Sample records for personal information protection

  1. 2 CFR 200.82 - Protected Personally Identifiable Information (Protected PII).

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 2 Grants and Agreements 1 2014-01-01 2014-01-01 false Protected Personally Identifiable Information (Protected PII). 200.82 Section 200.82 Grants and Agreements Office of Management and Budget... § 200.82 Protected Personally Identifiable Information (Protected PII). Protected PII means an...

  2. Information processing capacity while wearing personal protective eyewear.

    PubMed

    Wade, Chip; Davis, Jerry; Marzilli, Thomas S; Weimar, Wendi H

    2006-08-15

    It is difficult to overemphasize the function vision plays in information processing, specifically in maintaining postural control. Vision appears to be an immediate, effortless event; suggesting that eyes need only to be open to employ the visual information provided by the environment. This study is focused on investigating the effect of Occupational Safety and Health Administration regulated personal protective eyewear (29 CFR 1910.133) on physiological and cognitive factors associated with information processing capabilities. Twenty-one college students between the ages of 19 and 25 years were randomly tested in each of three eyewear conditions (control, new and artificially aged) on an inclined and horizontal support surface for auditory and visual stimulus reaction time. Data collection trials consisted of 50 randomly selected (25 auditory, 25 visual) stimuli over a 10-min surface-eyewear condition trial. Auditory stimulus reaction time was significantly affected by the surface by eyewear interaction (F2,40 = 7.4; p < 0.05). Similarly, analysis revealed a significant surface by eyewear interaction in reaction time following the visual stimulus (F2,40 = 21.7; p < 0.05). The current findings do not trivialize the importance of personal protective eyewear usage in an occupational setting; rather, they suggest the value of future research focused on the effect that personal protective eyewear has on the physiological, cognitive and biomechanical contributions to postural control. These findings suggest that while personal protective eyewear may serve to protect an individual from eye injury, an individual's use of such personal protective eyewear may have deleterious effects on sensory information associated with information processing and postural control.

  3. Protecting personal information: Implications of the Protection of Personal Information (POPI) Act for healthcare professionals.

    PubMed

    Buys, M

    2017-10-31

    Careless handling of patient information in daily medical practice can result in Health Professions Council of South Africa sanction, breach of privacy lawsuits and, in extreme cases, serious monetary penalty or even imprisonment. This review will focus on the Protection of Personal Information (POPI) Act (No. 4 of 2013) and the implications thereof for healthcare professionals in daily practice. Recommendations regarding the safeguarding of information are made.

  4. Protecting Personal Information on Social Networking Sites

    ERIC Educational Resources Information Center

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  5. 34 CFR 5.71 - Protection of personal privacy and proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Protection of personal privacy and proprietary information. 5.71 Section 5.71 Education Office of the Secretary, Department of Education AVAILABILITY OF INFORMATION TO THE PUBLIC PURSUANT TO PUB. L. 90-23 (Eff. until 7-14-10) Availability of Specific Records § 5.71 Protection of personal privacy and...

  6. Optical security system for the protection of personal identification information.

    PubMed

    Doh, Yang-Hoi; Yoon, Jong-Soo; Choi, Kyung-Hyun; Alam, Mohammad S

    2005-02-10

    A new optical security system for the protection of personal identification information is proposed. First, authentication of the encrypted personal information is carried out by primary recognition of a personal identification number (PIN) with the proposed multiplexed minimum average correlation energy phase-encrypted (MMACE_p) filter. The MMACE_p filter, synthesized with phase-encrypted training images, can increase the discrimination capability and prevent the leak of personal identification information. After the PIN is recognized, speedy authentication of personal information can be achieved through one-to-one optical correlation by means of the optical wavelet filter. The possibility of information counterfeiting can be significantly decreased with the double-identification process. Simulation results demonstrate the effectiveness of the proposed technique.

  7. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Protection, use, and release of personal information. 361.38 Section 361.38 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE SERVICES, DEPARTMENT OF EDUCATION STATE VOCATIONAL REHABILITATION SERVICES PROGRAM State Plan and...

  8. Privacy protection for personal health information and shared care records.

    PubMed

    Neame, Roderick L B

    2014-01-01

    The protection of personal information privacy has become one of the most pressing security concerns for record keepers: this will become more onerous with the introduction of the European General Data Protection Regulation (GDPR) in mid-2014. Many institutions, both large and small, have yet to implement the essential infrastructure for data privacy protection and patient consent and control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring, has led to the imposition of increasingly significant monetary penalties for failure to protect privacy: these too are set to become more onerous under the GDPR, increasing to a maximum of 2% of annual turnover. There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information. This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy. This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing. REQUIREMENTS FOR PRIVACY: There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers) to keep patient information confidential and to share it only with the authorisation of the patient. To achieve this information storage and retrieval, communication systems must be appropriately configured. There are many components of this, which are discussed in this paper. Patients may consult clinicians anywhere and at any time: therefore, their data must be available for recipient-driven retrieval (i.e. like the World Wide Web) under patient control and kept private: a method for delivering this is outlined.

  9. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of personal privacy. 212.22 Section 212.22 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Availability of Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion...

  10. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Protection of personal privacy. 212.22 Section 212.22 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Availability of Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion...

  11. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Protection of personal privacy. 212.22 Section 212.22 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Availability of Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion...

  12. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Protection of personal privacy. 212.22 Section 212.22 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Availability of Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion...

  13. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Protection of personal privacy. 212.22 Section 212.22 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Availability of Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion...

  14. Contract Procedure in an Agency Separated Products Explanation and Applied Process for Protection of the Personal Information

    NASA Astrophysics Data System (ADS)

    Terahama, Yukinori; Takahashi, Yoshiyasu; Suzuki, Shigeru; Kinukawa, Hiroshi

    Recent years, maintenance of corporate soundness and compliance with the law and corporate ethics are getting more significant in the insurance industry, regardless of life insurance. In the other hand, division of production and distribution is increasing. Therefore the problem of compliance with an agency is getting more significant. We propose a contract procedure in an agency separated products explanation and applied process for protection of the personal information. Our proposed procedure protects the personal information of the contractor and supports the compliance observance for contracts with the background texture watermarks and the redactable signature. We have developed a prototype system of the solution to check its feasibility.

  15. How strong are passwords used to protect personal health information in clinical trials?

    PubMed

    El Emam, Khaled; Moreau, Katherine; Jonker, Elizabeth

    2011-02-11

    Findings and statements about how securely personal health information is managed in clinical research are mixed. The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices.

  16. How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?

    PubMed Central

    Moreau, Katherine; Jonker, Elizabeth

    2011-01-01

    Background Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices. PMID:21317106

  17. Protecting Your Child's Personal Information at School

    ERIC Educational Resources Information Center

    Federal Trade Commission, 2012

    2012-01-01

    Back to school--an annual ritual that includes buying new notebooks, packing lunches, coordinating transportation, and filling out forms: registration forms, health forms, permission slips, and emergency contact forms, to name a few. Many school forms require personal and, sometimes, sensitive information. In the wrong hands, this information can…

  18. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false Protection of personal privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT CORPORATION FREEDOM OF INFORMATION ACT Exemptions From Public Access to Corporation Records § 902.56 Protection of personal privacy. (a) Any of the followin...

  19. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Protection of personal privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT CORPORATION FREEDOM OF INFORMATION ACT Exemptions From Public Access to Corporation Records § 902.56 Protection of personal privacy. (a) Any of the followin...

  20. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false Protection of personal privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT CORPORATION FREEDOM OF INFORMATION ACT Exemptions From Public Access to Corporation Records § 902.56 Protection of personal privacy. (a) Any of the followin...

  1. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false Protection of personal privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT CORPORATION FREEDOM OF INFORMATION ACT Exemptions From Public Access to Corporation Records § 902.56 Protection of personal privacy. (a) Any of the followin...

  2. Personal protective equipment

    MedlinePlus

    ... medlineplus.gov/ency/patientinstructions/000447.htm Personal protective equipment To use the sharing features on this page, please enable JavaScript. Personal protective equipment is special equipment you wear to create a ...

  3. [Management of Personal Information in Clinical Laboratory Medicine:--Chairmen's Introductory Remarks].

    PubMed

    Yoshida, Hiroshi; Shimetani, Naoto

    2014-11-01

    The Japanese Society of Laboratory Medicine has been running its own Medical Safety Committee, and holding a symposium on medical safety during the annual meeting. The medical world is filled with a considerable amount of personal information, including genetic information, the ultimate personal information. We, as medical staff, have to manage such personal information not only in times of peace but also during disasters or emergency situations. In Japan, the Act on the Protection of Personal Information is currently being implemented, but a number of problems remain. Human beings have entered the information technology era, including electrical medical record systems, which is useful for research and education besides medical practice. This is why personal information must be more effectively protected from leakage, misconception, and abuse. We should create a sound system to manage personal information, with the spirit of protecting patient information that originated from the Oath of Hippocrates.

  4. 10 CFR 26.411 - Protection of information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... of information. (a) Licensees and other entities who collect personal information about an individual for the purpose of complying with this subpart shall establish and maintain a system of files and procedures to protect the personal information. FFD programs must maintain and use such records with the...

  5. 10 CFR 26.411 - Protection of information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... of information. (a) Licensees and other entities who collect personal information about an individual for the purpose of complying with this subpart shall establish and maintain a system of files and procedures to protect the personal information. FFD programs must maintain and use such records with the...

  6. 36 CFR § 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Protection of personal privacy. § 902.56 Section § 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT CORPORATION FREEDOM OF INFORMATION ACT Exemptions From Public Access to Corporation Records § 902.56 Protection of personal privacy. (a) Any of the...

  7. Personal Privacy in an Information Society. Final Report.

    ERIC Educational Resources Information Center

    Privacy Protection Study Commission, Washington, DC.

    This report of the Privacy Protection Study Commission was prepared in response to a Congressional mandate to study data banks, automatic data processing programs, and information systems of governmental, regional and private organizations to determine standards and procedures in force for the protection of personal information. Recommendations…

  8. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Personal protective equipment. 170.240... WORKER PROTECTION STANDARD Standard for Pesticide Handlers § 170.240 Personal protective equipment. (a... protective equipment specified on the labeling for use of the product. (b) Definition. (1) Personal...

  9. About Personal Protective Equipment (PPE)

    MedlinePlus

    ... Equipment for Infection Control Questions About Personal Protective Equipment (PPE) Share Tweet Linkedin Pin it More sharing ... Print Q1. How do manufacturers ensure personal protective equipment (PPE) is safe and effective? A1. To help ...

  10. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... address, home telephone number, etc., must be strictly limited to individuals with an official need to know. It is inappropriate to use PPI in group/bulk orders. Activities must take action to protect PPI.... (c) Collection/maintenance. The collection and maintenance of information retrieved by an individual...

  11. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... address, home telephone number, etc., must be strictly limited to individuals with an official need to know. It is inappropriate to use PPI in group/bulk orders. Activities must take action to protect PPI.... (c) Collection/maintenance. The collection and maintenance of information retrieved by an individual...

  12. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... address, home telephone number, etc., must be strictly limited to individuals with an official need to know. It is inappropriate to use PPI in group/bulk orders. Activities must take action to protect PPI.... (c) Collection/maintenance. The collection and maintenance of information retrieved by an individual...

  13. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... address, home telephone number, etc., must be strictly limited to individuals with an official need to know. It is inappropriate to use PPI in group/bulk orders. Activities must take action to protect PPI.... (c) Collection/maintenance. The collection and maintenance of information retrieved by an individual...

  14. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... address, home telephone number, etc., must be strictly limited to individuals with an official need to know. It is inappropriate to use PPI in group/bulk orders. Activities must take action to protect PPI.... (c) Collection/maintenance. The collection and maintenance of information retrieved by an individual...

  15. Protection method for an optical information carrier

    NASA Astrophysics Data System (ADS)

    Pitsyuga, Vitaly V.; Kolesnikov, Michael Y.; Kosyak, Igor V.

    1997-02-01

    Now information protection on personal carriers (for example, cards) from an unauthorized access (UA) is a very important problem in connection with wide introduction of proper automatic systems for information processing in different spheres of human activity. These are financial, medical and information services, an access to restricted units and so on. There is proposed to use physical parameters of the special coating part (so-called restricted zone) to information protection on optical carriers (laser cards). There is formed restricted zone on the surface of the recording coating of a laser card. The unique information about every laser card to creating a protective passport from UA is obtained by readout of defects parameters.

  16. 77 FR 72411 - The Standard on Personal Protective Equipment (PPE) for Shipyard Employment; Extension of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-05

    ... Standard on Personal Protective Equipment (PPE) for Shipyard Employment; Extension of the Office of... requirements specified in the Standard on Personal Protective Equipment (PPE) for Shipyard Employment (29 CFR... information collection requirements contained in the Standard on Personal Protective Equipment (PPE) for...

  17. 78 FR 16539 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Personal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-15

    ... for OMB Review; Comment Request; Personal Protective Equipment for Shipyard Employment ACTION: Notice... (OSHA) sponsored information collection request (ICR) titled, ``Personal Protective Equipment for... employee uses the appropriate personal protective equipment (PPE) for the eyes, face, head, extremities...

  18. 78 FR 24234 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Personal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-24

    ... for OMB Review; Comment Request; Personal Protective Equipment Standard for General Industry ACTION... Administration (OSHA) sponsored information collection request (ICR) titled, ``Personal Protective Equipment...: Regulations 29 CFR part 1910, subpart I requires that personal protective equipment (PPE)--including equipment...

  19. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective equipment, including personal protective equipment for eyes, face, head, and extremities, protective clothing... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Personal protective...

  20. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective equipment, including personal protective equipment for eyes, face, head, and extremities, protective clothing... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Personal protective...

  1. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... individual's native language or through the appropriate mode of communication; and (v) These policies and.... Information containing identifiable personal information may not be shared with advisory or other bodies that...

  2. 29 CFR 1926.28 - Personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 8 2010-07-01 2010-07-01 false Personal protective equipment. 1926.28 Section 1926.28... Provisions § 1926.28 Personal protective equipment. (a) The employer is responsible for requiring the wearing of appropriate personal protective equipment in all operations where there is an exposure to...

  3. 29 CFR 1926.28 - Personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 8 2011-07-01 2011-07-01 false Personal protective equipment. 1926.28 Section 1926.28... Provisions § 1926.28 Personal protective equipment. (a) The employer is responsible for requiring the wearing of appropriate personal protective equipment in all operations where there is an exposure to...

  4. Electronic Health Record in Italy and Personal Data Protection.

    PubMed

    Bologna, Silvio; Bellavista, Alessandro; Corso, Pietro Paolo; Zangara, Gianluca

    2016-06-01

    The present article deals with the Italian Electronic Health Record (hereinafter EHR), recently introduced by Act 221/2012, with a specific focus on personal data protection. Privacy issues--e.g., informed consent, data processing, patients' rights and minors' will--are discussed within the framework of recent e-Health legislation, national Data Protection Code, the related Data Protection Authority pronouncements and EU law. The paper is aimed at discussing the problems arising from a complex, fragmentary and sometimes uncertain legal framework on e-Health.

