal Regulations, 2013 CFR
2013-07-01
... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2013-07-01 2013-07-01 false Information and procedures for requesting...
32 CFR 321.3 - Information and procedures for requesting notification.
Code of Federal Regulations, 2011 CFR
2011-07-01
... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2011-07-01 2011-07-01 false Information and procedures for requesting...
32 CFR 321.3 - Information and procedures for requesting notification.
Code of Federal Regulations, 2012 CFR
2012-07-01
... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2012-07-01 2012-07-01 false Information and procedures for requesting...
32 CFR 321.3 - Information and procedures for requesting notification.
Code of Federal Regulations, 2010 CFR
2010-07-01
... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.3 Information and... mail to the Defense Security Service, Office of FOI and Privacy, 1340 Braddock Place, Alexandria, VA... 32 National Defense 2 2010-07-01 2010-07-01 false Information and procedures for requesting...
75 FR 80313 - Privacy Act of 1974; Implementation
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-22
... Privacy Act listed below for the reasons set forth in the following text. Information in this system of... INFORMATION: Background On August 31, 2010, the FBI published notice of a new Privacy Act system of records... provide more information explaining the FBI's ``internal controls'' in protecting the data itself from...
12 CFR 741.220 - Privacy of consumer financial information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Privacy of consumer financial information. 741.220 Section 741.220 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING... Privacy of consumer financial information. Any credit union which is insured pursuant to Title II of the...
12 CFR 741.220 - Privacy of consumer financial information.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Privacy of consumer financial information. 741.220 Section 741.220 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING... Privacy of consumer financial information. Any credit union which is insured pursuant to Title II of the...
12 CFR 741.220 - Privacy of consumer financial information.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Privacy of consumer financial information. 741.220 Section 741.220 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING... Privacy of consumer financial information. Any credit union which is insured pursuant to title II of the...
12 CFR 741.220 - Privacy of consumer financial information.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Privacy of consumer financial information. 741.220 Section 741.220 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING... Privacy of consumer financial information. Any credit union which is insured pursuant to Title II of the...
12 CFR 741.220 - Privacy of consumer financial information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Privacy of consumer financial information. 741.220 Section 741.220 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING... Privacy of consumer financial information. Any credit union which is insured pursuant to Title II of the...
Code of Federal Regulations, 2010 CFR
2010-01-01
... ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION The Privacy Act § 792.52 Scope. This subpart governs requests made of NCUA under the Privacy Act (5 U.S.C. 552a). The regulation applies to all records...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-27
... information that raises significant identity theft, personal safety, or privacy concerns that are not... raises personal safety or privacy concerns is released to the public when considering whether to release... customer information or information that raises identity theft, personal safety or privacy concerns that do...
77 FR 25686 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-01
... NIST Computer Security Division. Note that agenda items may change without notice because of possible... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB...
32 CFR 806b.1 - Summary of revisions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... for the Air Force Privacy Program from Air Force Communications and Information Center to the Air Force Chief Information Officer; prescribes Air Force Visual Aid 33-276, Privacy Act Label as optional; adds the E-Gov Act of 2002 requirement for a Privacy Impact Assessment for all information systems that...
32 CFR 806b.1 - Summary of revisions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... for the Air Force Privacy Program from Air Force Communications and Information Center to the Air Force Chief Information Officer; prescribes Air Force Visual Aid 33-276, Privacy Act Label as optional; adds the E-Gov Act of 2002 requirement for a Privacy Impact Assessment for all information systems that...
32 CFR 806b.1 - Summary of revisions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... for the Air Force Privacy Program from Air Force Communications and Information Center to the Air Force Chief Information Officer; prescribes Air Force Visual Aid 33-276, Privacy Act Label as optional; adds the E-Gov Act of 2002 requirement for a Privacy Impact Assessment for all information systems that...
NASA Astrophysics Data System (ADS)
Romero, Natalia; Markopoulos, Panos
By their very nature, awareness systems bring about an increase in the level of communication between the individuals they connect. Sharing information regarding people’s whereabouts and activities raises privacy concerns, potentially compromising their ability to control who receives what information about them, in what form and at what times. Such privacy concerns can be more pronounced in cases where such information is captured and disclosed automatically, which can lead to unintentional and undesirable disclosure of information (Belloti and Sellen, 1993; Markopoulos, 2005).
Forum Guide to the Privacy of Student Information: A Resource for Schools
ERIC Educational Resources Information Center
National Center for Education Statistics, 2006
2006-01-01
The Forum Guide to the Privacy of Student Information: A Resource for Schools was written to help school and local education agency staff better understand and apply The Family Educational Rights and Privacy Act (FERPA), a federal law that protects privacy interests of parents and students in student education records. The Forum has developed…
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Social security numbers of... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.224-70 Social security numbers of consultants and... provision in all solicitations. Social Security Numbers of Consultants and Certain Sole Proprietors and...
Educators' Responsibilities for Student Records. A Model Policy and Rules (Revised).
ERIC Educational Resources Information Center
Bartlett, Larry D.; And Others
To assist Iowa school boards and administrators in handling student records, this revision of a 1976 publication presents model policies and rules for compliance with the federal Family Educational Rights and Privacy Act of 1974 and the Education for All Handicapped Children Act. Included in this guide are a model statement of school board policy…
Sankar, Pamela
2003-01-01
During the past 10 years, the number of genetic tests performed more than tripled, and public concern about genetic privacy emerged. The majority of states and the U.S. government have passed regulations protecting genetic information. However, research has shown that concerns about genetic privacy are disproportionate to known instances of information misuse. Beliefs in genetic determinacy explain some of the heightened concern about genetic privacy. Discussion of the debate over genetic testing within families illustrates the most recent response to genetic privacy concerns.
Overview of Privacy in Social Networking Sites (SNS)
NASA Astrophysics Data System (ADS)
Powale, Pallavi I.; Bhutkar, Ganesh D.
2013-07-01
Social Networking Sites (SNS) have become an integral part of communication and life style of people in today's world. Because of the wide range of services offered by SNSs mostly for free of cost, these sites are attracting the attention of all possible Internet users. Most importantly, users from all age groups have become members of SNSs. Since many of the users are not aware of the data thefts associated with information sharing, they freely share their personal information with SNSs. Therefore, SNSs may be used for investigating users' character and social habits by familiar or even unknown persons and agencies. Such commercial and social scenario, has led to number of privacy and security threats. Though, all major issues in SNSs need to be addressed, by SNS providers, privacy of SNS users is the most crucial. And therefore, in this paper, we have focused our discussion on "privacy in SNSs". We have discussed different ways of Personally Identifiable Information (PII) leakages from SNSs, information revelation to third-party domains without user consent and privacy related threats associated with such information sharing. We expect that this comprehensive overview on privacy in SNSs will definitely help in raising user awareness about sharing data and managing their privacy with SNSs. It will also help SNS providers to rethink about their privacy policies.
