Sample records for national intelligence privacy

  1. 75 FR 16853 - Office of the Director of National Intelligence; Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-02

    ... OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE Office of the Director of National Intelligence; Privacy Act of 1974; System of Records AGENCY: Office of the Director of National Intelligence. ACTION: Notice to establish systems of records. SUMMARY: The Office of the Director of National Intelligence...

  2. Intelligence, Dataveillance, and Information Privacy

    NASA Astrophysics Data System (ADS)

    Mace, Robyn R.

    The extent and scope of intelligence activities are expanding in response to technological and economic transformations of the past decades. Intelligence efforts involving aggregated data from multiple public and private sources combined with past abuses of domestic intelligence functions have generated significant concerns among privacy advocates and citizens about the protection of individual civil liberties and information privacy from corporate and governmental misuse. In the information age, effective regulation and oversight are key components in the legitimacy and success of government domestic intelligence activities.

  3. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  4. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  5. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  6. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  7. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  8. 75 FR 34634 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-18

    ... DEPARTMENT OF DEFENSE National Geospatial-Intelligence Agency 32 CFR Part 320 Privacy Act; Implementation CFR Correction In Title 32 of the Code of Federal Regulations, Parts 191 to 399, revised as of...-INTELLIGENCE AGENCY (NGA) PRIVACY [FR Doc. 2010-14884 Filed 6-17-10; 8:45 am] BILLING CODE 1505-01-D ...

  9. 75 FR 16698 - Privacy Act of 1974: Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-02

    ... OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE 32 CFR Part 1701 Privacy Act of 1974: Implementation AGENCY: Office of the Director of National Intelligence. ACTION: Proposed rulemaking. SUMMARY: The Office of the Director of National Intelligence (ODNI) proposes to exempt fourteen (14) new systems of...

  10. 76 FR 67599 - Privacy Act of 1974: Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE 32 CFR Part 1701 Privacy Act of 1974: Implementation AGENCY: Office of the Director of National Intelligence. ACTION: Final rule. SUMMARY: The Office of the Director of National Intelligence (ODNI) is issuing a final rule exempting six new systems of...

  11. 76 FR 43629 - Privacy Act of 1974: Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-21

    ... OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE 32 CFR Part 1701 Privacy Act of 1974: Implementation AGENCY: Office of the Director of National Intelligence. ACTION: Proposed rule. SUMMARY: The Office of the Director of National Intelligence (ODNI) proposes to exempt six new systems of records from...

  12. 75 FR 57163 - Privacy Act Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-20

    ... OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE 32 CFR Part 1701 Privacy Act Systems of Records AGENCY: Office of the Director of National Intelligence. ACTION: Final rule. SUMMARY: The Office of the Director of National Intelligence (ODNI) is issuing a final rule exempting fourteen (14) new systems of...

  13. 78 FR 32554 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-31

    ...] Privacy Act; Implementation AGENCY: National Geospatial-Intelligence Agency (NGA), DoD. ACTION: Direct... Privacy Act Program by adding the (j)(2) and (k)(2) exemptions to accurately describe the basis for... changes dealing with DoD's management of its Privacy Programs. DoD expects no opposition to the changes...

  14. 78 FR 43868 - Privacy Act of 1974; System of Records; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... notice altering a Privacy Act System of Records notice (NGA-013, National Geospatial-Intelligence Agency (NGA) Inspector General Investigative and Complaint Files). Subsequent to the publication of that... omission. FOR FURTHER INFORMATION CONTACT: National Geospatial-Intelligence Agency (NGA), ATTN: Security...

  15. Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection.

    PubMed

    Son, Junggab; Park, Juyoung; Oh, Heekuck; Bhuiyan, Md Zakirul Alam; Hur, Junbeom; Kang, Kyungtae

    2017-06-12

    Long-term electrocardiogram (ECG) monitoring, as a representative application of cyber-physical systems, facilitates the early detection of arrhythmia. A considerable number of previous studies has explored monitoring techniques and the automated analysis of sensing data. However, ensuring patient privacy or confidentiality has not been a primary concern in ECG monitoring. First, we propose an intelligent heart monitoring system, which involves a patient-worn ECG sensor (e.g., a smartphone) and a remote monitoring station, as well as a decision support server that interconnects these components. The decision support server analyzes the heart activity, using the Pan-Tompkins algorithm to detect heartbeats and a decision tree to classify them. Our system protects sensing data and user privacy, which is an essential attribute of dependability, by adopting signal scrambling and anonymous identity schemes. We also employ a public key cryptosystem to enable secure communication between the entities. Simulations using data from the MIT-BIH arrhythmia database demonstrate that our system achieves a 95.74% success rate in heartbeat detection and almost a 96.63% accuracy in heartbeat classification, while successfully preserving privacy and securing communications among the involved entities.

  16. Results of Workshops on Privacy Protection Technologies

    NASA Astrophysics Data System (ADS)

    Landwehr, Carl

    This talk summarizes the results of a series of workshops on privacy protecting technologies convened in the fall of 2006 by the Office of the Director of National Intelligence through its Civil Liberties Protection Office and the (then) Disruptive Technology Office (now part of the Intelligence Advanced Research Projects Activity, IARPA).

  17. 76 FR 59073 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency... the Director, Information Management [[Page 59074

  18. Privacy and the National Information Infrastructure.

    ERIC Educational Resources Information Center

    Rotenberg, Marc

    1994-01-01

    Explains the work of Computer Professionals for Social Responsibility regarding privacy issues in the use of electronic networks; recommends principles that should be adopted for a National Information Infrastructure privacy code; discusses the need for public education; and suggests pertinent legislative proposals. (LRW)

  19. Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control.

    PubMed

    Yue, Xiao; Wang, Huiju; Jin, Dawei; Li, Mingqiang; Jiang, Wei

    2016-10-01

    Healthcare data are a valuable source of healthcare intelligence. Sharing of healthcare data is one essential step to make healthcare system smarter and improve the quality of healthcare service. Healthcare data, one personal asset of patient, should be owned and controlled by patient, instead of being scattered in different healthcare systems, which prevents data sharing and puts patient privacy at risks. Blockchain is demonstrated in the financial field that trusted, auditable computing is possible using a decentralized network of peers accompanied by a public ledger. In this paper, we proposed an App (called Healthcare Data Gateway (HGD)) architecture based on blockchain to enable patient to own, control and share their own data easily and securely without violating privacy, which provides a new potential way to improve the intelligence of healthcare systems while keeping patient data private. Our proposed purpose-centric access model ensures patient own and control their healthcare data; simple unified Indicator-Centric Schema (ICS) makes it possible to organize all kinds of personal healthcare data practically and easily. We also point out that MPC (Secure Multi-Party Computing) is one promising solution to enable untrusted third-party to conduct computation over patient data without violating privacy.

  20. Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection †

    PubMed Central

    Son, Junggab; Park, Juyoung; Oh, Heekuck; Bhuiyan, Md Zakirul Alam; Hur, Junbeom; Kang, Kyungtae

    2017-01-01

    Long-term electrocardiogram (ECG) monitoring, as a representative application of cyber-physical systems, facilitates the early detection of arrhythmia. A considerable number of previous studies has explored monitoring techniques and the automated analysis of sensing data. However, ensuring patient privacy or confidentiality has not been a primary concern in ECG monitoring. First, we propose an intelligent heart monitoring system, which involves a patient-worn ECG sensor (e.g., a smartphone) and a remote monitoring station, as well as a decision support server that interconnects these components. The decision support server analyzes the heart activity, using the Pan–Tompkins algorithm to detect heartbeats and a decision tree to classify them. Our system protects sensing data and user privacy, which is an essential attribute of dependability, by adopting signal scrambling and anonymous identity schemes. We also employ a public key cryptosystem to enable secure communication between the entities. Simulations using data from the MIT-BIH arrhythmia database demonstrate that our system achieves a 95.74% success rate in heartbeat detection and almost a 96.63% accuracy in heartbeat classification, while successfully preserving privacy and securing communications among the involved entities. PMID:28604628

  1. Privacy Issues of a National Research and Education Network.

    ERIC Educational Resources Information Center

    Katz, James E.; Graveman, Richard F.

    1991-01-01

    Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…

  2. 78 FR 69551 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is proposing to update the DIA Privacy... Privacy Program rules that will exempt applicable Department records and/or material from certain portions...

  3. 77 FR 15590 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is proposing to update the DIA Privacy Act... nonsubstantive changes to the Defense Intelligence Agency (DIA) Privacy Program rules. These changes will allow...

  4. National Intelligence: A Consumer’s Guide

    DTIC Science & Technology

    2009-01-01

    execution of that budget. The National Intelligence Program (NIP), formerly known as the National Foreign Intelligence Program ( NFIP ), provides the...Clandestine Service NCTC: National Counterterrorism Center NDIC: National Defense Intelligence College (DIA – formerly JMIC) NFIP : National Foreign...Center (ODNI) NIE: National Intelligence Estimate NIP: National Intelligence Program (formerly NFIP ) NIPRNet: Non-Secure Internet Protocol Router

  5. Democratization of Intelligence: Melding Strategic Intelligence and National Discourse

    DTIC Science & Technology

    2009-07-01

    encourages research on intelligence issues that distills lessons and improves Intelligence Community capabilities for policy-level and operational...2006). “Organizational Culture Challenges to Interagency and Intelligence Community Communication and Interaction.” A paper submitted to the Faculty...HOCHSTEIN, Miles. (1993). “Epistemic Communities : Intelligence Studies and International Relations,” Intelligence and National Security, 8, no. 3

  6. Privacy Policy of NOAA's National Weather Service - NOAA's National Weather

    Science.gov Websites

    Safety Weather Radio Hazard Assmt... StormReady / TsunamiReady Skywarn(tm) Education/Outreach Information , and National Weather Service information collection practices. This Privacy Policy Statement applies only to National Weather Service web sites. Some organizations within NOAA may have other information

  7. 78 FR 90 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: National Intelligence University, Defense Intelligence... hereby given that a closed meeting of the National Intelligence University Board of Visitors has been...

  8. 2009 National Intelligence: A Consumer’s Guide

    DTIC Science & Technology

    2009-04-01

    Program (NIP), formerly known as the National Foreign Intelligence Program ( NFIP ), provides the resources needed to develop and maintain...Clandestine Service NCTC: National Counterterrorism Center NDIC: National Defense Intelligence College (DIA – formerly JMIC) NFIP : National Foreign...Coordination Center (ODNI) NIE: National Intelligence Estimate NIP: National Intelligence Program (formerly NFIP ) NIPRNet: Non-Secure Internet Protocol Router

  9. Framework for objective evaluation of privacy filters

    NASA Astrophysics Data System (ADS)

    Korshunov, Pavel; Melle, Andrea; Dugelay, Jean-Luc; Ebrahimi, Touradj

    2013-09-01

    Extensive adoption of video surveillance, affecting many aspects of our daily lives, alarms the public about the increasing invasion into personal privacy. To address these concerns, many tools have been proposed for protection of personal privacy in image and video. However, little is understood regarding the effectiveness of such tools and especially their impact on the underlying surveillance tasks, leading to a tradeoff between the preservation of privacy offered by these tools and the intelligibility of activities under video surveillance. In this paper, we investigate this privacy-intelligibility tradeoff objectively by proposing an objective framework for evaluation of privacy filters. We apply the proposed framework on a use case where privacy of people is protected by obscuring faces, assuming an automated video surveillance system. We used several popular privacy protection filters, such as blurring, pixelization, and masking and applied them with varying strengths to people's faces from different public datasets of video surveillance footage. Accuracy of face detection algorithm was used as a measure of intelligibility (a face should be detected to perform a surveillance task), and accuracy of face recognition algorithm as a measure of privacy (a specific person should not be identified). Under these conditions, after application of an ideal privacy protection tool, an obfuscated face would be visible as a face but would not be correctly identified by the recognition algorithm. The experiments demonstrate that, in general, an increase in strength of privacy filters under consideration leads to an increase in privacy (i.e., reduction in recognition accuracy) and to a decrease in intelligibility (i.e., reduction in detection accuracy). Masking also shows to be the most favorable filter across all tested datasets.

  10. Privacy Policy | Frederick National Laboratory for Cancer Research

    Cancer.gov

    The privacy of our users is of utmost importance to Frederick National Laboratory. The policy outlined below establishes how Frederick National Laboratory will use the information we gather about you from your visit to our website. We may coll

  11. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-04

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence University. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of...

  12. National Intelligent Transportation Infrastructure Initiative

    DOT National Transportation Integrated Search

    1997-09-19

    This report gives an overview of the National Intelligent Transportation Infrastructure Initiative (NITI). NITI refers to the integrated electronics, communications, and hardware and software elements that are available to support Intelligent Transpo...

  13. What Makes Nations Intelligent?

    PubMed

    Hunt, Earl

    2012-05-01

    Modern society is driven by the use of cognitive artifacts: physical instruments or styles of reasoning that amplify our ability to think. The artifacts range from writing systems to computers. In everyday life, a person demonstrates intelligence by showing skill in using these artifacts. Intelligence tests and their surrogates force examinees to exhibit some of these skills but not others. This is why test scores correlate substantially but not perfectly with a variety of measures of socioeconomic success. The same thing is true at the international level. Nations can be evaluated by the extent to which their citizens score well on cognitive tests, including both avowed intelligence tests and a variety of tests of academic achievement. The resulting scores are substantially correlated with various indices of national wealth, health, environmental quality, and schooling and with a vaguer variable, social commitment to innovation. These environmental variables are suggested as causes of the differences in general cognitive skills between national populations. It is conceivable that differences in gene pools also contribute to international and, within nations, group differences in cognitive skills, but at present it is impossible to evaluate the extent of genetic influences. © The Author(s) 2012.

  14. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  15. 78 FR 32241 - Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed Meeting AGENCY: National Intelligence University, Defense Intelligence Agency, Department of Defense. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the...

  16. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  17. National Water Model: Providing the Nation with Actionable Water Intelligence

    NASA Astrophysics Data System (ADS)

    Aggett, G. R.; Bates, B.

    2017-12-01

    The National Water Model (NWM) provides national, street-level detail of water movement through time and space. Operating hourly, this flood of information offers enormous benefits in the form of water resource management, natural disaster preparedness, and the protection of life and property. The Geo-Intelligence Division at the NOAA National Water Center supplies forecasters and decision-makers with timely, actionable water intelligence through the processing of billions of NWM data points every hour. These datasets include current streamflow estimates, short and medium range streamflow forecasts, and many other ancillary datasets. The sheer amount of NWM data produced yields a dataset too large to allow for direct human comprehension. As such, it is necessary to undergo model data post-processing, filtering, and data ingestion by visualization web apps that make use of cartographic techniques to bring attention to the areas of highest urgency. This poster illustrates NWM output post-processing and cartographic visualization techniques being developed and employed by the Geo-Intelligence Division at the NOAA National Water Center to provide national actionable water intelligence.

  18. 77 FR 15591 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is deleting an exemption rule for LDIA 0275... Defense Intelligence Agency Privacy Program rules. These changes will allow the Department to transfer...

  19. 76 FR 49658 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is deleting an exemption rule for LDIA 0275... Defense Intelligence Agency Privacy Program rules. These changes will allow the Department to transfer...

  20. 77 FR 57017 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is proposing to update the DIA Privacy Act... Records. This direct final rule makes nonsubstantive changes to the Defense Intelligence Agency Program...

  1. 77 FR 15594 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is deleting an exemption rule for LDIA 0800... Defense Intelligence Agency Privacy Program rules. These changes will allow the Department to transfer...

  2. 77 FR 22805 - Meeting of the Compact Council for the National Crime Prevention and Privacy Compact; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-17

    ... Register of April 3, 2012, concerning the date and location of the National Crime Prevention and Privacy Compact Council (Council) created by the National Crime Prevention and Privacy Compact Act of 1998... National Crime Prevention and Privacy Compact; Correction AGENCY: Federal Bureau of Investigation. ACTION...

  3. 77 FR 57016 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is updating the DIA Privacy Act Program by... final rule makes non-substantive changes to the Defense Intelligence Agency Program rules. These changes...

  4. Dysfunction Junction: Intelligence, Peacekeeping, and the United Nations

    DTIC Science & Technology

    2007-09-01

    Limitations,” Peacekeeping and International Relations 24, no. 6 (November 1995): 3. 25 Thomas Quiggin, “Response to No Cloak and Dagger Required...Johnston, “No Cloak and Dagger Required: Intelligence Support to UN Peacekeeping,” Intelligence and National Security 12, no. 4 (October 1997): 103...No Cloak and Dagger Required: Intelligence Support to UN Peacekeeping.” Intelligence and National Security 12, no. 4 (October 1997): 102-112

  5. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-109)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  6. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-071] Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy... training associated with [[Page 40516

  7. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 2 2012-10-01 2012-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...

  8. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 2 2014-10-01 2014-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...

  9. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...

  10. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 2 2013-10-01 2013-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...

  11. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 2 2011-10-01 2011-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...

  12. Acoustic assessment of speech privacy curtains in two nursing units

    PubMed Central

    Pope, Diana S.; Miller-Klein, Erik T.

    2016-01-01

    Hospitals have complex soundscapes that create challenges to patient care. Extraneous noise and high reverberation rates impair speech intelligibility, which leads to raised voices. In an unintended spiral, the increasing noise may result in diminished speech privacy, as people speak loudly to be heard over the din. The products available to improve hospital soundscapes include construction materials that absorb sound (acoustic ceiling tiles, carpet, wall insulation) and reduce reverberation rates. Enhanced privacy curtains are now available and offer potential for a relatively simple way to improve speech privacy and speech intelligibility by absorbing sound at the hospital patient's bedside. Acoustic assessments were performed over 2 days on two nursing units with a similar design in the same hospital. One unit was built with the 1970s’ standard hospital construction and the other was newly refurbished (2013) with sound-absorbing features. In addition, we determined the effect of an enhanced privacy curtain versus standard privacy curtains using acoustic measures of speech privacy and speech intelligibility indexes. Privacy curtains provided auditory protection for the patients. In general, that protection was increased by the use of enhanced privacy curtains. On an average, the enhanced curtain improved sound absorption from 20% to 30%; however, there was considerable variability, depending on the configuration of the rooms tested. Enhanced privacy curtains provide measureable improvement to the acoustics of patient rooms but cannot overcome larger acoustic design issues. To shorten reverberation time, additional absorption, and compact and more fragmented nursing unit floor plate shapes should be considered. PMID:26780959

  13. Acoustic assessment of speech privacy curtains in two nursing units.

    PubMed

    Pope, Diana S; Miller-Klein, Erik T

    2016-01-01

    Hospitals have complex soundscapes that create challenges to patient care. Extraneous noise and high reverberation rates impair speech intelligibility, which leads to raised voices. In an unintended spiral, the increasing noise may result in diminished speech privacy, as people speak loudly to be heard over the din. The products available to improve hospital soundscapes include construction materials that absorb sound (acoustic ceiling tiles, carpet, wall insulation) and reduce reverberation rates. Enhanced privacy curtains are now available and offer potential for a relatively simple way to improve speech privacy and speech intelligibility by absorbing sound at the hospital patient's bedside. Acoustic assessments were performed over 2 days on two nursing units with a similar design in the same hospital. One unit was built with the 1970s' standard hospital construction and the other was newly refurbished (2013) with sound-absorbing features. In addition, we determined the effect of an enhanced privacy curtain versus standard privacy curtains using acoustic measures of speech privacy and speech intelligibility indexes. Privacy curtains provided auditory protection for the patients. In general, that protection was increased by the use of enhanced privacy curtains. On an average, the enhanced curtain improved sound absorption from 20% to 30%; however, there was considerable variability, depending on the configuration of the rooms tested. Enhanced privacy curtains provide measureable improvement to the acoustics of patient rooms but cannot overcome larger acoustic design issues. To shorten reverberation time, additional absorption, and compact and more fragmented nursing unit floor plate shapes should be considered.

  14. Review of the National Defense Intelligence College's Master's Degree in Science and Technology Intelligence

    ERIC Educational Resources Information Center

    National Academies Press, 2011

    2011-01-01

    The National Research Council (NRC) was asked by the National Defense Intelligence College (NDIC) to convene a committee to review the curriculum and syllabi for their proposed master of science degree in science and technology intelligence. The NRC was asked to review the material provided by the NDIC and offer advice and recommendations…

  15. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  16. 77 FR 47767 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-10

    ... Protection, DHS/CBP--017 Analytical Framework for Intelligence (AFI) System of Records AGENCY: Privacy Office... Homeland Security/U.S. Customs and Border Protection, DHS/CBP--017 Analytical Framework for Intelligence... Analytical Framework for Intelligence (AFI) System of Records'' from one or more provisions of the Privacy...

  17. Decomposing self-estimates of intelligence: structure and sex differences across 12 nations.

    PubMed

    von Stumm, Sophie; Chamorro-Premuzic, Tomas; Furnham, Adrian

    2009-05-01

    This study examines the structure of self-estimates of intelligence (SEI) across 12 nations (Australia, Austria, Brazil, France, Iran, Israel, Malaysia, South Africa, Spain, Turkey, UK and US). Participants rated themselves on general and specific abilities from three popular models of intelligence: Gardner's multiple intelligences, Sternberg's triarchic theory of intelligence, and Goleman's emotional intelligence. The results showed that (a) laypeople across nations have similar and invariant concepts of intelligence, (b) concepts of intelligence are cross-culturally closely related to academic notions of intellectual ability and (c) sex differences in general and specific SEI favouring men are consistent across countries. Male hubris and female humility in SEI seem independent of sex differences in actual cognitive ability and national levels of masculinity-femininity. Furthermore, international mean differences in general SEI could not be attributed to discrepancies in national intelligence quotient (IQ) levels or to cultural variations.

  18. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  19. 75 FR 50987 - Privacy Act System of Records; National Animal Health Laboratory Network (NAHLN)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-18

    ...] Privacy Act System of Records; National Animal Health Laboratory Network (NAHLN) AGENCY: Animal and Plant Health Inspection Service, USDA. ACTION: Notice of a proposed new system of records; request for comment. SUMMARY: The U.S. Department of Agriculture (USDA) proposes to add a new Privacy Act system of records to...

  20. National Geospatial-Intelligence Agency Academic Research Program

    NASA Astrophysics Data System (ADS)

    Loomer, S. A.