  5. 49 CFR 214.111 - Personal protective equipment, generally.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Personal protective equipment, generally. 214.111... Personal protective equipment, generally. With the exception of foot protection, the railroad or railroad contractor shall provide and the bridge worker shall use appropriate personal protective equipment described...

  6. 49 CFR 214.111 - Personal protective equipment, generally.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Personal protective equipment, generally. 214.111... Personal protective equipment, generally. With the exception of foot protection, the railroad or railroad contractor shall provide and the bridge worker shall use appropriate personal protective equipment described...

  7. 48 CFR 8.608 - Protection of classified and sensitive information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...

  8. 48 CFR 8.608 - Protection of classified and sensitive information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...

  9. 48 CFR 8.608 - Protection of classified and sensitive information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...

  10. 48 CFR 8.608 - Protection of classified and sensitive information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...

  11. 48 CFR 8.608 - Protection of classified and sensitive information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...

  12. Web-browser encryption of personal health information

    PubMed Central

    2011-01-01

    Background Electronic health records provide access to an unprecedented amount of clinical data for research that can accelerate the development of effective medical practices. However it is important to protect patient confidentiality, as many medical conditions are stigmatized and disclosure could result in personal and/or financial loss. Results We describe a system for remote data entry that allows the data that would identify the patient to be encrypted in the web browser of the person entering the data. These data cannot be decrypted on the server by the staff at the data center but can be decrypted by the person entering the data or their delegate. We developed this system to solve a problem that arose in the context of clinical research, but it is applicable in a range of situations where sensitive information is stored and updated in a database and it is necessary to ensure that it cannot be viewed by any except those intentionally given access. Conclusion By developing this system, we are able to centralize the collection of some patient data while minimizing the risk that protected health information be made available to study personnel who are not authorized to use it. PMID:22073940

  13. Use of personal protective equipment for respiratory protection.

    PubMed

    Sargent, Edward V; Gallo, Frank

    2003-01-01

    Management of hazards in biomedical research facilities requires the application of the traditional industrial hygiene responsibilities of anticipation, recognition, evaluation, and control to characterize the work environment, evaluate tasks and equipment, identify hazards, define exposure groups, and recommend controls. Generally, the diversity and unique characteristics of hazards faced by laboratory and animal facility employees and the short-term and low-level nature of the exposures factor into the selection of proper exposure control measures in the laboratory. The proper selection of control measures is based on a hierarchy of elimination and minimization by engineering controls, followed last by personal protective equipment when exposures cannot be eliminated. Once it is decided that personal protective equipment is needed, specific regulations and guidelines define safety standards for research facilities, including the elements of a sound respiratory protection program. These elements include respirator selection (including appropriate protection factors), medical evaluation, fit testing, training, inspection, maintenance and care, quality, quantity and flow of breathing air, and routine and emergency use procedures.

  14. Personal protection against biting insects and ticks

    PubMed Central

    2011-01-01

    Recent events with the first cases of local transmission of chikungunya and dengue fever virus in southern France by Aedes albopictus, adding to the nuisance and potential vectors that can be encountered when traveling in tropical or sub-tropical countries, has shown the value of a reflection on the Personal protection against vectors (PPAV). It is seen during an outbreak of vector-borne disease, or simply because of nuisance arthropods, that our fellow citizens try to protect themselves individually by using an arsenal of resources available on the market. Yet most of these means have been neither checked for effectiveness or safety tests, however, essential. Travellers, staff on mission or assignment, are looking for specific information on how to protect themselves or their families. Health workers had at their disposal so far indications that vary widely from one source to another. Therefore it seemed important to the Society of Travel Medicine (SMV) and the French Society of Parasitology (SFP) to initiate a reflection on this theme. This reflection took the form of recommendations for good practice, following the outline established by the French High Health Authority (HAS). The aim was to gather all relevant information, verified and validated and the format to be used not only by health personnel (doctors, pharmacists, nurses), but also by travel agents and individuals. This document highlights the need to take into account the risk of vector-borne diseases, some deadly, and the benefit of various methods of personal protection. The choice of methods is clearly oriented towards those whose effectiveness has been proven and potential risks assessed. The paper finally proposes two decision trees based on the transmission type (day or night) and kind of stay (short or roaming, long and steady). It concerns travellers, but also expatriates, residents and nomads. PMID:21395212

  15. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... protection of nonpublic information in the Standards of Ethical Conduct for Employees of the Executive Branch... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information? All...

  16. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... protection of nonpublic information in the Standards of Ethical Conduct for Employees of the Executive Branch... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information? All...

  17. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... methods may include encryption or password protecting the information in a separate Word document. When....mil/whs/directives/corres/pdf/54007r_0998/p54007r.pdf. (c) Do not disclose personal information to...

  18. Patient information, consents and privacy protection scheme for an information system dedicated to pervasive developmental disorders.

    PubMed

    Ben Said, Mohamed; Robel, Laurence; Messiaen, Claude; Craus, Yann; Jais, Jean Philippe; Golse, Bernard; Landais, Paul

    2014-01-01

    Patients explicit and unambiguous information, patients consents and privacy protection are reviewed in this article, in the frame of the deployment of the information system TEDIS dedicated to autism spectrum disorders. The role of the Delegate to the Protection of Data is essential at this stage. We developed a privacy protection scheme based on storing encrypted patients personal data on the server database and decrypting it on the Web browser. It tries to respond to the end-users request to manage nominative data in a human readable form and to meet with privacy protection framework.

  19. Audit Report on "Protection of the Department of Energy's Unclassified Sensitive Electronic Information"

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    The Department of Energy and its contractors store and process massive quantities of sensitive information to accomplish national security, energy, science, and environmental missions. Sensitive unclassified data, such as personally identifiable information (PII), official use only, and unclassified controlled nuclear information require special handling and protection to prevent misuse of the information for inappropriate purposes. Industry experts have reported that more than 203 million personal privacy records have been lost or stolen over the past three years, including information maintained by corporations, educational institutions, and Federal agencies. The loss of personal and other sensitive information can result in substantial financialmore » harm, embarrassment, and inconvenience to individuals and organizations. Therefore, strong protective measures, including data encryption, help protect against the unauthorized disclosure of sensitive information. Prior reports involving the loss of sensitive information have highlighted weaknesses in the Department's ability to protect sensitive data. Our report on Security Over Personally Identifiable Information (DOE/IG-0771, July 2007) disclosed that the Department had not fully implemented all measures recommended by the Office of Management and Budget (OMB) and required by the National Institute of Standards and Technology (NIST) to protect PII, including failures to identify and encrypt PII maintained on information systems. Similarly, the Government Accountability Office recently reported that the Department had not yet installed encryption technology to protect sensitive data on the vast majority of laptop computers and handheld devices. Because of the potential for harm, we initiated this audit to determine whether the Department and its contractors adequately safeguarded sensitive electronic information. The Department had taken a number of steps to improve protection of PII. Our review, however

  20. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or...

  1. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Personal protective clothing and equipment. 197.555... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and equipment. (a) When the use of respirators in compliance with § 197.550 and the personal protective clothing...

  2. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Personal protective clothing and equipment. 197.555... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and equipment. (a) When the use of respirators in compliance with § 197.550 and the personal protective clothing...

  3. Personal Protective Equipment for Pesticide Handlers

    EPA Pesticide Factsheets

    Personal protective equipment.use is subject to certain requirement under the Worker Protection Standard. Learn about these requirements, which include cleaning and maintenance, as well as standards for availability.

  4. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data.

    PubMed

    Beck, Eduard J; Gill, Wayne; De Lay, Paul R

    2016-01-01

    As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs) may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV . The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The success of programs like

  5. Insertion Loss of Personal Protective Clothing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shull D.J.; Biesel, V.B.; Cunefare, K.A.

    1999-05-13

    'The use of personal protective clothing that covers the head is a common practice in many industries. Such personal protective clothing will impact the sound pressure level and the frequency content of sounds to which the wearer will be exposed. The use of such clothing, then, may impact speech and alarm audibility. A measure of the impact of such clothing is its insertion loss. Insertion loss measurements were performed on four types of personal protective clothing in use by Westinghouse Savannah River Company personnel which utilize cloth and plastic hood configurations to protect the head. All clothing configurations tested atmore » least partially cover the ears. The measurements revealed that insertion loss of the items tested was notable at frequencies above 1000 Hz only and was a function of material stiffness and acoustic flanking paths to the ear. Further, an estimate of the clothing''s noise reduction rating reveals poor performance in that regard, even though the insertion loss of the test articles was significant at frequencies at and above 1000 Hz.'« less

  6. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or secret...

  7. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or secret...

  8. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or secret...

  9. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or secret...

  10. Personal, Anticipated Information Need

    ERIC Educational Resources Information Center

    Bruce, Harry

    2005-01-01

    Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…

  11. 49 CFR 229.41 - Protection against personal injury.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Protection against personal injury. 229.41 Section... Requirements § 229.41 Protection against personal injury. Fan openings, exposed gears and pinions, exposed... breakers, contactors, relays, grid resistors, and fuses shall be in non-hazardous locations or equipped...

  12. 49 CFR 229.41 - Protection against personal injury.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Protection against personal injury. 229.41 Section... Requirements § 229.41 Protection against personal injury. Fan openings, exposed gears and pinions, exposed... breakers, contactors, relays, grid resistors, and fuses shall be in non-hazardous locations or equipped...

  13. 78 FR 17222 - Notice of Proposed Information Collection, License for the Use of Personally Identifiable...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ... Identifiable Information Protected Under the E-Government Act of 2002, Title V and the Privacy Act of 1974...) and Title V, subtitle A of the E-Government Act of 2002 (CIPSEA) (U.S.C. 3501 note). HUD wishes to... Information Collection, License for the Use of Personally Identifiable Information Protected Under the E...

  14. Personal Health Information in Canada: A Comparison of Citizen Expectations and Legislation

    ERIC Educational Resources Information Center

    Peekhaus, Wilhelm

    2008-01-01

    This paper explores whether the Canadian legislative protections in place to safeguard medical privacy meet the expectations of Canadians. An overview of current governance systems designed to protect the privacy of personal health information at both the federal and provincial levels is first presented. This is followed by an empirical analysis…

  15. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States and...

  16. A patient privacy protection scheme for medical information system.

    PubMed

    Lu, Chenglang; Wu, Zongda; Liu, Mingyong; Chen, Wei; Guo, Junfang

    2013-12-01

    In medical information systems, there are a lot of confidential information about patient privacy. It is therefore an important problem how to prevent patient's personal privacy information from being disclosed. Although traditional security protection strategies (such as identity authentication and authorization access control) can well ensure data integrity, they cannot prevent system's internal staff (such as administrators) from accessing and disclosing patient privacy information. In this paper, we present an effective scheme to protect patients' personal privacy for a medical information system. In the scheme, privacy data before being stored in the database of the server of a medical information system would be encrypted using traditional encryption algorithms, so that the data even if being disclosed are also difficult to be decrypted and understood. However, to execute various kinds of query operations over the encrypted data efficiently, we would also augment the encrypted data with additional index, so as to process as much of the query as possible at the server side, without the need to decrypt the data. Thus, in this paper, we mainly explore how the index of privacy data is constructed, and how a query operation over privacy data is translated into a new query over the corresponding index so that it can be executed at the server side immediately. Finally, both theoretical analysis and experimental evaluation validate the practicality and effectiveness of our proposed scheme.

  17. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... shoes, and normal work boots; or (ii) Ordinary clothing, skin creams, or other items, used solely for... 29 Labor 8 2010-07-01 2010-07-01 false Criteria for personal protective equipment. 1926.95 Section..., DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Personal Protective and Life...

  18. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... shoes, and normal work boots; or (ii) Ordinary clothing, skin creams, or other items, used solely for... 29 Labor 8 2011-07-01 2011-07-01 false Criteria for personal protective equipment. 1926.95 Section..., DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Personal Protective and Life...

  19. 29 CFR 1977.5 - Persons protected by section 11(c).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 9 2012-07-01 2012-07-01 false Persons protected by section 11(c). 1977.5 Section 1977.5... OCCUPATIONAL SAFETY AND HEALTH ACT OF 1970 General § 1977.5 Persons protected by section 11(c). (a) All... engaging in protected activity. (c) In view of the definitions of “employer” and “employee” contained in...

  20. 29 CFR 1977.5 - Persons protected by section 11(c).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 9 2013-07-01 2013-07-01 false Persons protected by section 11(c). 1977.5 Section 1977.5... OCCUPATIONAL SAFETY AND HEALTH ACT OF 1970 General § 1977.5 Persons protected by section 11(c). (a) All... engaging in protected activity. (c) In view of the definitions of “employer” and “employee” contained in...

  1. 29 CFR 1977.5 - Persons protected by section 11(c).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 9 2014-07-01 2014-07-01 false Persons protected by section 11(c). 1977.5 Section 1977.5... OCCUPATIONAL SAFETY AND HEALTH ACT OF 1970 General § 1977.5 Persons protected by section 11(c). (a) All... engaging in protected activity. (c) In view of the definitions of “employer” and “employee” contained in...

  2. Personal Protective Equipment. Module SH-12. Safety and Health.

    ERIC Educational Resources Information Center

    Center for Occupational Research and Development, Inc., Waco, TX.

    This student module on personal protective equipment is one of 50 modules concerned with job safety and health. This module explains the need for personal protective equipment, how it is selected, and the way in which the equipment is supposed to work. Following the introduction, 13 objectives (each keyed to a page in the text) the student is…

  3. Leishmaniasis: Who Uses Personal Protection among Military Personnel in Colombia?

    PubMed

    González, Aida M; Solís-Soto, María Teresa; Radon, Katja

    Leishmaniasis is common in Colombia, negatively affecting the health of military personnel active in endemic areas. The disease is transmitted by sand fly bites. Therefore, during duty, use of long-sleeved uniforms and other clothes treated with permethrin and application of mosquito repellent are important personal preventive measures. The objective of this study was to assess personal and occupational factors associated with the use of personal protection in male soldiers deployed to Leishmaniasis-endemic areas. Three hundred soldiers participated in a cross-sectional questionnaire study (response 84.3%). The self-administered questionnaire contained questions about sociodemographics, duration of service, compliance with personal mosquito protection, and knowledge about leishmaniasis. Descriptive analyses were followed by multiple logistic regression models adjusted for potential confounders (EpiInfo Version 7.0) FINDINGS: Overall, 23% of the soldiers reported complete use of the recommended personal protection measures. About 83% of the participants had heard about leishmaniasis. In the adjusted regression model, knowledge about leishmaniasis (adjusted odds ratio = 2.9; 95% confidence interval: 1.1-7.2) and being enrolled in the army for more than 5 years (2.2; 1.1-4.1) increased the odds of using personal protection. Improving knowledge about leishmaniasis is one measure to increase use of personal protection, thereby diminishing the risk of infection. Copyright © 2017 Icahn School of Medicine at Mount Sinai. Published by Elsevier Inc. All rights reserved.

  4. Experimental Evaluation of the Effectiveness Offered by Different Types of Personal Protective Clothing Against Nanoaerosols

    NASA Astrophysics Data System (ADS)

    Domat, M.; Pla, J.; Cadavid-Rodríguez, M. C.; Fito, C.