Liyanage, H; Liaw, S-T; Di Iorio, C T; Kuziemsky, C; Schreiber, R; Terry, A L; de Lusignan, S
2016-11-10
Privacy, ethics, and data access issues pose significant challenges to the timely delivery of health research. Whilst the fundamental drivers to ensure that data access is ethical and satisfies privacy requirements are similar, they are often dealt with in varying ways by different approval processes. To achieve a consensus across an international panel of health care and informatics professionals on an integrated set of privacy and ethics principles that could accelerate health data access in data-driven health research projects. A three-round consensus development process was used. In round one, we developed a baseline framework for privacy, ethics, and data access based on a review of existing literature in the health, informatics, and policy domains. This was further developed using a two-round Delphi consensus building process involving 20 experts who were members of the International Medical Informatics Association (IMIA) and European Federation of Medical Informatics (EFMI) Primary Health Care Informatics Working Groups. To achieve consensus we required an extended Delphi process. The first round involved feedback on and development of the baseline framework. This consisted of four components: (1) ethical principles, (2) ethical guidance questions, (3) privacy and data access principles, and (4) privacy and data access guidance questions. Round two developed consensus in key areas of the revised framework, allowing the building of a newly, more detailed and descriptive framework. In the final round panel experts expressed their opinions, either as agreements or disagreements, on the ethics and privacy statements of the framework finding some of the previous round disagreements to be surprising in view of established ethical principles. This study develops a framework for an integrated approach to ethics and privacy. Privacy breech risk should not be considered in isolation but instead balanced by potential ethical benefit.
Noonan, Vanessa K; Thorogood, Nancy P; Joshi, Phalgun B; Fehlings, Michael G; Craven, B Catharine; Linassi, Gary; Fourney, Daryl R; Kwon, Brian K; Bailey, Christopher S; Tsai, Eve C; Drew, Brian M; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F
2013-05-01
Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. Copyright © 2013 Longwoods Publishing.
Noonan, Vanessa K.; Thorogood, Nancy P.; Joshi, Phalgun B.; Fehlings, Michael G.; Craven, B. Catharine; Linassi, Gary; Fourney, Daryl R.; Kwon, Brian K.; Bailey, Christopher S.; Tsai, Eve C.; Drew, Brian M.; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F.
2013-01-01
Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. PMID:23968640
Privacy and occupational health services
Heikkinen, A; Launis, V; Wainwright, P; Leino‐Kilpi, H
2006-01-01
Privacy is a key ethical principle in occupational health services. Its importance is emphasised in several laws, in ethical codes of conduct as well as in the literature, yet there is only very limited empirical research on privacy in the occupational health context. Conceptual questions on privacy in the occupational health context are discussed. The baseline assumption is that, in this context, privacy cannot be approached and examined only from the employee's (an individual) vantage point but the employer's (a group) point of view must also be taken into account, and that the concept has several dimensions (physical, social, informational and psychological). Even though privacy is a basic human need, there is no universally accepted definition of the concept and no consensus on whether an organisation can have privacy in the same way as people do. Many of the challenges surrounding privacy in the context of occupational health seem to be associated with the dual loyalties of occupational health professionals towards the employee and employer and with their simultaneous duties of disseminating and protecting information (informational privacy). Privacy is thus not an absolute value, but more research is needed to understand its multidimensional nature in the context of occupational health. PMID:16943333
A Federal Right of Information Privacy: The Need for Reform. Number 4.
ERIC Educational Resources Information Center
Berman, Jerry; Goldman, Janlori
Because a right of information privacy is not firmly imbedded in constitutional case law, advocates of the concept that citizens have the right to control personal information held by others turned to Congress. Enacted to regulate the government's use of personal information, the Privacy Act of 1974 has failed to work in the way intended. Shortly…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-06
... Ellen Callahan, Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC... (703-235- 0780), Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC... Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245...
16 CFR 313.4 - Initial privacy notice to consumers required.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...
16 CFR 313.5 - Annual privacy notice to customers required.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...
16 CFR 313.5 - Annual privacy notice to customers required.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...
17 CFR 160.4 - Initial privacy notice to consumers required.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Initial privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...
17 CFR 160.5 - Annual privacy notice to customers required.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Annual privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...
16 CFR 313.5 - Annual privacy notice to customers required.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...
16 CFR 313.4 - Initial privacy notice to consumers required.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...
16 CFR 313.4 - Initial privacy notice to consumers required.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...
An examination of electronic health information privacy in older adults.
Le, Thai; Thompson, Hilaire; Demiris, George
2013-01-01
Older adults are the quickest growing demographic group and are key consumers of health services. As the United States health system transitions to electronic health records, it is important to understand older adult perceptions of privacy and security. We performed a secondary analysis of the Health Information National Trends Survey (2012, Cycle 1), to examine differences in perceptions of electronic health information privacy between older adults and the general population. We found differences in the level of importance placed on access to electronic health information (older adults placed greater emphasis on provider as opposed to personal access) and tendency to withhold information out of concerns for privacy and security (older adults were less likely to withhold information). We provide recommendations to alleviate some of these privacy concerns. This may facilitate greater use of electronic health communication between patient and provider, while promoting shared decision making.
32 CFR 324.14 - Relationship between the Privacy Act and the Freedom of Information Act.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 2 2010-07-01 2010-07-01 false Relationship between the Privacy Act and the Freedom of Information Act. 324.14 Section 324.14 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DFAS PRIVACY ACT PROGRAM Individual Access to Records § 324.14 Relationship between the...
28 CFR 16.93 - Exemption of Tax Division Systems-limited access.
Code of Federal Regulations, 2010 CFR
2010-07-01
... MATERIAL OR INFORMATION Exemption of Records Systems Under the Privacy Act § 16.93 Exemption of Tax... necessary to protect the privacy and physical safety of witnesses and informants. (9)(e)(5). In the... information. Such exemption is further necessary to protect the privacy and physical safety of witnesses and...
42 CFR 600.350 - Privacy and security of information.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 42 Public Health 5 2014-10-01 2014-10-01 false Privacy and security of information. 600.350 Section 600.350 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN... (Eff. 1-1-15) Eligibility and Enrollment § 600.350 Privacy and security of information. The State must...
10 CFR 9.23 - Requests for records.
Code of Federal Regulations, 2010 CFR
2010-01-01
....S.C. 552(a)(3) to the Freedom of Information Act and Privacy Act Officer by an appropriate method... received until the date it is actually received by the Freedom of Information Act and Privacy Act Officer... the Freedom of Information Act and Privacy Act Officer receives the request. A request does not cover...
Just in Time Research: Privacy Practices
ERIC Educational Resources Information Center
Grama, Joanna Lyn
2014-01-01
The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…
75 FR 39920 - Announcing a Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-13
... will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L. 100... Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB) will meet Wednesday, August...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-26
... for confidentiality with this collection of information. Privacy Impact Assessment: No impact(s... is no need for confidentiality with this collection of information. Privacy Impact Assessment: No.... Privacy Impact Assessment: No impact(s). Needs and Uses: On January 28, 2010, the Commission adopted a...
Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C
2008-11-06
As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.
Biobank research and the right to privacy.
Ursin, Lars Oystein
2008-01-01
What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants in biobank research might have to privacy, it is argued that their interests should be related to the specific context of the provision and reception of health care that participation in biobank research is connected with. Rather than just granting participants an exclusive right to or ownership of their health information, which must be waived in order to make biobank research possible, the privacy aspect of health information should be viewed in light of the moral rights and duties that accompany any involvement in a research based system of health services.