    2004-12-01

    "Know the Earth.Show the Way." In fulfillment of its vision, the National Geospatial-Intelligence Agency (NGA) provides geospatial intelligence in all its forms and from whatever source-imagery, imagery intelligence, and geospatial data and information-to ensure the knowledge foundation for planning, decision, and action. To achieve this, NGA conducts a multi-disciplinary program of basic research in geospatial intelligence topics through grants and fellowships to the leading investigators, research universities, and colleges of the nation. This research provides the fundamental science support to NGA's applied and advanced research programs. The major components of the NGA Academic Research Program (NARP) are: - NGA University Research Initiatives (NURI): Three-year basic research grants awarded competitively to the best investigators across the US academic community. Topics are selected to provide the scientific basis for advanced and applied research in NGA core disciplines. - Historically Black College and University - Minority Institution Research Initiatives (HBCU-MI): Two-year basic research grants awarded competitively to the best investigators at Historically Black Colleges and Universities, and Minority Institutions across the US academic community. - Director of Central Intelligence Post-Doctoral Research Fellowships: Fellowships providing access to advanced research in science and technology applicable to the intelligence community's mission. The program provides a pool of researchers to support future intelligence community needs and develops long-term relationships with researchers as they move into career positions. This paper provides information about the NGA Academic Research Program, the projects it supports and how other researchers and institutions can apply for grants under the program.

  1. 75 FR 17904 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-08

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to alter a system of records. Summary: The Defense Intelligence Agency is proposing to alter a system in its existing inventory of.... SUPPLEMENTARY INFORMATION: The Defense Intelligence Agency system of records notices subject to the Privacy Act...

  2. 75 FR 26201 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-11

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Intelligence Agency is proposing to amend a system in its existing inventory of.... SUPPLEMENTARY INFORMATION: The Defense Intelligence Agency systems of records notices subject to the Privacy Act...

  3. The Ethical Issues of Privacy, Confidentiality and Privileged Communication.

    ERIC Educational Resources Information Center

    Nunnelly, Diane T.

    School psychologists and other educators should be concerned about the issues of confidentiality, privacy and privileged communication in regard to school records such as psychological reports and intelligence test scores. Confidentiality relates to matters of professional ethics, privileged communication refers to legal rights, and privacy is a…

  4. 75 FR 69603 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security National...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... FURTHER INFORMATION CONTACT: For general questions please contact: Emily Andrew (703-235-2182), Privacy...: Background In accordance with the Privacy Act of 1974, 5 U.S.C. 552a, the Department of Homeland Security... Nation's 18 critical infrastructures and key resources (CIKR) sectors during normal operations and...

  5. 75 FR 13089 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ...; Systems of Records AGENCY: Defense Intelligence Agency, (DoD). ACTION: Notice to amend a system of records. SUMMARY: The Defense Intelligence Agency proposes to amend a system of records notice of its inventory of... INFORMATION: The Defense Intelligence Agency notices for systems of records subject to the Privacy Act of 1974...

  6. 75 FR 49946 - National Drug Intelligence Center: Agency Information Collection Activities: Proposed Extension...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... DEPARTMENT OF JUSTICE [OMB Number 1105-0087] National Drug Intelligence Center: Agency Information...), National Drug Intelligence Center (NDIC), will be submitting the following information collection request... Kevin M. Walker, General Counsel, National Drug Intelligence Center, Fifth Floor, 319 Washington Street...

  7. 75 FR 81247 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-27

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Intelligence Agency proposes to delete a system of records notice in its existing... Defense Intelligence Agency systems of records notices subject to the Privacy Act of 1974, (5 U.S.C. 552a...

  8. 77 FR 26260 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to Delete a System of Records. SUMMARY: The Defense Intelligence Agency proposes to delete a system of records notice in its existing...: The Defense Intelligence Agency systems of records notices subject to the Privacy Act of 1974 (5 U.S.C...

  9. 76 FR 10010 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-23

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to Delete a System of Records. SUMMARY: The Defense Intelligence Agency proposes to delete a system of records notice in its existing... Defense Intelligence Agency systems of records notices subject to the Privacy Act of 1974, (5 U.S.C. 552a...

  10. 75 FR 33791 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to add a system of records. SUMMARY: The Defense Intelligence Agency proposes to add a system of records to its inventory of record...: The Defense Intelligence Agency systems of records notices subject to the Privacy Act of 1974, (5 U.S...

  11. National intelligence estimates and the Failed State Index.

    PubMed

    Voracek, Martin

    2013-10-01

    Across 177 countries around the world, the Failed State Index, a measure of state vulnerability, was reliably negatively associated with the estimates of national intelligence. Psychometric analysis of the Failed State Index, compounded of 12 social, economic, and political indicators, suggested factorial unidimensionality of this index. The observed correspondence of higher national intelligence figures to lower state vulnerability might arise through these two macro-level variables possibly being proxies of even more pervasive historical and societal background variables that affect both.

  12. Report on the National Symposium on Personal Privacy and Information Technology (October 4-7, 1981).

    ERIC Educational Resources Information Center

    American Federation of Information Processing Societies, Montvale, NJ.

    A national symposium was held October 4-7, 1981, to explore the relationships among law, ethics, and informational technology as they relate to the individual's informational privacy. The introduction to this report describes the conference format; discusses the Privacy Act of 1974 and the Freedom of Information Act; and offers definitions of…

  13. National Intelligence and Personality: Their Relationships and Impact on National Economic Success

    ERIC Educational Resources Information Center

    Stolarski, Maciej; Zajenkowski, Marcin; Meisenberg, Gerhard

    2013-01-01

    The relationships between national personality traits and intelligence from 51 countries were examined. It was found that extraversion, openness to experience and agreeableness measured at the national level were significantly and positively correlated with national IQs; however, in the regression model only the former two were marginally…

  14. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  15. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  16. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  17. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  18. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  19. Through Patients' Eyes: Regulation, Technology, Privacy, and the Future.

    PubMed

    Petersen, Carolyn

    2018-04-22

    Privacy is commonly regarded as a regulatory requirement achieved via technical and organizational management practices. Those working in the field of informatics often play a role in privacy preservation as a result of their expertise in information technology, workflow analysis, implementation science, or related skills. Viewing privacy from the perspective of patients whose protected health information is at risk broadens the considerations to include the perceived duality of privacy; the existence of privacy within a context unique to each patient; the competing needs inherent within privacy management; the need for particular consideration when data are shared; and the need for patients to control health information in a global setting. With precision medicine, artificial intelligence, and other treatment innovations on the horizon, health care professionals need to think more broadly about how to preserve privacy in a health care environment driven by data sharing. Patient-reported privacy preferences, privacy portability, and greater transparency around privacy-preserving functionalities are potential strategies for ensuring that privacy regulations are met and privacy is preserved. Georg Thieme Verlag KG Stuttgart.

  20. 75 FR 28786 - Federal Advisory Committee; National Defense Intelligence College Board of Visitors; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-24

    ... Intelligence College Board of Visitors; Closed Meeting AGENCY: Defense Intelligence Agency, National Defense Intelligence College, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of subsection... hereby given that a closed meeting of the Defense Intelligence Agency, National Defense Intelligence...

  1. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  2. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  3. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  4. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  5. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  6. Thumbs up for privacy?: Differences in online self-disclosure behavior across national cultures.

    PubMed

    Reed, Philip J; Spiro, Emma S; Butts, Carter T

    2016-09-01

    This study investigates relationships between national-level culture and online self-disclosure behavior. We operationalize culture through the GLOBE dimensions, a set of nine variables measuring cultural practices and another nine measuring values. Our observations of self-disclosure come from the privacy settings of approximately 200,000 randomly sampled Facebook users who designated a geographical network in 2009. We model privacy awareness as a function of one or more GLOBE variables with demographic covariates, evaluating the relative influence of each factor. In the top-performing models, we find that the majority of the cultural dimensions are significantly related to privacy awareness behavior. We also find that the hypothesized directions of several of these relationships, based largely on cultural attitudes towards threat mitigation, are confirmed. Copyright © 2016. Published by Elsevier Inc.

  7. 3 CFR - Designation of Officers of the Office of the Director of National Intelligence To Act as Director...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Director of National Intelligence To Act as Director of National Intelligence Presidential Documents Other... of National Intelligence To Act as Director of National Intelligence Memorandum for the Director of National Intelligence By the authority vested in me as President by the Constitution and the laws of the...

  8. 3 CFR - Designation of Officers of the Office of the Director of National Intelligence To Act as Director...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Director of National Intelligence To Act as Director of National Intelligence Presidential Documents Other... National Intelligence To Act as Director of National Intelligence Memorandum for the Director of National Intelligence By the authority vested in me as President by the Constitution and the laws of the United States...

  9. ITS and locational privacy : suggestions for peaceful coexistence.

    DOT National Transportation Integrated Search

    2011-10-01

    Continuing developments in the fields of transportation technology and privacy law present an abundance of : opportunities for conflict. Without knowledge of the legal framework that applies to emerging technology, : Intelligent Transportation System...

  10. 76 FR 34616 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/National...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... questions please contact: Emily Andrew (703-235-2182), Privacy Officer, National Protection and Programs... U.S.C. 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate... Screening Database (TSDB). The TSDB is the Federal government's consolidated and integrated terrorist...

  11. Evaluation of privacy in high dynamic range video sequences

    NASA Astrophysics Data System (ADS)

    Řeřábek, Martin; Yuan, Lin; Krasula, Lukáš; Korshunov, Pavel; Fliegel, Karel; Ebrahimi, Touradj

    2014-09-01

    The ability of high dynamic range (HDR) to capture details in environments with high contrast has a significant impact on privacy in video surveillance. However, the extent to which HDR imaging affects privacy, when compared to a typical low dynamic range (LDR) imaging, is neither well studied nor well understood. To achieve such an objective, a suitable dataset of images and video sequences is needed. Therefore, we have created a publicly available dataset of HDR video for privacy evaluation PEViD-HDR, which is an HDR extension of an existing Privacy Evaluation Video Dataset (PEViD). PEViD-HDR video dataset can help in the evaluations of privacy protection tools, as well as for showing the importance of HDR imaging in video surveillance applications and its influence on the privacy-intelligibility trade-off. We conducted a preliminary subjective experiment demonstrating the usability of the created dataset for evaluation of privacy issues in video. The results confirm that a tone-mapped HDR video contains more privacy sensitive information and details compared to a typical LDR video.

  12. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  13. 32 CFR 806b.51 - Privacy and the Web.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy and the Web. 806b.51 Section 806b.51 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT... security notices at major web site entry points and Privacy Act statements or Privacy Advisories when...

  14. 32 CFR 1701.24 - Exemption of Office of the Director of National Intelligence (ODNI) systems of records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Intelligence (ODNI) systems of records. 1701.24 Section 1701.24 National Defense Other Regulations Relating to National Defense OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE... Director of National Intelligence (ODNI) systems of records. (a) The ODNI exempts the following systems of...

  15. 32 CFR 1701.24 - Exemption of Office of the Director of National Intelligence (ODNI) systems of records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Intelligence (ODNI) systems of records. 1701.24 Section 1701.24 National Defense Other Regulations Relating to National Defense OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE... Director of National Intelligence (ODNI) systems of records. (a) The ODNI exempts the following systems of...

  16. 32 CFR 1701.24 - Exemption of Office of the Director of National Intelligence (ODNI) systems of records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Intelligence (ODNI) systems of records. 1701.24 Section 1701.24 National Defense Other Regulations Relating to National Defense OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE... Director of National Intelligence (ODNI) systems of records. (a) The ODNI exempts the following systems of...

  17. 32 CFR 1701.24 - Exemption of Office of the Director of National Intelligence (ODNI) systems of records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Intelligence (ODNI) systems of records. 1701.24 Section 1701.24 National Defense Other Regulations Relating to National Defense OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE... Director of National Intelligence (ODNI) systems of records. (a) The ODNI exempts the following systems of...

  18. 32 CFR 1901.62 - General exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS... in section (j) of the Privacy Act, the Director of Central Intelligence has determined to exempt from... Privacy Act, the Director of Central Intelligence has determined to exempt from sections (c)(3) and (e)(3...

  19. 32 CFR 1901.62 - General exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS... in section (j) of the Privacy Act, the Director of Central Intelligence has determined to exempt from... Privacy Act, the Director of Central Intelligence has determined to exempt from sections (c)(3) and (e)(3...

  20. 75 FR 12437 - Privacy Act of 1974: Implementation of Exemptions; U.S. Immigration and Customs Enforcement-006...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-16

    ... of 1974: Implementation of Exemptions; U.S. Immigration and Customs Enforcement--006 Intelligence... Intelligence Records System'' from certain provisions of the Privacy Act. Specifically, the Department exempts portions of the Immigration and Customs Enforcement Intelligence Records System from one or more provisions...

  1. 32 CFR 701.119 - Privacy and the web.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Privacy and the web. 701.119 Section 701.119 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON...

  2. 32 CFR 701.109 - Privacy Act (PA) appeals.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Privacy Act (PA) appeals. 701.109 Section 701.109 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.109 Privacy Act (PA) appeals. (a...

  3. 32 CFR 701.109 - Privacy Act (PA) appeals.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Privacy Act (PA) appeals. 701.109 Section 701.109 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.109 Privacy Act (PA) appeals. (a...

  4. 32 CFR 701.109 - Privacy Act (PA) appeals.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Privacy Act (PA) appeals. 701.109 Section 701.109 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.109 Privacy Act (PA) appeals. (a...

  5. 32 CFR 701.119 - Privacy and the web.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Privacy and the web. 701.119 Section 701.119 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON...

  6. 32 CFR 701.109 - Privacy Act (PA) appeals.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Privacy Act (PA) appeals. 701.109 Section 701.109 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.109 Privacy Act (PA) appeals. (a...

  7. 32 CFR 701.119 - Privacy and the web.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Privacy and the web. 701.119 Section 701.119 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON...

  8. 32 CFR 701.119 - Privacy and the web.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Privacy and the web. 701.119 Section 701.119 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON...

  9. 32 CFR 701.109 - Privacy Act (PA) appeals.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy Act (PA) appeals. 701.109 Section 701.109 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.109 Privacy Act (PA) appeals. (a...

  10. Patient Privacy in the Era of Big Data.

    PubMed

    Kayaalp, Mehmet

    2018-01-20

    Privacy was defined as a fundamental human right in the Universal Declaration of Human Rights at the 1948 United Nations General Assembly. However, there is still no consensus on what constitutes privacy. In this review, we look at the evolution of privacy as a concept from the era of Hippocrates to the era of social media and big data. To appreciate the modern measures of patient privacy protection and correctly interpret the current regulatory framework in the United States, we need to analyze and understand the concepts of individually identifiable information, individually identifiable health information, protected health information, and de-identification. The Privacy Rule of the Health Insurance Portability and Accountability Act defines the regulatory framework and casts a balance between protective measures and access to health information for secondary (scientific) use. The rule defines the conditions when health information is protected by law and how protected health information can be de-identified for secondary use. With the advents of artificial intelligence and computational linguistics, computational text de-identification algorithms produce de-identified results nearly as well as those produced by human experts, but much faster, more consistently and basically for free. Modern clinical text de-identification systems now pave the road to big data and enable scientists to access de-identified clinical information while firmly protecting patient privacy. However, clinical text de-identification is not a perfect process. In order to maximize the protection of patient privacy and to free clinical and scientific information from the confines of electronic healthcare systems, all stakeholders, including patients, health institutions and institutional review boards, scientists and the scientific communities, as well as regulatory and law enforcement agencies must collaborate closely. On the one hand, public health laws and privacy regulations define rules

  11. Patient Privacy in the Era of Big Data

    PubMed Central

    Kayaalp, Mehmet

    2018-01-01

    Privacy was defined as a fundamental human right in the Universal Declaration of Human Rights at the 1948 United Nations General Assembly. However, there is still no consensus on what constitutes privacy. In this review, we look at the evolution of privacy as a concept from the era of Hippocrates to the era of social media and big data. To appreciate the modern measures of patient privacy protection and correctly interpret the current regulatory framework in the United States, we need to analyze and understand the concepts of individually identifiable information, individually identifiable health information, protected health information, and de-identification. The Privacy Rule of the Health Insurance Portability and Accountability Act defines the regulatory framework and casts a balance between protective measures and access to health information for secondary (scientific) use. The rule defines the conditions when health information is protected by law and how protected health information can be de-identified for secondary use. With the advents of artificial intelligence and computational linguistics, computational text de-identification algorithms produce de-identified results nearly as well as those produced by human experts, but much faster, more consistently and basically for free. Modern clinical text de-identification systems now pave the road to big data and enable scientists to access de-identified clinical information while firmly protecting patient privacy. However, clinical text de-identification is not a perfect process. In order to maximize the protection of patient privacy and to free clinical and scientific information from the confines of electronic healthcare systems, all stakeholders, including patients, health institutions and institutional review boards, scientists and the scientific communities, as well as regulatory and law enforcement agencies must collaborate closely. On the one hand, public health laws and privacy regulations define rules

  12. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  13. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  14. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  15. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  16. Cape Cod National Seashore intelligent transportation systems implementation plan: final report

    DOT National Transportation Integrated Search

    2011-03-18

    The Volpe National Transportation Systems Center (Volpe Center) is providing technical support to the Cape Cod National Seashore in the planning of an Intelligent Transportation System (ITS). In collaboration with the Cape Cod Commission, National Se...

  17. 76 FR 13499 - Designation of Officers of the Office of the Director of National Intelligence To Act as Director...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-11

    ... Officers of the Office of the Director of National Intelligence To Act as Director of National Intelligence Memorandum for the Director of National Intelligence By the authority vested in me as President by the... and 4 of this memorandum, the officers of the Office of the Director of National Intelligence named in...

  18. 76 FR 3098 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-19

    ...: National Security Agency/Central Security Service, Freedom of Information Act and Privacy Act Office, 9800..., Privacy Act and Mandatory Declassification Review Records. System Location: National Security Agency... Information Act; 5 U.S.C. 552a, The Privacy Act of 1974 (as amended); E.O. 13526, Classified National Security...

  19. National ITS Program Plan, Intelligent Transportation Systems, Synopsis

    DOT National Transportation Integrated Search

    THE PURPOSE OF THE NATIONAL ITS PROGRAM PLAN IS TO GUIDE THE DEVELOPMENT AND DEPLOYMENT OF INTELLIGENT TRANSPORTATION SYSTEMS (ITS) IN THE UNITED STATES. THIS, THE FIRST EDITION OF THE PLAN WAS A JOINT EFFORT OF ITS AMERICA AND THE UNITED STATES DEPA...

  20. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 2 2011-04-01 2011-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided: Solicitation...

  1. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 2 2012-04-01 2012-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided: Solicitation...

  2. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 2 2014-04-01 2014-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided: Solicitation...

  3. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 2 2013-04-01 2013-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided: Solicitation...

  4. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided: Solicitation...

  5. Academic research opportunities at the National Geospatial-Intelligence Agency(NGA)

    NASA Astrophysics Data System (ADS)

    Loomer, Scott A.

    2006-05-01

    The vision of the National Geospatial-Intelligence Agency (NGA) is to "Know the Earth...Show the Way." To achieve this vision, the NGA provides geospatial intelligence in all its forms and from whatever source-imagery, imagery intelligence, and geospatial data and information-to ensure the knowledge foundation for planning, decision, and action. Academia plays a key role in the NGA research and development program through the NGA Academic Research Program. This multi-disciplinary program of basic research in geospatial intelligence topics provides grants and fellowships to the leading investigators, research universities, and colleges of the nation. This research provides the fundamental science support to NGA's applied and advanced research programs. The major components of the NGA Academic Research Program are: *NGA University Research Initiatives (NURI): Three-year basic research grants awarded competitively to the best investigators across the US academic community. Topics are selected to provide the scientific basis for advanced and applied research in NGA core disciplines. *Historically Black College and University - Minority Institution Research Initiatives (HBCU-MI): Two-year basic research grants awarded competitively to the best investigators at Historically Black Colleges and Universities, and Minority Institutions across the US academic community. *Intelligence Community Post-Doctoral Research Fellowships: Fellowships providing access to advanced research in science and technology applicable to the intelligence community's mission. The program provides a pool of researchers to support future intelligence community needs and develops long-term relationships with researchers as they move into career positions. This paper provides information about the NGA Academic Research Program, the projects it supports and how researchers and institutions can apply for grants under the program. In addition, other opportunities for academia to engage with NGA through

  6. Regulation, Privacy and Security: Chairman's Opening Remarks

    PubMed Central

    Gabrieli, E.R.

    1979-01-01

    Medical privacy is a keystone of a free democratic society. To conserve the right of the patient to medical privacy, computerization of the medical data must be regulated. This paper enumerates some steps to be taken urgently for the protection of computerized sensitive medical data. A computer-oriented medical lexicon is urgently needed for accurate coding. Health industry standards should be drafted. The goals of various data centers must be sharply defined to avoid conflicts of interest. Medical privacy should be studied further, and medical data centers should consider cost-effectiveness. State boards for medical privacy should be created to monitor data security procedures. There is a need for purposeful decentralization. A national medical information policy should be drafted, and a national clinical information board should implement the nation's medical information policy.

  7. 78 FR 59159 - Designation of Officers of the Office of the Director of National Intelligence To Act as Director...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-25

    ... Designation of Officers of the Office of the Director of National Intelligence To Act as Director of National Intelligence Memorandum for the Director of National Intelligence By the authority vested in me as President by... Intelligence, in the order listed, shall act as and perform the functions and duties of the Director of...

  8. Visual Privacy by Context: Proposal and Evaluation of a Level-Based Visualisation Scheme

    PubMed Central

    Padilla-López, José Ramón; Chaaraoui, Alexandros Andre; Gu, Feng; Flórez-Revuelta, Francisco

    2015-01-01

    Privacy in image and video data has become an important subject since cameras are being installed in an increasing number of public and private spaces. Specifically, in assisted living, intelligent monitoring based on computer vision can allow one to provide risk detection and support services that increase people's autonomy at home. In the present work, a level-based visualisation scheme is proposed to provide visual privacy when human intervention is necessary, such as at telerehabilitation and safety assessment applications. Visualisation levels are dynamically selected based on the previously modelled context. In this way, different levels of protection can be provided, maintaining the necessary intelligibility required for the applications. Furthermore, a case study of a living room, where a top-view camera is installed, is presented. Finally, the performed survey-based evaluation indicates the degree of protection provided by the different visualisation models, as well as the personal privacy preferences and valuations of the users. PMID:26053746

  9. Visual privacy by context: proposal and evaluation of a level-based visualisation scheme.

    PubMed

    Padilla-López, José Ramón; Chaaraoui, Alexandros Andre; Gu, Feng; Flórez-Revuelta, Francisco

    2015-06-04

    Privacy in image and video data has become an important subject since cameras are being installed in an increasing number of public and private spaces. Specifically, in assisted living, intelligent monitoring based on computer vision can allow one to provide risk detection and support services that increase people's autonomy at home. In the present work, a level-based visualisation scheme is proposed to provide visual privacy when human intervention is necessary, such as at telerehabilitation and safety assessment applications. Visualisation levels are dynamically selected based on the previously modelled context. In this way, different levels of protection can be provided, maintaining the necessary intelligibility required for the applications. Furthermore, a case study of a living room, where a top-view camera is installed, is presented. Finally, the performed survey-based evaluation indicates the degree of protection provided by the different visualisation models, as well as the personal privacy preferences and valuations of the users.