    2017-06-01

    The rapid expansion of nanotechnology is outpacing health and safety recommendations for engineered nanomaterials. Thus, there is a lack of information about the effects that nanomaterials can induce in the human health. Nevertheless, workers in nanotechnology-related industries are potentially at risk of being exposed to nanomaterials. Therefore, there is a need of characterize the behaviour of personal protective equipment against penetration nanoparticles, in order to provide an adequate protection to the workers. In this study, the efficiency of several protective dermal equipment against water-based NaCl aerosol was evaluated. For this purpose, different protective clothing and gloves were selected to carry out the assays, simulating typical use conditions of protective equipment under occupational settings. Results obtained exposed that the level of protection offered by the distinct types of personal protective coveralls depended not only on the fabric, but also on their fitting to the body of the subject. On the other hand, the efficiency of the protective gloves was set in the range from 95% to 99%, depending on the thickness and the type of material.

  5. Collaborative Information Retrieval Method among Personal Repositories

    NASA Astrophysics Data System (ADS)

    Kamei, Koji; Yukawa, Takashi; Yoshida, Sen; Kuwabara, Kazuhiro

    In this paper, we describe a collaborative information retrieval method among personal repositorie and an implementation of the method on a personal agent framework. We propose a framework for personal agents that aims to enable the sharing and exchange of information resources that are distributed unevenly among individuals. The kernel of a personal agent framework is an RDF(resource description framework)-based information repository for storing, retrieving and manipulating privately collected information, such as documents the user read and/or wrote, email he/she exchanged, web pages he/she browsed, etc. The repository also collects annotations to information resources that describe relationships among information resources and records of interaction between the user and information resources. Since the information resources in a personal repository and their structure are personalized, information retrieval from other users' is an important application of the personal agent. A vector space model with a personalized concept-base is employed as an information retrieval mechanism in a personal repository. Since a personalized concept-base is constructed from information resources in a personal repository, it reflects its user's knowledge and interests. On the other hand, it leads to another problem while querying other users' personal repositories; that is, simply transferring query requests does not provide desirable results. To solve this problem, we propose a query equalization scheme based on a relevance feedback method for collaborative information retrieval between personalized concept-bases. In this paper, we describe an implementation of the collaborative information retrieval method and its user interface on the personal agent framework.

  6. Commercial products that convey personal health information in emergencies.

    PubMed

    Potini, Vishnu C; Weerasuriya, Dilani N; Lowery-North, Douglas W; Kellermann, Arthur L

    2011-12-01

    Describe commercially available products and services designed to convey personal health information in emergencies. The search engine Google®, supplemented by print ads, was used to identify companies and organizations that offer relevant products and services to the general market. Disease-specific, health system, and health plan-specific offerings were excluded. Vendor web sites were the primary sources of information, supplemented by telephone and e-mail queries to sales representatives. Perfect inter-rater agreement was achieved. Thirty-nine unique vendors were identified. Eight sell engraved jewelry. Three offer an embossed card or pamphlet. Twelve supply USB drives with various features. Eleven support password-protected web sites. Five maintain national call centers. Available media differed markedly with respect to capacity and accessibility. Quoted prices ranged from a one-time expenditure of $3.50 to an annual fee of $200. Associated features and annual fees varied widely. A wide range of products and services exist to help patients convey personal health information. Health care providers should be familiar with their features, so they can access the information in a disaster or emergency.

  7. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Physical protection of personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property...-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection of...

  8. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Physical protection of personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property...-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection of...

  9. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Physical protection of personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property...-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection of...

  10. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Physical protection of personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property...-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection of...

  11. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Physical protection of personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property...-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection of...

  12. Safety of nursing staff and determinants of adherence to personal protective equipment.

    PubMed

    Neves, Heliny Carneiro Cunha; Souza, Adenícia Custódia Silva e; Medeiros, Marcelo; Munari, Denize Bouttelet; Ribeiro, Luana Cássia Miranda; Tipple, Anaclara Ferreira Veiga

    2011-01-01

    A qualitative study conducted in a teaching hospital with 15 nursing professionals. Attempted to analyze the reasons, attitudes and beliefs of nursing staff regarding adherence to personal protective equipment. Data were collected through focus groups, analyzed by the method of interpretation of meanings, considering Rosenstock's model of health beliefs as a reference framework. Data revealed two themes: Occupational safety and Interpersonal Relationship. We identified several barriers that interfere in matters of safety and personal protective equipment, such as communication, work overload, physical structure, accessibility of protective equipment and organizational and management aspects. Adherence to personal protective equipment is determined by the context experienced in the workplace, as well as by individual values and beliefs, but the decision to use the personal protective equipment is individual.

  13. Self-informant Agreement for Personality and Evaluative Person Descriptors: Comparing Methods for Creating Informant Measures.

    PubMed

    Simms, Leonard J; Zelazny, Kerry; Yam, Wern How; Gros, Daniel F

    2010-05-01

    Little attention typically is paid to the way self-report measures are translated for use in self-informant agreement studies. We studied two possible methods for creating informant measures: (a) the traditional method in which self-report items were translated from the first- to the third-person and (b) an alternative meta-perceptual method in which informants were directed to rate their perception of the targets' self-perception. We hypothesized that the latter method would yield stronger self-informant agreement for evaluative personality dimensions measured by indirect item markers. We studied these methods in a sample of 303 undergraduate friendship dyads. Results revealed mean-level differences between methods, similar self-informant agreement across methods, stronger agreement for Big Five dimensions than for evaluative dimensions, and incremental validity for meta-perceptual informant rating methods. Limited power reduced the interpretability of several sparse acquaintanceship effects. We conclude that traditional informant methods are appropriate for most personality traits, but meta-perceptual methods may be more appropriate when personality questionnaire items reflect indirect indicators of the trait being measured, which is particularly likely for evaluative traits.

  14. Risk-accepting personality and personal protective equipment use within the Agricultural Health Study.

    PubMed

    DellaValle, Curt T; Hoppin, Jane A; Hines, Cynthia J; Andreotti, Gabriella; Alavanja, Michael C R

    2012-01-01

    Pesticide exposures can be reduced by use of personal protective equipment as well as proper mixing and application practices. The authors examined the effects of risk-accepting personality on personal protective equipment (PPE) use and mixing and application practices among private pesticide applicators and their spouses within the Agricultural Health Study (AHS) in Iowa and North Carolina and commercial applicators in Iowa. The AHS follow-up questionnaire included four questions designed to assess attitudes toward risk. Analysis was limited to those who were currently working on a farm or registered as a commercial applicator and indicated current pesticide use (n=25,166). Respondents who answered three or more questions in the affirmative (private applicators: n=4160 [21%]; commercial applicators: n=199 [14%]; spouses: n=829 [23%]) were classified as having a risk-accepting personality. Logistic regression was used to evaluate specific work practices associated with risk-accepting attitudes. Among private applicators, the likelihood of using any PPE when mixing or loading pesticides was lower among risk-acceptors compared to risk-averse individuals (odds ratio [OR] = 0.72, 95% confidence interval [CI]: 0.65-0.79). A similar relationship was observed among commercial applicators (OR = 0.77, 95% CI: 0.34-1.77) but not among spouses (OR = 1.09, 95% CI: 0.90-1.33). Among private applicators, risk-acceptors were more likely than the risk-averse to apply pesticides within 50 feet of the home (OR = 1.21, 95% CI: 1.01-1.44), compared to further than ¼ mile. These findings suggest that the decisions to use personal protective equipment and properly handle/apply pesticides may be driven by risk-accepting personality traits.

  15. An Inter-Personal Information Sharing Model Based on Personalized Recommendations

    NASA Astrophysics Data System (ADS)

    Kamei, Koji; Funakoshi, Kaname; Akahani, Jun-Ichi; Satoh, Tetsuji

    In this paper, we propose an inter-personal information sharing model among individuals based on personalized recommendations. In the proposed model, we define an information resource as shared between people when both of them consider it important --- not merely when they both possess it. In other words, the model defines the importance of information resources based on personalized recommendations from identifiable acquaintances. The proposed method is based on a collaborative filtering system that focuses on evaluations from identifiable acquaintances. It utilizes both user evaluations for documents and their contents. In other words, each user profile is represented as a matrix of credibility to the other users' evaluations on each domain of interests. We extended the content-based collaborative filtering method to distinguish other users to whom the documents should be recommended. We also applied a concept-based vector space model to represent the domain of interests instead of the previous method which represented them by a term-based vector space model. We introduce a personalized concept-base compiled from each user's information repository to improve the information retrieval in the user's environment. Furthermore, the concept-spaces change from user to user since they reflect the personalities of the users. Because of different concept-spaces, the similarity between a document and a user's interest varies for each user. As a result, a user receives recommendations from other users who have different view points, achieving inter-personal information sharing based on personalized recommendations. This paper also describes an experimental simulation of our information sharing model. In our laboratory, five participants accumulated a personal repository of e-mails and web pages from which they built their own concept-base. Then we estimated the user profiles according to personalized concept-bases and sets of documents which others evaluated. We simulated

  16. Self-informant Agreement for Personality and Evaluative Person Descriptors: Comparing Methods for Creating Informant Measures

    PubMed Central

    Simms, Leonard J.; Zelazny, Kerry; Yam, Wern How; Gros, Daniel F.

    2011-01-01

    Little attention typically is paid to the way self-report measures are translated for use in self-informant agreement studies. We studied two possible methods for creating informant measures: (a) the traditional method in which self-report items were translated from the first- to the third-person and (b) an alternative meta-perceptual method in which informants were directed to rate their perception of the targets’ self-perception. We hypothesized that the latter method would yield stronger self-informant agreement for evaluative personality dimensions measured by indirect item markers. We studied these methods in a sample of 303 undergraduate friendship dyads. Results revealed mean-level differences between methods, similar self-informant agreement across methods, stronger agreement for Big Five dimensions than for evaluative dimensions, and incremental validity for meta-perceptual informant rating methods. Limited power reduced the interpretability of several sparse acquaintanceship effects. We conclude that traditional informant methods are appropriate for most personality traits, but meta-perceptual methods may be more appropriate when personality questionnaire items reflect indirect indicators of the trait being measured, which is particularly likely for evaluative traits. PMID:21541262

  17. The Personal Protective Behaviors of College Student Drinkers: Evidence of Indigenous Protective Norms

    ERIC Educational Resources Information Center

    Haines, Michael P.; Barker, Gregory; Rice, Richard M.

    2006-01-01

    Given the prevalence of alcohol consumption and the relative infrequency of harm among college students, the authors sought to determine how most college students protect themselves from alcohol-related harm. An analysis of the aggregate National College Health Assessment data identified a cluster of personal protective behaviors that correlated…

  18. Risk-Accepting Personality and Personal Protective Equipment Use within the Agricultural Health Study

    PubMed Central

    DellaValle, Curt T.; Hoppin, Jane A.; Hines, Cynthia J.; Andreotti, Gabriella; Alavanja, Michael C.R.

    2012-01-01

    Pesticide exposures can be reduced by use of personal protective equipment as well as proper mixing and application practices. We examined the effects of risk-accepting personality on personal protective equipment (PPE) use and mixing and application practices among private pesticide applicators and their spouses within the Agricultural Health Study (AHS) in Iowa and North Carolina and commercial applicators in Iowa. The AHS follow-up questionnaire included four questions designed to assess attitudes toward risk. Analysis was limited to those who were currently working on a farm or registered as a commercial applicator and indicated current pesticide use (n=25,166). Respondents who answered three or more questions in the affirmative (private applicators: n=4,160 (21%); commercial applicators: n=199 (14%); spouses: n=829 (23%)) were classified as having a risk-accepting personality. Logistic regression was used to evaluate specific work practices associated with risk-accepting attitudes. Among private applicators, the likelihood of using any PPE when mixing or loading pesticides was lower among risk-acceptors compared to risk-averse individuals (odds ratio (OR) = 0.72; 95% Confidence Interval (CI): 0.65 – 0.79). A similar relationship was observed among commercial applicators (OR = 0.77, 95% CI: 0.34 – 1.77) but not among spouses (OR = 1.09, 95% CI: 0.90 – 1.33). Among private applicators, risk-acceptors were more likely than the risk-averse to apply pesticides within 50 ft of the home (OR=1.21; 95% CI: 1.01 – 1.44), compared to further than ¼ mile. Our findings suggest that the decisions to use personal protective equipment and properly handle/apply pesticides may be driven by risk-accepting personality traits. PMID:22732067

  19. Protective personality traits: High openness and low neuroticism linked to better memory in multiple sclerosis.

    PubMed

    Leavitt, Victoria M; Buyukturkoglu, Korhan; Inglese, Matilde; Sumowski, James F

    2017-11-01

    Memory impairment in multiple sclerosis (MS) is common, although few risk/protective factors are known. To examine relationships of personality to memory/non-memory cognition in MS. 80 patients completed a cognitive battery and a personality scale measuring the "Big 5" traits: openness, neuroticism, agreeableness, extraversion, and conscientiousness. Memory was most related to openness, with higher openness linked to better memory and lower risk for memory impairment, controlling for age, atrophy, education, and intelligence quotient (IQ). Lower neuroticism was also related to better memory, and lower conscientiousness to memory impairment. Non-memory cognition was unrelated to personality. Personality may inform predictive models of memory impairment in MS.

  20. Personal health record systems and their security protection.

    PubMed

    Win, Khin Than; Susilo, Willy; Mu, Yi

    2006-08-01

    The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.

  1. 48 CFR 3.104-4 - Disclosure, protection, and marking of contractor bid or proposal information and source...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., and marking of contractor bid or proposal information and source selection information. 3.104-4... BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 3.104-4 Disclosure, protection, and marking of contractor bid or proposal information and source selection information. (a) Except as...

  2. 48 CFR 2903.104-5 - Disclosure, protection, and marking of contractor bid or proposal information and source...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., and marking of contractor bid or proposal information and source selection information. 2903.104-5... PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 2903.104-5 Disclosure, protection, and marking of contractor bid or proposal information and source selection information. (a) Government employees serving in...

  3. Effects of Anthropometrics and Body Size Changes on the Development of Personal Protective Equipment (PPE) Sizing Systems in the US Army

    DTIC Science & Technology

    2016-08-01

    ANTHROPOMETRICS AND BODY SIZE CHANGES ON THE DEVELOPMENT OF PERSONAL PROTECTIVE EQUIPMENT (PPE) SIZING SYSTEMS IN THE US ARMY by Hyeg Joo Choi* Todd...EFFECTS OF ANTHROPOMETRICS AND BODY SIZE CHANGES ON THE DEVELOPMENT OF PERSONAL PROTECTIVE EQUIPMENT (PPE) SIZING SYSTEMS IN THE US ARMY 5a. CONTRACT...Universities (ORAU) Maryland, 4692 Millennium Drive, Suite 101, Belcamp, MD 21017 14. ABSTRACT Understanding body size and shape information of military

  4. Insect repellents and associated personal protection for a reduction in human disease

    USDA-ARS?s Scientific Manuscript database

    Personal protection measures against biting arthropods include topical insect repellents, area repellents, insecticide-treated bednets and treated clothing. The literature on the effectiveness of personal protection products against arthropods is mainly limited to studies of prevention of bites, rat...