NASA Astrophysics Data System (ADS)
Aldeen Yousra, S.; Mazleena, Salleh
2018-05-01
Recent advancement in Information and Communication Technologies (ICT) demanded much of cloud services to sharing users’ private data. Data from various organizations are the vital information source for analysis and research. Generally, this sensitive or private data information involves medical, census, voter registration, social network, and customer services. Primary concern of cloud service providers in data publishing is to hide the sensitive information of individuals. One of the cloud services that fulfill the confidentiality concerns is Privacy Preserving Data Mining (PPDM). The PPDM service in Cloud Computing (CC) enables data publishing with minimized distortion and absolute privacy. In this method, datasets are anonymized via generalization to accomplish the privacy requirements. However, the well-known privacy preserving data mining technique called K-anonymity suffers from several limitations. To surmount those shortcomings, I propose a new heuristic anonymization framework for preserving the privacy of sensitive datasets when publishing on cloud. The advantages of K-anonymity, L-diversity and (α, k)-anonymity methods for efficient information utilization and privacy protection are emphasized. Experimental results revealed the superiority and outperformance of the developed technique than K-anonymity, L-diversity, and (α, k)-anonymity measure.
Ben Said, Mohamed; Robel, Laurence; Messiaen, Claude; Craus, Yann; Jais, Jean Philippe; Golse, Bernard; Landais, Paul
2014-01-01
Patients explicit and unambiguous information, patients consents and privacy protection are reviewed in this article, in the frame of the deployment of the information system TEDIS dedicated to autism spectrum disorders. The role of the Delegate to the Protection of Data is essential at this stage. We developed a privacy protection scheme based on storing encrypted patients personal data on the server database and decrypting it on the Web browser. It tries to respond to the end-users request to manage nominative data in a human readable form and to meet with privacy protection framework.
Privacy and the National Information Infrastructure.
ERIC Educational Resources Information Center
Rotenberg, Marc
1994-01-01
Explains the work of Computer Professionals for Social Responsibility regarding privacy issues in the use of electronic networks; recommends principles that should be adopted for a National Information Infrastructure privacy code; discusses the need for public education; and suggests pertinent legislative proposals. (LRW)
ERIC Educational Resources Information Center
Lavagnino, Merri Beth
2013-01-01
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
16 CFR 313.2 - Model privacy form and examples.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...
12 CFR 332.8 - Revised privacy notices.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...
12 CFR 332.2 - Model privacy form and examples.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions...
12 CFR 216.2 - Model privacy form and examples.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...
13 CFR 102.36 - Privacy Act standards of conduct.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...
17 CFR 160.2 - Model privacy form and examples.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this...
16 CFR 313.2 - Model privacy form and examples.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...
12 CFR 332.2 - Model privacy form and examples.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions...
17 CFR 160.9 - Delivering privacy and opt out notices.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Delivering privacy and opt out... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out notices...
13 CFR 102.36 - Privacy Act standards of conduct.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...
12 CFR 216.2 - Model privacy form and examples.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...
12 CFR 332.8 - Revised privacy notices.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...
17 CFR 160.2 - Model privacy form and examples.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this...
16 CFR 313.2 - Model privacy form and examples.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...
12 CFR 216.2 - Model privacy form and examples.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...
13 CFR 102.36 - Privacy Act standards of conduct.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 13 Business Credit and Assistance 1 2014-01-01 2014-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...
17 CFR 160.2 - Model privacy form and examples.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...
16 CFR 313.2 - Model privacy form and examples.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...
16 CFR 313.9 - Delivering privacy and opt out notices.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Delivering privacy and opt out notices. 313... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out...
12 CFR 332.2 - Model privacy form and examples.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions...
12 CFR 332.8 - Revised privacy notices.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...
13 CFR 102.36 - Privacy Act standards of conduct.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 13 Business Credit and Assistance 1 2013-01-01 2013-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...
17 CFR 160.2 - Model privacy form and examples.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Model privacy form and... (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...
12 CFR 332.2 - Model privacy form and examples.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions...
12 CFR 216.2 - Model privacy form and examples.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...
12 CFR 332.8 - Revised privacy notices.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...
13 CFR 102.36 - Privacy Act standards of conduct.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...
12 CFR 216.2 - Model privacy form and examples.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...
17 CFR 160.2 - Model privacy form and examples.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...
16 CFR 313.2 - Model privacy form and examples.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...
12 CFR 332.8 - Revised privacy notices.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...
12 CFR 332.2 - Model privacy form and examples.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions...
12 CFR 716.5 - Annual privacy notice to members required.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Annual privacy notice to members required. 716... UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.5 Annual privacy... members that accurately reflects your privacy policies and practices not less than annually during the...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Denials of Freedom of Information and Privacy Act Requests Appendix to Subpart H Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE Antitrust Division Pt. 0, Subpt. H, App. Appendix to Subpart H—Delegation of Authority Respecting Denials of Freedom of Information and Privacy Act...
Hacking Facebook Privacy and Security
2012-08-28
that their information is somehow protected. However, practically this is not always the case and privacy on social networking sites has received...fraudsters target Facebook and other social networking sites to harvest information about you. Here’s how we recommend you set your Facebook privacy
Privacy and human behavior in the age of information.
Acquisti, Alessandro; Brandimarte, Laura; Loewenstein, George
2015-01-30
This Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and behavioral sciences: people's uncertainty about the consequences of privacy-related behaviors and their own preferences over those consequences; the context-dependence of people's concern, or lack thereof, about privacy; and the degree to which privacy concerns are malleable—manipulable by commercial and governmental interests. Organizing our discussion by these themes, we offer observations concerning the role of public policy in the protection of privacy in the information age. Copyright © 2015, American Association for the Advancement of Science.
Digital Privacy: Toward a New Politics and Discursive Practice.
ERIC Educational Resources Information Center
Doty, Philip
2001-01-01
Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-23
... Commercial Space Transportation Notice of Intent To Publish Current and Future Launch, Site, and Reentry...\\ beginning on October 24, 2011. The FAA will not publish license or permit applications or evaluations. The... Privacy Act Statement can be found in the Federal Register published on April 11, 2000 (65 FR 19477-19478...
2008-03-01
Zoufal Colonel, United States Army Reserve B.A., University of Illinois, 1978 M.A.P.A., University of Illinois, 1980 J.D., University of Illinois...9 6. Case Studies of the United Kingdom, France, and Germany........11 7. The Chicago Experience...E. PROBLEM STATEMENT ...........................................................................14 1. The Rise of CCTV Surveillance in the United
Code of Federal Regulations, 2014 CFR
2014-07-01
... penalty of perjury that the foregoing is true and correct. Signature Date Privacy Act Statement: The... 1001). I declare under penalty of perjury that the foregoing is true and correct. Signature Date.... DOCUMENTATION: I. One Document as Evidence of the Deceased Eligible Individual's Death 1. A certified copy or...
Code of Federal Regulations, 2013 CFR
2013-07-01
... penalty of perjury that the foregoing is true and correct. Signature Date Privacy Act Statement: The... 1001). I declare under penalty of perjury that the foregoing is true and correct. Signature Date.... DOCUMENTATION: I. One Document as Evidence of the Deceased Eligible Individual's Death 1. A certified copy or...
Code of Federal Regulations, 2011 CFR
2011-07-01
... penalty of perjury that the foregoing is true and correct. Signature Date Privacy Act Statement: The... 1001). I declare under penalty of perjury that the foregoing is true and correct. Signature Date.... DOCUMENTATION: I. One Document as Evidence of the Deceased Eligible Individual's Death 1. A certified copy or...