  10. 32 CFR 806b.51 - Privacy and the Web.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy and the Web. 806b.51 Section 806b.51 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Disclosing Records to Third Parties § 806b.51 Privacy and the Web. Do not post personal...

  11. 32 CFR 806b.51 - Privacy and the Web.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy and the Web. 806b.51 Section 806b.51 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Disclosing Records to Third Parties § 806b.51 Privacy and the Web. Do not post personal...

  12. Legislation for Personal Privacy: Its Impact on Transborder Data Flow.

    ERIC Educational Resources Information Center

    Mendelsohn, L. D.

    1987-01-01

    This description of the development of privacy protection laws in several developed nations identifies possible motivations for such legislation other than protection of citizens' privacy, including economic factors and national sovereignty. The impact of privacy legislation on international trade is discussed. (20 references) (CLB)

  13. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act. In...

  14. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act. In...

  15. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act. In...

  16. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act. In...

  17. The Challenges of Seeking Security While Respecting Privacy

    NASA Astrophysics Data System (ADS)

    Kantor, Paul B.; Lesk, Michael E.

    Security is a concern for persons, organizations, and nations. For the individual members of organizations and nations, personal privacy is also a concern. The technologies for monitoring electronic communication are at the same time tools to protect security and threats to personal privacy. Participants in this workshop address the interrelation of personal privacy and national or societal security, from social, technical and legal perspectives. The participants represented industry, the academy and the United States Government. The issues addressed have become, if anything, even more pressing today than they were when the conference was held.

  18. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  19. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  20. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  1. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  2. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  3. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  4. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  5. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  6. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  7. 32 CFR 320.12 - Exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.12 Exemptions. Link to an amendment published... intelligence agencies which may be exempt from certain provisions of the Privacy Act. However, NGA does not... in this system, including law enforcement counterterrorism, investigatory and intelligence records...

  8. 32 CFR 724.811 - Privacy Act information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of SECNAVINST...

  9. 32 CFR 724.811 - Privacy Act information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of SECNAVINST...

  10. 32 CFR 724.811 - Privacy Act information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of SECNAVINST...

  11. 32 CFR 724.811 - Privacy Act information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of SECNAVINST...

  12. 32 CFR 724.811 - Privacy Act information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of SECNAVINST...

  13. The State of Intelligent Transportation Systems in the National Park System.

    DOT National Transportation Integrated Search

    2001-05-25

    This paper was written to provide basic information in advance of the National Workshop to : Develop an Intelligent Transportation Systems Program Strategy for the National Park : Service, June 19-20, 2001, to be held at the Central Federal Lan...

  14. 32 CFR 865.119 - Privacy Act information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of 32...

  15. 32 CFR 865.119 - Privacy Act information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of 32...

  16. 32 CFR 865.119 - Privacy Act information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of 32...

  17. 32 CFR 865.119 - Privacy Act information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of 32...

  18. 32 CFR 865.119 - Privacy Act information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of 32...

  19. National ITS Program Plan Intelligent Transportation Systems Volume I

    DOT National Transportation Integrated Search

    1995-03-01

    ADVANCED TRAVELER INFORMATION SYSTEMS OR ATIS : THE PURPOSE OF THE NATIONAL ITS PROGRAM PLAN IS TO GUIDE THE DEVELOPMENT AND DEPLOYMENT OF INTELLIGENT TRANSPORTATION SYSTEMS (ITS) IN THE UNITED STATES. THIS, THE FIRST EDITION OF THE PLAN WAS A JOINT ...

  20. National ITS Program Plan, Intelligent Transportation Systems Volume II

    DOT National Transportation Integrated Search

    1995-03-01

    THE PURPOSE OF THE NATIONAL ITS PROGRAM PLAN IS TO GUIDE THE DEVELOPMENT AND DEPLOYMENT OF INTELLIGENT TRANSPORTATION SYSTEMS (ITS) IN THE UNITED STATES. THIS, THE FIRST EDITION OF THE PLAN WAS A JOINT EFFORT OF ITS AMERICA AND THE UNITED STATES DEPA...

  1. Evaluating Common Privacy Vulnerabilities in Internet Service Providers

    NASA Astrophysics Data System (ADS)

    Kotzanikolaou, Panayiotis; Maniatis, Sotirios; Nikolouzou, Eugenia; Stathopoulos, Vassilios

    Privacy in electronic communications receives increased attention in both research and industry forums, stemming from both the users' needs and from legal and regulatory requirements in national or international context. Privacy in internet-based communications heavily relies on the level of security of the Internet Service Providers (ISPs), as well as on the security awareness of the end users. This paper discusses the role of the ISP in the privacy of the communications. Based on real security audits performed in national-wide ISPs, we illustrate privacy-specific threats and vulnerabilities that many providers fail to address when implementing their security policies. We subsequently provide and discuss specific security measures that the ISPs can implement, in order to fine-tune their security policies in the context of privacy protection.

  2. EGRP Privacy Policy & Disclaimers

    Cancer.gov

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  3. Nation-wide primary healthcare research network: a privacy protection assessment.

    PubMed

    De Clercq, Etienne; Van Casteren, Viviane; Bossuyt, Nathalie; Moreels, Sarah; Goderis, Geert; Bartholomeeusen, Stefaan; Bonte, Pierre; Bangels, Marc

    2012-01-01

    Efficiency and privacy protection are essential when setting up nationwide research networks. This paper investigates the extent to which basic services developed to support the provision of care can be re-used, whilst preserving an acceptable privacy protection level, within a large Belgian primary care research network. The generic sustainable confidentiality management model used to assess the privacy protection level of the selected network architecture is described. A short analysis of the current architecture is provided. Our generic model could also be used in other countries.

  4. 32 CFR 505.3 - Privacy Act systems of records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privacy Act systems of records. 505.3 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.3 Privacy Act systems of records. (a) Systems... assigned to an individual. (2) Privacy Act systems of records must be— (i) Authorized by Federal statute or...

  5. 32 CFR 505.3 - Privacy Act systems of records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Privacy Act systems of records. 505.3 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.3 Privacy Act systems of records. (a) Systems... assigned to an individual. (2) Privacy Act systems of records must be— (i) Authorized by Federal statute or...

  6. 28 CFR 16.82 - Exemption of the National Drug Intelligence Center Data Base-limited access.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Intelligence Center Data Base-limited access. 16.82 Section 16.82 Judicial Administration DEPARTMENT OF JUSTICE....82 Exemption of the National Drug Intelligence Center Data Base—limited access. (a) The following... Intelligence Center Data Base (JUSTICE/NDIC-001). (2) [Reserved] (b) These exemptions apply only to the extent...

  7. 28 CFR 16.82 - Exemption of the National Drug Intelligence Center Data Base-limited access.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Intelligence Center Data Base-limited access. 16.82 Section 16.82 Judicial Administration DEPARTMENT OF JUSTICE....82 Exemption of the National Drug Intelligence Center Data Base—limited access. (a) The following... Intelligence Center Data Base (JUSTICE/NDIC-001). (2) [Reserved] (b) These exemptions apply only to the extent...

  8. 28 CFR 16.82 - Exemption of the National Drug Intelligence Center Data Base-limited access.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Intelligence Center Data Base-limited access. 16.82 Section 16.82 Judicial Administration DEPARTMENT OF JUSTICE....82 Exemption of the National Drug Intelligence Center Data Base—limited access. (a) The following... Intelligence Center Data Base (JUSTICE/NDIC-001). (2) [Reserved] (b) These exemptions apply only to the extent...

  9. 28 CFR 16.82 - Exemption of the National Drug Intelligence Center Data Base-limited access.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Intelligence Center Data Base-limited access. 16.82 Section 16.82 Judicial Administration DEPARTMENT OF JUSTICE....82 Exemption of the National Drug Intelligence Center Data Base—limited access. (a) The following... Intelligence Center Data Base (JUSTICE/NDIC-001). (2) [Reserved] (b) These exemptions apply only to the extent...

  10. 28 CFR 16.82 - Exemption of the National Drug Intelligence Center Data Base-limited access.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Intelligence Center Data Base-limited access. 16.82 Section 16.82 Judicial Administration DEPARTMENT OF JUSTICE....82 Exemption of the National Drug Intelligence Center Data Base—limited access. (a) The following... Intelligence Center Data Base (JUSTICE/NDIC-001). (2) [Reserved] (b) These exemptions apply only to the extent...

  11. 32 CFR 505.3 - Privacy Act systems of records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privacy Act systems of records. 505.3 Section 505... AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.3 Privacy Act systems of records. (a) Systems of... assigned to an individual. (2) Privacy Act systems of records must be— (i) Authorized by Federal statute or...

  12. 32 CFR 505.3 - Privacy Act systems of records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Privacy Act systems of records. 505.3 Section 505... AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.3 Privacy Act systems of records. (a) Systems of... assigned to an individual. (2) Privacy Act systems of records must be— (i) Authorized by Federal statute or...

  13. Privacy Policy | FNLCR Staging

    Cancer.gov

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  14. 76 FR 58786 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-22

    ... National Security Agency/Central Security System systems of records notices subject to the Privacy Act of... inquiries to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; Systems of Records AGENCY: National Security Agency/Central Security Service, Department of Defense (DoD...

  15. 78 FR 45913 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-30

    ... National Security Agency/Central Security Service systems of records subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act Office, 9800...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to alter...

  16. 75 FR 43494 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act and Privacy Act Office, 9800...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to...

  17. 75 FR 67697 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-03

    ... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act (FOIA)/Privacy Act Office...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a...

  18. The Decline of Intelligence in America: A Strategy for National Renewal.

    ERIC Educational Resources Information Center

    Itzkoff, Seymour W.

    It is argued that the United States is declining as a nation, a decline that can be confirmed by any of the criteria that historians have ever used to measure the state and condition of a nation and its people, and it is asserted that this decline is rooted in the overall decline of the intelligence capital of the nation, a decline in the levels…

  19. 77 FR 59021 - License Amendment Request for the U.S. Department of the Army, National Ground Intelligence...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-25

    ... NUCLEAR REGULATORY COMMISSION [Docket No. 03032042; NRC-2012-0219] License Amendment Request for the U.S. Department of the Army, National Ground Intelligence Center, Charlottesville, VA AGENCY... held by the U.S. Department of the Army, National Ground Intelligence Center (the licensee), for...

  20. 32 CFR 320.11 - Penalties.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Penalties. 320.11 Section 320.11 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.11 Penalties. The Privacy Act of 1974 (5 U.S.C...

  1. 32 CFR 320.11 - Penalties.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Penalties. 320.11 Section 320.11 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.11 Penalties. The Privacy Act of 1974 (5 U.S.C...

  2. 32 CFR 320.11 - Penalties.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Penalties. 320.11 Section 320.11 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.11 Penalties. The Privacy Act of 1974 (5 U.S.C...

  3. 32 CFR 701.119 - Privacy and the web.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy and the web. 701.119 Section 701.119... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON activities shall consult SECNAVINST 5720.47B for guidance on what may be posted on a Navy Web site. ...

  4. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Evaluating information systems for Privacy Act compliance. 806b.30 Section 806b.30 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR... privacy issues are unchanged. (d) The depth and content of the Privacy Impact Assessment should be...

  5. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Evaluating information systems for Privacy Act compliance. 806b.30 Section 806b.30 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR... privacy issues are unchanged. (d) The depth and content of the Privacy Impact Assessment should be...

  6. From Data Privacy to Location Privacy

    NASA Astrophysics Data System (ADS)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  7. 77 FR 15596 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2012-OS-0032] 32 CFR Part 322 Privacy... levels of government. List of Subjects in 32 CFR Part 322 Privacy. Accordingly, 32 CFR part 322 is amended as follows: PART 322--NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 0 1. The authority...

  8. Efficient Secure and Privacy-Preserving Route Reporting Scheme for VANETs

    NASA Astrophysics Data System (ADS)

    Zhang, Yuanfei; Pei, Qianwen; Dai, Feifei; Zhang, Lei

    2017-10-01

    Vehicular ad-hoc network (VANET) is a core component of intelligent traffic management system which could provide various of applications such as accident prediction, route reporting, etc. Due to the problems caused by traffic congestion, route reporting becomes a prospective application which can help a driver to get optimal route to save her travel time. Before enjoying the convenience of route reporting, security and privacy-preserving issues need to be concerned. In this paper, we propose a new secure and privacy-preserving route reporting scheme for VANETs. In our scheme, only an authenticated vehicle can use the route reporting service provided by the traffic management center. Further, a vehicle may receive the response from the traffic management center with low latency and without violating the privacy of the vehicle. Experiment results show that our scheme is much more efficiency than the existing one.

  9. Counter-Intelligence as a Chaotic Phenomenon and Its Importance in National Security

    NASA Astrophysics Data System (ADS)

    Kuloğlu, Gökhan; Gül, Zakir; Erçetin, Şefika Şule

    In today's rapidly changing globalized world, remarkably fast and important developments have been faced in the area of national security as in almost all other areas. Advancements in communication and transportation technologies have removed physical boundaries almost completely. National security institutions now have to fight against new and complicated security threats that go beyond the boundaries such as organized crimes and terror crimes. These ever-changing threats and dangerous environment which become more and more complex every single day force nations to review their current security structures and to take new and effective measures in the required areas in order to ensure their national security. As a matter of fact, counter-intelligence, which was quite important due to the frequency of spying acts during the Cold War but lost its importance after the Cold War had ended, has been one of these measures. Today, counterintelligence has once again become one of the most important functions in the fight against national security threats with changing dimensions. It is only possible for a nation to ensure its national security fully by having not only a defensive and passive approach but also offensive counter-intelligence.

  10. Privacy Implications Arising From Intelligent Vehicle-Highway Systems

    DOT National Transportation Integrated Search

    1993-12-08

    INTELLIGENT VEHICLE-HIGHWAY SYSTEMS, ("IVHS") INVOLVE ELECTRONIC MONITORING AND SOMETIMES IDENTIFICATION OF AND COMMUNICATION WITH MOTOR VEHICLES OPERATING ON PUBLIC HIGHWAYS FOR THE PURPOSE OF IMPROVING TRAFFIC SAFETY, EFFICIENCY AND CONVENIENCE. IV...

  11. A laboratory study for assessing speech privacy in a simulated open-plan office.

    PubMed

    Lee, P J; Jeon, J Y

    2014-06-01

    The aim of this study is to assess speech privacy in open-plan office using two recently introduced single-number quantities: the spatial decay rate of speech, DL(2,S) [dB], and the A-weighted sound pressure level of speech at a distance of 4 m, L(p,A,S,4) m [dB]. Open-plan offices were modeled using a DL(2,S) of 4, 8, and 12 dB, and L(p,A,S,4) m was changed in three steps, from 43 to 57 dB.Auditory experiments were conducted at three locations with source–receiver distances of 8, 16, and 24 m, while background noise level was fixed at 30 dBA.A total of 20 subjects were asked to rate the speech intelligibility and listening difficulty of 240 Korean sentences in such surroundings. The speech intelligibility scores were not affected by DL(2,S) or L(p,A,S,4) m at a source–receiver distance of 8 m; however, listening difficulty ratings were significantly changed with increasing DL(2,S) and L(p,A,S,4) m values. At other locations, the influences of DL(2,S) and L(p,A,S,4) m on speech intelligibility and listening difficulty ratings were significant. It was also found that the speech intelligibility scores and listening difficulty ratings were considerably changed with increasing the distraction distance (r(D)). Furthermore, listening difficulty is more sensitive to variations in DL(2,S) and L(p,A,S,4) m than intelligibility scores for sound fields with high speech transmission performances. The recently introduced single-number quantities in the ISO standard, based on the spatial distribution of sound pressure level, were associated with speech privacy in an open-plan office. The results support single-number quantities being suitable to assess speech privacy, mainly at large distances. This new information can be considered when designing open-plan offices and making acoustic guidelines of open-plan offices.

  12. 78 FR 66906 - Privacy Act of 1974; System of Records: National Title I Study of Implementation and Outcomes...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-07

    ... DEPARTMENT OF EDUCATION Privacy Act of 1974; System of Records: National Title I Study of Implementation and Outcomes; Early Childhood Language Development AGENCY: Institute of Education Sciences, Department of Education. ACTION: Notice of a new system of records. [[Page 66907

  13. National Conference On Intelligent Transportation Systems And The Environment: Conference Proceedings

    DOT National Transportation Integrated Search

    1994-06-06

    ENVIRONMENTAL IMPACT : THE PURPOSE OF THE NATIONAL POLICY CONFERENCE ON ITS AND THE ENVIRONMENT WAS TO CONDUCT A WIDE RANGING EXAMINATION OF HOW INTELLIGENT TRANSPORTATION AND RELATED ADVANCED TECHNOLOGIES COULD IMPACT ENVIRONMENTAL POLICIES AND P...

  14. 47 CFR 0.506 - FOIA and Privacy Act requests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false FOIA and Privacy Act requests. 0.506 Section 0... Declassification of National Security Information § 0.506 FOIA and Privacy Act requests. Requests for....461), of the Privacy Act of 1974, (See § 0.554) shall be processed in accordance with the provisions...

  15. 47 CFR 0.506 - FOIA and Privacy Act requests.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Declassification of National Security Information § 0.506 FOIA and Privacy Act requests. Requests for... 47 Telecommunication 1 2014-10-01 2014-10-01 false FOIA and Privacy Act requests. 0.506 Section 0....461), of the Privacy Act of 1974, (See § 0.554) shall be processed in accordance with the provisions...

  16. 47 CFR 0.506 - FOIA and Privacy Act requests.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Declassification of National Security Information § 0.506 FOIA and Privacy Act requests. Requests for... 47 Telecommunication 1 2013-10-01 2013-10-01 false FOIA and Privacy Act requests. 0.506 Section 0....461), of the Privacy Act of 1974, (See § 0.554) shall be processed in accordance with the provisions...

  17. 47 CFR 0.506 - FOIA and Privacy Act requests.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Declassification of National Security Information § 0.506 FOIA and Privacy Act requests. Requests for... 47 Telecommunication 1 2011-10-01 2011-10-01 false FOIA and Privacy Act requests. 0.506 Section 0....461), of the Privacy Act of 1974, (See § 0.554) shall be processed in accordance with the provisions...

  18. 47 CFR 0.506 - FOIA and Privacy Act requests.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Declassification of National Security Information § 0.506 FOIA and Privacy Act requests. Requests for... 47 Telecommunication 1 2012-10-01 2012-10-01 false FOIA and Privacy Act requests. 0.506 Section 0....461), of the Privacy Act of 1974, (See § 0.554) shall be processed in accordance with the provisions...

  19. NOAA's National Water Model - Integration of National Water Model with Geospatial Data creating Water Intelligence

    NASA Astrophysics Data System (ADS)

    Clark, E. P.; Cosgrove, B.; Salas, F.

    2016-12-01

    As a significant step forward to transform NOAA's water prediction services, NOAA plans to implement a new National Water Model (NWM) Version 1.0 in August 2016. A continental scale water resources model, the NWM is an evolution of the WRF-Hydro architecture developed by the National Center for Atmospheric Research (NCAR). The NWM will provide analyses and forecasts of flow for the 2.7 million stream reaches nationwide in the National Hydrography Dataset Plus v2 (NHDPlusV2) jointly developed by the USGS and EPA. The NWM also produces high-resolution water budget variables of snow, soil moisture, and evapotranspiration on a 1-km grid. NOAA's stakeholders require additional decision support application to be built on these data. The Geo-intelligence division of the Office of Water Prediction is building new products and services that integrate output from the NWM with geospatial datasets such as infrastructure and demographics to better estimate the impacts dynamic water resource states on community resiliency. This presentation will detail the methods and underlying information to produce prototypes water resources intelligence that is timely, actionable and credible. Moreover, it will to explore the NWM capability to support sector-specific decision support services.

  20. 32 CFR Appendix G to Part 323 - Privacy Act Enforcement Actions

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Privacy Act Enforcement Actions G Appendix G to... (CONTINUED) PRIVACY PROGRAM DEFENSE LOGISTICS AGENCY PRIVACY PROGRAM Pt. 323, App. G Appendix G to Part 323—Privacy Act Enforcement Actions A. Administrative Remedies. Any individual who feels he or she has a...

  1. 32 CFR Appendix G to Part 323 - Privacy Act Enforcement Actions

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Privacy Act Enforcement Actions G Appendix G to... (CONTINUED) PRIVACY PROGRAM DEFENSE LOGISTICS AGENCY PRIVACY PROGRAM Pt. 323, App. G Appendix G to Part 323—Privacy Act Enforcement Actions A. Administrative Remedies. Any individual who feels he or she has a...

  2. 32 CFR Appendix G to Part 323 - Privacy Act Enforcement Actions

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Privacy Act Enforcement Actions G Appendix G to... (CONTINUED) PRIVACY PROGRAM DEFENSE LOGISTICS AGENCY PRIVACY PROGRAM Pt. 323, App. G Appendix G to Part 323—Privacy Act Enforcement Actions A. Administrative Remedies. Any individual who feels he or she has a...

  3. The Role of Health Care Experience and Consumer Information Efficacy in Shaping Privacy and Security Perceptions of Medical Records: National Consumer Survey Results

    PubMed Central

    Beckjord, Ellen; Moser, Richard P; Hughes, Penelope; Hesse, Bradford W

    2015-01-01

    Background Providers’ adoption of electronic health records (EHRs) is increasing and consumers have expressed concerns about the potential effects of EHRs on privacy and security. Yet, we lack a comprehensive understanding regarding factors that affect individuals’ perceptions regarding the privacy and security of their medical information. Objective The aim of this study was to describe national perceptions regarding the privacy and security of medical records and identify a comprehensive set of factors associated with these perceptions. Methods Using a nationally representative 2011-2012 survey, we reported on adults’ perceptions regarding privacy and security of medical records and sharing of health information between providers, and whether adults withheld information from a health care provider due to privacy or security concerns. We used multivariable models to examine the association between these outcomes and sociodemographic characteristics, health and health care experience, information efficacy, and technology-related variables. Results Approximately one-quarter of American adults (weighted n=235,217,323; unweighted n=3959) indicated they were very confident (n=989) and approximately half indicated they were somewhat confident (n=1597) in the privacy of their medical records; we found similar results regarding adults’ confidence in the security of medical records (very confident: n=828; somewhat confident: n=1742). In all, 12.33% (520/3904) withheld information from a health care provider and 59.06% (2100/3459) expressed concerns about the security of both faxed and electronic health information. Adjusting for other characteristics, adults who reported higher quality of care had significantly greater confidence in the privacy and security of their medical records and were less likely to withhold information from their health care provider due to privacy or security concerns. Adults with higher information efficacy had significantly greater

  4. The role of health care experience and consumer information efficacy in shaping privacy and security perceptions of medical records: national consumer survey results.