  5. 48 CFR 203.104-4 - Disclosure, protection, and marking of contractor bid or proposal information and source...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., and marking of contractor bid or proposal information and source selection information. 203.104-4..., DEPARTMENT OF DEFENSE GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 203.104-4 Disclosure, protection, and marking of contractor bid or proposal information and source...

  6. Use and disclosure of health information and protection of patient privacy in Taiwan.

    PubMed

    Liu, Han-Hsi

    2010-03-01

    This paper examines Taiwan's current regulatory system for the use of healthcare information from the viewpoint of patient privacy protection. The author proposes a patient-centered, cooperative system centered on the "traffic light theory", as a solution to the potential conflict between the use of healthcare information and the protection of patient privacy. Taiwan, a country with a national healthcare insurance program and state-of-the-art electronic technology, takes a distinctive approach to the protection of patient privacy. On January 1st, 2004, the Bureau of National Health Insurance (BNHI) implemented a comprehensive embedded integrated circuit (IC) card, which puts the wide-ranging health information of its 22 million beneficiaries online to facilitate review of use and disclosure. It is well understood that healthcare information is of a personal and sensitive nature, demanding stringent privacy protection. Nevertheless, there is no denying the potential benefit of using personal health information (PHI) to achieve public good, especially in the area of cost containment. The comprehensive e-health system in Taiwan greatly facilitates copying, transmission, and use of PHI, but does the regulatory system provide enough safeguards for patient privacy? Because the law in Taiwan does not provide clear standards for the use and disclosure of healthcare information, healthcare providers are either too conservative or too aggressive. While most healthcare providers keep their oath of confidentiality, some rogue members severely abuse patient privacy. This paper proposes a "traffic-light system" to remedy this situation. Flashing yellow lights allow aggressive drivers to ignore others, while causing overly cautious drivers to be too hesitant. The author contends that clear standards should have been established for healthcare providers. Like car drivers, healthcare providers need red and green traffic signals. The law should indicate, through workable privacy

  7. Information Protection Engineering: Using Technology and Experience to Protect Assets

    DTIC Science & Technology

    2001-07-01

    SAIC’s highly experienced team has developed technology, techniques and expertise in protecting these information assets from electronic attack by...criminals, terrorists, hackers or nation states. INFORMATION PROTECTION ENGINEERING : Using Technology and Experience to Protect Assets William J. Marlow... Engineering : Using Technology and Experience to Protect Assets Contract or Grant Number Program Element Number Authors Marlow, William J. Project

  8. 48 CFR 1303.104-4 - Disclosure, protection and marking of contractor bid or proposal information and source selection...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... marking of contractor bid or proposal information and source selection information. 1303.104-4 Section... PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 1303.104-4 Disclosure, protection and marking of contractor bid or proposal information and source selection information. Contractor bid or proposal...

  9. Malaria infection in mosquitoes decreases the personal protection offered by permethrin-treated bednets.

    PubMed

    Thiévent, Kevin; Hofer, Lorenz; Rapp, Elise; Tambwe, Mgeni Mohamed; Moore, Sarah; Koella, Jacob C

    2018-05-04

    Insecticides targeting adult mosquitoes are the main way of controlling malaria. They work not only by killing mosquitoes, but also by repelling and irritating them. Indeed their repellent action gives valuable personal protection against biting mosquitoes. In the context of malaria control this personal protection is especially relevant when mosquitoes are infectious, whereas to protect the community we would prefer that the mosquitoes that are not yet infectious are killed (so, not repelled) by the insecticide. As the infectious stage of malaria parasites increases the motivation of mosquitoes to bite, we predicted that it would also change their behavioural response to insecticides. With two systems, a laboratory isolate of the rodent malaria Plasmodium berghei infecting Anopheles gambiae and several isolates of P. falciparum obtained from schoolchildren in Tanzania that infected Anopheles arabiensis, we found that mosquitoes harbouring the infectious stage (the sporozoites) of the parasite were less repelled by permethrin-treated nets than uninfected ones. Our results suggest that, at least in the laboratory, malaria infection decreases the personal protection offered by insecticide-treated nets at the stage where the personal protection is most valuable. Further studies must investigate whether these results hold true in the field and whether the less effective personal protection can be balanced by increased community protection.

  10. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Confidentiality, security, and integrity of personal information collected from children. 312.8 Section 312.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8...

  11. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of personal information collected from children. 312.8 Section 312.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8...

  12. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Confidentiality, security, and integrity of personal information collected from children. 312.8 Section 312.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8...

  13. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Confidentiality, security, and integrity of personal information collected from children. 312.8 Section 312.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8...

  14. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Confidentiality, security, and integrity of personal information collected from children. 312.8 Section 312.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8...

  15. Privacy online: up, close and personal.

    PubMed

    Tikk, Eneken

    2017-01-01

    In the era of information, administration of personal data protection mingles with expectations of access to information as well as the overall sense of cyber (in)security. A failure to appropriately consider the system of data processing relationships easily reduces personal data protection to assurances in letter. The complexity of contemporary data transactions demands a systemic and structured normative approach to personal data protection. Any evaluation of relevant norms should not be isolated from factors that determine or condition their implementation. As privacy is an intrinsically subjective claim, enforcing data privacy is premised on data subject's personal participation in the protection of her data.

  16. Perspectives on use and protection of genetic information in work settings: results of a preliminary study.

    PubMed

    Roberts, Laura Weiss; Geppert, Cynthia M A; Warner, Teddy D; Green Hammond, Katherine A; Rogers, Melinda; Smrcka, Julienne; Roberts, Brian B

    2005-04-01

    The societal use of genetic information raises ethical concerns, and the views of working persons regarding genetic information have received little attention. We performed an empirical project to characterize perspectives of 63 employees at two sites who expressed strong interest in learning about and protecting their personal genetic information. Genetic data were seen as more sensitive than other health data, and disclosure of genetic susceptibility was perceived as having negative consequences. This study suggests the value of exploring the perspectives of key stakeholders most directly affected by genetic applications across diverse societal settings.

  17. Selecting PPE for the Workplace (Personal Protective Equipment for the Eyes and Face)

    MedlinePlus

    ... Additional References Site Map Credits Selecting Personal Protective Equipment (PPE) for the Workplace Impact Heat Chemicals Dust Optical Radiation OSHA Requirements Home | Selecting Personal Protective Equipment (PPE) for the Workplace | OSHA Requirements Site Map | ...

  18. 22 CFR 123.17 - Exports of firearms, ammunition, and personal protective gear.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Exports of firearms, ammunition, and personal..., ammunition, and personal protective gear. (a) Port Directors of U.S. Customs and Border Protection shall... firearms and accompanying ammunition to be exported is with the individual's baggage or effects, whether...

  19. 48 CFR 703.104-5 - Disclosure, protection, and marking of proprietary and source information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Disclosure, protection, and marking of proprietary and source information. 703.104-5 Section 703.104-5 Federal Acquisition Regulations System AGENCY FOR INTERNATIONAL DEVELOPMENT GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL...

  20. Annual Statistical Report, 1988. Client Assistance Program, Protection & Advocacy System for Persons with Mental Illness, Protection & Advocacy System for Persons with Developmental Disabilities.

    ERIC Educational Resources Information Center

    National Association of Protection and Advocacy Systems, Washington, DC.

    The report summarizes: (1) 1988 program data for state Protection and Advocacy Systems for persons with developmental disabilities and persons with mental illness, and (2) 1988 program data for Client Assistance Programs. The data are derived from reports from 56 states and territories. In addition to nationwide data totals, each state's…

  1. Protecting personal data in epidemiological research: DataSHIELD and UK law.

    PubMed

    Wallace, Susan E; Gaye, Amadou; Shoush, Osama; Burton, Paul R

    2014-01-01

    Data from individual collections, such as biobanks and cohort studies, are now being shared in order to create combined datasets which can be queried to ask complex scientific questions. But this sharing must be done with due regard for data protection principles. DataSHIELD is a new technology that queries nonaggregated, individual-level data in situ but returns query data in an anonymous format. This raises questions of the ability of DataSHIELD to adequately protect participant confidentiality. An ethico-legal analysis was conducted that examined each step of the DataSHIELD process from the perspective of UK case law, regulations, and guidance. DataSHIELD reaches agreed UK standards of protection for the sharing of biomedical data. All direct processing of personal data is conducted within the protected environment of the contributing study; participating studies have scientific, ethics, and data access approvals in place prior to the analysis; studies are clear that their consents conform with this use of data, and participants are informed that anonymisation for further disclosure will take place. DataSHIELD can provide a flexible means of interrogating data while protecting the participants' confidentiality in accordance with applicable legislation and guidance. © 2014 S. Karger AG, Basel.

  2. Large-scale Health Information Database and Privacy Protection.

    PubMed

    Yamamoto, Ryuichi

    2016-09-01

    Japan was once progressive in the digitalization of healthcare fields but unfortunately has fallen behind in terms of the secondary use of data for public interest. There has recently been a trend to establish large-scale health databases in the nation, and a conflict between data use for public interest and privacy protection has surfaced as this trend has progressed. Databases for health insurance claims or for specific health checkups and guidance services were created according to the law that aims to ensure healthcare for the elderly; however, there is no mention in the act about using these databases for public interest in general. Thus, an initiative for such use must proceed carefully and attentively. The PMDA projects that collect a large amount of medical record information from large hospitals and the health database development project that the Ministry of Health, Labour and Welfare (MHLW) is working on will soon begin to operate according to a general consensus; however, the validity of this consensus can be questioned if issues of anonymity arise. The likelihood that researchers conducting a study for public interest would intentionally invade the privacy of their subjects is slim. However, patients could develop a sense of distrust about their data being used since legal requirements are ambiguous. Nevertheless, without using patients' medical records for public interest, progress in medicine will grind to a halt. Proper legislation that is clear for both researchers and patients will therefore be highly desirable. A revision of the Act on the Protection of Personal Information is currently in progress. In reality, however, privacy is not something that laws alone can protect; it will also require guidelines and self-discipline. We now live in an information capitalization age. I will introduce the trends in legal reform regarding healthcare information and discuss some basics to help people properly face the issue of health big data and privacy

  3. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...-resistant footwear with sufficient durability and a tread appropriate for wear in rough terrain is not... using a closed system to mix or load pesticides with a signal word of DANGER or WARNING may substitute a... operates under pressure shall wear protective eyewear. (iv) Persons using a closed system shall have all...

  4. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...-resistant footwear with sufficient durability and a tread appropriate for wear in rough terrain is not... using a closed system to mix or load pesticides with a signal word of DANGER or WARNING may substitute a... operates under pressure shall wear protective eyewear. (iv) Persons using a closed system shall have all...

  5. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...-resistant footwear with sufficient durability and a tread appropriate for wear in rough terrain is not... using a closed system to mix or load pesticides with a signal word of DANGER or WARNING may substitute a... operates under pressure shall wear protective eyewear. (iv) Persons using a closed system shall have all...

  6. 78 FR 6352 - Personal Protective Equipment for General Industry; Extension of the Office of Management and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-30

    ...] Personal Protective Equipment for General Industry; Extension of the Office of Management and Budget's (OMB... collection requirements contained in the Personal Protective Equipment Standard for General Industry (29 CFR... personal protective equipment (PPE) necessary. Where such hazards are present, employers must communicate...

  7. PCASSO: a design for secure communication of personal health information via the internet.

    PubMed

    Baker, D B; Masys, D R

    1999-05-01

    The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.

  8. 16 CFR 312.7 - Prohibition against conditioning a child's participation on collection of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Prohibition against conditioning a child's participation on collection of personal information. 312.7 Section 312.7 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.7...

  9. 16 CFR 312.7 - Prohibition against conditioning a child's participation on collection of personal information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Prohibition against conditioning a child's participation on collection of personal information. 312.7 Section 312.7 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.7...

  10. 16 CFR 312.7 - Prohibition against conditioning a child's participation on collection of personal information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Prohibition against conditioning a child's participation on collection of personal information. 312.7 Section 312.7 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.7...

  11. 16 CFR 312.7 - Prohibition against conditioning a child's participation on collection of personal information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Prohibition against conditioning a child's participation on collection of personal information. 312.7 Section 312.7 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.7...

  12. 16 CFR 312.7 - Prohibition against conditioning a child's participation on collection of personal information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Prohibition against conditioning a child's participation on collection of personal information. 312.7 Section 312.7 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.7...

  13. 49 CFR 238.117 - Protection against personal injury.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Protection against personal injury. 238.117 Section 238.117 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... voltage equipment, electrical conductors and switches, and pipes carrying hot fluids or gases on all...

  14. Are Informant Reports of Personality More Internally Consistent Than Self Reports of Personality?

    PubMed

    Balsis, Steve; Cooper, Luke D; Oltmanns, Thomas F

    2015-08-01

    The present study examined whether informant-reported personality was more or less internally consistent than self-reported personality in an epidemiological community sample (n = 1,449). Results indicated that across the 5 NEO (Neuroticism-Extraversion-Openness) personality factors and the 10 personality disorder trait dimensions, informant reports tended to be more internally consistent than self reports, as indicated by equal or higher Cronbach's alpha scores and higher average interitem correlations. In addition, the informant reports collectively outperformed the self reports for predicting responses on a global measure of health, indicating that the informant reports are not only more reliable than self reports, but they can also be useful in predicting an external criterion. Collectively these findings indicate that informant reports tend to have greater internal consistency than self reports. © The Author(s) 2014.

  15. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene. ...

  16. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene. ...

  17. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene. ...

  18. Trust-based information system architecture for personal wellness.

    PubMed

    Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd

    2014-01-01

    Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed.

  19. Smartphone Mobile Application Delivering Personalized, Real-Time Sun Protection Advice: A Randomized Clinical Trial

    PubMed Central

    Buller, David B.; Berwick, Marianne; Lantz, Kathy; Buller, Mary Klein; Shane, James; Kane, Ilima; Liu, Xia

    2014-01-01

    Importance Mobile smart phones are rapidly emerging as an effective means of communicating with many Americans. Using mobile applications, they can access remote databases, track time and location, and integrate user input to provide tailored health information. Objective A smart phone mobile application providing personalized, real-time sun protection advice was evaluated in a randomized trial. Design The trial was conducted in 2012 and had a randomized pretest-posttest controlled design with a 10-week follow-up. Setting Data was collected from a nationwide population-based survey panel. Participants The trial enrolled a sample of n=604 non-Hispanic and Hispanic adults from the Knowledge Panel® aged 18 or older who owned an Android smart phone. Intervention The mobile application provided advice on sun protection (i.e., protection practices and risk of sunburn) and alerts (to apply/reapply sunscreen and get out of the sun), hourly UV Index, and vitamin D production based on the forecast UV Index, phone's time and location, and user input. Main Outcomes and Measures Percent of days using sun protection and time spent outdoors (days and minutes) in the midday sun and number of sunburns in the past 3 months were collected. Results Individuals in the treatment group reported more shade use but less sunscreen use than controls. Those who used the mobile app reported spending less time in the sun and using all protection behaviors combined more. Conclusions and Relevance The mobile application improved some sun protection. Use of the mobile application was lower than expected but associated with increased sun protection. Providing personalized advice when and where people are in the sun may help reduce sun exposure. PMID:25629710

  20. National Perspectives on Data Protection.

    ERIC Educational Resources Information Center

    Yurow, Jane

    1983-01-01

    Discussion of different approaches to protecting personal information in Europe and the United States highlights data protection laws and agreements (international transfer of personal data, European laws, United States state and federal laws), United States and European views of privacy protection, national economic and political goals, and…

  1. Personal medical information system using laser card

    NASA Astrophysics Data System (ADS)

    Cho, Seong H.; Kim, Keun Ho; Choi, Hyung-Sik; Park, Hyun Wook

    1996-04-01

    The well-known hospital information system (HIS) and the picture archiving and communication system (PACS) are typical applications of multimedia to medical area. This paper proposes a personal medical information save-and-carry system using a laser card. This laser card is very useful, especially in emergency situations, because the medical information in the laser card can be read at anytime and anywhere if there exists a laser card reader/writer. The contents of the laser card include the clinical histories of a patient such as clinical chart, exam result, diagnostic reports, images, and so on. The purpose of this system is not a primary diagnosis, but emergency reference of clinical history of the patient. This personal medical information system consists of a personal computer integrated with laser card reader/writer, color frame grabber, color CCD camera and a high resolution image scanner optionally. Window-based graphical user interface was designed for easy use. The laser card has relatively sufficient capacity to store the personal medical information, and has fast access speed to restore and load the data with a portable size as compact as a credit card. Database items of laser card provide the doctors with medical data such as laser card information, patient information, clinical information, and diagnostic result information.