Code of Federal Regulations, 2012 CFR
2012-07-01
... penalty of perjury that the foregoing is true and correct. Signature Date Privacy Act Statement: The... 1001). I declare under penalty of perjury that the foregoing is true and correct. Signature Date.... DOCUMENTATION: I. One Document as Evidence of the Deceased Eligible Individual's Death 1. A certified copy or...
Secure message authentication system for node to node network
NASA Astrophysics Data System (ADS)
Sindhu, R.; Vanitha, M. M.; Norman, J.
2017-10-01
The Message verification remains some of the best actual methods for prevent the illegal and dis honored communication after presence progressed to WSNs (Wireless Sensor Networks). Intend for this purpose, several message verification systems must stand established, created on both symmetric key cryptography otherwise public key cryptosystems. Best of them will have some limits for great computational then statement above in count of deficiency of climb ability then flexibility in node settlement occurrence. In a polynomial based system was newly presented for these problems. Though, this system then situations delay will must the dimness of integral limitation firm in the point of polynomial: once the amount of message transferred remains the greater than the limitation then the opponent will completely improve the polynomial approaches. This paper suggests using ECC (Elliptic Curve Cryptography). Though using the node verification the technique in this paper permits some nodes to transfer a limitless amount of messages lacking misery in the limit problem. This system will have the message cause secrecy. Equally theoretic study then model effects show our planned system will be effective than the polynomial based method in positions of calculation then statement above in privacy points though message basis privacy.
Ethical considerations in internet use of electronic protected health information.
Polito, Jacquelyn M
2012-03-01
Caregivers, patients, and their family members are increasingly reliant on social network websites for storing, communicating, and referencing medical information. The Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule seeks balance by protecting the privacy of patients' health information and assuring that this information is available to those who need it to provide health care. Though federal and state governments have created laws and policies to safeguard patient privacy and confidentiality, the laws are inadequate against the rapid and innovative use of electronic health websites. As Internet use broadens access to information, health professionals must be aware that this information is not always secure. We must identify and reflect on medical ethics issues and be accountable for maintaining privacy for the patient.
Klonoff, David C; Price, W Nicholson
2017-03-01
Privacy is an important concern for the Precision Medicine Initiative (PMI) because success of this initiative will require the public to be willing to participate by contributing large amounts of genetic/genomic information and sensor data. This sensitive personal information is intended to be used only for specified research purposes. Public willingness to participate will depend on the public's level of trust that their information will be protected and kept private. Medical devices may constantly provide information. Therefore, assuring privacy for device-generated information may be essential for broad participation in the PMI. Privacy standards for devices should be an important early step in the development of the PMI.
12 CFR 716.2 - Model privacy form and examples.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendixA of this part, consistent with the instructions in appendixA...
12 CFR 332.9 - Delivering privacy and opt out notices.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Delivering privacy and opt out notices. 332.9... GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out...
12 CFR 716.2 - Model privacy form and examples.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in Appendix...
12 CFR 716.2 - Model privacy form and examples.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in Appendix...
12 CFR 216.9 - Delivering privacy and opt out notices.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Delivering privacy and opt out notices. 216.9... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out...
12 CFR 716.2 - Model privacy form and examples.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in Appendix...
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on Government Reform and Oversight.
This report explains how to use the Freedom of Information Act (FOIA) and the Privacy Act of 1974. It reflects all changes to the laws made since 1977: major amendments to the Freedom of Information Act passed in 1974 and 1986; a major addition to the Privacy Act of 1974 was enacted in 1988; and minor amendments to the Privacy Act were made in…
Blood rights: the body and information privacy.
Alston, Bruce
2005-05-01
Genetic and other medical technology makes blood, human tissue and other bodily samples an immediate and accessible source of comprehensive personal and health information about individuals. Yet, unlike medical records, bodily samples are not subject to effective privacy protection or other regulation to ensure that individuals have rights to control the collection, use and transfer of such samples. This article examines the existing coverage of privacy legislation, arguments in favour of baseline protection for bodily samples as sources of information and possible approaches to new regulation protecting individual privacy rights in bodily samples.
Lessons learned from a privacy breach at an academic health science centre.
Malonda, Jacqueline; Campbell, Janice; Crivianu-Gaita, Daniela; Freedman, Melvin H; Stevens, Polly; Laxer, Ronald M
2009-01-01
In 2007, the Hospital for Sick Children experienced a serious privacy breach when a laptop computer containing the personal health information of approximately 3,000 patients and research subjects was stolen from a physician-researcher's vehicle. This incident was reported to the information and privacy commissioner of Ontario (IPC). The IPC issued an order that required the hospital to examine and revise its policies, practices and research protocols related to the protection of personal health information and to educate staff on privacy-related matters.
Privacy and confidentiality in pragmatic clinical trials.
McGraw, Deven; Greene, Sarah M; Miner, Caroline S; Staman, Karen L; Welch, Mary Jane; Rubel, Alan
2015-10-01
With pragmatic clinical trials, an opportunity exists to answer important questions about the relative risks, burdens, and benefits of therapeutic interventions. However, concerns about protecting the privacy of this information are significant and must be balanced with the imperative to learn from the data gathered in routine clinical practice. Traditional privacy protections for research uses of identifiable information rely disproportionately on informed consent or authorizations, based on a presumption that this is necessary to fulfill ethical principles of respect for persons. But frequently, the ideal of informed consent is not realized in its implementation. Moreover, the principle of respect for persons—which encompasses their interests in health information privacy—can be honored through other mechanisms. Data anonymization also plays a role in protecting privacy but is not suitable for all research, particularly pragmatic clinical trials. In this article, we explore both the ethical foundation and regulatory framework intended to protect privacy in pragmatic clinical trials. We then review examples of novel approaches to respecting persons in research that may have the added benefit of honoring patient privacy considerations. © The Author(s) 2015.
Code of Federal Regulations, 2010 CFR
2010-07-01
... information; benefit data or claims information; the Social Security number, employer identification number... ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.2 Definitions. For purposes of this subpart, the following terms...
32 CFR 806b.7 - Responsibilities.
Code of Federal Regulations, 2014 CFR
2014-07-01
...) Review and provide final approval on Privacy Impact Assessments (see appendix E of this part). (2) Send a copy of approved Privacy Impact Assessments to Air Force Chief Information Officer/P. (i) Major Command.... (7) Review and provide recommendations on completed Privacy Impact Assessments for information...
32 CFR 806b.7 - Responsibilities.
Code of Federal Regulations, 2013 CFR
2013-07-01
...) Review and provide final approval on Privacy Impact Assessments (see appendix E of this part). (2) Send a copy of approved Privacy Impact Assessments to Air Force Chief Information Officer/P. (i) Major Command.... (7) Review and provide recommendations on completed Privacy Impact Assessments for information...
32 CFR 806b.7 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
...) Review and provide final approval on Privacy Impact Assessments (see appendix E of this part). (2) Send a copy of approved Privacy Impact Assessments to Air Force Chief Information Officer/P. (i) Major Command.... (7) Review and provide recommendations on completed Privacy Impact Assessments for information...
32 CFR 806b.7 - Responsibilities.
Code of Federal Regulations, 2012 CFR
2012-07-01
...) Review and provide final approval on Privacy Impact Assessments (see appendix E of this part). (2) Send a copy of approved Privacy Impact Assessments to Air Force Chief Information Officer/P. (i) Major Command.... (7) Review and provide recommendations on completed Privacy Impact Assessments for information...