    PubMed

    Patel, Vaishali; Beckjord, Ellen; Moser, Richard P; Hughes, Penelope; Hesse, Bradford W

    2015-04-02

    Providers' adoption of electronic health records (EHRs) is increasing and consumers have expressed concerns about the potential effects of EHRs on privacy and security. Yet, we lack a comprehensive understanding regarding factors that affect individuals' perceptions regarding the privacy and security of their medical information. The aim of this study was to describe national perceptions regarding the privacy and security of medical records and identify a comprehensive set of factors associated with these perceptions. Using a nationally representative 2011-2012 survey, we reported on adults' perceptions regarding privacy and security of medical records and sharing of health information between providers, and whether adults withheld information from a health care provider due to privacy or security concerns. We used multivariable models to examine the association between these outcomes and sociodemographic characteristics, health and health care experience, information efficacy, and technology-related variables. Approximately one-quarter of American adults (weighted n=235,217,323; unweighted n=3959) indicated they were very confident (n=989) and approximately half indicated they were somewhat confident (n=1597) in the privacy of their medical records; we found similar results regarding adults' confidence in the security of medical records (very confident: n=828; somewhat confident: n=1742). In all, 12.33% (520/3904) withheld information from a health care provider and 59.06% (2100/3459) expressed concerns about the security of both faxed and electronic health information. Adjusting for other characteristics, adults who reported higher quality of care had significantly greater confidence in the privacy and security of their medical records and were less likely to withhold information from their health care provider due to privacy or security concerns. Adults with higher information efficacy had significantly greater confidence in the privacy and security of medical

  5. Technology, Privacy, and Electronic Freedom of Speech.

    ERIC Educational Resources Information Center

    McDonald, Frances M.

    1986-01-01

    Explores five issues related to technology's impact on privacy and access to information--regulation and licensing of the press, electronic surveillance, invasion of privacy, copyright, and policy-making and regulation. The importance of First Amendment rights and civil liberties in forming a coherent national information policy is stressed.…

  6. 32 CFR 505.14 - Recordkeeping requirements under the Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Recordkeeping requirements under the Privacy Act. 505.14 Section 505.14 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.14 Recordkeeping requirements...

  7. 32 CFR 806b.11 - When to give Privacy Act Statements (PAS).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false When to give Privacy Act Statements (PAS). 806b... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.11 When to give Privacy Act Statements... information. Give a copy of the Privacy Act Statement if asked. Do not ask the person to sign the Privacy Act...

  8. 32 CFR 806b.11 - When to give Privacy Act Statements (PAS).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false When to give Privacy Act Statements (PAS). 806b... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.11 When to give Privacy Act Statements... information. Give a copy of the Privacy Act Statement if asked. Do not ask the person to sign the Privacy Act...

  9. 32 CFR 806b.11 - When to give Privacy Act Statements (PAS).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false When to give Privacy Act Statements (PAS). 806b... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.11 When to give Privacy Act Statements... information. Give a copy of the Privacy Act Statement if asked. Do not ask the person to sign the Privacy Act...

  10. HEALTH PROFESSIONALS' USER EXPERIENCE OF THE INTELLIGENT BED IN PATIENTS' HOMES.

    PubMed

    Cai, Hao; Toft, Egon; Hejlesen, Ole; Hansen, John; Oestergaard, Claus; Dinesen, Birthe

    2015-01-01

    The intelligent bed is a medical bed with several home healthcare functions. It includes, among others, an "out of bed" detector, a moisture detector, and a catheter bag detector. The design purpose of the intelligent bed is to assist patients in their daily living, facilitate the work of clinical staff, and improves the quality of care. The aim of this sub-study of the iCare project was to explore how health professionals (HPs) experience and use the intelligent bed in patients' homes. The overall research design is inspired by case study methodology. A triangulation of data collection techniques has been used: log book, documentation study, participant observations (n = 45 hr), and qualitative interviews (n = 23). The data have been analyzed by means of Nvivo 9.0. We identified several themes: HP transformation from passive technology recipient to innovator; individualized care; work flow redesign; and sensor technology intruding on patient privacy. It is suggested that functions of the intelligent bed can result in more individualized care, workflow redesign, and time savings for the health professionals in caring for elderly patients. However, the technology intruded on patients' privacy.

  11. 22 CFR 51.73 - Privacy of hearing.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Privacy of hearing. 51.73 Section 51.73 Foreign Relations DEPARTMENT OF STATE NATIONALITY AND PASSPORTS PASSPORTS Procedures for Review of Certain Denials and Revocations § 51.73 Privacy of hearing. Only the person requesting the hearing, his or her...

  12. 22 CFR 51.73 - Privacy of hearing.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Privacy of hearing. 51.73 Section 51.73 Foreign Relations DEPARTMENT OF STATE NATIONALITY AND PASSPORTS PASSPORTS Procedures for Review of Certain Denials and Revocations § 51.73 Privacy of hearing. Only the person requesting the hearing, his or her...

  13. 22 CFR 51.73 - Privacy of hearing.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Privacy of hearing. 51.73 Section 51.73 Foreign Relations DEPARTMENT OF STATE NATIONALITY AND PASSPORTS PASSPORTS Procedures for Review of Certain Denials and Revocations § 51.73 Privacy of hearing. Only the person requesting the hearing, his or her...

  14. 22 CFR 51.73 - Privacy of hearing.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Privacy of hearing. 51.73 Section 51.73 Foreign Relations DEPARTMENT OF STATE NATIONALITY AND PASSPORTS PASSPORTS Procedures for Review of Certain Denials and Revocations § 51.73 Privacy of hearing. Only the person requesting the hearing, his or her...

  15. 22 CFR 51.73 - Privacy of hearing.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Privacy of hearing. 51.73 Section 51.73 Foreign Relations DEPARTMENT OF STATE NATIONALITY AND PASSPORTS PASSPORTS Procedures for Review of Certain Denials and Revocations § 51.73 Privacy of hearing. Only the person requesting the hearing, his or her...

  16. 32 CFR Appendix C to Part 505 - Privacy Act Statement Format

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Privacy Act Statement Format C Appendix C to... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM Pt. 505, App. C Appendix C to Part 505—Privacy Act... he or she chooses not to provide the requested information. (1) Example of a Privacy Act Statement (i...

  17. 32 CFR Appendix C to Part 505 - Privacy Act Statement Format

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privacy Act Statement Format C Appendix C to... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM Pt. 505, App. C Appendix C to Part 505—Privacy Act... he or she chooses not to provide the requested information. (1) Example of a Privacy Act Statement (i...

  18. 32 CFR Appendix C to Part 505 - Privacy Act Statement Format

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privacy Act Statement Format C Appendix C to Part... AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM Pt. 505, App. C Appendix C to Part 505—Privacy Act... he or she chooses not to provide the requested information. (1) Example of a Privacy Act Statement (i...

  19. 32 CFR Appendix C to Part 505 - Privacy Act Statement Format

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Privacy Act Statement Format C Appendix C to Part... AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM Pt. 505, App. C Appendix C to Part 505—Privacy Act... he or she chooses not to provide the requested information. (1) Example of a Privacy Act Statement (i...

  20. 32 CFR 320.1 - Purpose and scope.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.1 Purpose and scope. (a) This part is published... whether the National Geospatial-Intelligence Agency (NGA) maintains or has disclosed a record pertaining...

  1. 32 CFR 320.1 - Purpose and scope.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.1 Purpose and scope. (a) This part is published... whether the National Geospatial-Intelligence Agency (NGA) maintains or has disclosed a record pertaining...

  2. 32 CFR 320.1 - Purpose and scope.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.1 Purpose and scope. (a) This part is published... whether the National Geospatial-Intelligence Agency (NGA) maintains or has disclosed a record pertaining...

  3. Privacy Policy | Smokefree 60+

    Cancer.gov

    The National Cancer Institute (NCI) respects the privacy of users of its websites. This is why we have taken the time to disclose our privacy policy and information collection practices. NCI does not disclose, give, sell, or transfer any personal information about visitors unless required to do so by law. NCI automatically collects a limited amount of information about the use of websites for statistical purposes — that is, to measure the numbers of visitors. This information may be helpful when considering changes that improve our websites for future visitors.

  4. 77 FR 60475 - Privacy Act of 1974, as Amended; System of Records Notices

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-03

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Privacy Act of 1974, as Amended; System of Records Notices AGENCY: National Archives and Records Administration (NARA). ACTION: Notice of the establishment of new privacy system of record, NARA 44. SUMMARY: The National Archives and Records Administration...

  5. 76 FR 13671 - Privacy Act of 1974, as Amended; System of Records Notices

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-14

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Privacy Act of 1974, as Amended; System of Records Notices AGENCY: National Archives and Records Administration (NARA). ACTION: Notice of the establishment of new privacy system of record, NARA 41. SUMMARY: The National Archives and Records Administration...

  6. Defending the Homeland: The Case for Integrating National Guard Intelligence Personnel into the State Fusion Centers

    DTIC Science & Technology

    2011-02-15

    already robust lineup of 57 National Guard Combat Support Teams (CSTs) and 17 CBRNE Enhanced Response Force Packages (CERFPs) to increase the existing...analysis of disparate data sources, identification of intelligence gaps, and proactive collection of intelligence against those gaps which could

  7. 32 CFR 320.4 - Procedures for requesting information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Procedures for requesting information. 320.4 Section 320.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.4 Procedures for...

  8. 32 CFR 320.5 - Disclosure of requested information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Disclosure of requested information. 320.5 Section 320.5 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.5 Disclosure of...

  9. 32 CFR 320.3 - Responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Responsibilities. 320.3 Section 320.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.3 Responsibilities. (a) Director of NGA: (1...

  10. 32 CFR 320.5 - Disclosure of requested information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Disclosure of requested information. 320.5 Section 320.5 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.5 Disclosure of...

  11. 32 CFR 320.4 - Procedures for requesting information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Procedures for requesting information. 320.4 Section 320.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.4 Procedures for...

  12. 32 CFR 320.4 - Procedures for requesting information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Procedures for requesting information. 320.4 Section 320.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.4 Procedures for...

  13. 32 CFR 320.3 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Responsibilities. 320.3 Section 320.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.3 Responsibilities. (a) Director of NGA: (1...

  14. 32 CFR 320.12 - Exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Exemptions. 320.12 Section 320.12 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.12 Exemptions. (a) Exempt systems of record...

  15. 32 CFR 320.3 - Responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Responsibilities. 320.3 Section 320.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.3 Responsibilities. (a) Director of NGA: (1...

  16. 32 CFR 320.5 - Disclosure of requested information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Disclosure of requested information. 320.5 Section 320.5 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.5 Disclosure of...

  17. 32 CFR 320.12 - Exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Exemptions. 320.12 Section 320.12 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.12 Exemptions. (a) Exempt systems of record...

  18. Comparative Approaches to Biobanks and Privacy.

    PubMed

    Rothstein, Mark A; Knoppers, Bartha Maria; Harrell, Heather L

    2016-03-01

    Laws in the 20 jurisdictions studied for this project display many similar approaches to protecting privacy in biobank research. Although few have enacted biobank-specific legislation, many countries address biobanking within other laws. All provide for some oversight mechanisms for biobank research, even though the nature of that oversight varies between jurisdictions. Most have some sort of controlled access system in place for research with biobank specimens. While broad consent models facilitate biobanking, countries without national or federated biobanks have been slow to adopt broad consent. International guidelines have facilitated sharing and generally take a proportional risk approach, but many countries have provisions guiding international sharing and a few even limit international sharing. Although privacy laws may not prohibit international collaborations, the multi-prong approach to privacy unique to each jurisdiction can complicate international sharing. These symposium issues can serve as a resource for explaining the sometimes intricate privacy laws in each studied jurisdiction, outlining the key issues with regards to privacy and biobanking, and serving to describe a framework for the process of harmonization of privacy laws. © 2016 American Society of Law, Medicine & Ethics.

  19. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Privacy Act pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (2) and (5): Foreign Intelligence and... concerning him or her would hinder authorized United States intelligence activities by informing that...) Subsection (d)(1). Disclosure of foreign intelligence and counterintelligence information would interfere...

  20. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Privacy Act pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (2) and (5): Foreign Intelligence and... concerning him or her would hinder authorized United States intelligence activities by informing that...) Subsection (d)(1). Disclosure of foreign intelligence and counterintelligence information would interfere...

  1. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Privacy Act pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (2) and (5): Foreign Intelligence and... concerning him or her would hinder authorized United States intelligence activities by informing that...) Subsection (d)(1). Disclosure of foreign intelligence and counterintelligence information would interfere...

  2. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Privacy Act pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (2) and (5): Foreign Intelligence and... concerning him or her would hinder authorized United States intelligence activities by informing that...) Subsection (d)(1). Disclosure of foreign intelligence and counterintelligence information would interfere...

  3. 32 CFR 320.7 - Agency review of request for correction or amendment of record.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Agency review of request for correction or amendment of record. 320.7 Section 320.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320...

  4. 32 CFR 320.6 - Request for correction or amendment to record.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Request for correction or amendment to record. 320.6 Section 320.6 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.6 Request...

  5. 32 CFR 320.10 - Fees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Fees. 320.10 Section 320.10 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.10 Fees. Individuals may request copies for retention of...

  6. 32 CFR 320.10 - Fees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Fees. 320.10 Section 320.10 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.10 Fees. Individuals may request copies for retention of...

  7. 32 CFR 1901.45 - Notification of decision and right of judicial review.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Notification of decision and right of judicial review. 1901.45 Section 1901.45 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Action on Privacy Act Administrative Appeals...

  8. 32 CFR 320.7 - Agency review of request for correction or amendment of record.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Agency review of request for correction or amendment of record. 320.7 Section 320.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320...

  9. 32 CFR 1901.11 - Preliminary information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Preliminary information. 1901.11 Section 1901.11 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests § 1901.11 Preliminary information. Members...

  10. 32 CFR 1901.44 - Action by appeals authority.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Action by appeals authority. 1901.44 Section 1901.44 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Action on Privacy Act Administrative Appeals § 1901.44 Action...

  11. 32 CFR 1901.13 - Requirements as to identification of requester.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Requirements as to identification of requester. 1901.13 Section 1901.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests § 1901.13...

  12. 32 CFR 320.10 - Fees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Fees. 320.10 Section 320.10 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.10 Fees. Individuals may request copies for retention of...

  13. 32 CFR 320.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Definitions. 320.2 Section 320.2 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.2 Definitions. As used in this part: (a...

  14. 32 CFR 1901.45 - Notification of decision and right of judicial review.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Notification of decision and right of judicial review. 1901.45 Section 1901.45 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Action on Privacy Act Administrative Appeals...

  15. 32 CFR 1901.13 - Requirements as to identification of requester.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Requirements as to identification of requester. 1901.13 Section 1901.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests § 1901.13...

  16. 32 CFR 320.6 - Request for correction or amendment to record.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Request for correction or amendment to record. 320.6 Section 320.6 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.6 Request...

  17. 32 CFR 320.6 - Request for correction or amendment to record.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Request for correction or amendment to record. 320.6 Section 320.6 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.6 Request...

  18. 32 CFR 320.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Definitions. 320.2 Section 320.2 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.2 Definitions. As used in this part: (a...

  19. 32 CFR 1901.44 - Action by appeals authority.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Action by appeals authority. 1901.44 Section 1901.44 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Action on Privacy Act Administrative Appeals § 1901.44 Action...

  20. 32 CFR 1901.11 - Preliminary information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Preliminary information. 1901.11 Section 1901.11 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests § 1901.11 Preliminary information. Members...

  1. 32 CFR 320.7 - Agency review of request for correction or amendment of record.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Agency review of request for correction or amendment of record. 320.7 Section 320.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320...

  2. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ....107.pdf. (1) Developing or procuring information technology systems or projects that collect, maintain... 32 National Defense 6 2013-07-01 2013-07-01 false Evaluating information systems for Privacy Act... FORCE ADMINISTRATION PRIVACY ACT PROGRAM Privacy Impact Assessments § 806b.30 Evaluating information...

  3. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ....107.pdf. (1) Developing or procuring information technology systems or projects that collect, maintain... 32 National Defense 6 2014-07-01 2014-07-01 false Evaluating information systems for Privacy Act... FORCE ADMINISTRATION PRIVACY ACT PROGRAM Privacy Impact Assessments § 806b.30 Evaluating information...

  4. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ....107.pdf. (1) Developing or procuring information technology systems or projects that collect, maintain... 32 National Defense 6 2012-07-01 2012-07-01 false Evaluating information systems for Privacy Act... FORCE ADMINISTRATION PRIVACY ACT PROGRAM Privacy Impact Assessments § 806b.30 Evaluating information...

  5. 32 CFR 1701.7 - Requests for notification of and access to records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... THE DIRECTOR OF NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.7 Requests for... the specific Privacy Act System of Records Notice. To ensure proper routing and tracking, requesters...

  6. 78 FR 69393 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    .... FOR FURTHER INFORMATION CONTACT: National Geospatial-Intelligence Agency (NGA), ATTN: Human...: Delete entry and replace with ``Human Development Directorate, National Geospatial-Intelligence Agency...; System of Records AGENCY: National Geospatial-Intelligence Agency, DoD. ACTION: Notice to alter a System...

  7. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ....C. 2473 (2003); Federal Records Act, 44 U.S.C. 3101 (2003); Chief Financial Officers Act of 1990 205.... ADDRESSES: Patti F. Stockman, Privacy Act Officer, Office of the Chief Information Officer, National... Information Officer. NASA 10CFMR SYSTEM NAME: Core Financial Management Records. SECURITY CLASSIFICATION: This...

  8. 77 FR 69898 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-21

    ... System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the... notice of its intention to revise a previously noticed system of records Earth Observing System Data and...

  9. 78 FR 32635 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-31

    ...; System of Records AGENCY: National Geospatial-Intelligence Agency, DoD. ACTION: Notice to Add a New System of Records. SUMMARY: The National Geospatial-Intelligence Agency is establishing a new system of... information. FOR FURTHER INFORMATION CONTACT: National Geospatial-Intelligence Agency [[Page 32636

  10. 78 FR 35606 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-13

    ...; System of Records AGENCY: National Geospatial-Intelligence Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The National Geospatial-Intelligence Agency is altering a system of records in.... FOR FURTHER INFORMATION CONTACT: National Geospatial-Intelligence Agency (NGA), ATTN: Security...

  11. 32 CFR 324.14 - Relationship between the Privacy Act and the Freedom of Information Act.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Relationship between the Privacy Act and the Freedom of Information Act. 324.14 Section 324.14 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DFAS PRIVACY ACT PROGRAM Individual Access to Records § 324.14 Relationship between the...

  12. 32 CFR 1701.6 - Disclosure of records/policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.6 Disclosure of records/policy... Privacy Act Systems of Records Notices (available at http://www.dni.gov); (d) Release to the Bureau of the...

  13. 32 CFR 1901.42 - Right of appeal and appeal procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Right of appeal and appeal procedures. 1901.42 Section 1901.42 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Action on Privacy Act Administrative Appeals § 1901.42...

  14. 32 CFR 1901.23 - Notification of decision and right of appeal.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Notification of decision and right of appeal. 1901.23 Section 1901.23 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Action on Privacy Act Requests § 1901.23...

  15. 32 CFR 1901.43 - Determination(s) by Deputy Director(s).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Determination(s) by Deputy Director(s). 1901.43 Section 1901.43 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Action on Privacy Act Administrative Appeals § 1901.43...

  16. 32 CFR 1901.23 - Notification of decision and right of appeal.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Notification of decision and right of appeal. 1901.23 Section 1901.23 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Action on Privacy Act Requests § 1901.23...

  17. 32 CFR 1901.42 - Right of appeal and appeal procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Right of appeal and appeal procedures. 1901.42 Section 1901.42 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Action on Privacy Act Administrative Appeals § 1901.42...

  18. 32 CFR 1901.43 - Determination(s) by Deputy Director(s).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Determination(s) by Deputy Director(s). 1901.43 Section 1901.43 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Action on Privacy Act Administrative Appeals § 1901.43...

  19. 75 FR 43497 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ...; System of Records AGENCY: National Geospatial-Intelligence Agency (NGA), DoD. ACTION: Notice to add a system of records. SUMMARY: The National Geospatial-Intelligence Agency (NGA) proposes to add a system of...-3808. SUPPLEMENTARY INFORMATION: The National Geospatial-Intelligence Agency notices for systems of...

  20. Privacy in the Computer Age: Perceptions and Realities.

    ERIC Educational Resources Information Center

    Monfils, Barbara

    As more people become computer literate, issues of privacy become more pertinent. Major privacy issues at the individual, national, and international levels are identified in the first part of the paper. These issues provide the basis for the second part of the paper, which is a report of a survey in which subjects were asked to indicate whether…

  1. Genetic privacy and non-discrimination.

    PubMed

    Romeo Casabona, Carlos María

    2011-01-01

    The UN Inter-Agency Committee on Bioethics met for its tenth meeting at the UNESCO headquarters in Paris on 4-5th March 2011. Member organisations such as the WHO and UNESCO were in attendance alongside associate members such as the Council for Europe, the European Commission, the Organisation for Economic Co-operation and Development and the World Trade Organisation. Discussion centred on the theme "genetic privacy and nondiscrimination". The United Nations Economic and Social Council (ECOSOC) had previously considered, from a legal and ethical perspective, the implications of increasingly sophisticated technologies for genetic privacy and non-discrimination in fields such as medicine, employment and insurance. Thus, the ECOSOC requested that UNESCO report on relevant developments in the field of genetic privacy and non-discrimination. In parallel with a consultation process with member states, UNESCO launched a consultation with the UN Interagency Committee on Bioethics. This article analyses the report presented by the author concerning the analysis of the current contentions in the field and illustrates attempts at responding on a normative level to a perceived threat to genetic privacy and non-discrimination.

  2. 32 CFR 320.6 - Request for correction or amendment to record.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.6 Request... writing with the NGA Office of General Counsel for amendment. Such requests shall specify the particular...

  3. 32 CFR 320.6 - Request for correction or amendment to record.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.6 Request... writing with the NGA Office of General Counsel for amendment. Such requests shall specify the particular...

  4. 12 CFR 741.220 - Privacy of consumer financial information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Privacy of consumer financial information. 741.220 Section 741.220 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING... Privacy of consumer financial information. Any credit union which is insured pursuant to Title II of the...

  5. 12 CFR 741.220 - Privacy of consumer financial information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Privacy of consumer financial information. 741.220 Section 741.220 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING... Privacy of consumer financial information. Any credit union which is insured pursuant to Title II of the...

  6. 12 CFR 741.220 - Privacy of consumer financial information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Privacy of consumer financial information. 741.220 Section 741.220 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING... Privacy of consumer financial information. Any credit union which is insured pursuant to title II of the...

  7. 12 CFR 741.220 - Privacy of consumer financial information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Privacy of consumer financial information. 741.220 Section 741.220 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING... Privacy of consumer financial information. Any credit union which is insured pursuant to Title II of the...