  2. Psychometric Comparison of Self- and Informant-Reports of Personality

    PubMed Central

    Olino, Thomas M.; Klein, Daniel N.

    2017-01-01

    Self-reports are the most relied on assessment method in psychology. In the area of personality, informant-reports are a reasonable alternative assessment strategy. However, agreement between self- and informant-reports of personality is only moderately good. A portion of the observed discrepancies between self- and informant-reports of personality may come from differences in psychometric measurement across raters. That is, it is unknown whether the constructs assessed via self- and informant-reports are psychometrically identical. We examined four key personality scales—Well-Being, Social Closeness, Stress Reaction, and Harm Avoidance—in male and female dyads who provided self- and informant-reports for their partner. Similarities in self- and informant-reports of personality were evaluated by testing measurement invariance. Overall, models supported configural, metric, and scalar invariance for each of the four personality dimensions. These results suggest that the same psychometric constructs are assessed via self- and informant-reports of these personality dimensions. Informant-reports can be used in studies to avoid biases from relying solely on self-reports. PMID:25612626

  3. 78 FR 49524 - National Institute for Occupational Safety and Health Personal Protective Technology Program and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-14

    ... Non-Respiratory Personal Protective Equipment (PPE).'' To view the notice and related materials, visit... processes, to address conformity assessment of non-respiratory personal protective equipment. Conformity...

  4. Are Norms of Disclosure of Online and Offline Personal Information Associated with the Disclosure of Personal Information Online?

    ERIC Educational Resources Information Center

    Mesch, Gustavo S.; Beker, Guy

    2010-01-01

    This study investigated whether norms of self-disclosure of one's online and offline identity are linked to online disclosure of personal and intimate information. We expected online disclosure of personal and intimate information to be associated with norms of online disclosure. Secondary analysis of the 2006 Pew and American Life Survey of…

  5. 34 CFR 364.56 - What are the special requirements pertaining to the protection, use, and release of personal...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF EDUCATION STATE INDEPENDENT LIVING SERVICES PROGRAM AND CENTERS FOR INDEPENDENT LIVING PROGRAM... 34 Education 2 2011-07-01 2010-07-01 true What are the special requirements pertaining to the protection, use, and release of personal information? 364.56 Section 364.56 Education Regulations of the...

  6. 34 CFR 364.56 - What are the special requirements pertaining to the protection, use, and release of personal...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF EDUCATION STATE INDEPENDENT LIVING SERVICES PROGRAM AND CENTERS FOR INDEPENDENT LIVING PROGRAM... 34 Education 2 2010-07-01 2010-07-01 false What are the special requirements pertaining to the protection, use, and release of personal information? 364.56 Section 364.56 Education Regulations of the...

  7. You are born with your genes: justice and protection against discrimination in the use of genetic information.

    PubMed

    Francis, Leslie P

    2010-01-01

    Genetic information poses an apparent paradox for justice in health care. On the one hand, genetic information seems to be exactly the kind of information that it is unjust to take into account in the distribution of important goods. On the other hand, genetic information may increasingly become useful in individual patient care as evidence for personalized medicine increases. Although it is important to emphasize the difference between genetic information and the social construct of race, nonetheless, the historical interplay between discrimination based on assumptions about heritability and discrimination based on race are significant. Thus, this article defends the importance of paying very close attention to protections in the use of genetic information. Three current examples of inadequate protection are cited. First, informed consent to genetic testing should incorporate potential confidentiality risks raised by this information. Second, the Genetic Information Nondiscrimination Act is too porous to protect employees from their employers' possession of genetic information; if such information is used in discriminatory ways, burdens of seeking protection then fall on the employees. More stringent strategies for protecting information are thus desirable. Finally, current designs of interoperable health records fail to allow for the sequestration of genetic information. Efforts to develop such sequestration techniques should be encouraged; among other benefits, they would be helpful in shielding genetic information from employers. (c) 2010 Mount Sinai School of Medicine.

  8. Data protection, privacy.

    PubMed

    La Monaca, G; Schiralli, I

    2010-01-01

    The topic of data protection is referred closely to the concept of privacy--characterized by the American political philosophy in order to indicate a sphere recognized as personal, and therefore private or intimate, of the person, which exclude other individuals or society--whose protection has deep roots in the international right. The technological progress in the field of telecommunication has increased the facility of acquisition and spreading of information, the exchange of data, and the possibility of access to confidential information by other people. This made it made necessary the regulation of the management and the transfer of these information in order to protect individual rights and, on the other hand, an easy circulation of data for legitimate and useful goals.

  9. How Do Students Organize Personal Information Spaces?

    ERIC Educational Resources Information Center

    Hardof-Jaffe, Sharon; Hershkovitz, Arnon; Abu-Kishk, Hama; Bergman, Ofer; Nachmias, Rafi

    2009-01-01

    The purpose of this study is to empirically reveal strategies of students' organization of learning-related digital materials within an online personal information archive. Research population included 518 students who utilized the personal Web space allocated to them on the university servers for archiving information items, and data describing…

  10. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Collecting personal information. 505.4 Section 505.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.4 Collecting personal information. (a) General...

  11. Large-scale Health Information Database and Privacy Protection*1

    PubMed Central

    YAMAMOTO, Ryuichi

    2016-01-01

    Japan was once progressive in the digitalization of healthcare fields but unfortunately has fallen behind in terms of the secondary use of data for public interest. There has recently been a trend to establish large-scale health databases in the nation, and a conflict between data use for public interest and privacy protection has surfaced as this trend has progressed. Databases for health insurance claims or for specific health checkups and guidance services were created according to the law that aims to ensure healthcare for the elderly; however, there is no mention in the act about using these databases for public interest in general. Thus, an initiative for such use must proceed carefully and attentively. The PMDA*2 projects that collect a large amount of medical record information from large hospitals and the health database development project that the Ministry of Health, Labour and Welfare (MHLW) is working on will soon begin to operate according to a general consensus; however, the validity of this consensus can be questioned if issues of anonymity arise. The likelihood that researchers conducting a study for public interest would intentionally invade the privacy of their subjects is slim. However, patients could develop a sense of distrust about their data being used since legal requirements are ambiguous. Nevertheless, without using patients’ medical records for public interest, progress in medicine will grind to a halt. Proper legislation that is clear for both researchers and patients will therefore be highly desirable. A revision of the Act on the Protection of Personal Information is currently in progress. In reality, however, privacy is not something that laws alone can protect; it will also require guidelines and self-discipline. We now live in an information capitalization age. I will introduce the trends in legal reform regarding healthcare information and discuss some basics to help people properly face the issue of health big data and privacy

  12. Examination of an Electronic Patient Record Display Method to Protect Patient Information Privacy.

    PubMed

    Niimi, Yukari; Ota, Katsumasa

    2017-02-01

    Electronic patient records facilitate the provision of safe, high-quality medical care. However, because personnel can view almost all stored information, this study designed a display method using a mosaic blur (pixelation) to temporarily conceal information patients do not want shared. This study developed an electronic patient records display method for patient information that balanced the patient's desire for personal information protection against the need for information sharing among medical personnel. First, medical personnel were interviewed about the degree of information required for both individual duties and team-based care. Subsequently, they tested a mock display method that partially concealed information using a mosaic blur, and they were interviewed about the effectiveness of the display method that ensures patient privacy. Participants better understood patients' demand for confidentiality, suggesting increased awareness of patients' privacy protection. However, participants also indicated that temporary concealment of certain information was problematic. Other issues included the inconvenience of removing the mosaic blur to obtain required information and risk of insufficient information for medical care. Despite several issues with using a display method that temporarily conceals information according to patient privacy needs, medical personnel could accept this display method if information essential to medical safety remains accessible.

  13. Border malaria in China: knowledge and use of personal protection by minority populations and implications for malaria control: a questionnaire-based survey.

    PubMed

    Moore, Sarah J; Min, Xia; Hill, Nigel; Jones, Caroline; Zaixing, Zhang; Cameron, Mary M

    2008-10-01

    Malaria control in remote, forested areas of the Mekong region relies on personal protection from mosquito bites. Uptake of these methods may be limited by knowledge of the link between mosquitoes and malaria as well as social and economic aspects. Understanding barriers to uptake will inform malaria control programmes on targets for improvement of delivery. A total 748 key respondents: health providers and village heads, from 187 villages and 25 different ethnic groups, were interviewed using structured questionnaires. Differences in use of personal protection, and knowledge of malaria between groups were analysed using chi-square; and binary logistic regression used for multivariate analysis. Malaria knowledge was poor with 19.4% of women and 37.5% of men linking mosquitoes with malaria, although 95.6% knew one or more methods of mosquito control. Virtually all respondents used personal protection at some time during the year; and understanding of malaria transmission was strongly associated with bednet use. Those working in forest agriculture were significantly more likely to know that mosquitoes transmit malaria but this did not translate into a significantly greater likelihood of using bednets. Furthermore, use of personal protection while woing outdoors was rare, and less than 3% of respondents knew about the insecticide impregnation of bednets. The use of bednets, synthetic repellents and mosquito coils varied between ethnic groups, but was significantly more frequent among those with higher income, more years of education and permanent housing. The reported use of repellents and coils was also more common among women despite their low knowledge of malaria transmission, and low likelihood of having heard information on malaria within the last year. The use of personal protection must be increased, particularly among outdoor workers that have higher malaria risk. However, personal protection is widely used and widely accepted to prevent nuisance biting

  14. 49 CFR 1522.125 - Protection of information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program § 1522.125 Protection of information. (a) Sensitive Security Information. Each validation... 49 Transportation 9 2010-10-01 2010-10-01 false Protection of information. 1522.125 Section 1522...

  15. Personal protective equipment and risk for avian influenza (H7N3).

    PubMed

    Morgan, Oliver; Kuhne, Mirjam; Nair, Pat; Verlander, Neville Q; Preece, Richard; McDougal, Marianne; Zambon, Maria; Reacher, Mark

    2009-01-01

    An outbreak of avian influenza (H7N3) among poultry resulted in laboratory-confirmed disease in 1 of 103 exposed persons. Incomplete use of personal protective equipment (PPE) was associated with conjunctivitis and influenza-like symptoms. Rigorous use of PPE by persons managing avian influenza outbreaks may reduce exposure to potentially hazardous infected poultry materials.

  16. Personal Protective Equipment and Risk for Avian Influenza (H7N3)

    PubMed Central

    Kuhne, Mirjam; Nair, Pat; Verlander, Neville Q.; Preece, Richard; McDougal, Marianne; Zambon, Maria; Reacher, Mark

    2009-01-01

    An outbreak of avian influenza (H7N3) among poultry resulted in laboratory-confirmed disease in 1 of 103 exposed persons. Incomplete use of personal protective equipment (PPE) was associated with conjunctivitis and influenza-like symptoms. Rigorous use of PPE by persons managing avian influenza outbreaks may reduce exposure to potentially hazardous infected poultry materials. PMID:19116052

  17. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... steel-toe shoes or steel-toe boots) and non-specialty prescription safety eyewear, provided that the... 1926.95 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Personal Protective and Life...

  18. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... steel-toe shoes or steel-toe boots) and non-specialty prescription safety eyewear, provided that the... 1926.95 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Personal Protective and Life...

  19. Evaluation of commercial products for personal protection against mosquitoes

    USDA-ARS?s Scientific Manuscript database

    Human landing catch studies were conducted in a semi-field setting to determine the efficacy of seven commercial products used for personal protection against mosquitoes. Experiments were conducted in two empty, insecticide free, greenhouse compartments, in Israel, with either 1500 Aedes albopictus...

  20. Particle swarm optimization using multi-information characteristics of all personal-best information.

    PubMed

    Huang, Song; Tian, Na; Wang, Yan; Ji, Zhicheng

    2016-01-01

    Convergence stagnation is the chief difficulty to solve hard optimization problems for most particle swarm optimization variants. To address this issue, a novel particle swarm optimization using multi-information characteristics of all personal-best information is developed in our research. In the modified algorithm, two positions are defined by personal-best positions and an improved cognition term with three positions of all personal-best information is used in velocity update equation to enhance the search capability. This strategy could make particles fly to a better direction by discovering useful information from all the personal-best positions. The validity of the proposed algorithm is assessed on twenty benchmark problems including unimodal, multimodal, rotated and shifted functions, and the results are compared with that obtained by some published variants of particle swarm optimization in the literature. Computational results demonstrate that the proposed algorithm finds several global optimum and high-quality solutions in most case with a fast convergence speed.

  1. 10 CFR 71.11 - Protection of Safeguards Information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... public health and safety or the common defense and security, shall protect Safeguards Information against... 10 Energy 2 2012-01-01 2012-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or...

  2. 10 CFR 71.11 - Protection of Safeguards Information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... public health and safety or the common defense and security, shall protect Safeguards Information against... 10 Energy 2 2011-01-01 2011-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or...

  3. 10 CFR 71.11 - Protection of Safeguards Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... public health and safety or the common defense and security, shall protect Safeguards Information against... 10 Energy 2 2010-01-01 2010-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or...

  4. 10 CFR 71.11 - Protection of Safeguards Information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... public health and safety or the common defense and security, shall protect Safeguards Information against... 10 Energy 2 2013-01-01 2013-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or...

  5. Informed consent in direct-to-consumer personal genome testing: the outline of a model between specific and generic consent.