78 FR 41918 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-12
... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate.... SUMMARY: The Defense Finance and Accounting Service proposes to alter a system of records, T7905, entitled...: Mr. Gregory L. Outlaw, Defense Finance and Accounting Service, Freedom of Information/Privacy Act...
32 CFR 310.6 - Responsibilities.
Code of Federal Regulations, 2014 CFR
2014-07-01
...) Assess the impact of technology on the privacy of personal information and, when feasible, adopt privacy-enhancing technology both to preserve and protect personal information contained in Component systems of... Privacy Program support for DoD Field Activities. (c) The General Counsel of the Department of Defense...
32 CFR 310.6 - Responsibilities.
Code of Federal Regulations, 2012 CFR
2012-07-01
...) Assess the impact of technology on the privacy of personal information and, when feasible, adopt privacy-enhancing technology both to preserve and protect personal information contained in Component systems of... Privacy Program support for DoD Field Activities. (c) The General Counsel of the Department of Defense...
32 CFR 310.6 - Responsibilities.
Code of Federal Regulations, 2013 CFR
2013-07-01
...) Assess the impact of technology on the privacy of personal information and, when feasible, adopt privacy-enhancing technology both to preserve and protect personal information contained in Component systems of... Privacy Program support for DoD Field Activities. (c) The General Counsel of the Department of Defense...
32 CFR 310.6 - Responsibilities.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Assess the impact of technology on the privacy of personal information and, when feasible, adopt privacy-enhancing technology both to preserve and protect personal information contained in Component systems of... Privacy Program support for DoD Field Activities. (c) The General Counsel of the Department of Defense...
32 CFR 310.6 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
...) Assess the impact of technology on the privacy of personal information and, when feasible, adopt privacy-enhancing technology both to preserve and protect personal information contained in Component systems of... Privacy Program support for DoD Field Activities. (c) The General Counsel of the Department of Defense...
Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.
Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping
2014-11-01
Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.
34 CFR 5.71 - Protection of personal privacy and proprietary information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 34 Education 1 2010-07-01 2010-07-01 false Protection of personal privacy and proprietary information. 5.71 Section 5.71 Education Office of the Secretary, Department of Education AVAILABILITY OF INFORMATION TO THE PUBLIC PURSUANT TO PUB. L. 90-23 (Eff. until 7-14-10) Availability of Specific Records § 5.71 Protection of personal privacy and...
Third-year medical students' knowledge of privacy and security issues concerning mobile devices.
Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M
2012-01-01
The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.
Nurses' and patients' perceptions of privacy protection behaviours and information provision.
Kim, Kyunghee; Han, Yonghee; Kim, Ji-Su
2017-08-01
With increased attention to patient privacy and autonomy, privacy protection and information provision for patients are becoming increasingly important. The aim of this study was to identify and analyse nurses' and patients' perceptions of the importance and performance of protecting patients' privacy and providing them with relevant information. This study is a descriptive cross-sectional investigation. Participants and research context: Participants were 168 patients hospitalised in medical and surgical wards and 176 nurses who cared for them. Ethical consideration: This study was approved by the Chung-Ang University Bioethics Committee, and informed written consent was collected from all participants. Nurses' recognition of the importance of protecting patients' privacy and providing adequate information was higher compared to their actual performance, and the nurses' level of performance was higher in comparison with the patients' recognition of its importance. Although a holistic approach to patient privacy protection and information provision is needed, the medical field has not embraced this model of care. These findings provide empirical data to create an ethical environment for the future, as considerable attention has been devoted to patients' rights and medical institutions' liability for providing explanations to patients.
Dehling, Tobias; Gao, Fangjian; Schneider, Stephan
2015-01-01
Background Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. Objective The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. Methods We assessed apps available in English and offered in the categories “Medical” and “Health & Fitness” in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. Results We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose at least some potential damage through information security and privacy infringements. There were 11.67% (2098/17,979) of apps that scored the highest assessments of potential damages. Conclusions Various kinds of mHealth apps collect and offer critical, sensitive, private medical information, calling for a special focus on information security and privacy of mHealth apps. In order to foster user acceptance and trust, appropriate security measures and processes need to be devised and employed so that users can benefit from seamlessly accessible, tailored mHealth apps without exposing themselves to the serious repercussions of information security and privacy infringements. PMID:25599627
Dehling, Tobias; Gao, Fangjian; Schneider, Stephan; Sunyaev, Ali
2015-01-19
Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. We assessed apps available in English and offered in the categories "Medical" and "Health & Fitness" in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose at least some potential damage through information security and privacy infringements. There were 11.67% (2098/17,979) of apps that scored the highest assessments of potential damages. Various kinds of mHealth apps collect and offer critical, sensitive, private medical information, calling for a special focus on information security and privacy of mHealth apps. In order to foster user acceptance and trust, appropriate security measures and processes need to be devised and employed so that users can benefit from seamlessly accessible, tailored mHealth apps without exposing themselves to the serious repercussions of information security and privacy infringements.
17 CFR 200.301 - Purpose and scope.
Code of Federal Regulations, 2011 CFR
2011-04-01
...; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Privacy of Individuals and Systems of Records Maintained by the Commission § 200.301 Purpose and scope. (a) The Privacy Act of 1974... the privacy of individuals identified in information systems maintained by Federal agencies, it is...
17 CFR 200.301 - Purpose and scope.
Code of Federal Regulations, 2010 CFR
2010-04-01
...; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Privacy of Individuals and Systems of Records Maintained by the Commission § 200.301 Purpose and scope. (a) The Privacy Act of 1974... the privacy of individuals identified in information systems maintained by Federal agencies, it is...
Code of Federal Regulations, 2010 CFR
2010-07-01
... UNDER THE PRIVACY ACT OF 1974 General § 1801.2 Definitions. For purposes of this part, the following... acting through the NACIC Information and Privacy Coordinator; Days means calendar days when NACIC is...; Coordinator means the NACIC Information and Privacy Coordinator who serves as the NACIC manager of the...
45 CFR 164.534 - Compliance dates for initial implementation of the privacy standards.
Code of Federal Regulations, 2010 CFR
2010-10-01
... privacy standards. 164.534 Section 164.534 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.534 Compliance dates for initial implementation of the privacy standards. (a...
45 CFR 164.534 - Compliance dates for initial implementation of the privacy standards.
Code of Federal Regulations, 2014 CFR
2014-10-01
... privacy standards. 164.534 Section 164.534 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.534 Compliance dates for initial implementation of the privacy standards. (a...
45 CFR 164.534 - Compliance dates for initial implementation of the privacy standards.
Code of Federal Regulations, 2011 CFR
2011-10-01
... privacy standards. 164.534 Section 164.534 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.534 Compliance dates for initial implementation of the privacy standards. (a...
12 CFR 1016.8 - Revised privacy notices.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...
17 CFR 160.8 - Revised privacy notices.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule. Except...
12 CFR 716.8 - Revised privacy notices.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...
4 CFR 200.13 - Privacy Act training.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 4 Accounts 1 2014-01-01 2013-01-01 true Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...
12 CFR 216.8 - Revised privacy notices.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...
12 CFR 1016.8 - Revised privacy notices.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...
4 CFR 200.13 - Privacy Act training.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 4 Accounts 1 2012-01-01 2012-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...