  8. 12 CFR 741.220 - Privacy of consumer financial information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Privacy of consumer financial information. 741.220 Section 741.220 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING... Privacy of consumer financial information. Any credit union which is insured pursuant to Title II of the...

  9. 32 CFR 319.12 - General exemptions. [Reserved

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false General exemptions. [Reserved] 319.12 Section 319.12 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.12 General exemptions...

  10. 32 CFR 319.12 - General exemptions. [Reserved

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false General exemptions. [Reserved] 319.12 Section 319.12 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.12 General exemptions...

  11. 32 CFR 319.12 - General exemptions. [Reserved

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false General exemptions. [Reserved] 319.12 Section 319.12 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.12 General exemptions...

  12. Will the new Australian health privacy law provide adequate protection?

    PubMed

    Bomba, David; Hallit, George

    2002-01-01

    Amendments to the original Privacy Act (1988) come at a key point in time, as a national medical record system looms on the Australian horizon. Changes to The Privacy Act have the potential to define a level of information privacy prior to the implementation of such a system. We have therefore collected expert opinions on the ability of the Health Privacy Guidelines (enacted in December 2001 under The Privacy Act and hereafter more specifically known as Health Privacy Legislation) to ensure the privacy and security of patient information. We conclude that the legislation is flawed in its capacity to withstand an increasingly corporatised health sector. Deficiencies in consent requirements, together with feeble enforcement capabilities, mean The Legislation cannot effectively ensure that personally identifiable information will not end up in corporate third party hands. To significantly bolster the new legislation, we argue that it should be supplemented with explicit health data legislation and privacy auditing.

  13. 32 CFR 1901.12 - Requirements as to form.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Requirements as to form. 1901.12 Section 1901.12 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests § 1901.12 Requirements as to form. (a) In...

  14. 32 CFR 1901.14 - Fees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Fees. 1901.14 Section 1901.14 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests § 1901.14 Fees. No fees will be charged for any action...

  15. 32 CFR 1901.12 - Requirements as to form.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Requirements as to form. 1901.12 Section 1901.12 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests § 1901.12 Requirements as to form. (a) In...

  16. 32 CFR 1901.14 - Fees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Fees. 1901.14 Section 1901.14 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Filing of Privacy Act Requests § 1901.14 Fees. No fees will be charged for any action...

  17. 32 CFR 635.3 - Special requirements of the Privacy Act of 1974.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Special requirements of the Privacy Act of 1974. 635.3 Section 635.3 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Records Administration § 635.3 Special requirements of the Privacy Act of...

  18. Privacy policy analysis for health information networks and regional health information organizations.

    PubMed

    Noblin, Alice M

    2007-01-01

    Regional Health Information Organizations (RHIOs) are forming in response to President George W. Bush's 2004 mandate that medical information be made available electronically to facilitate continuity of care. Privacy concerns are a deterrent to widespread acceptance of RHIOs. The Health Information Portability and Accountability Act of 1996 provides some guidelines for privacy protection. However, most states have stricter guidelines, causing difficulty when RHIOs form across these jurisdictions. This article compares several RHIOs including their privacy policies where available. In addition, studies were reviewed considering privacy concerns of people in the United States and elsewhere. Surveys reveal that Americans are concerned about the privacy of their personal health information and ultimately feel it is the role of the government to provide protection. The purpose of this article is to look at the privacy issues and recommend a policy that may help to resolve some of the concerns of both providers and patients. Policy research and action are needed to move the National Health Information Network toward reality. Efforts to provide consistency in privacy laws are a necessary early step to facilitate the construction and maintenance of RHIOs and the National Health Information Network.

  19. 36 CFR 1202.6 - Whom should I contact for Privacy Act matters at NARA?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Privacy Act matters at NARA? 1202.6 Section 1202.6 Parks, Forests, and Public Property NATIONAL ARCHIVES... Information About the Privacy Act § 1202.6 Whom should I contact for Privacy Act matters at NARA? Contact the.... Details about what to include in your Privacy Act request are discussed in Subpart C of this part. ...

  20. 32 CFR 319.7 - Special procedures: Medical records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Special procedures: Medical records. 319.7 Section 319.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.7 Special procedures: Medical...

  1. 32 CFR 319.7 - Special procedures: Medical records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Special procedures: Medical records. 319.7 Section 319.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.7 Special procedures: Medical...

  2. 32 CFR 319.7 - Special procedures: Medical records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Special procedures: Medical records. 319.7 Section 319.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.7 Special procedures: Medical...

  3. 14 CFR 1212.200 - Determining existence of records subject to the Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... requests under the Privacy Act made by individuals concerning records about themselves: (a) To determine if... the Privacy Act. 1212.200 Section 1212.200 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION PRIVACY ACT-NASA REGULATIONS Access to Records § 1212.200 Determining existence of records subject...

  4. 12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR...

  5. 12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR...

  6. 12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR...

  7. 12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR...

  8. 32 CFR 1901.63 - Specific exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Specific exemptions. 1901.63 Section 1901.63 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS... section (k) of the Privacy Act, the Director of Central Intelligence has determined to exempt from section...

  9. 32 CFR 1901.63 - Specific exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Specific exemptions. 1901.63 Section 1901.63 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS... section (k) of the Privacy Act, the Director of Central Intelligence has determined to exempt from section...

  10. (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems.

    PubMed

    Li, Hongtao; Guo, Feng; Zhang, Wenyin; Wang, Jie; Xing, Jinsheng

    2018-02-14

    The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a 1 ,k 1 )-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a 1 ,k 1 )-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a 2 ,k 2 )-anonymity (a 1  ≥ a 2 , k 2  ≥ k 1 ). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.

  11. 75 FR 57904 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-23

    ... Office, --Update of NIST Computer Security Division, and --Information Security and Privacy Advisory... Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB) will meet...

  12. 32 CFR 320.11 - Penalties.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.11 Penalties. The Privacy Act of 1974 (5 U.S.C... similar penalties for violations by NGA employees of the Act or regulations established thereunder. ...

  13. 32 CFR 320.11 - Penalties.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.11 Penalties. The Privacy Act of 1974 (5 U.S.C... similar penalties for violations by NGA employees of the Act or regulations established thereunder. ...

  14. Meeting the Privacy Requirements for the Development of a Multi-Centre Patient Registry in Canada: The Rick Hansen Spinal Cord Injury Registry

    PubMed Central

    Noonan, Vanessa K.; Thorogood, Nancy P.; Joshi, Phalgun B.; Fehlings, Michael G.; Craven, B. Catharine; Linassi, Gary; Fourney, Daryl R.; Kwon, Brian K.; Bailey, Christopher S.; Tsai, Eve C.; Drew, Brian M.; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F.

    2013-01-01

    Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. PMID:23968640

  15. Meeting the privacy requirements for the development of a multi-centre patient registry in Canada: the Rick Hansen Spinal Cord Injury Registry.

    PubMed

    Noonan, Vanessa K; Thorogood, Nancy P; Joshi, Phalgun B; Fehlings, Michael G; Craven, B Catharine; Linassi, Gary; Fourney, Daryl R; Kwon, Brian K; Bailey, Christopher S; Tsai, Eve C; Drew, Brian M; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F

    2013-05-01

    Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. Copyright © 2013 Longwoods Publishing.

  16. Intelligence and childlessness.

    PubMed

    Kanazawa, Satoshi

    2014-11-01

    Demographers debate why people have children in advanced industrial societies where children are net economic costs. From an evolutionary perspective, however, the important question is why some individuals choose not to have children. Recent theoretical developments in evolutionary psychology suggest that more intelligent individuals may be more likely to prefer to remain childless than less intelligent individuals. Analyses of the National Child Development Study show that more intelligent men and women express preference to remain childless early in their reproductive careers, but only more intelligent women (not more intelligent men) are more likely to remain childless by the end of their reproductive careers. Controlling for education and earnings does not at all attenuate the association between childhood general intelligence and lifetime childlessness among women. One-standard-deviation increase in childhood general intelligence (15 IQ points) decreases women's odds of parenthood by 21-25%. Because women have a greater impact on the average intelligence of future generations, the dysgenic fertility among women is predicted to lead to a decline in the average intelligence of the population in advanced industrial nations. Copyright © 2014 Elsevier Inc. All rights reserved.

  17. Home Country National Intelligence and Self-Employment Rates among Immigrants in Norway

    ERIC Educational Resources Information Center

    Vinogradov, Evgueni; Kolvereid, Lars

    2010-01-01

    The level of self-employment varies significantly among immigrants from different countries of origin. The objective of this research is to examine the relationship between home-country national intelligence and self-employment rates among first generation immigrants in Norway. Empirical secondary data on self-employment among immigrants from 117…

  18. Joint and National Intelligence Support to Military Operations

    DTIC Science & Technology

    2004-10-07

    missions. The goal is to maximize the impact of intelligence on military operations by increasing the efficiency of the intelligence process and the...intelligence support to military operations will be affected by non-threat-related environmental factors such as requisite changes in sources and...tailored and highly detailed intelligence analyses of a wide variety of human and information environmental factors, such as public attitudes and

  19. Intelligence, democracy, and international environmental commitment.

    PubMed

    Obydenkova, Anastassia; Salahodjaev, Raufhon

    2016-05-01

    This paper investigates the determinants of nations' commitment to environmental protection at the international level by focusing on the role of national intelligence and the level of democracy. The national intelligence is measured by nation's IQ scores. The findings based on a sample of 152 nations provide strong evidence that intelligence has statistically significant impact on ratification of international environmental agreements, and the countries with IQ 10-points above global average are 23% more likely to sign multilateral environmental agreements than others. The findings also demonstrate that it is the combination of high-level of intelligence of nations and democracy, that likely result in international environmental commitments. Copyright © 2016 Elsevier Inc. All rights reserved.

  20. Intelligence and homosexuality.

    PubMed

    Kanazawa, Satoshi

    2012-09-01

    The origin of preferences and values is an unresolved theoretical problem in behavioural sciences. The Savanna-IQ Interaction Hypothesis, derived from the Savanna Principle and a theory of the evolution of general intelligence, suggests that more intelligent individuals are more likely to acquire and espouse evolutionarily novel preferences and values than less intelligent individuals, but general intelligence has no effect on the acquisition and espousal of evolutionarily familiar preferences and values. Ethnographies of traditional societies suggest that exclusively homosexual behaviour was probably rare in the ancestral environment, so the Hypothesis would predict that more intelligent individuals are more likely to identify themselves as homosexual and engage in homosexual behaviour. Analyses of three large, nationally representative samples (two of which are prospectively longitudinal) from two different nations confirm the prediction.

  1. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  2. 32 CFR 806b.51 - Privacy and the Web.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy and the Web. 806b.51 Section 806b.51... PROGRAM Disclosing Records to Third Parties § 806b.51 Privacy and the Web. Do not post personal information on publicly accessible DoD web sites unless clearly authorized by law and implementing regulation...

  3. 32 CFR 806b.51 - Privacy and the Web.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy and the Web. 806b.51 Section 806b.51... PROGRAM Disclosing Records to Third Parties § 806b.51 Privacy and the Web. Do not post personal information on publicly accessible DoD web sites unless clearly authorized by law and implementing regulation...

  4. 32 CFR 1907.02 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CHALLENGES TO... means the United States Central Intelligence Agency acting through the CIA Information and Privacy... specifically authorized by the Central Intelligence Agency to possess and use on official business classified...

  5. 32 CFR 320.3 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.3 Responsibilities. (a) Director of NGA: (1) Implements the NGA privacy program. (2) Designates the Director of the Public Affairs Office as the NGA... General Counsel as the NGA Privacy Act Officer and the principal point of contact for matters involving...

  6. 32 CFR 320.3 - Responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.3 Responsibilities. (a) Director of NGA: (1) Implements the NGA privacy program. (2) Designates the Director of the Public Affairs Office as the NGA... General Counsel as the NGA Privacy Act Officer and the principal point of contact for matters involving...

  7. 32 CFR 635.12 - Release of information under the Privacy Act of 1974.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) The release and denial authorities for all Privacy Act cases concerning military police records are... 32 National Defense 4 2010-07-01 2010-07-01 true Release of information under the Privacy Act of... § 635.12 Release of information under the Privacy Act of 1974. (a) Military police records may be...

  8. Gateway National Recreational Area - Sandy Hook Unit : automated fee entrance plaza and intelligent transportation system technical requirements

    DOT National Transportation Integrated Search

    2009-01-01

    The Volpe National Transportation Systems Center (Volpe Center) is providing technical : support to Sandy Hook, a unit of the Gateway National Recreation Area, in the planning and : concept development for possible Intelligent Transportation Systems ...

  9. A Cross-National Study of Student Teachers' Views about Intelligence: Similarities and Differences in England and Turkey

    ERIC Educational Resources Information Center

    Ilhan-Beyaztas, Dilek; Dawson, Elizabeth

    2017-01-01

    A cross-national descriptive research method was used to explore Turkish and English student teachers' views about intelligence, and the factors which shape them. The "Adult Version of The Implicit Theory of Intelligence Scale" [1], and the Turkish version of this scale [2] were used to investigate the views of 114 English and 201…

  10. 32 CFR 319.9 - Agency review of request for correction or amendment of record.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Agency review of request for correction or amendment of record. 319.9 Section 319.9 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.9 Agency...

  11. 32 CFR 319.9 - Agency review of request for correction or amendment of record.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Agency review of request for correction or amendment of record. 319.9 Section 319.9 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.9 Agency...

  12. 32 CFR 319.9 - Agency review of request for correction or amendment of record.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Agency review of request for correction or amendment of record. 319.9 Section 319.9 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.9 Agency...

  13. 12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION... UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION The Privacy Act § 792.69 Training and employee standards of conduct with regard to...

  14. Legal issues concerning electronic health information: privacy, quality, and liability.

    PubMed

    Hodge, J G; Gostin, L O; Jacobson, P D

    1999-10-20

    Personally identifiable health information about individuals and general medical information is increasingly available in electronic form in health databases and through online networks. The proliferation of electronic data within the modern health information infrastructure presents significant benefits for medical providers and patients, including enhanced patient autonomy, improved clinical treatment, advances in health research and public health surveillance, and modern security techniques. However, it also presents new legal challenges in 3 interconnected areas: privacy of identifiable health information, reliability and quality of health data, and tortbased liability. Protecting health information privacy (by giving individuals control over health data without severely restricting warranted communal uses) directly improves the quality and reliability of health data (by encouraging individual uses of health services and communal uses of data), which diminishes tort-based liabilities (by reducing instances of medical malpractice or privacy invasions through improvements in the delivery of health care services resulting in part from better quality and reliability of clinical and research data). Following an analysis of the interconnectivity of these 3 areas and discussing existing and proposed health information privacy laws, recommendations for legal reform concerning health information privacy are presented. These include (1) recognizing identifiable health information as highly sensitive, (2) providing privacy safeguards based on fair information practices, (3) empowering patients with information and rights to consent to disclosure (4) limiting disclosures of health data absent consent, (5) incorporating industry-wide security protections, (6) establishing a national data protection authority, and (7) providing a national minimal level of privacy protections.

  15. A Vision-Based System for Intelligent Monitoring: Human Behaviour Analysis and Privacy by Context

    PubMed Central

    Chaaraoui, Alexandros Andre; Padilla-López, José Ramón; Ferrández-Pastor, Francisco Javier; Nieto-Hidalgo, Mario; Flórez-Revuelta, Francisco

    2014-01-01

    Due to progress and demographic change, society is facing a crucial challenge related to increased life expectancy and a higher number of people in situations of dependency. As a consequence, there exists a significant demand for support systems for personal autonomy. This article outlines the vision@home project, whose goal is to extend independent living at home for elderly and impaired people, providing care and safety services by means of vision-based monitoring. Different kinds of ambient-assisted living services are supported, from the detection of home accidents, to telecare services. In this contribution, the specification of the system is presented, and novel contributions are made regarding human behaviour analysis and privacy protection. By means of a multi-view setup of cameras, people's behaviour is recognised based on human action recognition. For this purpose, a weighted feature fusion scheme is proposed to learn from multiple views. In order to protect the right to privacy of the inhabitants when a remote connection occurs, a privacy-by-context method is proposed. The experimental results of the behaviour recognition method show an outstanding performance, as well as support for multi-view scenarios and real-time execution, which are required in order to provide the proposed services. PMID:24854209

  16. A vision-based system for intelligent monitoring: human behaviour analysis and privacy by context.

    PubMed

    Chaaraoui, Alexandros Andre; Padilla-López, José Ramón; Ferrández-Pastor, Francisco Javier; Nieto-Hidalgo, Mario; Flórez-Revuelta, Francisco

    2014-05-20

    Due to progress and demographic change, society is facing a crucial challenge related to increased life expectancy and a higher number of people in situations of dependency. As a consequence, there exists a significant demand for support systems for personal autonomy. This article outlines the vision@home project, whose goal is to extend independent living at home for elderly and impaired people, providing care and safety services by means of vision-based monitoring. Different kinds of ambient-assisted living services are supported, from the detection of home accidents, to telecare services. In this contribution, the specification of the system is presented, and novel contributions are made regarding human behaviour analysis and privacy protection. By means of a multi-view setup of cameras, people's behaviour is recognised based on human action recognition. For this purpose, a weighted feature fusion scheme is proposed to learn from multiple views. In order to protect the right to privacy of the inhabitants when a remote connection occurs, a privacy-by-context method is proposed. The experimental results of the behaviour recognition method show an outstanding performance, as well as support for multi-view scenarios and real-time execution, which are required in order to provide the proposed services.

  17. Speech privacy and annoyance considerations in the acoustic environment of passenger cars of high-speed trains.

    PubMed

    Jeon, Jin Yong; Hong, Joo Young; Jang, Hyung Suk; Kim, Jae Hyeon

    2015-12-01

    It is necessary to consider not only annoyance of interior noises but also speech privacy to achieve acoustic comfort in a passenger car of a high-speed train because speech from other passengers can be annoying. This study aimed to explore an optimal acoustic environment to satisfy speech privacy and reduce annoyance in a passenger car. Two experiments were conducted using speech sources and compartment noise of a high speed train with varying speech-to-noise ratios (SNRA) and background noise levels (BNL). Speech intelligibility was tested in experiment I, and in experiment II, perceived speech privacy, annoyance, and acoustic comfort of combined sounds with speech and background noise were assessed. The results show that speech privacy and annoyance were significantly influenced by the SNRA. In particular, the acoustic comfort was evaluated as acceptable when the SNRA was less than -6 dB for both speech privacy and noise annoyance. In addition, annoyance increased significantly as the BNL exceeded 63 dBA, whereas the effect of the background-noise level on the speech privacy was not significant. These findings suggest that an optimal level of interior noise in a passenger car might exist between 59 and 63 dBA, taking normal speech levels into account.

  18. 32 CFR 320.1 - Purpose and scope.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.1 Purpose and scope. (a) This part is published... whether the National Geospatial-Intelligence Agency (NGA) maintains or has disclosed a record pertaining..., Headquarters NGA has determined to be exempt from the procedures established by this regulation and from...

  19. 32 CFR 320.1 - Purpose and scope.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.1 Purpose and scope. (a) This part is published... whether the National Geospatial-Intelligence Agency (NGA) maintains or has disclosed a record pertaining..., Headquarters NGA has determined to be exempt from the procedures established by this regulation and from...

  20. 32 CFR 319.11 - Fees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Fees. 319.11 Section 319.11 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.11 Fees. (a) The schedule of fees chargeable is contained at § 286.60...

  1. 32 CFR 319.11 - Fees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Fees. 319.11 Section 319.11 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.11 Fees. (a) The schedule of fees chargeable is contained at § 286.60...

  2. 32 CFR 319.11 - Fees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Fees. 319.11 Section 319.11 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.11 Fees. (a) The schedule of fees chargeable is contained at § 286.60...

  3. Autonomous intelligent cars: proof that the EPSRC Principles are future-proof

    NASA Astrophysics Data System (ADS)

    de Cock Buning, Madeleine; de Bruin, Roeland

    2017-07-01

    Principle 2 of the EPSRC's principles of robotics (AISB workshop on Principles of Robotics, 2016) proves to be future proof when applied to the current state of the art of law and technology surrounding autonomous intelligent cars (AICs). Humans, not AICS, are responsible agents. AICs should be designed; operated as far as is practicable to comply with existing laws and fundamental rights and freedoms, including privacy by design. It will show that some legal questions arising from autonomous intelligent driving technology can be answered by the technology itself.

  4. Average Intelligence Predicts Atheism Rates across 137 Nations

    ERIC Educational Resources Information Center

    Lynn, Richard; Harvey, John; Nyborg, Helmuth

    2009-01-01

    Evidence is reviewed pointing to a negative relationship between intelligence and religious belief in the United States and Europe. It is shown that intelligence measured as psychometric "g" is negatively related to religious belief. We also examine whether this negative relationship between intelligence and religious belief is present between…

  5. Privacy Awareness: A Means to Solve the Privacy Paradox?

    NASA Astrophysics Data System (ADS)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  6. 78 FR 73508 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-06

    ... Force's notices for systems of records subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended....gov/privacy/SORNs/component/airforce/index.html . The proposed systems reports, as required by 5 U.S.C... Volunteer Records. System location: National Museum of the U.S. Air Force, 1100 Spaatz Street, Wright...

  7. Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and the National Instant Criminal Background Check System (NICS). Final rule.

    PubMed

    2016-01-06

    The Department of Health and Human Services (HHS or "the Department'') is issuing this final rule to modify the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule to expressly permit certain HIPAA covered entities to disclose to the National Instant Criminal Background Check System (NICS) the identities of individuals who are subject to a Federal "mental health prohibitor'' that disqualifies them from shipping, transporting, possessing, or receiving a firearm. The NICS is a national system maintained by the Federal Bureau of Investigation (FBI) to conduct background checks on persons who may be disqualified from receiving firearms based on Federally prohibited categories or State law. Among the persons subject to the Federal mental health prohibitor established under the Gun Control Act of 1968 and implementing regulations issued by the Department of Justice (DOJ) are individuals who have been involuntarily committed to a mental institution; found incompetent to stand trial or not guilty by reason of insanity; or otherwise have been determined by a court, board, commission, or other lawful authority to be a danger to themselves or others or to lack the mental capacity to contract or manage their own affairs, as a result of marked subnormal intelligence or mental illness, incompetency, condition, or disease. Under this final rule, only covered entities with lawful authority to make the adjudications or commitment decisions that make individuals subject to the Federal mental health prohibitor, or that serve as repositories of information for NICS reporting purposes, are permitted to disclose the information needed for these purposes. The disclosure is restricted to limited demographic and certain other information needed for NICS purposes. The rule specifically prohibits the disclosure of diagnostic or clinical information, from medical records or other sources, and any mental health information beyond the indication that the individual

  8. 76 FR 55693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-08

    ... instructions for submitting comments. Fax: 703-483-2999. Mail: Mary Ellen Callahan, Chief Privacy Officer... approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public... obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer...