    PubMed

    Bunnik, Eline M; Janssens, A Cecile J W; Schermer, Maartje H N

    2014-09-01

    Broad genome-wide testing is increasingly finding its way to the public through the online direct-to-consumer marketing of so-called personal genome tests. Personal genome tests estimate genetic susceptibilities to multiple diseases and other phenotypic traits simultaneously. Providers commonly make use of Terms of Service agreements rather than informed consent procedures. However, to protect consumers from the potential physical, psychological and social harms associated with personal genome testing and to promote autonomous decision-making with regard to the testing offer, we argue that current practices of information provision are insufficient and that there is a place--and a need--for informed consent in personal genome testing, also when it is offered commercially. The increasing quantity, complexity and diversity of most testing offers, however, pose challenges for information provision and informed consent. Both specific and generic models for informed consent fail to meet its moral aims when applied to personal genome testing. Consumers should be enabled to know the limitations, risks and implications of personal genome testing and should be given control over the genetic information they do or do not wish to obtain. We present the outline of a new model for informed consent which can meet both the norm of providing sufficient information and the norm of providing understandable information. The model can be used for personal genome testing, but will also be applicable to other, future forms of broad genetic testing or screening in commercial and clinical settings. © 2012 John Wiley & Sons Ltd.

  6. Personal Protective Equipment in Animal Research

    PubMed Central

    Villano, Jason S; Follo, Janet M; Chappell, Mark G; Jr, Morris T Collins

    2017-01-01

    The occupational health and safety program is an integral component of a comprehensive animal care and use program. It is important to mitigate the risk of exposures of animal care and research personnel to allergens and physical, chemical, radiologic, and biologic hazards during the conduct of various tasks. This need is especially true in infectious disease and biocontainment research. One aspect of the program is the provision of personal protective equipment (PPE). Commercially available PPE should be carefully evaluated based on their material composition and performance according to manufacturer data. To help institutions and end users by providing them guidance on choosing appropriate PPE, we here discuss the regulatory framework, device standards, and materials engineering for various PPE, including gloves, shoe covers, head caps, gowns, aprons, masks, hearing and eye protection devices, and respirators. Ultimately, the choice of appropriate PPE is based on the risk assessment, which should include consideration for personnel comfort, correct device fitting, and the containment level for the hazard used. PMID:28662749

  7. Content Sharing Based on Personal Information in Virtually Secured Space

    NASA Astrophysics Data System (ADS)

    Sohn, Hosik; Ro, Yong Man; Plataniotis, Kostantinos N.

    User generated contents (UGC) are shared in an open space like social media where users can upload and consume contents freely. Since the access of contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. In this paper, we propose a method for sharing UGCs securely based on the personal information of users. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information. In order to verify the usefulness of the proposed method, the experiment was performed where the content was encrypted with personal information of creator, and users with similar personal information have decrypted and consumed the contents. The results showed that UGCs were securely shared among users who have similar personal information.

  8. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES Electricity...

  9. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES Electricity...

  10. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES Electricity...

  11. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES Electricity...

  12. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES Electricity...

  13. 19 CFR 356.9 - Persons authorized to receive proprietary information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... such counsel, provided that the counsel or professional does not participate in competitive decision...) for the participant represented or for any person who would gain competitive advantage through... issued a protective order, such as paralegals, law clerks, and secretaries, if such other persons are: (1...

  14. The information protection level assessment system implementation

    NASA Astrophysics Data System (ADS)

    Trapeznikov, E. V.

    2018-04-01

    Currently, the threat of various attacks increases significantly as automated systems become more widespread. On the basis of the conducted analysis the information protection level assessment system establishing objective was identified. The paper presents the information protection level assessment software implementation in the information system by applying the programming language C #. In conclusions the software features are identified and experimental results are represented.

  15. 29 CFR Appendix B to Subpart I of... - General Testing Conditions and Additional Guidelines for Personal Fall Protection Systems (Non...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) OCCUPATIONAL SAFETY AND HEALTH STANDARDS FOR SHIPYARD EMPLOYMENT Personal Protective Equipment (PPE) Pt. 1915... Personal Fall Protection Systems (Non-Mandatory) B Appendix B to Subpart I of Part 1915 Labor Regulations... Guidelines for Personal Fall Protection Systems (Non-Mandatory) 1. Personal fall arrest systems—(a) General...

  16. 29 CFR Appendix B to Subpart I of... - General Testing Conditions and Additional Guidelines for Personal Fall Protection Systems (Non...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) OCCUPATIONAL SAFETY AND HEALTH STANDARDS FOR SHIPYARD EMPLOYMENT Personal Protective Equipment (PPE) Pt. 1915... Personal Fall Protection Systems (Non-Mandatory) B Appendix B to Subpart I of Part 1915 Labor Regulations... Guidelines for Personal Fall Protection Systems (Non-Mandatory) 1. Personal fall arrest systems—(a) General...

  17. Review of Extracting Information From the Social Web for Health Personalization

    PubMed Central

    Karlsen, Randi; Bonander, Jason

    2011-01-01

    In recent years the Web has come into its own as a social platform where health consumers are actively creating and consuming Web content. Moreover, as the Web matures, consumers are gaining access to personalized applications adapted to their health needs and interests. The creation of personalized Web applications relies on extracted information about the users and the content to personalize. The Social Web itself provides many sources of information that can be used to extract information for personalization apart from traditional Web forms and questionnaires. This paper provides a review of different approaches for extracting information from the Social Web for health personalization. We reviewed research literature across different fields addressing the disclosure of health information in the Social Web, techniques to extract that information, and examples of personalized health applications. In addition, the paper includes a discussion of technical and socioethical challenges related to the extraction of information for health personalization. PMID:21278049

  18. EPA Plan for Reducing Personally Identifiable Information, January 2013

    EPA Pesticide Factsheets

    The EPA Privacy Policy, issued in 2007, establishes the framework and accountability for reducing Agency personally identifiable information (PII). Learn about the Agency's plan to reduce the collection of Personally Identifiable Information (PII).

  19. 10 CFR 37.31 - Protection of information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... verifies information such as name, date of birth, social security number, gender, and other applicable... 10 Energy 1 2014-01-01 2014-01-01 false Protection of information. 37.31 Section 37.31 Energy NUCLEAR REGULATORY COMMISSION PHYSICAL PROTECTION OF CATEGORY 1 AND CATEGORY 2 QUANTITIES OF RADIOACTIVE...

  20. [Personal protection measures against blood-sucking insects and ticks].

    PubMed

    Orshan, Laor; Wilamowski, Amos; Pener, Hedva

    2010-09-01

    Blood-sucking arthropods are major vectors of various pathogens like viruses, bacteria, protozoa and nematodes. Preventing exposure to the vector is imperative especially when vaccine and prophylactic treatments are not available. Personal protection measures (PPM) are essential and often the only means available when dealing with blood-sucking disease transmitting arthropods. Awareness of the risk in the specific areas of travel is the first step to be taken before and while traveling. PPM include preventive personal behavior, suitable clothing, application of insect repellents to the skin, the use of space repellents, impregnation of clothing, camping gear and bed nets and, when necessary, ground spraying of insecticides. The registered and recommended active ingredients for skin application are Deet, picaridin (icaridin), p-menthane-3,8-diol (PMD) and IR3535. Volatile pyrethrins are used as space repellents while pyrethroids, especially permethrin, are employed for impregnation and for ground spraying. It is recommended to purchase only products registered in Israel or other developed countries. These products should have a detailed label specifying the concentration of the active ingredient, application instructions and the duration of protection.

  1. Determinants of the Rigor of State Protection Policies for Persons With Dementia in Assisted Living.

    PubMed

    Nattinger, Matthew C; Kaskie, Brian

    2017-01-01

    Continued growth in the number of individuals with dementia residing in assisted living (AL) facilities raises concerns about their safety and protection. However, unlike federally regulated nursing facilities, AL facilities are state-regulated and there is a high degree of variation among policies designed to protect persons with dementia. Despite the important role these protection policies have in shaping the quality of life of persons with dementia residing in AL facilities, little is known about their formation. In this research, we examined the adoption of AL protection policies pertaining to staffing, the physical environment, and the use of chemical restraints. For each protection policy type, we modeled policy rigor using an innovative point-in-time approach, incorporating variables associated with state contextual, institutional, political, and external factors. We found that the rate of state AL protection policy adoptions remained steady over the study period, with staffing policies becoming less rigorous over time. Variables reflecting institutional policy making, including legislative professionalism and bureaucratic oversight, were associated with the rigor of state AL dementia protection policies. As we continue to evaluate the mechanisms contributing to the rigor of AL protection policies, it seems that organized advocacy efforts might expand their role in educating state policy makers about the importance of protecting persons with dementia residing in AL facilities and moving to advance appropriate policies.

  2. Adaptive Visualization for Focused Personalized Information Retrieval

    ERIC Educational Resources Information Center

    Ahn, Jae-wook

    2010-01-01

    The new trend on the Web has totally changed today's information access environment. The traditional information overload problem has evolved into the qualitative level beyond the quantitative growth. The mode of producing and consuming information is changing and we need a new paradigm for accessing information. Personalized search is one of…

  3. Management Guide to the Protection of Information Resources.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…

  4. Personal Radiation Protection System

    NASA Technical Reports Server (NTRS)

    McDonald, Mark; Vinci, Victoria

    2004-01-01

    A report describes the personal radiation protection system (PRPS), which has been invented for use on the International Space Station and other spacecraft. The PRPS comprises walls that can be erected inside spacecraft, where and when needed, to reduce the amount of radiation to which personnel are exposed. The basic structural modules of the PRPS are pairs of 1-in. (2.54-cm)-thick plates of high-density polyethylene equipped with fasteners. The plates of each module are assembled with a lap joint. The modules are denoted bricks because they are designed to be stacked with overlaps, in a manner reminiscent of bricks, to build 2-in. (5.08-cm)-thick walls of various lengths and widths. The bricks are of two varieties: one for flat wall areas and one for corners. The corner bricks are specialized adaptations of the flat-area bricks that make it possible to join walls perpendicular to each other. Bricks are attached to spacecraft structures and to each other by use of straps that can be tightened to increase the strengths and stiffnesses of joints.

  5. Risk and Protective Factors Associated with Personal Mastery Among Sexual Minority African American Female Sex Workers

    PubMed Central

    Buttram, Mance E.; Surratt, Hilary L.; Kurtz, Steven P.

    2014-01-01

    Research among sexual minorities has traditionally examined problems such as substance use, HIV risk, mental health problems, and victimization. Among sexual minority street-based female sex workers, these vulnerabilities can be magnified. Grounded in theories of resilience, this study examines risk and protective factors associated with a high level of personal mastery among a vulnerable population of women. Data are drawn from baseline interviews from street-based African American female sex workers enrolled in a randomized intervention trial in Miami, Florida. We compare sexual minority (N=197) and heterosexual (N=365) women on measures of risk and protective factors; among sexual minority women we present logistic regression analyses which reveal that severe mental distress and HIV transmission risk are associated with low levels of personal mastery, while protective factors of transportation access and social support are associated with high levels of personal mastery. These findings suggest that these protective factors may potentially facilitate the development of personal mastery and represent beneficial avenues for intervention efforts. PMID:25530691

  6. A Personalized Health Information Retrieval System

    PubMed Central

    Wang, Yunli; Liu, Zhenkai

    2005-01-01

    Consumers face barriers when seeking health information on the Internet. A Personalized Health Information Retrieval System (PHIRS) is proposed to recommend health information for consumers. The system consists of four modules: (1) User modeling module captures user’s preference and health interests; (2) Automatic quality filtering module identifies high quality health information; (3) Automatic text difficulty rating module classifies health information into professional or patient educational materials; and (4) User profile matching module tailors health information for individuals. The initial results show that PHIRS could assist consumers with simple search strategies. PMID:16779435

  7. HIV-positive status and preservation of privacy: a recent decision from the Italian Data Protection Authority on the procedure of gathering personal patient data in the dental office.

    PubMed

    Conti, Adelaide; Delbon, Paola; Laffranchi, Laura; Paganelli, Corrado; De Ferrari, Francesco

    2012-06-01

    The processing of sensitive information in the health field is subject to rigorous standards that guarantee the protection of information confidentiality. Recently, the Italian Data Protection Authority (Garante per la Protezione dei Dati Personali) stated their formal opinion on a standard procedure in dental offices involving the submission of a questionnaire that includes the patient's health status. HIV infection status is included on the form. The Authority has stated that all health data collection must be in accordance with the current Italian normative framework for personal data protection and respect the patient's freedom. This freedom allows the patient to decide, in a conscious and responsible way, whether to share health information with health personnel without experiencing any prejudice in the provision of healthcare requested. Moreover, data collection must be relevant and cannot exceed the principles of treatment goals with reference to the specific care of the concerned person. However, the need for recording information regarding HIV infection at the first appointment, regardless of the clinical intervention or therapeutic plan that needs to be conducted, should not alter the standard protection measures of the healthcare staff. In fact, these measures are adopted for every patient.

  8. Feasibility of a patient decision aid regarding disclosure of personal health information: qualitative evaluation of the Health Care Information Directive

    PubMed Central

    Tracy, C Shawn; Dantas, Guilherme Coelho; Upshur, Ross EG

    2004-01-01

    Background Concerns regarding the privacy of health information are escalating owing both to the growing use of information technology to store and exchange data and to the increasing demand on the part of patients to control the use of their medical records. The objective of this study was to evaluate the Health Care Information Directive (HCID), a recently-developed patient decision aid that aims to delineate the level of health information an individual is willing to share. Methods We convened a series of four focus group meetings with several communities in a large Canadian city. A total of 28 men and women participated, representing health care consumer advocates, urban professionals, senior citizens, and immigrants who speak English as a second language. Data were analysed using qualitative methods. Results Participants lacked substantial knowledge regarding the fate and uses of personal health information. They expressed mistrust concerning how their information will be used and protected. Several suggestions were made towards customizing the use of data according to specific needs rather than broad and full access to their charts. Furthermore, despite concern regarding the implementation of a tool like the HCID, participants were hopeful that a refined instrument could contribute to the improved regulation of health information. Conclusion This study indicated poor knowledge concerning the uses of personal health information, distrust concerning security provisions, and cautious support for a patient decision aid such as the HCID to improve control over health data. PMID:15361257

  9. Feasibility of a patient decision aid regarding disclosure of personal health information: qualitative evaluation of the Health Care Information Directive.

    PubMed

    Tracy, C Shawn; Dantas, Guilherme Coelho; Upshur, Ross E G

    2004-09-10

    Concerns regarding the privacy of health information are escalating owing both to the growing use of information technology to store and exchange data and to the increasing demand on the part of patients to control the use of their medical records. The objective of this study was to evaluate the Health Care Information Directive (HCID), a recently-developed patient decision aid that aims to delineate the level of health information an individual is willing to share. We convened a series of four focus group meetings with several communities in a large Canadian city. A total of 28 men and women participated, representing health care consumer advocates, urban professionals, senior citizens, and immigrants who speak English as a second language. Data were analysed using qualitative methods. Participants lacked substantial knowledge regarding the fate and uses of personal health information. They expressed mistrust concerning how their information will be used and protected. Several suggestions were made towards customizing the use of data according to specific needs rather than broad and full access to their charts. Furthermore, despite concern regarding the implementation of a tool like the HCID, participants were hopeful that a refined instrument could contribute to the improved regulation of health information. This study indicated poor knowledge concerning the uses of personal health information, distrust concerning security provisions, and cautious support for a patient decision aid such as the HCID to improve control over health data.

  10. Protecting Privacy in Computerized Medical Information.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Office of Technology Assessment.