10 CFR 1304.113 - Privacy Act training.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...
10 CFR 1304.113 - Privacy Act training.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...
4 CFR 200.13 - Privacy Act training.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 4 Accounts 1 2013-01-01 2013-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...
16 CFR 313.8 - Revised privacy notices.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...
4 CFR 200.13 - Privacy Act training.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 4 Accounts 1 2011-01-01 2011-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...
12 CFR 216.8 - Revised privacy notices.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...
16 CFR 313.8 - Revised privacy notices.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...
12 CFR 216.8 - Revised privacy notices.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...
10 CFR 1304.113 - Privacy Act training.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...
12 CFR 716.8 - Revised privacy notices.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...
16 CFR 313.8 - Revised privacy notices.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...
10 CFR 1304.113 - Privacy Act training.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...
16 CFR 313.8 - Revised privacy notices.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...
12 CFR 1016.8 - Revised privacy notices.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...
12 CFR 716.8 - Revised privacy notices.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...
12 CFR 216.8 - Revised privacy notices.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...
12 CFR 716.8 - Revised privacy notices.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...
12 CFR 716.4 - Initial privacy notice to consumers required.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Initial privacy notice to consumers required... CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear and...
10 CFR 1304.113 - Privacy Act training.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...
17 CFR 160.8 - Revised privacy notices.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule. Except...
12 CFR 216.8 - Revised privacy notices.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...
16 CFR 313.8 - Revised privacy notices.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...
4 CFR 200.13 - Privacy Act training.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...
Perspectives on Privacy and Terrorism: All Is not Lost--Yet.
ERIC Educational Resources Information Center
Gellman, Robert
2002-01-01
Discusses implications of the U.S.A. Patriot Act, antiterrorism legislation that was passed after the September 11 attacks, regarding privacy issues. Highlights include information privacy; privacy and government, including increases in the surveillance powers of government; privacy and the private sector; and future possibilities. (Author/LRW)
A Privacy Preservation Model for Health-Related Social Networking Sites.
Li, Jingquan
2015-07-08
The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS.
A Privacy Preservation Model for Health-Related Social Networking Sites
2015-01-01
The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953
Private content identification based on soft fingerprinting
NASA Astrophysics Data System (ADS)
Voloshynovskiy, Sviatoslav; Holotyak, Taras; Koval, Oleksiy; Beekhof, Fokko; Farhadzadeh, Farzad
2011-02-01
In many problems such as biometrics, multimedia search, retrieval, recommendation systems requiring privacypreserving similarity computations and identification, some binary features are stored in the public domain or outsourced to third parties that might raise certain privacy concerns about the original data. To avoid this privacy leak, privacy protection is used. In most cases, privacy protection is uniformly applied to all binary features resulting in data degradation and corresponding loss of performance. To avoid this undesirable effect we propose a new privacy amplification technique that is based on data hiding principles and benefits from side information about bit reliability a.k.a. soft fingerprinting. In this paper, we investigate the identification-rate vs privacy-leak trade-off. The analysis is performed for the case of a perfect match between side information shared between the encoder and decoder as well as for the case of partial side information.
Klonoff, David C.; Price, W. Nicholson
2017-01-01
Privacy is an important concern for the Precision Medicine Initiative (PMI) because success of this initiative will require the public to be willing to participate by contributing large amounts of genetic/genomic information and sensor data. This sensitive personal information is intended to be used only for specified research purposes. Public willingness to participate will depend on the public’s level of trust that their information will be protected and kept private. Medical devices may constantly provide information. Therefore, assuring privacy for device-generated information may be essential for broad participation in the PMI. Privacy standards for devices should be an important early step in the development of the PMI. PMID:27920271
The Structures of Centralized Governmental Privacy Protection: Approaches, Models, and Analysis.
ERIC Educational Resources Information Center
Jaeger, Paul T.; McClure, Charles R.; Fraser, Bruce T.
2002-01-01
Asserts that the federal government should adopt a centralized governmental structure for the privacy protection of personal information and data. Discusses the roles of federal law, federal agencies, and the judiciary; the concept of information privacy; the impact of current technologies; and models of centralized government structures for…
76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-17
....C. 2473 (2003); Federal Records Act, 44 U.S.C. 3101 (2003); Chief Financial Officers Act of 1990 205.... ADDRESSES: Patti F. Stockman, Privacy Act Officer, Office of the Chief Information Officer, National... Information Officer. NASA 10CFMR SYSTEM NAME: Core Financial Management Records. SECURITY CLASSIFICATION: This...
A Practitioner's Response to the New Health Privacy Regulations
ERIC Educational Resources Information Center
Yang, Julia A.; Kombarakaran, Francis A.
2006-01-01
The established professional practice requiring informed consent for the disclosure of personal health information with its implied right to privacy suffered a serious setback with the first federal privacy initiative of the Bush administration. The new Health Insurance Portability and Accountability Act (HIPAA) of 1996 (P.L. 104-191) privacy…
12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.
Code of Federal Regulations, 2014 CFR
2014-01-01
... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR...
12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.
Code of Federal Regulations, 2012 CFR
2012-01-01
... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR...
12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.
Code of Federal Regulations, 2013 CFR
2013-01-01
... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR...
12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.
Code of Federal Regulations, 2011 CFR
2011-01-01
... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR...
75 FR 32372 - Information Privacy and Innovation in the Internet Economy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-08
... initiative designed to gather public input and review the nexus between privacy policy and innovation in the... Internet. \\1\\ Commerce Secretary Locke Announces Public Review of Privacy Policy and Innovation in the... flexibility needed to foster innovation in the information economy; (2) the public confidence necessary for...
Code of Federal Regulations, 2010 CFR
2010-07-01
... PRIVACY ACT OF 1974 General § 1901.02 Definitions. For purposes of this part, the following terms have the... the CIA Information and Privacy Coordinator; (b) Days means calendar days when the Agency is operating...) Coordinator means the CIA Information and Privacy Coordinator who serves as the Agency manager of the...
13 CFR 102.21 - Agency employees responsible for the Privacy Act of 1974.
Code of Federal Regulations, 2011 CFR
2011-01-01
... systems of records in that office. (c) Senior Agency Official for Privacy is SBA's Chief Information Officer (CIO) who has overall responsibility and accountability for ensuring the SBA's implementation of...) Chief, Freedom of Information/Privacy Acts (FOI/PA) Office oversees and implements the record access...
13 CFR 102.21 - Agency employees responsible for the Privacy Act of 1974.
Code of Federal Regulations, 2014 CFR
2014-01-01
... systems of records in that office. (c) Senior Agency Official for Privacy is SBA's Chief Information Officer (CIO) who has overall responsibility and accountability for ensuring the SBA's implementation of...) Chief, Freedom of Information/Privacy Acts (FOI/PA) Office oversees and implements the record access...
13 CFR 102.21 - Agency employees responsible for the Privacy Act of 1974.
Code of Federal Regulations, 2013 CFR
2013-01-01
... systems of records in that office. (c) Senior Agency Official for Privacy is SBA's Chief Information Officer (CIO) who has overall responsibility and accountability for ensuring the SBA's implementation of...) Chief, Freedom of Information/Privacy Acts (FOI/PA) Office oversees and implements the record access...