  9. 77 FR 6543 - Privacy Act of 1974: Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-08

    ... DEPARTMENT OF COMMERCE National Telecommunications and Information Administration [Docket No. 120203097-2097-01] RIN 0660-XA26 Privacy Act of 1974: Systems of Records AGENCY: National Telecommunications... Chief Counsel, National Telecommunications and Information Administration, Room 4713, 14th Street and...

  10. Ambient Intelligence Research Landscapes: Introduction and Overview

    NASA Astrophysics Data System (ADS)

    Streitz, Norbert

    This paper starts out by introducing the "Landscapes" category at the Joint International Conference on Ambient Intelligence (AmI-2010) and provides an overview over the two sessions. The main part of the paper presents a framework for the role of Ambient Intelligence in the development of the cities of the future. This includes the integration of real and virtual worlds resulting in Hybrid Cities and their transformation into Smart Cities. In the context, it is argued that the technological development has to be monitored by guidelines and goals for maintaining and improving the quality of life leading to what is called Humane Cities, addressing, e.g., social awareness and privacy, trust and identity. The paper closes with proposals for a future research agenda.

  11. Intelligence and Physical Attractiveness

    ERIC Educational Resources Information Center

    Kanazawa, Satoshi

    2011-01-01

    This brief research note aims to estimate the magnitude of the association between general intelligence and physical attractiveness with large nationally representative samples from two nations. In the United Kingdom, attractive children are more intelligent by 12.4 IQ points (r=0.381), whereas in the United States, the correlation between…

  12. Genetic privacy.

    PubMed

    Sankar, Pamela

    2003-01-01

    During the past 10 years, the number of genetic tests performed more than tripled, and public concern about genetic privacy emerged. The majority of states and the U.S. government have passed regulations protecting genetic information. However, research has shown that concerns about genetic privacy are disproportionate to known instances of information misuse. Beliefs in genetic determinacy explain some of the heightened concern about genetic privacy. Discussion of the debate over genetic testing within families illustrates the most recent response to genetic privacy concerns.

  13. Holographic Radar Imaging Privacy Techniques Utilizing Dual-Frequency Implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.

    2008-04-18

    Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhancemore » the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.« less

  14. Holographic radar imaging privacy techniques utilizing dual-frequency implementation

    NASA Astrophysics Data System (ADS)

    McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.

    2008-04-01

    Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhance the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.

  15. 75 FR 56079 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-15

    ... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The National Security Agency/Central Security Service is proposing to...

  16. Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection.

    PubMed

    Chen, Hsuan-Ting; Chen, Wenghong

    2015-01-01

    Sampling 515 college students, this study investigates how privacy protection, including profile visibility, self-disclosure, and friending, are influenced by privacy concerns and efficacy regarding one's own ability to manage privacy settings, a factor that researchers have yet to give a great deal of attention to in the context of social networking sites (SNSs). The results of this study indicate an inconsistency in adopting strategies to protect privacy, a disconnect from limiting profile visibility and friending to self-disclosure. More specifically, privacy concerns lead SNS users to limit their profile visibility and discourage them from expanding their network. However, they do not constrain self-disclosure. Similarly, while self-efficacy in privacy management encourages SNS users to limit their profile visibility, it facilitates self-disclosure. This suggests that if users are limiting their profile visibility and constraining their friending behaviors, it does not necessarily mean they will reduce self-disclosure on SNSs because these behaviors are predicted by different factors. In addition, the study finds an interaction effect between privacy concerns and self-efficacy in privacy management on friending. It points to the potential problem of increased risk-taking behaviors resulting from high self-efficacy in privacy management and low privacy concerns.

  17. Health information: reconciling personal privacy with the public good of human health.

    PubMed

    Gostin, L O

    2001-01-01

    The success of the health care system depends on the accuracy, correctness and trustworthiness of the information, and the privacy rights of individuals to control the disclosure of personal information. A national policy on health informational privacy should be guided by ethical principles that respect individual autonomy while recognizing the important collective interests in the use of health information. At present there are no adequate laws or constitutional principles to help guide a rational privacy policy. The laws are scattered and fragmented across the states. Constitutional law is highly general, without important specific safeguards. Finally, a case study is provided showing the important trade-offs that exist between public health and privacy. For a model public health law, see www.critpath.org/msphpa/privacy.

  18. 77 FR 26259 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    .... SUPPLEMENTARY INFORMATION: The National Security Agency systems of records notice subject to the Privacy Act of... of Records AGENCY: National Security Agency/Central Security Service. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security Service is deleting a system of...

  19. 77 FR 56628 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a system of records. SUMMARY: The National Security Agency/Central Security Service proposes to add a new...

  20. The Information Edge: Imagery Intelligence and Geospatial Information in an Evolving National Security Environment

    DTIC Science & Technology

    2000-12-01

    8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10 . SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR...Activities................................................................................ 48 10 . NIMA and Its Suppliers...Agency (DIA), the National Reconnaissance Office (NRO), the Defense Airborne Reconnaissance Office (DARO), and the Central Intelligence Agency” ibid. 10

  1. Developing intelligent transportation systems using the national ITS architecture : an executive edition for senior transportation managers

    DOT National Transportation Integrated Search

    1998-07-01

    This document has been produced to provide senior transportation managers of state and local departments of transportation with practical guidance for deploying Intelligent Transportation Systems (ITS) consistent with the National ITS Architecture. T...

  2. Bringing the National Security Agency into the Classroom: Ethical Reflections on Academia-Intelligence Agency Partnerships.

    PubMed

    Kampe, Christopher; Reid, Gwendolynne; Jones, Paul; S, Colleen; S, Sean; Vogel, Kathleen M

    2018-01-09

    Academia-intelligence agency collaborations are on the rise for a variety of reasons. These can take many forms, one of which is in the classroom, using students to stand in for intelligence analysts. Classrooms, however, are ethically complex spaces, with students considered vulnerable populations, and become even more complex when layering multiple goals, activities, tools, and stakeholders over those traditionally present. This does not necessarily mean one must shy away from academia-intelligence agency partnerships in classrooms, but that these must be conducted carefully and reflexively. This paper hopes to contribute to this conversation by describing one purposeful classroom encounter that occurred between a professor, students, and intelligence practitioners in the fall of 2015 at North Carolina State University: an experiment conducted as part of a graduate-level political science class that involved students working with a prototype analytic technology, a type of participatory sensing/self-tracking device, developed by the National Security Agency. This experiment opened up the following questions that this paper will explore: What social, ethical, and pedagogical considerations arise with the deployment of a prototype intelligence technology in the college classroom, and how can they be addressed? How can academia-intelligence agency collaboration in the classroom be conducted in ways that provide benefits to all parties, while minimizing disruptions and negative consequences? This paper will discuss the experimental findings in the context of ethical perspectives involved in values in design and participatory/self-tracking data practices, and discuss lessons learned for the ethics of future academia-intelligence agency partnerships in the classroom.

  3. 77 FR 37004 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-20

    ...-Intelligence Agency (NGA), ATTN: Security Specialist, Mission Support, MSRS P-12, 7500 GEOINT Drive..., Alternate OSD Federal Register Liaison Officer, Department of Defense. NGA-005 System name: National... maintained at National Geospatial-Intelligence Agency (NGA) Headquarters in Washington, DC metro area...

  4. 32 CFR 1907.02 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CHALLENGES TO... means the United States Central Intelligence Agency acting through the CIA Information and Privacy... Agency Release Panel; (g) Information means any knowledge that can be communicated or documentary...

  5. 32 CFR 1907.02 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CHALLENGES TO... means the United States Central Intelligence Agency acting through the CIA Information and Privacy... Agency Release Panel; (g) Information means any knowledge that can be communicated or documentary...

  6. 32 CFR 1907.02 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CHALLENGES TO... means the United States Central Intelligence Agency acting through the CIA Information and Privacy... Agency Release Panel; (g) Information means any knowledge that can be communicated or documentary...

  7. 78 FR 69393 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... records in its inventory of record systems subject to the Privacy Act of 1974, as amended. The National....O. 12968, as amended, Access to classified information; 5 CFR part 732, National security positions...); 5 U.S.C. 7532, Suspension and Removal; E.O. 12958, Classified National Security Information; DoD...

  8. An Examination of the Flynn Effect in the National Intelligence Test in Estonia

    ERIC Educational Resources Information Center

    Shiu, William

    2012-01-01

    This study examined the Flynn Effect (FE; i.e., the rise in IQ scores over time) in Estonia from Scale B of the National Intelligence Test using both classical test theory (CTT) and item response theory (IRT) methods. Secondary data from two cohorts (1934, n = 890 and 2006, n = 913) of students were analyzed, using both classical test theory (CTT)…

  9. Determining if Space is an Applicable Component to Intelligence Preparation of the Battlefield for Ranger Operations When Facing Non-Nation-State Adversaries

    DTIC Science & Technology

    2002-05-31

    DETERMINING IF SPACE IS AN APPLICABLE COMPONENT TO INTELLIGENCE PREPARATION OF THE BATTLEFIELD FOR RANGER OPERATIONS WHEN FACING NON-NATION-STATE...Candidate: Major Michael Bruce Johnson Thesis Title: Determining if Space is an Applicable Component to Intelligence Preparation of the Battlefield for ...iii ABSTRACT DETERMINING IF SPACE IS AN APPLICABLE COMPONENT TO INTELLIGENCE PREPARATION OF THE BATTLEFIELD FOR RANGER OPERATIONS WHEN FACING NON

  10. Informational privacy and the public's health: the Model State Public Health Privacy Act.

    PubMed

    Gostin, L O; Hodge, J G; Valdiserri, R O

    2001-09-01

    Protecting public health requires the acquisition, use, and storage of extensive health-related information about individuals. The electronic accumulation and exchange of personal data promises significant public health benefits but also threatens individual privacy; breaches of privacy can lead to individual discrimination in employment, insurance, and government programs. Individuals concerned about privacy invasions may avoid clinical or public health tests, treatments, or research. Although individual privacy protections are critical, comprehensive federal privacy protections do not adequately protect public health data, and existing state privacy laws are inconsistent and fragmented. The Model State Public Health Privacy Act provides strong privacy safeguards for public health data while preserving the ability of state and local public health departments to act for the common good.

  11. 76 FR 44452 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security National...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-26

    ... CONTACT: For general questions please contact: Emily Andrew (703-235-2182), Senior Privacy Officer... and SORN were identical. Each comment is outlined below followed by the Department's response. 1. By... of the Act. Comment: EPIC urged DHS to limit its exemptions from the Privacy Act's provisions...

  12. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy.

    PubMed

    Mulligan, Deirdre K; Koopman, Colin; Doty, Nick

    2016-12-28

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy's disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy's essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy's multiple uses across multiple contexts.This article is part of the themed issue 'The ethical impact of data science'. © 2016 The Author(s).

  13. 75 FR 77607 - Privacy Act of 1974; Proposed New System of Records; Veterinary Medicine Loan Repayment Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-13

    ... DEPARTMENT OF AGRICULTURE Office of the Secretary [Docket No. 2010-0004] Privacy Act of 1974... Food and Agriculture, USDA. ACTION: Notice of a proposed new Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Agriculture (USDA), National Institute of Food and...

  14. 32 CFR 320.5 - Disclosure of requested information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.5 Disclosure of... nonexempt NGA system of records. However, nothing in this section shall allow an individual access to any information compiled by NGA in reasonable anticipation of a civil or criminal action or proceeding. (b...

  15. 32 CFR 320.5 - Disclosure of requested information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.5 Disclosure of... nonexempt NGA system of records. However, nothing in this section shall allow an individual access to any information compiled by NGA in reasonable anticipation of a civil or criminal action or proceeding. (b...

  16. 14 CFR 1212.200 - Determining existence of records subject to the Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Determining existence of records subject to the Privacy Act. 1212.200 Section 1212.200 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION PRIVACY ACT-NASA REGULATIONS Access to Records § 1212.200 Determining existence of records subject...

  17. Personal control of privacy and data: Estonian experience.

    PubMed

    Priisalu, Jaan; Ottis, Rain

    2017-01-01

    The Republic of Estonia leads Europe in the provision of public digital services. The national communications and transactions platform allows for twenty-first century governance by allowing for transparency, e-safety (inter alia privacy), e-security, entrepreneurship and, among other things, rising levels of prosperity, and well-being for all its Citizens. However, a series of Information Infrastructure attacks against the Estonian e-society infrastructure in 2007 became one of best known incidents and experiences that fundamentally changed both Estonian and international discussions about Cyber Security and Privacy. Estonian experience shows that an open and transparent attitude provides a good foundation for trust between the Citizen and the State, and gives more control to the real owner of the data - the Citizen. Another important lesson is that the Citizen needs to be confident in the government's ability to keep their data safe -- in terms of confidentiality, integrity and availability - establishing a strong link between privacy and information security. This paper discusses certain critical choices, context, and events connected to the birth and growth of the Estonian e-society in terms of Privacy.

  18. Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency

    NASA Astrophysics Data System (ADS)

    Mohaisen, Abedelaziz; Jho, Nam-Su; Hong, Dowon; Nyang, Daehun

    Privacy preserving association rule mining algorithms have been designed for discovering the relations between variables in data while maintaining the data privacy. In this article we revise one of the recently introduced schemes for association rule mining using fake transactions (FS). In particular, our analysis shows that the FS scheme has exhaustive storage and high computation requirements for guaranteeing a reasonable level of privacy. We introduce a realistic definition of privacy that benefits from the average case privacy and motivates the study of a weakness in the structure of FS by fake transactions filtering. In order to overcome this problem, we improve the FS scheme by presenting a hybrid scheme that considers both privacy and resources as two concurrent guidelines. Analytical and empirical results show the efficiency and applicability of our proposed scheme.

  19. 32 CFR 806b.25 - Contents of Privacy Act case files.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Contents of Privacy Act case files. 806b.25 Section 806b.25 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... papers. ...

  20. 32 CFR 806b.25 - Contents of Privacy Act case files.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Contents of Privacy Act case files. 806b.25 Section 806b.25 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... papers. ...

  1. 32 CFR 806b.25 - Contents of Privacy Act case files.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Contents of Privacy Act case files. 806b.25 Section 806b.25 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... papers. ...

  2. 32 CFR 806b.25 - Contents of Privacy Act case files.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Contents of Privacy Act case files. 806b.25 Section 806b.25 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... papers. ...

  3. 32 CFR 806b.25 - Contents of Privacy Act case files.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Contents of Privacy Act case files. 806b.25 Section 806b.25 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... papers. ...

  4. Assessment of Intelligent Processing Equipment in the National Aeronautics and Space Administration, 1991

    NASA Technical Reports Server (NTRS)

    Jones, C. S.

    1992-01-01

    Summarized here is an assessment of intelligent processing equipment (IPE) within NASA. An attempt is made to determine the state of IPE development and research in specific areas where NASA might contribute to the national capability. Mechanisms to transfer NASA technology to the U.S. private sector in this critical area are discussed. It was concluded that intelligent processing equipment is finding extensive use in the manufacture of space hardware, especially in the propulsion components of the shuttle. The major benefits are found in improved process consistency, which lowers cost as it reduces rework. Advanced feedback controls are under development and being implemented gradually into shuttle manufacturing. Implementation is much more extensive in new programs, such as in the advanced solid rocket motor and the Space Station Freedom.

  5. 76 FR 22615 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2011-OS-0003] 32 CFR Part 322... Part 322 Privacy. Accordingly, 32 CFR part 322 is amended as follows: PART 322--NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE PROGRAM 0 1. The authority citation for 32 CFR part 322.7 continues to...

  6. Privacy-Preserving Patient Similarity Learning in a Federated Environment: Development and Analysis

    PubMed Central

    Sun, Jimeng; Wang, Fei; Wang, Shuang; Jun, Chi-Hyuck; Jiang, Xiaoqian

    2018-01-01

    Background There is an urgent need for the development of global analytic frameworks that can perform analyses in a privacy-preserving federated environment across multiple institutions without privacy leakage. A few studies on the topic of federated medical analysis have been conducted recently with the focus on several algorithms. However, none of them have solved similar patient matching, which is useful for applications such as cohort construction for cross-institution observational studies, disease surveillance, and clinical trials recruitment. Objective The aim of this study was to present a privacy-preserving platform in a federated setting for patient similarity learning across institutions. Without sharing patient-level information, our model can find similar patients from one hospital to another. Methods We proposed a federated patient hashing framework and developed a novel algorithm to learn context-specific hash codes to represent patients across institutions. The similarities between patients can be efficiently computed using the resulting hash codes of corresponding patients. To avoid security attack from reverse engineering on the model, we applied homomorphic encryption to patient similarity search in a federated setting. Results We used sequential medical events extracted from the Multiparameter Intelligent Monitoring in Intensive Care-III database to evaluate the proposed algorithm in predicting the incidence of five diseases independently. Our algorithm achieved averaged area under the curves of 0.9154 and 0.8012 with balanced and imbalanced data, respectively, in κ-nearest neighbor with κ=3. We also confirmed privacy preservation in similarity search by using homomorphic encryption. Conclusions The proposed algorithm can help search similar patients across institutions effectively to support federated data analysis in a privacy-preserving manner. PMID:29653917

  7. Ethics and privacy issues of a practice-based surveillance system: need for a national-level institutional research ethics board and consent standards.

    PubMed

    Kotecha, Jyoti A; Manca, Donna; Lambert-Lanning, Anita; Keshavjee, Karim; Drummond, Neil; Godwin, Marshall; Greiver, Michelle; Putnam, Wayne; Lussier, Marie-Thérèse; Birtwhistle, Richard

    2011-10-01

    To describe the challenges the Canadian Primary Care Sentinel Surveillance Network (CPCSSN) experienced with institutional research ethics boards (IREBs) when seeking approvals across jurisdictions and to provide recommendations for overcoming challenges of ethical review for multisite and multijurisdictional surveillance and research. The CPCSSN project collects and validates longitudinal primary care health information (relating to hypertension, diabetes, depression, chronic obstructive lung disease, and osteoarthritis) from electronic medical records across Canada. Privacy and data storage security policies and processes have been developed to protect participants' privacy and confidentiality, and IREB approval is obtained in each participating jurisdiction. Inconsistent interpretation and application of privacy and ethical issues by IREBs delays and impedes research programs that could better inform us about chronic disease. The CPCSSN project's experience with gaining approval from IREBs highlights the difficulty of conducting pan-Canadian health surveillance and multicentre research. Inconsistent IREB approvals to waive explicit individual informed consent produced particular challenges for researchers. The CPCSSN experience highlights the need to develop a better process for researchers to obtain timely and consistent IREB approvals for multicentre surveillance and research. We suggest developing a specialized, national, centralized IREB responsible for approving multisite studies related to population health research.

  8. 32 CFR 320.4 - Procedures for requesting information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.4 Procedures for... be informed whether or not any NGA system of records contains a record pertaining to him. (b) Any individual requesting such information in person may appear at NGA General Counsel Office (refer to the NGA...

  9. 32 CFR 320.4 - Procedures for requesting information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.4 Procedures for... be informed whether or not any NGA system of records contains a record pertaining to him. (b) Any individual requesting such information in person may appear at NGA General Counsel Office (refer to the NGA...

  10. 32 CFR 319.7 - Special procedures: Medical records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Special procedures: Medical records. 319.7... (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.7 Special procedures: Medical records. Medical records, requested pursuant to § 319.5 of this part, will be disclosed to the requester...

  11. 32 CFR 319.7 - Special procedures: Medical records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Special procedures: Medical records. 319.7... (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.7 Special procedures: Medical records. Medical records, requested pursuant to § 319.5 of this part, will be disclosed to the requester...

  12. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-21

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [DHS-2013-0073] Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency, Federal Government--001 National Defense Executive Reserve System of Records AGENCY: Department of Homeland Security, Privacy Office...

  13. An examination of electronic health information privacy in older adults.

    PubMed

    Le, Thai; Thompson, Hilaire; Demiris, George

    2013-01-01

    Older adults are the quickest growing demographic group and are key consumers of health services. As the United States health system transitions to electronic health records, it is important to understand older adult perceptions of privacy and security. We performed a secondary analysis of the Health Information National Trends Survey (2012, Cycle 1), to examine differences in perceptions of electronic health information privacy between older adults and the general population. We found differences in the level of importance placed on access to electronic health information (older adults placed greater emphasis on provider as opposed to personal access) and tendency to withhold information out of concerns for privacy and security (older adults were less likely to withhold information). We provide recommendations to alleviate some of these privacy concerns. This may facilitate greater use of electronic health communication between patient and provider, while promoting shared decision making.

  14. Cyber security challenges in Smart Cities: Safety, security and privacy

    PubMed Central

    Elmaghraby, Adel S.; Losavio, Michael M.

    2014-01-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517

  15. Cyber security challenges in Smart Cities: Safety, security and privacy.

    PubMed

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  16. 77 FR 25686 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-01

    ... NIST Computer Security Division. Note that agenda items may change without notice because of possible... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB...

  17. 75 FR 39920 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-13

    ... will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L. 100... Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB) will meet Wednesday, August...

  18. Schooling Effects on Intelligence Development: Evidence Based on National Samples from Urban and Rural China

    ERIC Educational Resources Information Center

    Wang, Tengfei; Ren, Xuezhu; Schweizer, Karl; Xu, Fen

    2016-01-01

    The current research investigated the variability of school effects on intelligence development in considering two economically and socially distinct groups of children. The data came from a nationally representative sample of primary school children from urban and rural areas of China. Two standardised reasoning tests were used to assess fluid…

  19. Altered states: state health privacy laws and the impact of the Federal Health Privacy Rule.

    PubMed

    Pritts, Joy L

    2002-01-01

    Although the Federal Health Privacy Rule has evened out some of the inconsistencies between states' health privacy laws, gaps in protection still remain. Furthermore, the Federal Rule contains some lax standards for the disclosure of health information. State laws can play a vital role in filling these gaps and strengthening the protections afforded health information. By enacting legislation that has higher privacy-protective standards than the Federal Health Privacy Rule, states can play three important roles. First, because they can directly regulate entities that are beyond HHS's mandate, states can afford their citizens a broader degree of privacy protection than the Federal Health Privacy Rule. Second, by having state health privacy laws, states can enforce privacy protections at the local level. Finally, action by the states can positively influence health privacy policies at the federal level by raising the standard as to what constitutes sufficient privacy protection. High privacy protections imposed by states may serve as the standard for comprehensive federal legislation, if and when Congress reconsiders the issue. So far, states' reactions to the Federal Privacy Rule have been mixed. Only time will tell whether states will assume the mantle of leadership on health privacy or relinquish their role as the primary protectors of health information.

  20. 32 CFR 320.7 - Agency review of request for correction or amendment of record.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320... after receipt of a request to amend a record, in whole or in part, the NGA Office of General Counsel, or NGA office having responsibility for maintenance of the record in question, shall correct any portion...