    This report analyzes the implications of computerized medical information and the challenges it brings to individual privacy. The report examines the nature of the privacy interest in health care information and the current state of the law protecting that information; the nature of proposals to computerize health care information and the…

  11. [Protection of genetic data in Spain. Analysis based on the general principles of personal data protection].

    PubMed

    García Amez, Javier

    2006-01-01

    The genetic data is Spain is not regulated specifically, rather, we must look at the regulation on the protection of data of a personal nature. This is turn, establishes a series of general principles to apply to any type of data. Analysing this with other regulations that are dispersed both in the national and international regulations, we can deduce the rights and obligations in this field. This highlights the fact that one can't dispose of the genetic data in the same manner as the personal data.

  12. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... interpreted by the courts of the United States, except that, for purposes of any periodic audit, report, or..., notwithstanding paragraph (d)(1) of this section, if an audit, monitoring review, State plan assurance review... personally identifiable information (i.e., name, address, telephone number, social security number, or other...

  13. 29 CFR 1977.5 - Persons protected by section 11(c).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Persons protected by section 11(c). 1977.5 Section 1977.5 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) DISCRIMINATION AGAINST EMPLOYEES EXERCISING RIGHTS UNDER THE WILLIAMS-STEIGER...

  14. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Amendment of protected health information. 164.526....526 Amendment of protected health information. (a) Standard: Right to amend. (1) Right to amend. An individual has the right to have a covered entity amend protected health information or a record about the...

  15. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.4 Collecting personal information. (a) General... information on public Web sites without the express permission of the user. Requests for exceptions must be...

  16. 32 CFR 1700.11 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for information concerning other... INFORMATION ACT § 1700.11 Procedures for information concerning other persons. (a) In general. Personal information concerning individuals other than the requester shall not be disclosed under the FOIA if the...

  17. Open consent, biobanking and data protection law: can open consent be 'informed' under the forthcoming data protection regulation?

    PubMed

    Hallinan, Dara; Friedewald, Michael

    2015-01-01

    This article focuses on whether a certain form of consent used by biobanks--open consent--is compatible with the Proposed Data Protection Regulation. In an open consent procedure, the biobank requests consent once from the data subject for all future research uses of genetic material and data. However, as biobanks process personal data, they must comply with data protection law. Data protection law is currently undergoing reform. The Proposed Data Protection Regulation is the culmination of this reform and, if voted into law, will constitute a new legal framework for biobanking. The Regulation puts strict conditions on consent--in particular relating to information which must be given to the data subject. It seems clear that open consent cannot meet these requirements. 4 categories of information cannot be provided with adequate specificity: purpose, recipient, possible third country transfers, data collected. However, whilst open consent cannot meet the formal requirements laid out by the Regulation, this is not to say that these requirements are substantially undebateable. Two arguments could be put forward suggesting the applicable consent requirements should be rethought. First, from policy documents regarding the drafting process, it seems that the informational requirements in the Regulation are so strict in order to protect the data subject from risks inherent in the use of the consent mechanism in a certain context--exemplified by the online context. There are substantial differences between this context and the biobanking context. Arguably, a consent transaction in the biobanking does not present the same type of risk to the data subject. If the risks are different, then perhaps there are also grounds for a reconsideration of consent requirements? Second, an argument can be made that the legislator drafted the Regulation based on certain assumptions as to the nature of 'data'. The authors argue that these assumptions are difficult to apply to genetic data

  18. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    PubMed

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  19. Protecting Information

    NASA Astrophysics Data System (ADS)

    Loepp, Susan; Wootters, William K.

    2006-09-01

    For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science.Of particular interest are the potential impacts of quantum physics:(i) a quantum computer, if built, could crack our currently used public-key cryptosystems; and (ii) quantum cryptography promises to provide an alternative to these cryptosystems, basing its security on the laws of nature rather than on computational complexity. No prior knowledge of quantum mechanics is assumed, but students should have a basic knowledge of complex numbers, vectors, and matrices. Accessible to readers familiar with matrix algebra, vector spaces and complex numbers First undergraduate text to cover cryptography, error-correction, and quantum computation together Features exercises designed to enhance understanding, including a number of computational problems, available from www.cambridge.org/9780521534765

  20. Smartphone mobile application delivering personalized, real-time sun protection advice: a randomized clinical trial.

    PubMed

    Buller, David B; Berwick, Marianne; Lantz, Kathy; Buller, Mary Klein; Shane, James; Kane, Ilima; Liu, Xia

    2015-05-01

    Mobile smartphones are rapidly emerging as an effective means of communicating with many Americans. Using mobile applications (apps), they can access remote databases, track time and location, and integrate user input to provide tailored health information. A smartphone mobile app providing personalized, real-time sun protection advice was evaluated in a randomized clinical trial. The trial was conducted in 2012 and had a randomized pretest-posttest controlled design with a 10-week follow-up. Data were collected from a nationwide population-based survey panel. A sample of 604 non-Hispanic and Hispanic adults from the Knowledge Panel 18 years or older who owned an Android smartphone were enrolled. The mobile app provided advice on sun protection (ie, protection practices and risk of sunburn) and alerts (to apply or reapply sunscreen and get out of the sun), hourly UV Index, and vitamin D production based on the forecast UV Index, the phone's time and location, and user input. Percentage of days using sun protection and time spent outdoors (days and minutes) in the midday sun and number of sunburns in the past 3 months were collected. Individuals in the treatment group reported more shade use (mean days staying in the shade, 41.0% vs 33.7%; P = .03) but less sunscreen use (mean days, 28.6% vs 34.5%; P = .048) than controls. There was no significant difference in number of sunburns in the past 3 months (mean, 0.60 in the treatment group vs 0.62 for controls; P = .87). Those who used the mobile app reported spending less time in the sun (mean days keeping time in the sun to a minimum, 60.4% for app users vs 49.3% for nonusers; P = .04) and using all protection behaviors combined more (mean days, 39.4% vs 33.8%; P = .04). The mobile app improved some sun protection. Use of the mobile app was lower than expected but associated with increased sun protection. Providing personalized advice when and where people are in the sun may help reduce sun exposure.

  1. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... official purposes to reduce the number of people with access to such personal information. Commanders and...

  2. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... official purposes to reduce the number of people with access to such personal information. Commanders and...

  3. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... official purposes to reduce the number of people with access to such personal information. Commanders and...

  4. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... official purposes to reduce the number of people with access to such personal information. Commanders and...

  5. Hazard Assessment of Personal Protective Clothing for Hydrogen Peroxide Service

    NASA Technical Reports Server (NTRS)

    Greene, Ben; McClure, Mark B.; Johnson, Harry T.

    2004-01-01

    Selection of personal protective equipment (PPE) for hydrogen peroxide service is an important part of the hazard assessment process. But because drip testing of chemical protective clothing for hydrogen peroxide service has not been reported for about 40 years, it is of great interest to test new protective clothing materials with new, high-concentration hydrogen peroxide following similar procedures. The suitability of PPE for hydrogen peroxide service is in part determined by observations made when hydrogen peroxide is dripped onto swatches of protective clothing material. Protective clothing material was tested as received, in soiled condition, and in grossly soiled condition. Materials were soiled by pretreating the material with potassium permanganate (KMnO4) solution then drying to promote a reaction. Materials were grossly soiled with solid KMnO4 to greatly promote reaction. Observations of results including visual changes to the hydrogen peroxide and materials, times to ignition, and self-extinguishing characteristics of the materials are reported.

  6. Continuum Thinking and the Contexts of Personal Information Management

    ERIC Educational Resources Information Center

    Huvila, Isto; Eriksen, Jon; Häusner, Eva-Maria; Jansson, Ina-Maria

    2014-01-01

    Introduction: Recent personal information management literature has underlined the significance of the contextuality of personal information and its use. The present article discusses the applicability of the records continuum model and its generalisation, continuum thinking, as a theoretical framework for explicating the overlap and evolution of…

  7. The letter of recommendation effect in informant ratings of personality.

    PubMed

    Leising, Daniel; Erbs, Julia; Fritz, Ulrike

    2010-04-01

    In most studies using informant reports of personality, the informants are recruited by the targets. Such informants may tend to like the targets and thus portray them in specific ways (e.g., too positively). Study 1 (N = 403) demonstrated the necessity to distinguish between "liking" and "knowing" in studying the relationships between informants and targets. Informants who liked their targets better described them more positively (i.e., as being more extraverted, agreeable, open, conscientious, and less neurotic). The association between personality ratings and liking was moderated by item evaluativeness. Liked targets were also described as being more similar to each other (range restriction), which would lower correlations of informant ratings of personality with external variables. Study 2 (N = 90) used a within-subjects design to disentangle actual personality differences between targets (substance) from the informants' specific views on the targets (style). Ninety informants were asked to nominate targets they did not like. These targets then nominated informants of their own choice. Target-nominated informants liked the targets very much and described the targets' personalities very positively and in ways that were highly redundant with the average target's self-rating. There was evidence that lower liking may be associated with better accuracy. Higher subjective levels of knowing were not associated with better interrater agreement but with a greater willingness to describe targets negatively. Implications for the field of recruiting are discussed. Where possible, the choice of informants and referees should be made independent of the targets' preferences.

  8. Detecting Protected Health Information in Heterogeneous Clinical Notes.

    PubMed

    Henriksson, Aron; Kvist, Maria; Dalianis, Hercules

    2017-01-01

    To enable secondary use of healthcare data in a privacy-preserving manner, there is a need for methods capable of automatically identifying protected health information (PHI) in clinical text. To that end, learning predictive models from labeled examples has emerged as a promising alternative to rule-based systems. However, little is known about differences with respect to PHI prevalence in different types of clinical notes and how potential domain differences may affect the performance of predictive models trained on one particular type of note and applied to another. In this study, we analyze the performance of a predictive model trained on an existing PHI corpus of Swedish clinical notes and applied to a variety of clinical notes: written (i) in different clinical specialties, (ii) under different headings, and (iii) by persons in different professions. The results indicate that domain adaption is needed for effective detection of PHI in heterogeneous clinical notes.

  9. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2014-01-01 2014-01-01 false Protected Critical Infrastructure Information...

  10. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2011-01-01 2011-01-01 false Protected Critical Infrastructure Information...

  11. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2010-01-01 2010-01-01 false Protected Critical Infrastructure Information...

  12. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2012-01-01 2012-01-01 false Protected Critical Infrastructure Information...

  13. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2013-01-01 2013-01-01 false Protected Critical Infrastructure Information...

  14. Employer, use of personal protective equipment, and work safety climate: Latino poultry processing workers.

    PubMed

    Arcury, Thomas A; Grzywacz, Joseph G; Anderson, Andrea M; Mora, Dana C; Carrillo, Lourdes; Chen, Haiying; Quandt, Sara A

    2013-02-01

    This analysis describes the work safety climate of Latino poultry processing workers and notes differences by worker personal characteristics and employer; describes the use of common personal protective equipment (PPE) among workers; and examines the associations of work safety climate with use of common PPE. Data are from a cross-sectional study of 403 Latino poultry processing workers in western North Carolina. Work safety climate differed little by personal characteristics, but it did differ consistently by employer. Provision of PPE varied; for example, 27.2% of participants were provide with eye protection at no cost, 57.0% were provided with hand protection at no cost, and 84.7% were provided with protective clothing at no cost. PPE use varied by type. Provision of PPE at no cost was associated with lower work safety climate; this result was counter-intuitive. Consistent use of PPE was associated with higher work safety climate. Work safety climate is important for improving workplace safety for immigrant workers. Research among immigrant workers should document work safety climate for different employers and industries, and delineate how work safety climate affects safety behavior and injuries. Copyright © 2012 Wiley Periodicals, Inc.

  15. 32 CFR 1800.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for information concerning other... Administrative Matters § 1800.32 Procedures for information concerning other persons. (a) In general. Personal information concerning individuals other than the requester shall not be disclosed under the Freedom of...

  16. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for information concerning other... Administrative Matters § 1900.32 Procedures for information concerning other persons. (a) In general. Personal information concerning individuals other than the requester shall not be disclosed under the Freedom of...

  17. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Rights to request privacy protection for protected health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights...

  18. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Rights to request privacy protection for protected health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights...

  19. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Rights to request privacy protection for protected health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights...

  20. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Rights to request privacy protection for protected health information. 164.522 Section 164.522 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights...

  1. Study to the current protection of personal data in the educational sector in Indonesia

    NASA Astrophysics Data System (ADS)

    Rosmaini, E.; Kusumasari, T. F.; Lubis, M.; Lubis, A. R.

    2018-03-01

    This study examines how legal expert interpret UU ITE to protect personal data based on privacy principle by using content analysis. This act has importance in order to govern the process of collection, use, transfer, disclose and store personal data for profit or other commercial purposes. By recognizing both the right of individual for privacy and the need of organization to utilize the customer data, the Act, which was amended by Parliament at October, 27th 2016 have critical role for protection guideline in Indonesia. Increasingly, with the use of advanced technology, data protection became one of the main issues on various sectors, especially in the educational sector. Educational institutions require large amount of personal data to run their business process to support learning, teaching, research and administration process. It involves wide range of personal data from institution, agencies, colleges, lecturers, students and parents, which might consist of several sensitive and confidential data such as historical, health, financial, academic and experience background. Underestimating and ignoring these issues can lead to disaster such as blackmailing, stalking, bullying or improper use of personal data. In aggregation, they might deliver huge loss to institution either financially or trust. Thus, this study analyse the privacy principle of UU ITE through 21 coders from legal expert to obtain more understanding of appropriate approach to implement privacy policy in the educational sector.

  2. Adaptive interface for personalizing information seeking.

    PubMed

    Narayanan, S; Koppaka, Lavanya; Edala, Narasimha; Loritz, Don; Daley, Raymond

    2004-12-01

    An adaptive interface autonomously adjusts its display and available actions to current goals and abilities of the user by assessing user status, system task, and the context. Knowledge content adaptability is needed for knowledge acquisition and refinement tasks. In the case of knowledge content adaptability, the requirements of interface design focus on the elicitation of information from the user and the refinement of information based on patterns of interaction. In such cases, the emphasis on adaptability is on facilitating information search and knowledge discovery. In this article, we present research on adaptive interfaces that facilitates personalized information seeking from a large data warehouse. The resulting proof-of-concept system, called source recommendation system (SRS), assists users in locating and navigating data sources in the repository. Based on the initial user query and an analysis of the content of the search results, the SRS system generates a profile of the user tailored to the individual's context during information seeking. The user profiles are refined successively and are used in progressively guiding the user to the appropriate set of sources within the knowledge base. The SRS system is implemented as an Internet browser plug-in to provide a seamless and unobtrusive, personalized experience to the users during the information search process. The rationale behind our approach, system design, empirical evaluation, and implications for research on adaptive interfaces are described in this paper.

  3. 12 CFR 568.5 - Protection of customer information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Protection of customer information. 568.5 Section 568.5 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.5 Protection of customer information. Savings associations and their subsidiaries (except...

  4. 15 CFR 325.16 - Protecting confidentiality of information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign... EXPORT TRADE CERTIFICATES OF REVIEW § 325.16 Protecting confidentiality of information. (a) Any...

  5. 15 CFR 325.16 - Protecting confidentiality of information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign... EXPORT TRADE CERTIFICATES OF REVIEW § 325.16 Protecting confidentiality of information. (a) Any...