13 CFR 102.21 - Agency employees responsible for the Privacy Act of 1974.
Code of Federal Regulations, 2012 CFR
2012-01-01
... systems of records in that office. (c) Senior Agency Official for Privacy is SBA's Chief Information Officer (CIO) who has overall responsibility and accountability for ensuring the SBA's implementation of...) Chief, Freedom of Information/Privacy Acts (FOI/PA) Office oversees and implements the record access...
Technology, Privacy, and Electronic Freedom of Speech.
ERIC Educational Resources Information Center
McDonald, Frances M.
1986-01-01
Explores five issues related to technology's impact on privacy and access to information--regulation and licensing of the press, electronic surveillance, invasion of privacy, copyright, and policy-making and regulation. The importance of First Amendment rights and civil liberties in forming a coherent national information policy is stressed.…
Individual privacy in an information dependent society
DOE Office of Scientific and Technical Information (OSTI.GOV)
Clifford, B.P.
1994-12-31
The extraordinary technologies and capabilities of the Information Age have vastly improved communication, while allowing executives to have ultra-current information about their companies, subsidiaries, staff, clients, and practically any individual in the world. These advances, however, have stripped the individual of his privacy. Although invasions of privacy do not require a computer, computers have made it much easier to gather and select informatin, which means that it is also much easier to invade privacy. The increased value of information to policy makers leads them to covet information, even when acquiring it invades someone`s pricacy; not only do managers of privatemore » companies gather personal data, almost every citizen has files about him in Federal agencies and administrations.« less
Electronic consent channels: preserving patient privacy without handcuffing researchers.
Shelton, Robert H
2011-02-09
Advances in health information technology and electronic medical records have the tremendous potential to accelerate translational and clinical research. However, privacy concerns threaten to be a rate-limiting factor. By recognizing and responding to patient privacy concerns, policy-makers, researchers, and information technology leaders have the opportunity to transform trial recruitment and make it safer to electronically locate and convey sensitive health information.
Authentic Attributes with Fine-Grained Anonymity Protection
2000-01-01
accurate pro le information and protecting an individual’s privacy are ordinarily viewed as being at odds. This paper presents mech- anisms that protect...individual privacy while presenting accurate|indeed authenticated|pro le information to servers and merchants. In partic- ular, we give a pseudonym...demographic, psychographic, and behavioral information. Buyers are typically concerned about privacy . Users may even object to the distribution of
Patient Privacy in the Era of Big Data.
Kayaalp, Mehmet
2018-01-20
Privacy was defined as a fundamental human right in the Universal Declaration of Human Rights at the 1948 United Nations General Assembly. However, there is still no consensus on what constitutes privacy. In this review, we look at the evolution of privacy as a concept from the era of Hippocrates to the era of social media and big data. To appreciate the modern measures of patient privacy protection and correctly interpret the current regulatory framework in the United States, we need to analyze and understand the concepts of individually identifiable information, individually identifiable health information, protected health information, and de-identification. The Privacy Rule of the Health Insurance Portability and Accountability Act defines the regulatory framework and casts a balance between protective measures and access to health information for secondary (scientific) use. The rule defines the conditions when health information is protected by law and how protected health information can be de-identified for secondary use. With the advents of artificial intelligence and computational linguistics, computational text de-identification algorithms produce de-identified results nearly as well as those produced by human experts, but much faster, more consistently and basically for free. Modern clinical text de-identification systems now pave the road to big data and enable scientists to access de-identified clinical information while firmly protecting patient privacy. However, clinical text de-identification is not a perfect process. In order to maximize the protection of patient privacy and to free clinical and scientific information from the confines of electronic healthcare systems, all stakeholders, including patients, health institutions and institutional review boards, scientists and the scientific communities, as well as regulatory and law enforcement agencies must collaborate closely. On the one hand, public health laws and privacy regulations define rules and responsibilities such as requesting and granting only the amount of health information that is necessary for the scientific study. On the other hand, developers of de-identification systems provide guidelines to use different modes of operations to maximize the effectiveness of their tools and the success of de-identification. Institutions with clinical repositories need to follow these rules and guidelines closely to successfully protect patient privacy. To open the gates of big data to scientific communities, healthcare institutions need to be supported in their de-identification and data sharing efforts by the public, scientific communities, and local, state, and federal legislators and government agencies.
Patient Privacy in the Era of Big Data
Kayaalp, Mehmet
2018-01-01
Privacy was defined as a fundamental human right in the Universal Declaration of Human Rights at the 1948 United Nations General Assembly. However, there is still no consensus on what constitutes privacy. In this review, we look at the evolution of privacy as a concept from the era of Hippocrates to the era of social media and big data. To appreciate the modern measures of patient privacy protection and correctly interpret the current regulatory framework in the United States, we need to analyze and understand the concepts of individually identifiable information, individually identifiable health information, protected health information, and de-identification. The Privacy Rule of the Health Insurance Portability and Accountability Act defines the regulatory framework and casts a balance between protective measures and access to health information for secondary (scientific) use. The rule defines the conditions when health information is protected by law and how protected health information can be de-identified for secondary use. With the advents of artificial intelligence and computational linguistics, computational text de-identification algorithms produce de-identified results nearly as well as those produced by human experts, but much faster, more consistently and basically for free. Modern clinical text de-identification systems now pave the road to big data and enable scientists to access de-identified clinical information while firmly protecting patient privacy. However, clinical text de-identification is not a perfect process. In order to maximize the protection of patient privacy and to free clinical and scientific information from the confines of electronic healthcare systems, all stakeholders, including patients, health institutions and institutional review boards, scientists and the scientific communities, as well as regulatory and law enforcement agencies must collaborate closely. On the one hand, public health laws and privacy regulations define rules and responsibilities such as requesting and granting only the amount of health information that is necessary for the scientific study. On the other hand, developers of de-identification systems provide guidelines to use different modes of operations to maximize the effectiveness of their tools and the success of de-identification. Institutions with clinical repositories need to follow these rules and guidelines closely to successfully protect patient privacy. To open the gates of big data to scientific communities, healthcare institutions need to be supported in their de-identification and data sharing efforts by the public, scientific communities, and local, state, and federal legislators and government agencies. PMID:28903886
Povar, Gail J; Blumen, Helen; Daniel, John; Daub, Suzanne; Evans, Lois; Holm, Richard P; Levkovich, Natalie; McCarter, Alice O; Sabin, James; Snyder, Lois; Sulmasy, Daniel; Vaughan, Peter; Wellikson, Laurence D; Campbell, Amy
2004-07-20
Cost pressures and changes in the health care environment pose ethical challenges and hard choices for patients, physicians, policymakers, and society. In 2000 and 2001, the American College of Physicians, with the Harvard Pilgrim Health Care Ethics Program, convened a working group of stakeholders--patients, physicians, and managed care representatives, along with medical ethicists--to develop a statement of ethics for managed care. The group explored the impact of a changing health care environment on patient-physician relationships and how to best apply the principles of professionalism in this environment. The statement that emerged offers guidance on preserving the patient-clinician relationship, patient rights and responsibilities, confidentiality and privacy, resource allocation and stewardship, the obligation of health plans to foster an ethical environment for the delivery of care, and the clinician's responsibility to individual patients, the community, and the public health, among other issues.