  1. 32 CFR 320.7 - Agency review of request for correction or amendment of record.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320... after receipt of a request to amend a record, in whole or in part, the NGA Office of General Counsel, or NGA office having responsibility for maintenance of the record in question, shall correct any portion...

  2. The social life of genes: privacy, property and the new genetics.

    PubMed

    Everett, Margaret

    2003-01-01

    With the advent of the Human Genome Project and widespread fears over human cloning and medical privacy, a number of states have moved to protect genetic privacy. Oregon's unique Genetic Privacy Act of 1995, which declared that an individual had property rights to their DNA, has provoked national and international interest and controversy. This paper critically reviews the literature on genetic privacy and gene patenting from law, philosophy, science and anthropology. The debate in Oregon, from 1995 to 2001, illustrates many of the key issues in this emerging area. Both sides of the debate invoke the property metaphor, reinforcing deterministic assumptions and avoiding more fundamental questions about the integrity of the body and self-identity. The anthropological critique of the commodification of the body, and the concept of 'embodiment' are useful in analyzing the debate over DNA as property.

  3. 77 FR 60620 - Update of Existing Privacy Act-NASA Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ... be accessed on the Agency's open Government Web site at http://www.nasa.gov/open/ . DATES: This rule... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION 14 CFR Part 1212 [Document No. NASA--NASA-2012-0005] RIN 2700-AD86 Update of Existing Privacy Act--NASA Regulations AGENCY: National Aeronautics and Space...

  4. 78 FR 8963 - Update of Existing Privacy Act-NASA Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-07

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION 14 CFR Part 1212 [Document Number NASA-2012-0005] RIN 2700-AD86 Update of Existing Privacy Act--NASA Regulations AGENCY: National Aeronautics and Space... regulations (NASA-2012-0005), which were published in the Federal Register of Thursday, October 4, 2012 (77 FR...

  5. Center for Artificial Intelligence

    DTIC Science & Technology

    1992-03-14

    builder’s intelligent assistant. The basic approach of IGOR is to integrate the complementary strategies of exploratory and confirmatory data analysis...Recovery: A Model and Experiments," in Proceedings of the Ninth National Conference on Artifcial Intelligence , Anaheim, CA, July 1991, pp. 801-808. Howe...Lehnert University of Massachusetts, Amherst, MAJ (413) 545-1322 Lessei•:s.umass.edu Title: Center for Artificial Intelligence Contract #: N00014-86-K

  6. Trajectory data privacy protection based on differential privacy mechanism

    NASA Astrophysics Data System (ADS)

    Gu, Ke; Yang, Lihao; Liu, Yongzhi; Liao, Niandong

    2018-05-01

    In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.

  7. 32 CFR 1701.23 - Exemption of Office of Inspector General (OIG) systems of records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF...)(1) and (k)(5) of the Act: (1) OIG Human Resources Records (ODNI/OIG-001). (2) OIG Experts Contact... the investigative interest of intelligence or law enforcement agencies or compromise sensitive...

  8. A community assessment of privacy preserving techniques for human genomes

    PubMed Central

    2014-01-01

    To answer the need for the rigorous protection of biomedical data, we organized the Critical Assessment of Data Privacy and Protection initiative as a community effort to evaluate privacy-preserving dissemination techniques for biomedical data. We focused on the challenge of sharing aggregate human genomic data (e.g., allele frequencies) in a way that preserves the privacy of the data donors, without undermining the utility of genome-wide association studies (GWAS) or impeding their dissemination. Specifically, we designed two problems for disseminating the raw data and the analysis outcome, respectively, based on publicly available data from HapMap and from the Personal Genome Project. A total of six teams participated in the challenges. The final results were presented at a workshop of the iDASH (integrating Data for Analysis, 'anonymization,' and SHaring) National Center for Biomedical Computing. We report the results of the challenge and our findings about the current genome privacy protection techniques. PMID:25521230

  9. A community assessment of privacy preserving techniques for human genomes.

    PubMed

    Jiang, Xiaoqian; Zhao, Yongan; Wang, Xiaofeng; Malin, Bradley; Wang, Shuang; Ohno-Machado, Lucila; Tang, Haixu

    2014-01-01

    To answer the need for the rigorous protection of biomedical data, we organized the Critical Assessment of Data Privacy and Protection initiative as a community effort to evaluate privacy-preserving dissemination techniques for biomedical data. We focused on the challenge of sharing aggregate human genomic data (e.g., allele frequencies) in a way that preserves the privacy of the data donors, without undermining the utility of genome-wide association studies (GWAS) or impeding their dissemination. Specifically, we designed two problems for disseminating the raw data and the analysis outcome, respectively, based on publicly available data from HapMap and from the Personal Genome Project. A total of six teams participated in the challenges. The final results were presented at a workshop of the iDASH (integrating Data for Analysis, 'anonymization,' and SHaring) National Center for Biomedical Computing. We report the results of the challenge and our findings about the current genome privacy protection techniques.

  10. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rothstein, M.A.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emergingmore » genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.« less

  11. Student Privacy versus Campus Safety: Has Recent Legislation Compromised Privacy Rights?

    ERIC Educational Resources Information Center

    van der Kaay, Christopher D.

    This study highlights major legislation addressing campus safety and crime reporting and discusses its impact on a student's right to privacy. The 1974 Family Educational Rights and Privacy Act, commonly referred to as the "Buckley Amendment," was among the first pieces of legislation to address the notion of student privacy and confidentiality.…

  12. Privacy with emergency medical information used in first response.

    PubMed

    Croll, Peter R; Ambrosoli, Kimberly M

    2012-01-01

    In an emergency there are many stages of Medical response. This paper focuses on the first response stage of an emergency medical incident, for example, a sporting accident. Today's Information Technology together with mobile devices now permits vital medical information regarding an individual to be available at the scene. Those first in attendance are often not medically trained. The literature shows the importance of appropriate first response in minimising harm and the significant investments being made to educate the public in this regard. It also highlights the privacy concerns that arise from the provision of sensitive health information in electronic form. The method utilised is a Privacy Impact Assessment to ascertain the suitability and compliance of the proposed technology. This approach follows the privacy guidelines specified by the Australian government to include information flow mapping, evaluation, compliance analysis, risk analysis and recommendations to management. The resultant output is a list of specific questions and a set of commendations and recommendations that are matched against the National Privacy Principles. The paper concludes that: the approach is both technical and pragmatically viable; it can meet all the reasonableness tests for privacy concerns; it can adopt standard security measures, and; it discusses its potential to be integrated into Personally Controlled Electronic Health Records.

  13. Intelligence Community Spending: Trends and Issues

    DTIC Science & Technology

    2016-11-08

    who provide financial and economic expertise. Financial intelligence analysts focus on terrorist financing, counterfeiting, money laundering , funds...but also agreed that disclosure of numbers below the topline could cause damage to national security. It recommended that the amount of money spent...associated with intelligence spending. How Much is Enough? America’s intelligence agencies may spend more money on gathering and disseminating intelligence

  14. 75 FR 69693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... system will be included in the Department of Homeland Security's inventory of record systems. DATES... FURTHER INFORMATION CONTACT: For general questions please contact: Emily Andrew (703-235-2182), Privacy.... Background In accordance with the Privacy Act of 1974, 5 U.S.C. 552a, the Department of Homeland Security...

  15. Privacy-Preserving Patient Similarity Learning in a Federated Environment: Development and Analysis.

    PubMed

    Lee, Junghye; Sun, Jimeng; Wang, Fei; Wang, Shuang; Jun, Chi-Hyuck; Jiang, Xiaoqian

    2018-04-13

    There is an urgent need for the development of global analytic frameworks that can perform analyses in a privacy-preserving federated environment across multiple institutions without privacy leakage. A few studies on the topic of federated medical analysis have been conducted recently with the focus on several algorithms. However, none of them have solved similar patient matching, which is useful for applications such as cohort construction for cross-institution observational studies, disease surveillance, and clinical trials recruitment. The aim of this study was to present a privacy-preserving platform in a federated setting for patient similarity learning across institutions. Without sharing patient-level information, our model can find similar patients from one hospital to another. We proposed a federated patient hashing framework and developed a novel algorithm to learn context-specific hash codes to represent patients across institutions. The similarities between patients can be efficiently computed using the resulting hash codes of corresponding patients. To avoid security attack from reverse engineering on the model, we applied homomorphic encryption to patient similarity search in a federated setting. We used sequential medical events extracted from the Multiparameter Intelligent Monitoring in Intensive Care-III database to evaluate the proposed algorithm in predicting the incidence of five diseases independently. Our algorithm achieved averaged area under the curves of 0.9154 and 0.8012 with balanced and imbalanced data, respectively, in κ-nearest neighbor with κ=3. We also confirmed privacy preservation in similarity search by using homomorphic encryption. The proposed algorithm can help search similar patients across institutions effectively to support federated data analysis in a privacy-preserving manner. ©Junghye Lee, Jimeng Sun, Fei Wang, Shuang Wang, Chi-Hyuck Jun, Xiaoqian Jiang. Originally published in JMIR Medical Informatics (http

  16. 32 CFR 320.9 - Disclosure of record to person other than the individual to whom it pertains.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA... officer or employee of NGA will disclose any record which is contained in a system of records, by any...; Appendix C to part 310 of this chapter; and/or a NGA Privacy Act system of records notice. (b) Any such...

  17. 32 CFR 320.9 - Disclosure of record to person other than the individual to whom it pertains.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA... officer or employee of NGA will disclose any record which is contained in a system of records, by any...; appendix C to part 310 of this chapter; and/or a NGA Privacy Act system of records notice. (b) Any such...

  18. 78 FR 89 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-02

    ... Management and Budget, and the Director of NIST on security and privacy issues pertaining to federal computer... Computer Security Division. Note that agenda items may change without notice because of possible unexpected... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and...

  19. 32 CFR 637.17 - Police Intelligence.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Police Intelligence. 637.17 Section 637.17... CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.17 Police Intelligence. (a) The purpose of gathering police intelligence is to identify individuals or groups of individuals in an effort...

  20. 32 CFR 637.17 - Police Intelligence.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 4 2014-07-01 2013-07-01 true Police Intelligence. 637.17 Section 637.17... CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.17 Police Intelligence. (a) The purpose of gathering police intelligence is to identify individuals or groups of individuals in an effort...

  1. 32 CFR 637.17 - Police Intelligence.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 4 2013-07-01 2013-07-01 false Police Intelligence. 637.17 Section 637.17... CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.17 Police Intelligence. (a) The purpose of gathering police intelligence is to identify individuals or groups of individuals in an effort...

  2. 32 CFR 637.17 - Police Intelligence.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 4 2011-07-01 2011-07-01 false Police Intelligence. 637.17 Section 637.17... CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.17 Police Intelligence. (a) The purpose of gathering police intelligence is to identify individuals or groups of individuals in an effort...

  3. 32 CFR 637.17 - Police Intelligence.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 4 2012-07-01 2011-07-01 true Police Intelligence. 637.17 Section 637.17... CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.17 Police Intelligence. (a) The purpose of gathering police intelligence is to identify individuals or groups of individuals in an effort...

  4. Protecting Children's Online Privacy.

    ERIC Educational Resources Information Center

    Kresses, Mamie

    2001-01-01

    Discuss provisions of new federal Children's Online Privacy Protection Act that principals should know to protect student privacy on the Internet. Also discusses relevant provisions of the Family Educational Rights and Privacy Act. (PKP)

  5. Strategies for maintaining patient privacy in i2b2.

    PubMed

    Murphy, Shawn N; Gainer, Vivian; Mendis, Michael; Churchill, Susanne; Kohane, Isaac

    2011-12-01

    The re-use of patient data from electronic healthcare record systems can provide tremendous benefits for clinical research, but measures to protect patient privacy while utilizing these records have many challenges. Some of these challenges arise from a misperception that the problem should be solved technically when actually the problem needs a holistic solution. The authors' experience with informatics for integrating biology and the bedside (i2b2) use cases indicates that the privacy of the patient should be considered on three fronts: technical de-identification of the data, trust in the researcher and the research, and the security of the underlying technical platforms. The security structure of i2b2 is implemented based on consideration of all three fronts. It has been supported with several use cases across the USA, resulting in five privacy categories of users that serve to protect the data while supporting the use cases. The i2b2 architecture is designed to provide consistency and faithfully implement these user privacy categories. These privacy categories help reflect the policy of both the Health Insurance Portability and Accountability Act and the provisions of the National Research Act of 1974, as embodied by current institutional review boards. By implementing a holistic approach to patient privacy solutions, i2b2 is able to help close the gap between principle and practice.

  6. Context-Aware Generative Adversarial Privacy

    NASA Astrophysics Data System (ADS)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  7. Protecting genetic privacy.

    PubMed

    Roche, P A; Annas, G J

    2001-05-01

    This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.

  8. Disentangling privacy from property: toward a deeper understanding of genetic privacy.

    PubMed

    Suter, Sonia M

    2004-04-01

    With the mapping of the human genome, genetic privacy has become a concern to many. People care about genetic privacy because genes play an important role in shaping us--our genetic information is about us, and it is deeply connected to our sense of ourselves. In addition, unwanted disclosure of our genetic information, like a great deal of other personal information, makes us vulnerable to unwanted exposure, stigmatization, and discrimination. One recent approach to protecting genetic privacy is to create property rights in genetic information. This Article argues against that approach. Privacy and property are fundamentally different concepts. At heart, the term "property" connotes control within the marketplace and over something that is disaggregated or alienable from the self. "Privacy," in contrast, connotes control over access to the self as well as things close to, intimately connected to, and about the self. Given these different meanings, a regime of property rights in genetic information would impoverish our understanding of that information, ourselves, and the relationships we hope will be built around and through its disclosure. This Article explores our interests in genetic information in order to deepen our understanding of the ongoing discourse about the distinction between property and privacy. It develops a conception of genetic privacy with a strong relational component. We ordinarily share genetic information in the context of relationships in which disclosure is important to the relationship--family, intimate, doctor-patient, researcher-participant, employer-employee, and insurer-insured relationships. Such disclosure makes us vulnerable to and dependent on the person to whom we disclose it. As a result, trust is essential to the integrity of these relationships and our sharing of genetic information. Genetic privacy can protect our vulnerability in these relationships and enhance the trust we hope to have in them. Property, in contrast, by

  9. 32 CFR 320.8 - Appeal of initial adverse agency determination on correction or amendment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Appeal of initial adverse agency determination on correction or amendment. 320.8 Section 320.8 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY...

  10. 32 CFR 320.8 - Appeal of initial adverse agency determination on correction or amendment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Appeal of initial adverse agency determination on correction or amendment. 320.8 Section 320.8 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY...

  11. 32 CFR 320.8 - Appeal of initial adverse agency determination on correction or amendment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Appeal of initial adverse agency determination on correction or amendment. 320.8 Section 320.8 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY...

  12. Structure of the Wechsler Intelligence Scale for Children--Fourth Edition among a national sample of referred students.

    PubMed

    Watkins, Marley W

    2010-12-01

    The structure of the Wechsler Intelligence Scale for Children-Fourth Edition (WISC-IV; D. Wechsler, 2003a) was analyzed via confirmatory factor analysis among a national sample of 355 students referred for psychoeducational evaluation by 93 school psychologists from 35 states. The structure of the WISC-IV core battery was best represented by four first-order factors as per D. Wechsler (2003b), plus a general intelligence factor in a direct hierarchical model. The general factor was the predominate source of variation among WISC-IV subtests, accounting for 48% of the total variance and 75% of the common variance. The largest 1st-order factor, Processing Speed, only accounted for 6.1% total and 9.5% common variance. Given these explanatory contributions, recommendations favoring interpretation of the 1st-order factor scores over the general intelligence score appear to be misguided.

  13. A Quantum Private Query Protocol for Enhancing both User and Database Privacy

    NASA Astrophysics Data System (ADS)

    Zhou, Yi-Hua; Bai, Xue-Wei; Li, Lei-Lei; Shi, Wei-Min; Yang, Yu-Guang

    2018-01-01

    In order to protect the privacy of query user and database, some QKD-based quantum private query (QPQ) protocols were proposed. Unfortunately some of them cannot resist internal attack from database perfectly; some others can ensure better user privacy but require a reduction of database privacy. In this paper, a novel two-way QPQ protocol is proposed to ensure the privacy of both sides of communication. In our protocol, user makes initial quantum states and derives the key bit by comparing initial quantum state and outcome state returned from database by ctrl or shift mode instead of announcing two non-orthogonal qubits as others which may leak part secret information. In this way, not only the privacy of database be ensured but also user privacy is strengthened. Furthermore, our protocol can also realize the security of loss-tolerance, cheat-sensitive, and resisting JM attack etc. Supported by National Natural Science Foundation of China under Grant Nos. U1636106, 61572053, 61472048, 61602019, 61502016; Beijing Natural Science Foundation under Grant Nos. 4152038, 4162005; Basic Research Fund of Beijing University of Technology (No. X4007999201501); The Scientific Research Common Program of Beijing Municipal Commission of Education under Grant No. KM201510005016

  14. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.

    PubMed

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-09-10

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one.

  15. 77 FR 24242 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-23

    ... under the Freedom of Information Act (FOIA) or the Privacy Act. Categories of records in the system: The... allegation or complaint of discrimination based on race, color, religion, sex, national origin, age, or...

  16. 76 FR 72325 - Privacy Act; Exempt Record System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES 45 CFR Part 5b RIN 0906-AA91 Privacy Act; Exempt Record System AGENCY: Health Resources and Services Administration (HRSA), HHS. ACTION: Final rule. SUMMARY... Adverse Information on Physicians and Other Health Care Practitioners, HHS/HRSA/BHPr) for the National...

  17. Use and disclosure of health information and protection of patient privacy in Taiwan.

    PubMed

    Liu, Han-Hsi

    2010-03-01

    This paper examines Taiwan's current regulatory system for the use of healthcare information from the viewpoint of patient privacy protection. The author proposes a patient-centered, cooperative system centered on the "traffic light theory", as a solution to the potential conflict between the use of healthcare information and the protection of patient privacy. Taiwan, a country with a national healthcare insurance program and state-of-the-art electronic technology, takes a distinctive approach to the protection of patient privacy. On January 1st, 2004, the Bureau of National Health Insurance (BNHI) implemented a comprehensive embedded integrated circuit (IC) card, which puts the wide-ranging health information of its 22 million beneficiaries online to facilitate review of use and disclosure. It is well understood that healthcare information is of a personal and sensitive nature, demanding stringent privacy protection. Nevertheless, there is no denying the potential benefit of using personal health information (PHI) to achieve public good, especially in the area of cost containment. The comprehensive e-health system in Taiwan greatly facilitates copying, transmission, and use of PHI, but does the regulatory system provide enough safeguards for patient privacy? Because the law in Taiwan does not provide clear standards for the use and disclosure of healthcare information, healthcare providers are either too conservative or too aggressive. While most healthcare providers keep their oath of confidentiality, some rogue members severely abuse patient privacy. This paper proposes a "traffic-light system" to remedy this situation. Flashing yellow lights allow aggressive drivers to ignore others, while causing overly cautious drivers to be too hesitant. The author contends that clear standards should have been established for healthcare providers. Like car drivers, healthcare providers need red and green traffic signals. The law should indicate, through workable privacy

  18. Identity management and privacy languages technologies: Improving user control of data privacy

    NASA Astrophysics Data System (ADS)

    García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz

    The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.

  19. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    PubMed

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  20. [Health privacy in the age of digital networks].

    PubMed

    Weichert, Thilo

    2018-03-01

    Digitization in the health sector embodies opportunities and risks. These consist of patient and data confidentiality. Vulnerability of data concerning integrity and availability can lead to financial losses and to damage of the health of data subjects. Those risks must be tackled by privacy or data protection law. For this purpose we have the European Data Protection Regulation as a comprehensive legal framework and a harmonizing bracket.This framework contains regulations on consent, purpose binding and data transfer, on rights of the data subject, technical and organizational measures and procedural arrangements. Recently, codes of conduct and certification schemes have been added as instruments. The frame of privacy law is completed by the law on medical products and information security regulations.Unfortunately, German legislation did not grip the opportunity of the European regulation to modernize, tighten and harmonize national privacy law in the health sector. This led to a lack of clarity, particularly because of the parallel applicability of privacy law and professional law. Central issues - for instance concerning transparency for data subjects, official supervision, analytics and processing for research purposes - remain dysfunctional. The German legislation should adjust those deficits. Corporations and the chambers for health professionals could and should also be active for this concern.

  1. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees

    PubMed Central

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-01-01

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417

  2. 32 CFR 635.5 - Police Intelligence/Criminal Information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 4 2011-07-01 2011-07-01 false Police Intelligence/Criminal Information. 635.5... Intelligence/Criminal Information. (a) The purpose of gathering police intelligence is to identify individuals.... If police intelligence is developed to the point where it factually establishes a criminal offense...

  3. 32 CFR 635.5 - Police Intelligence/Criminal Information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 4 2012-07-01 2011-07-01 true Police Intelligence/Criminal Information. 635.5... Intelligence/Criminal Information. (a) The purpose of gathering police intelligence is to identify individuals.... If police intelligence is developed to the point where it factually establishes a criminal offense...

  4. 32 CFR 635.5 - Police Intelligence/Criminal Information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Police Intelligence/Criminal Information. 635.5... Intelligence/Criminal Information. (a) The purpose of gathering police intelligence is to identify individuals.... If police intelligence is developed to the point where it factually establishes a criminal offense...

  5. 32 CFR 635.5 - Police Intelligence/Criminal Information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 4 2014-07-01 2013-07-01 true Police Intelligence/Criminal Information. 635.5... Intelligence/Criminal Information. (a) The purpose of gathering police intelligence is to identify individuals.... If police intelligence is developed to the point where it factually establishes a criminal offense...

  6. 32 CFR 635.5 - Police Intelligence/Criminal Information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 4 2013-07-01 2013-07-01 false Police Intelligence/Criminal Information. 635.5... Intelligence/Criminal Information. (a) The purpose of gathering police intelligence is to identify individuals.... If police intelligence is developed to the point where it factually establishes a criminal offense...

  7. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  8. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  9. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  10. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  11. National Intelligence and National Prosperity

    ERIC Educational Resources Information Center

    Hunt, Earl; Wittmann, Werner

    2008-01-01

    What is the relation between the cognitive competence of a national population that nation's economic prosperity? Lynn and Vanhanen [Lynn, R. & Vanhanen, T. (2002). "IQ and the wealth of nations." Westport, CT: Praeger.] presented data pointing to an exceptionally strong relationship between IQ scores and Gross Domestic Product per…

  12. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy

    PubMed Central

    Koopman, Colin; Doty, Nick

    2016-01-01

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy’s disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy’s essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy’s multiple uses across multiple contexts. This article is part of the themed issue ‘The ethical impact of data science’. PMID:28336797

  13. 75 FR 9233 - Privacy Act of 1974; U.S. Immigration and Customs Enforcement-006 Intelligence Records System of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-01

    ... 1974; U.S. Immigration and Customs Enforcement-006 Intelligence Records System of Records AGENCY... titled the Immigration and Customs Enforcement-006 Intelligence Records System (Dec. 9, 2008), to clarify... Intelligence Records system of records notice to more clearly explain the type of information it gathers on...