Raisaro, Jean-Louis; McLaren, Paul J; Fellay, Jacques; Cavassini, Matthias; Klersy, Catherine; Hubaux, Jean-Pierre
2018-03-01
Protecting patient privacy is a major obstacle for the implementation of genomic-based medicine. Emerging privacy-enhancing technologies can become key enablers for managing sensitive genetic data. We studied physicians' attitude toward this kind of technology in order to derive insights that might foster their future adoption for clinical care. We conducted a questionnaire-based survey among 55 physicians of the Swiss HIV Cohort Study who tested the first implementation of a privacy-preserving model for delivering genomic test results. We evaluated their feedback on three different aspects of our model: clinical utility, ability to address privacy concerns and system usability. 38/55 (69%) physicians participated in the study. Two thirds of them acknowledged genetic privacy as a key aspect that needs to be protected to help building patient trust and deploy new-generation medical information systems. All of them successfully used the tool for evaluating their patients' pharmacogenomics risk and 90% were happy with the user experience and the efficiency of the tool. Only 8% of physicians were unsatisfied with the level of information and wanted to have access to the patient's actual DNA sequence. This survey, although limited in size, represents the first evaluation of privacy-preserving models for genomic-based medicine. It has allowed us to derive unique insights that will improve the design of these new systems in the future. In particular, we have observed that a clinical information system that uses homomorphic encryption to provide clinicians with risk information based on sensitive genetic test results can offer information that clinicians feel sufficient for their needs and appropriately respectful of patients' privacy. The ability of this kind of systems to ensure strong security and privacy guarantees and to provide some analytics on encrypted data has been assessed as a key enabler for the management of sensitive medical information in the near future. Providing clinically relevant information to physicians while protecting patients' privacy in order to comply with regulations is crucial for the widespread use of these new technologies. Copyright © 2017. Published by Elsevier Inc.
Smith, Stephanie A; Brunner, Steven R
2016-01-01
This research study examined Bud Goodall's online health narrative as a case study through the use of a thematic analysis to investigate the presence of communication privacy management (CPM) theory. Emergent themes of humor as a privacy management strategy, legitimization of co-owners, shifting privacy rules at end of life, and metaphors as privacy protection were used to recount Goodall's cancer experience on his personal blog, connecting to the components of CPM. The themes the authors analyzed represent the push-pull dialectical tension experienced to reveal and conceal information, conceptualization of private information, shared boundaries, and boundary linkages.
Trust information-based privacy architecture for ubiquitous health.
Ruotsalainen, Pekka Sakari; Blobel, Bernd; Seppälä, Antto; Nykänen, Pirkko
2013-10-08
Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system analysis. The architecture mimics the way humans use trust information in decision making, and enables the DS to design system-specific privacy policies using computational trust information that is based on systems' measured features. The trust attributes that were developed describe the level systems for support awareness and transparency, and how they follow general and domain-specific regulations and laws. The monitoring component of the architecture offers dynamic feedback concerning how the system enforces the polices of DS. The privacy management architecture developed in this study enables the DS to dynamically manage information privacy in ubiquitous health and to define individual policies for all systems considering their trust value and corresponding attributes. The DS can also set policies for secondary use and reuse of health information. The architecture offers protection against privacy threats existing in ubiquitous environments. Although the architecture is targeted to ubiquitous health, it can easily be modified to other ubiquitous applications.
Trust Information-Based Privacy Architecture for Ubiquitous Health
2013-01-01
Background Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. Objective The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. Methods A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system analysis. Results The architecture mimics the way humans use trust information in decision making, and enables the DS to design system-specific privacy policies using computational trust information that is based on systems’ measured features. The trust attributes that were developed describe the level systems for support awareness and transparency, and how they follow general and domain-specific regulations and laws. The monitoring component of the architecture offers dynamic feedback concerning how the system enforces the polices of DS. Conclusions The privacy management architecture developed in this study enables the DS to dynamically manage information privacy in ubiquitous health and to define individual policies for all systems considering their trust value and corresponding attributes. The DS can also set policies for secondary use and reuse of health information. The architecture offers protection against privacy threats existing in ubiquitous environments. Although the architecture is targeted to ubiquitous health, it can easily be modified to other ubiquitous applications. PMID:25099213
76 FR 79665 - Notice of Proposed Information Collection Requests
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-22
..., Information Collection Clearance Division, Privacy, Information and Records Management Services, Office of Management, invites comments on the proposed information collection requests as required by the Paperwork... Division, Privacy, Information and Records Management Services, Office of Management, publishes this notice...
Health information law in the context of minors.
Rosenbaum, Sara; Abramson, Susan; MacTaggart, Patricia
2009-01-01
This article presents a legal overview of privacy and autonomy considerations related to children in the context of health information technology adoption and use. All uses of health-related technologies take place within a legal framework that guides health care generally; the privacy laws and autonomy principles long predate health information technology and can be expected to shape its design and use. Furthermore, it is a legal tenet that technology advances shape the law, and this can be expected as health information technology use evolves. Most laws related to health care, medical practice, and the right to privacy are state-based and subject to high variability. As the health information revolution increasingly eliminates the importance of geographic boundaries to health care, interstate tensions can be expected to grow. Health information privacy law is even more complex in the case of children, because the relationship between privacy law and children is itself complex. The law considers minor children to be deserving of special protection against harm and risk exposure, and this concern extends to privacy. Regardless of whether minors can shield health information from parents, it is clear that parents and children have the power to control the flow of information to and among entities. Although information protections may pose a higher standard where information about children is concerned, this fact should not overshadow the extent to which information can be used under existing legal principles. Over time, as the security and safety of information sharing are established, the law may yet evolve to permit a freer flow of information.
17 CFR 248.2 - Model privacy form: rule of construction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Model privacy form: rule of... Safeguarding Personal Information § 248.2 Model privacy form: rule of construction. (a) Model privacy form. Use of the model privacy form in Appendix A to Subpart A of this part, consistent with the instructions...
12 CFR 573.2 - Model privacy form and examples.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model...
17 CFR 160.5 - Annual privacy notice to customers required.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Annual privacy notice to... COMMISSION (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.5 Annual privacy notice to customers required. (a)(1) General rule. You...
12 CFR 1016.9 - Delivering privacy and opt out notices.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Delivering privacy and opt out notices. 1016.9 Section 1016.9 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.9 Delivering privacy and opt out notices. (a...
12 CFR 216.4 - Initial privacy notice to consumers required.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Initial privacy notice to consumers required... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear and...
12 CFR 40.2 - Model privacy form and examples.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model...
12 CFR 573.8 - Revised privacy notices.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...
12 CFR 573.5 - Annual privacy notice to customers required.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Annual privacy notice to customers required. 573.5 Section 573.5 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.5 Annual privacy notice to...
17 CFR 160.5 - Annual privacy notice to customers required.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Annual privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.5 Annual privacy notice to customers required. (a)(1) General rule. You must...
12 CFR 216.4 - Initial privacy notice to consumers required.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Initial privacy notice to consumers required... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear and...
12 CFR 40.8 - Revised privacy notices.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...
12 CFR 573.9 - Delivering privacy and opt out notices.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Delivering privacy and opt out notices. 573.9 Section 573.9 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.9 Delivering privacy and opt out notices...
17 CFR 160.4 - Initial privacy notice to consumers required.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Initial privacy notice to... COMMISSION (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.4 Initial privacy notice to consumers required. (a) Initial notice...
12 CFR 573.2 - Model privacy form and examples.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model...