  14. The public health information infrastructure. A national review of the law on health information privacy.

    PubMed

    Gostin, L O; Lazzarini, Z; Neslund, V S; Osterholm, M T

    1996-06-26

    Our objectives were to review and analyze the laws in the 50 states, the District of Columbia, and Puerto Rico that regulate the acquisition, storage, and use of public health data and to offer proposals for reform of the laws on public health information privacy. Virtually all states reported some statutory protection for governmentally maintained health data for public health information in general (49 states), communicable diseases (42 states), and sexually transmitted diseases (43 states). State statutes permitted disclosure of data for statistical purposes (42 states), contact tracing (39 states), epidemiologic investigations (22 states), and subpoena or court order (14 states). The survey revealed significant problems that affect both the development of fair and effective public health information systems and the protection of privacy. Statutes may be silent about the degree of privacy protection afforded, confer weaker privacy protection to certain kinds of information, or grant health officials broad discretion to disseminate personal information. Our proposals for law reform are based on a meeting of experts at the Carter Presidential Center under the auspices of the Centers for Disease Control and Prevention and the Council of State and Territorial Epidemiologists: (1) an independent data protection commission should be established, (2) health authorities should justify the collection of personally identifiable information, (3) subjects should be given basic information about data practices, (4) data should be held and used in accordance with fair information practices, (5) legally binding privacy and security assurances should attach to identifiable health information with significant penalties for breach of these assurances, (6) disclosure of data should be made only for purposes consistent with the original collection, and (7) secondary uses beyond those originally intended by the data collector should be permitted only with informed consent.

  15. 32 CFR 1901.32 - Requests for expedited processing.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Requests for expedited processing. 1901.32 Section 1901.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Additional Administrative Matters § 1901.32 Requests...

  16. 32 CFR 1901.52 - Criminal penalties.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Criminal penalties. 1901.52 Section 1901.52 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Prohibitions § 1901.52 Criminal penalties. (a) Unauthorized disclosure...

  17. 32 CFR 1901.52 - Criminal penalties.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Criminal penalties. 1901.52 Section 1901.52 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Prohibitions § 1901.52 Criminal penalties. (a) Unauthorized disclosure...

  18. 32 CFR 1901.32 - Requests for expedited processing.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Requests for expedited processing. 1901.32 Section 1901.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Additional Administrative Matters § 1901.32 Requests...

  19. Space in Space: Designing for Privacy in the Workplace

    NASA Technical Reports Server (NTRS)

    Akin, Jonie

    2015-01-01

    Privacy is cultural, socially embedded in the spatial, temporal, and material aspects of the lived experience. Definitions of privacy are as varied among scholars as they are among those who fight for their personal rights in the home and the workplace. Privacy in the workplace has become a topic of interest in recent years, as evident in discussions on Big Data as well as the shrinking office spaces in which people work. An article in The New York Times published in February of this year noted that "many companies are looking to cut costs, and one way to do that is by trimming personal space". Increasingly, organizations ranging from tech start-ups to large corporations are downsizing square footage and opting for open-office floorplans hoping to trim the budget and spark creative, productive communication among their employees. The question of how much is too much to trim when it comes to privacy, is one that is being actively addressed by the National Aeronautics and Space Administration (NASA) as they explore habitat designs for future space missions. NASA recognizes privacy as a design-related stressor impacting human health and performance. Given the challenges of sustaining life in an isolated, confined, and extreme environment such as Mars, NASA deems it necessary to determine the acceptable minimal amount for habitable volume for activities requiring at least some level of privacy in order to support optimal crew performance. Ethnographic research was conducted in 2013 to explore perceptions of privacy and privacy needs among astronauts living and working in space as part of a long-distance, long-duration mission. The allocation of space, or habitable volume, becomes an increasingly complex issue in outer space due to the costs associated with maintaining an artificial, confined environment bounded by limitations of mass while located in an extreme environment. Privacy in space, or space in space, provides a unique case study of the complex notions of

  20. Privacy and Library Records

    ERIC Educational Resources Information Center

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  1. Intelligent robotics can boost America's economic growth

    NASA Technical Reports Server (NTRS)

    Erickson, Jon D.

    1994-01-01

    A case is made for strategic investment in intelligent robotics as a part of the solution to the problem of improved global competitiveness for U.S. manufacturing, a critical industrial sector. Similar cases are made for strategic investments in intelligent robotics for field applications, construction, and service industries such as health care. The scope of the country's problems and needs is beyond the capability of the private sector alone, government alone, or academia alone to solve independently of the others. National cooperative programs in intelligent robotics are needed with the private sector supplying leadership direction and aerospace and non-aerospace industries conducting the development. Some necessary elements of such programs are outlined. The National Aeronautics and Space Administration (NASA) and the Lyndon B. Johnson Space Center (JSC) can be key players in such national cooperative programs in intelligent robotics for several reasons: (1) human space exploration missions require supervised intelligent robotics as enabling tools and, hence must develop supervised intelligent robotic systems; (2) intelligent robotic technology is being developed for space applications at JSC (but has a strong crosscutting or generic flavor) that is advancing the state of the art and is producing both skilled personnel and adaptable developmental infrastructure such as integrated testbeds; and (3) a NASA JSC Technology Investment Program in Robotics has been proposed based on commercial partnerships and collaborations for precompetitive, dual-use developments.

  2. Privacy and Data Protection in Japan.

    ERIC Educational Resources Information Center

    Srinivasan, Srinija

    1992-01-01

    Discussion of individual rights and privacy in Japan focuses on the Privacy Protection Act, which acknowledges the threat posed by government databases to the individual's right of privacy. Characteristics of the Japanese legal system are described, origins of privacy in Japanese law are examined, and privacy and government databases are…

  3. Privacy and occupational health services

    PubMed Central

    Heikkinen, A; Launis, V; Wainwright, P; Leino‐Kilpi, H

    2006-01-01

    Privacy is a key ethical principle in occupational health services. Its importance is emphasised in several laws, in ethical codes of conduct as well as in the literature, yet there is only very limited empirical research on privacy in the occupational health context. Conceptual questions on privacy in the occupational health context are discussed. The baseline assumption is that, in this context, privacy cannot be approached and examined only from the employee's (an individual) vantage point but the employer's (a group) point of view must also be taken into account, and that the concept has several dimensions (physical, social, informational and psychological). Even though privacy is a basic human need, there is no universally accepted definition of the concept and no consensus on whether an organisation can have privacy in the same way as people do. Many of the challenges surrounding privacy in the context of occupational health seem to be associated with the dual loyalties of occupational health professionals towards the employee and employer and with their simultaneous duties of disseminating and protecting information (informational privacy). Privacy is thus not an absolute value, but more research is needed to understand its multidimensional nature in the context of occupational health. PMID:16943333

  4. 3 CFR - Reviewing Our Global Signals Intelligence Collection and Communications Technologies

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 3 The President 1 2014-01-01 2014-01-01 false Reviewing Our Global Signals Intelligence Collection... August 12, 2013 Reviewing Our Global Signals Intelligence Collection and Communications Technologies Memorandum for the Director of National Intelligence The United States, like all nations, gathers...

  5. Ethics across the computer science curriculum: privacy modules in an introductory database course.

    PubMed

    Appel, Florence

    2005-10-01

    This paper describes the author's experience of infusing an introductory database course with privacy content, and the on-going project entitled Integrating Ethics Into the Database Curriculum, that evolved from that experience. The project, which has received funding from the National Science Foundation, involves the creation of a set of privacy modules that can be implemented systematically by database educators throughout the database design thread of an undergraduate course.

  6. 78 FR 20944 - Privacy Act of 1974, as Amended; Notice of a New System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-08

    ... computer tapes. RETRIEVABILITY: Records in this system are retrieved by various fields including the name...] Privacy Act of 1974, as Amended; Notice of a New System of Records AGENCY: National Park Service, Interior. ACTION: Notice of creation of a new system of records. SUMMARY: Pursuant to the provisions of the Privacy...

  7. Privacy information management for video surveillance

    NASA Astrophysics Data System (ADS)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  8. 32 CFR 1901.04 - Suggestions and complaints.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Suggestions and complaints. 1901.04 Section 1901.04 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 General § 1901.04 Suggestions and complaints. The Agency welcomes...

  9. 32 CFR 1901.51 - Limitations on disclosure.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Limitations on disclosure. 1901.51 Section 1901.51 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Prohibitions § 1901.51 Limitations on disclosure. No record which is...

  10. 32 CFR 320.9 - Disclosure of record to person other than the individual to whom it pertains.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Disclosure of record to person other than the individual to whom it pertains. 320.9 Section 320.9 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA...

  11. 32 CFR 320.9 - Disclosure of record to person other than the individual to whom it pertains.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Disclosure of record to person other than the individual to whom it pertains. 320.9 Section 320.9 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA...

  12. 32 CFR 1901.31 - Special procedures for medical and psychological records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Special procedures for medical and psychological records. 1901.31 Section 1901.31 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Additional Administrative Matters § 1901.31...

  13. 32 CFR 1901.04 - Suggestions and complaints.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Suggestions and complaints. 1901.04 Section 1901.04 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 General § 1901.04 Suggestions and complaints. The Agency welcomes...

  14. 32 CFR 1901.31 - Special procedures for medical and psychological records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Special procedures for medical and psychological records. 1901.31 Section 1901.31 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Additional Administrative Matters § 1901.31...

  15. 32 CFR 320.9 - Disclosure of record to person other than the individual to whom it pertains.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Disclosure of record to person other than the individual to whom it pertains. 320.9 Section 320.9 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA...

  16. 32 CFR 1901.51 - Limitations on disclosure.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Limitations on disclosure. 1901.51 Section 1901.51 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Prohibitions § 1901.51 Limitations on disclosure. No record which is...

  17. Privacy and Technology: Folk Definitions and Perspectives

    PubMed Central

    Kwasny, Michelle N.; Caine, Kelly E.; Rogers, Wendy A.; Fisk, Arthur D.

    2017-01-01

    In this paper we present preliminary results from a study of individual differences in privacy beliefs, as well as relate folk definitions of privacy to extant privacy theory. Focus groups were conducted with young adults aged 18–28 and older adults aged 65–75. Participants first shared their individual definitions of privacy, followed by a discussion of privacy in six scenarios chosen to represent a range of potentially invasive situations. Taken together, Westin’s and Altman’s theories of privacy accounted for both younger and older adults’ ideas about privacy, however, neither theory successfully accounted for findings across all age and gender groups. Whereas males tended to think of privacy in terms of personal needs and convenience, females focused more on privacy in terms of others, respecting privacy rights, and safety. Older adults tended to be more concerned about privacy of space rather than information privacy. Initial results reinforce the notion that targeting HCI design to the user population, even with respect to privacy, is critically important. PMID:29057397

  18. Artificial Intelligence and Language Comprehension.

    ERIC Educational Resources Information Center

    National Inst. of Education (DHEW), Washington, DC. Basic Skills Group. Learning Div.

    The three papers in this volume concerning artificial intelligence and language comprehension were commissioned by the National Institute of Education to further the understanding of the cognitive processes that enable people to comprehend what they read. The first paper, "Artificial Intelligence and Language Comprehension," by Terry Winograd,…

  19. Assessing Intelligence Operation/Fusion/Coordination Centers for Efficiency Opportunities

    DTIC Science & Technology

    2013-02-28

    intelligence ], HUMINT [human intelligence ], GEOINT [geospatial intelligence ], or even open source information into the NIC-C. There is no...centers have and continue to be stood up to improve the collaboration across intelligence organizatons addressing national security threats. Open ... source review of journals and books describing changes in the intelligence community organizational structure since September 2001, were reviewed to

  20. 32 CFR Appendix M to Part 275 - Format for Certificate of Compliance With the Right to Financial Privacy Act of 1978

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Format for Certificate of Compliance With the Right to Financial Privacy Act of 1978 M Appendix M to Part 275 National Defense Department of Defense... INSTITUTIONS: RIGHT TO FINANCIAL PRIVACY ACT OF 1978 Pt. 275, App. M Appendix M to Part 275—Format for...

  1. 32 CFR Appendix M to Part 275 - Format for Certificate of Compliance With the Right to Financial Privacy Act of 1978

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Format for Certificate of Compliance With the Right to Financial Privacy Act of 1978 M Appendix M to Part 275 National Defense Department of Defense... INSTITUTIONS: RIGHT TO FINANCIAL PRIVACY ACT OF 1978 Pt. 275, App. M Appendix M to Part 275—Format for...

  2. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rothstein, M.A.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emergingmore » genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.« less

  3. Privacy Act Statement

    EPA Pesticide Factsheets

    Any information you provide to the Environmental Protection Agency’s (EPA) Suspension and Debarment Program will be governed by the Privacy Act and will be included in the EPA Debarment and Suspension Files, a Privacy Act system of records.

  4. 78 FR 46799 - Supplemental Nutrition Assistance Program: Privacy Protections of Information From Applicant...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-02

    ... Supplemental Nutrition Assistance Program: Privacy Protections of Information From Applicant Households AGENCY... National School Lunch Program established under the Richard B. Russell National School Lunch Act or the School Breakfast Program established under the Child Nutrition Act of 1966, in order to directly certify...

  5. Disclosing genetic information to at-risk relatives: new Australian privacy principles, but uniformity still elusive.

    PubMed

    Otlowski, Margaret F A

    2015-04-06

    There is growing understanding of the need for genetic information to be shared with genetic relatives in some circumstances. Since 2006, s 95AA of the Privacy Act 1988 (Cwlth) has permitted the disclosure of genetic information to genetic relatives without the patient's consent, provided that the health practitioner reasonably believes that disclosure is necessary to lessen or prevent a serious threat to the life, health or safety of the genetic relatives. Enabling guidelines were introduced in 2009. These were limited to the private sector, and excluded doctors working in the public sector at both Commonwealth and state and territory levels. Privacy legislation was amended in March 2014, and new Australian Privacy Principles, which replace the National Privacy Principles and Information Privacy Principles, now cover the collection and use of personal information. The Privacy Act and the Australian Privacy Principles now extend to practitioners employed by the Commonwealth but not to health practitioners working in state and territory public hospitals. In this article, I review these legislative developments and highlight the implications of the lack of uniformity and the consequent need for a collaborative, uniform approach by states and territories.

  6. 32 CFR 319.10 - Appeal of initial adverse Agency determination for access, correction or amendment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Appeal of initial adverse Agency determination for access, correction or amendment. 319.10 Section 319.10 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY...

  7. 32 CFR 319.10 - Appeal of initial adverse Agency determination for access, correction or amendment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Appeal of initial adverse Agency determination for access, correction or amendment. 319.10 Section 319.10 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY...

  8. 32 CFR 319.10 - Appeal of initial adverse Agency determination for access, correction or amendment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Appeal of initial adverse Agency determination for access, correction or amendment. 319.10 Section 319.10 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY...

  9. Partitioning-based mechanisms under personalized differential privacy.

    PubMed

    Li, Haoran; Xiong, Li; Ji, Zhanglong; Jiang, Xiaoqian

    2017-05-01

    Differential privacy has recently emerged in private statistical aggregate analysis as one of the strongest privacy guarantees. A limitation of the model is that it provides the same privacy protection for all individuals in the database. However, it is common that data owners may have different privacy preferences for their data. Consequently, a global differential privacy parameter may provide excessive privacy protection for some users, while insufficient for others. In this paper, we propose two partitioning-based mechanisms, privacy-aware and utility-based partitioning, to handle personalized differential privacy parameters for each individual in a dataset while maximizing utility of the differentially private computation. The privacy-aware partitioning is to minimize the privacy budget waste, while utility-based partitioning is to maximize the utility for a given aggregate analysis. We also develop a t -round partitioning to take full advantage of remaining privacy budgets. Extensive experiments using real datasets show the effectiveness of our partitioning mechanisms.

  10. Partitioning-based mechanisms under personalized differential privacy

    PubMed Central

    Li, Haoran; Xiong, Li; Ji, Zhanglong; Jiang, Xiaoqian

    2017-01-01

    Differential privacy has recently emerged in private statistical aggregate analysis as one of the strongest privacy guarantees. A limitation of the model is that it provides the same privacy protection for all individuals in the database. However, it is common that data owners may have different privacy preferences for their data. Consequently, a global differential privacy parameter may provide excessive privacy protection for some users, while insufficient for others. In this paper, we propose two partitioning-based mechanisms, privacy-aware and utility-based partitioning, to handle personalized differential privacy parameters for each individual in a dataset while maximizing utility of the differentially private computation. The privacy-aware partitioning is to minimize the privacy budget waste, while utility-based partitioning is to maximize the utility for a given aggregate analysis. We also develop a t-round partitioning to take full advantage of remaining privacy budgets. Extensive experiments using real datasets show the effectiveness of our partitioning mechanisms. PMID:28932827

  11. Location Privacy in RFID Applications

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  12. Ethics and Privacy.

    ERIC Educational Resources Information Center

    Brewer, Erin; Eastmond, Nick; Geertsen, Reed; Johnson, Doug; Lewandowski, Judith; Yeaman, Andrew R. J.

    2003-01-01

    Contains four articles covering trends and issues on ethics and privacy in instructional technology, including: considerations for assessing ethical issues; what schools must do to develop ethical behaviors in students; a privacy primer for educators; and manufacturing technophopia. Each article contains references. (MES)

  13. Quantifying Differential Privacy under Temporal Correlations

    PubMed Central

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-01-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective. PMID:28883711

  14. Quantifying Differential Privacy under Temporal Correlations.

    PubMed

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-04-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time . We call it temporal privacy leakage . Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective.

  15. 75 FR 20298 - Privacy Act Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ... Part 200 RIN 0430-AA03 Privacy Act Regulations AGENCY: Recovery Accountability and Transparency Board... amend the Board's regulations implementing the Privacy Act of 1974 (Privacy Act), as amended. This proposed rule would exempt certain systems of records from certain sections of the Privacy Act. These...

  16. Intelligence, Information Technology, and Information Warfare.

    ERIC Educational Resources Information Center

    Davies, Philip H. J.

    2002-01-01

    Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…

  17. Respecting the privacy of hospitalized patients: An integrative review.

    PubMed

    Hasan Tehrani, Tayebeh; Seyed Bagher Maddah, Sadat; Fallahi-Khoshknab, Masoud; Ebadi, Abbas; Mohammadi Shahboulaghi, Farahnaz; Gillespie, Mark

    2018-01-01

    Privacy is a complicated and obscure concept, which has special meanings in the healthcare environment; therefore, it is essential for healthcare providers to fully understand this concept. However, there is no universally accepted definition for this concept in the texts, and it has been interpreted differently, based on its application. To analyze and provide a clear and scientific definition for respect of privacy of hospitalized patients and identify the common aspects of this concept. This study was conducted using the Whittemore and Knafl's modified framework as a conceptual analysis method. Ethical consideration: This study was approved by the Research Council of the University of Social Welfare and Rehabilitation Sciences. We have respected the ethical requirements required regarding the sources and authorship. Research context and data sources: Using integrative review, a search was performed using national and international databases, including CINAHL, Scopus, Medline, Web of Science, and ISI (with no date restriction). The keywords employed during the search process were "privacy of patients," "confidentiality," "and patients' rights." In total, 1345 articles were retrieved from the databases. After the elimination of repetitive studies and with regard to the study objectives, 124 articles, 3 books, and 4 theses were entered into the study. The data were analyzed using the conventional content analysis approach. The results were extracted in the form of four, seven, and two themes related to attributes such as physical, informational, social, and psychological and the antecedents and consequences of respecting patient privacy, respectively. Respect for hospitalized patient privacy contains multiple dimensions. Factors affecting the achievement of this concept include individual backgrounds, nature of the disease, and rule of paternalism. The fulfillment of patient privacy leads to such consequences as protection and improvement of human dignity as well

  18. More Than Defense in Daily Experience of Privacy: The Functions of Privacy in Digital and Physical Environments

    PubMed Central

    Lombardi, Debora Benedetta; Ciceri, Maria Rita

    2016-01-01

    The purpose of the current study was to investigate the experience of privacy, focusing on its functional role in personal well-being. A sample (N = 180) comprised subjects between 18 and 50 years of age were asked to spontaneously provide accounts of their experiences with privacy and answer close-ended questions to acquire a description of a daily experience of privacy. The results showed the importance attributed to the function of privacy related to the “defense from social threats”, and the twofold function of privacy related to an “achieved state of privacy”, in the terms of both “system maintenance” and “system development”. The results also shed light on the role of the environment in shaping one’s experience of privacy. Specifically, the participants recognized more easily the function of defense from threats related to seeking privacy while interacting in digital environments, whereas they seemed to benefit from positive functions related to an achieved state of privacy in physical environments. The findings sustain the notion of privacy as a supportive condition for some psychological processes involved in the positive human functioning and confirm previous studies conducted on the role of privacy in human well-being. PMID:27247696

  19. Biobanking and Privacy Law in Brazil.

    PubMed

    Dallari, Sueli Gandolfi; Castellaro, Felipe Angel Bocchi; Guerriero, Iara Coelho Zito

    2015-01-01

    This article analyzes the current regulatory framework for biobanking, genomic research, and protection of privacy in Brazil. It is divided in four parts. The first describes the biobanking context in Brazil and its evolution in recent years. In the second, the entire regulatory framework on biobanking and genomic research is analyzed. The third part focuses on the critical evaluation of this regulatory framework, specifically on some major ethical dilemmas in biobanking. The fourth part describes the characteristics of the Brazilian biobanking and human research governance system, known as the CEP/CONEP system. Finally, the conclusion summarizes the information in the article and its contribution to the study of the biobanking ethical challenges, especially the protection of privacy. It is highlighted that biobanking regulatory harmonization among countries is necessary, since it increases scientific possibilities that can come from broader cooperation among biobanks and several research centers on the national and international levels. © 2015 American Society of Law, Medicine & Ethics, Inc.

  20. Geospatial intelligence workforce

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2013-02-01

    A report on the future U.S. workforce for geospatial intelligence, requested by the U.S. National Geospatial-Intelligence Agency (NGA), found that the agency—which hires about 300 scientists and analysts annually—is probably finding sufficient experts to fill the needs in all of its core areas, with the possible exception of geographic information systems (GIS) and remote sensing. The report by the U.S. National Research Council, released on 25 January, noted that competition for GIS applications analysts is strong. While there appear to be enough cartographers, photogrammetrists, and geodesists to meet NGA's current needs in those core areas, the report cautioned that future shortages in these areas seem likely because of a relatively small number of graduates.