  6. 15 CFR 325.16 - Protecting confidentiality of information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign... EXPORT TRADE CERTIFICATES OF REVIEW § 325.16 Protecting confidentiality of information. (a) Any...

  7. 15 CFR 325.16 - Protecting confidentiality of information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign... EXPORT TRADE CERTIFICATES OF REVIEW § 325.16 Protecting confidentiality of information. (a) Any...

  8. Farmers' use of personal protective equipment during handling of plant protection products: Determinants of implementation.

    PubMed

    Damalas, Christos A; Abdollahzadeh, Gholamhossein

    2016-11-15

    Understanding factors affecting the use of personal protective equipment (PPE) during handling of plant protection products (PPPs) is of major importance for the design of tailored interventions to minimize exposure among farmers. However, data regarding this issue are highly limited. Factors related to the use of PPE during handling of PPPs were explored in a survey of cotton farmers in northern Greece. Data were collected through face-to-face interviews with the farmers based on a questionnaire with structured items on the frequency of use of various personal protective devices during handling of PPPs. New evidence on patterns of PPE use and potential exposure of farmers to PPPs is provided. Most farmers (49.3%) showed potentially unsafe behaviour with respect to PPE use. Hat and boots were the most commonly used protective items during PPPs use, but most of the farmers surveyed reported low frequency of use for gloves, goggles, face mask, coveralls, and respirator. Especially the respirator was reported to be the least used PPE item amongst farmers. Farmers who perceived PPPs as harmful substances or those who had an episode of intoxication in the past reported more frequent use of several PPE items. Stepwise multiple regression analysis revealed that the variable episode of intoxication in the past exerted the strongest positive influence on PPE use, followed by the perception of PPPs being hazardous substances, upper secondary education, previous training on PPPs (i.e., spraying equipment, application parameters, risks to human health and environment, safety issues) and farm size under cultivation. Old age exerted a significant negative influence on PPE use, namely, elderly farmers tended not to use PPE. Strategies to maximize the protection of applicators of PPPs from hazardous exposures still require innovation to achieve increased effectiveness. Emphasis on lifelong training and education of farmers about hazards and risks of PPPs is crucial for changing

  9. Predictors affecting personal health information management skills.

    PubMed

    Kim, Sujin; Abner, Erin

    2016-01-01

    This study investigated major factors affecting personal health records (PHRs) management skills associated with survey respondents' health information management related activities. A self-report survey was used to assess individuals' personal characteristics, health knowledge, PHR skills, and activities. Factors underlying respondents' current PHR-related activities were derived using principal component analysis (PCA). Scale scores were calculated based on the results of the PCA, and hierarchical linear regression analyses were used to identify respondent characteristics associated with the scale scores. Internal consistency of the derived scale scores was assessed with Cronbach's α. Among personal health information activities surveyed (N = 578 respondents), the four extracted factors were subsequently grouped and labeled as: collecting skills (Cronbach's α = 0.906), searching skills (Cronbach's α = 0.837), sharing skills (Cronbach's α = 0.763), and implementing skills (Cronbach's α = 0.908). In the hierarchical regression analyses, education and computer knowledge significantly increased the explanatory power of the models. Health knowledge (β = 0.25, p < 0.001) emerged as a positive predictor of PHR collecting skills. This study confirmed that PHR training and learning should consider a full spectrum of information management skills including collection, utilization and distribution to support patients' care and prevention continua.

  10. Attenuation of X and Gamma Rays in Personal Radiation Shielding Protective Clothing.

    PubMed

    Kozlovska, Michaela; Cerny, Radek; Otahal, Petr

    2015-11-01

    A collection of personal radiation shielding protective clothing, suitable for use in case of accidents in nuclear facilities or radiological emergency situations involving radioactive agents, was gathered and tested at the Nuclear Protection Department of the National Institute for Nuclear, Chemical and Biological Protection, Czech Republic. Attenuating qualities of shielding layers in individual protective clothing were tested via spectra measurement of x and gamma rays, penetrating them. The rays originated from different radionuclide point sources, the gamma ray energies of which cover a broad energy range. The spectra were measured by handheld spectrometers, both scintillation and High Purity Germanium. Different narrow beam geometries were adjusted using a special testing bench and a set of various collimators. The main experimentally determined quantity for individual samples of personal radiation shielding protective clothing was x and gamma rays attenuation for significant energies of the spectra. The attenuation was assessed comparing net peak areas (after background subtraction) in spectra, where a tested sample was placed between the source and the detector, and corresponding net peak areas in spectra, measured without the sample. Mass attenuation coefficients, which describe attenuating qualities of shielding layers materials in individual samples, together with corresponding lead equivalents, were determined as well. Experimentally assessed mass attenuation coefficients of the samples were compared to the referred ones for individual heavy metals.

  11. Permeation Resistance of Personal Protective Equipment Materials to Monomethyhydrazine

    NASA Technical Reports Server (NTRS)

    Waller, J. M.; Williams, J. H.

    1997-01-01

    Permeation resistance was determined by measuring the breakthrough time and time-averaged vapor transmission rate of monomethylhydrazine (MMH) through two types of personal protective equipment (PPE). The two types of PPE evaluated were the totally encapsulating ILC Dover Chemturion Model 1212 chemical protective suit with accessories, and the FabOhio polyvinyl chloride (PVC) splash garment. Two exposure scenarios were simulated: (1) a saturated vapor exposure for 2 hours (h), and (2) a brief MMH 'splash' followed by a 2-h saturated vapor exposure. Time-averaged MMH concentrations inside the totally-encapsulating suit were calculated by summation of the area-weighted contributions made by each suit component. Results show that the totally encapsulating suit provides adequate protection at the new 10 ppb Threshold Limit Value Time-Weighted Average (TLV-TWA). The permeation resistance of the PVC splash garment to MMH was poorer than any of the totally encapsulating suit materials tested. Breakthrough occurred soon after initial vapor or 'splash' exposure.

  12. 49 CFR 1520.7 - Covered persons.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...

  13. 49 CFR 1520.7 - Covered persons.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...

  14. 49 CFR 1520.7 - Covered persons.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...

  15. 49 CFR 1520.7 - Covered persons.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...

  16. 49 CFR 1520.7 - Covered persons.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...

  17. Personal information documents for people with dementia: Healthcare staff 's perceptions and experiences.

    PubMed

    Baillie, Lesley; Thomas, Nicola

    2018-01-01

    Person-centred care is internationally recognised as best practice for the care of people with dementia. Personal information documents for people with dementia are proposed as a way to support person-centred care in healthcare settings. However, there is little research about how they are used in practice. The aim of this study was to analyse healthcare staff 's perceptions and experiences of using personal information documents, mainly Alzheimer's Society's 'This is me', for people with dementia in healthcare settings. The method comprised a secondary thematic analysis of data from a qualitative study, of how a dementia awareness initiative affected care for people with dementia in one healthcare organisation. The data were collected through 12 focus groups (n = 58 participants) and 1 individual interview, conducted with a range of healthcare staff, both clinical and non-clinical. There are four themes presented: understanding the rationale for personal information documents; completing personal information documents; location for personal information documents and transfer between settings; impact of personal information documents in practice. The findings illuminated how healthcare staff use personal information documents in practice in ways that support person-centred care. Practical issues about the use of personal information documents were revealed and these may affect the optimal use of the documents in practice. The study indicated the need to complete personal information documents at an early stage following diagnosis of dementia, and the importance of embedding their use across care settings, to support communication and integrated care.

  18. Perspectives of Australian adults about protecting the privacy of their health information in statistical databases.

    PubMed

    King, Tatiana; Brankovic, Ljiljana; Gillard, Patricia

    2012-04-01

    . Assuring individuals that their personal health information is de-identified reduces their concern about the necessity of consent for releasing health information for research purposes, but many people are not aware that removing their names and other direct identifiers from medical records does not guarantee full privacy protection for their health information. Privacy concerns decrease as extra security measures are introduced to protect privacy. Therefore, instead of "tailoring concern" as proposed by Willison we suggest improving privacy protection of personal information by introducing additional security measures in data publishing. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  19. 78 FR 5116 - NASA Information Security Protection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-24

    ... 2700-AD61 NASA Information Security Protection AGENCY: National Aeronautics and Space Administration... implement the provisions of Executive Order (E.O.) 13526, Classified National Security Information, and... Information, that establishes the Agency's requirements for the proper implementation and management of a...

  20. 45 CFR 164.524 - Access of individuals to protected health information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Health Information § 164.524 Access of individuals to protected health information. (a) Standard: Access to protected health information—(1) Right of access. Except as otherwise provided in paragraph (a)(2... protected health information about the individual in a designated record set, for as long as the protected...

  1. 45 CFR 164.524 - Access of individuals to protected health information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Health Information § 164.524 Access of individuals to protected health information. (a) Standard: Access to protected health information—(1) Right of access. Except as otherwise provided in paragraph (a)(2... protected health information about the individual in a designated record set, for as long as the protected...

  2. The Role of Personality in Musicians' Information Seeking for Creativity

    ERIC Educational Resources Information Center

    Kostagiolas, Petros; Lavranos, Charilaos; Martzoukou, Konstantina; Papadatos, Joseph

    2017-01-01

    Introduction: This paper explores the relationship between musicians' information seeking behaviour and their personality traits within the context of musical creativity. Although previous research has addressed different socio-technological and behavioral aspects of music information seeking, the role of personality characteristics around…

  3. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 2 2013-07-01 2013-07-01 false Public information and consumer.../Maintenance Program Requirements § 51.368 Public information and consumer protection. (a) Public awareness. The SIP shall include a plan for informing the public on an ongoing basis throughout the life of the I...

  4. 24 CFR 81.76 - FOIA requests and protection of GSE information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... FOIA requests and protection of GSE information. (a) General. HUD shall process FOIA requests for... disclosure. (b) Protection of confidential business information other than mortgage data and AHAR information. When a GSE seeks to protect from disclosure confidential business information, the GSE may seek...

  5. 78 FR 53478 - Proposed Information Collection; United States Park Police Personal History Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-29

    ...] Proposed Information Collection; United States Park Police Personal History Statement AGENCY: National Park... Police Personal History Statement) to collect detailed personal history information from applicants... information, including financial data and residence history. Selective Service information and military data...

  6. Government Doublethink: Protection or Suppression in Information.

    ERIC Educational Resources Information Center

    Drake, Miriam A.

    2003-01-01

    Discusses regulations and actions related to government withholding, suppressing, and altering information since September 11, 2001. Topics include conflicting goals of an informed citizenry versus national security, science and technology progress versus protection of sensitive information, and public health versus ideology; political pressure;…

  7. 29 CFR Appendix B to Subpart I of... - General Testing Conditions and Additional Guidelines for Personal Fall Protection Systems (Non...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Personal Fall Protection Systems (Non-Mandatory) B Appendix B to Subpart I of Part 1915 Labor Regulations... Guidelines for Personal Fall Protection Systems (Non-Mandatory) 1. Personal fall arrest systems—(a) General... create the free fall distance should be the one supplied with the system, or in its absence, the least...

  8. 29 CFR Appendix B to Subpart I of... - General Testing Conditions and Additional Guidelines for Personal Fall Protection Systems (Non...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Personal Fall Protection Systems (Non-Mandatory) B Appendix B to Subpart I of Part 1915 Labor Regulations... Guidelines for Personal Fall Protection Systems (Non-Mandatory) 1. Personal fall arrest systems—(a) General... create the free fall distance should be the one supplied with the system, or in its absence, the least...

  9. 29 CFR Appendix B to Subpart I of... - General Testing Conditions and Additional Guidelines for Personal Fall Protection Systems (Non...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Personal Fall Protection Systems (Non-Mandatory) B Appendix B to Subpart I of Part 1915 Labor Regulations... Guidelines for Personal Fall Protection Systems (Non-Mandatory) 1. Personal fall arrest systems—(a) General... create the free fall distance should be the one supplied with the system, or in its absence, the least...

  10. Reference architecture of application services for personal wellbeing information management.

    PubMed

    Tuomainen, Mika; Mykkänen, Juha

    2011-01-01

    Personal information management has been proposed as an important enabler for individual empowerment concerning citizens' wellbeing and health information. In the MyWellbeing project in Finland, a strictly citizen-driven concept of "Coper" and related architectural and functional guidelines have been specified. We present a reference architecture and a set of identified application services to support personal wellbeing information management. In addition, the related standards and developments are discussed.

  11. [Application of classified protection of information security in the information system of air pollution and health impact monitoring].

    PubMed

    Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun

    2018-01-01

    To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.

  12. Comparison of assessment of personality disorder by patients and informants.

    PubMed

    Modestin, J; Puhan, A

    2000-01-01

    The present study evaluated the pathology of personality disorder in a group of 8 nonpatient volunteers and 32 psychiatric in- and outpatients, most of them suffering from substance abuse disorder. The patient self-reports were compared with the reports by 2 informants for each proband. All probands and informants completed the Structured Interview for DSM-III-R Axis II Personality Questionnaire. Patient self-reports and informant reports yielded the same number of diagnoses. The diagnostic agreement between the three sets of data was generally poor; however, the concordance was slightly better between both groups of informants than between patients and informants: Median kappa were 0.13 for patients versus parents, 0.14 for patients versus brothers/sisters and 0.29 for parents versus brothers/sisters. Patient and informant evaluations represent two different assessment approaches of the personality, and a complete agreement is not to be expected. Copyright 2000 S. Karger AG, Basel.

  13. 76 FR 50487 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-15

    ... Information (PCII) Stakeholder Survey AGENCY: National Protection and Programs Directorate, DHS. ACTION: 30... Collection Request, Protected Critical Infrastructure Information (PCII) Stakeholder Survey. DHS previously... homeland security duties. This survey is designed to gather information from PCII Officers that can be used...

  14. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  15. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  16. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  17. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  18. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  19. Media reporting of ProtecT: a disconnect in information dissemination?

    PubMed

    Westerman, M E; Bhindi, B; Choo, R; Gettman, M T; Karnes, R J; Klotz, L; Boorjian, S A

    2017-12-01

    Given the central role of the media in disseminating information to the public, we analyzed news coverage of the recent publication from ProtecT to assess views on treatment, the level of detail presented and degree of bias. We applied a predefined search strategy to identify all news articles reporting on ProtecT within 30 days of its publication. Articles were independently assessed by two urologists and two lay persons using five-point Likert scales. Descriptive statistics and analysis of variance were used. Of 33 unique articles identified, 20 (61%) conveyed negative views on definitive treatment for localized prostate cancer (PCa), while 29 (88%) expressed favorable views of active surveillance/monitoring (AM). Nevertheless, fewer than half of the articles described what AM entails (n=15; 46%) or the rate of treatment in the AM arm (n=12; 36%). Moreover, while 32 (97%) articles highlighted the absence of a difference in cancer-specific mortality at 10 years, only 17 (52%) mentioned the need for longer follow-up. A total of 17 (52%) articles had a notable degree of perceived bias (⩾4/5 on Likert scale), with shorter articles (P=0.02), articles covering few content areas (P=0.03) and articles that did not detail what AM entails (P=0.003) containing significantly increased bias. The majority of news articles regarding ProtecT presented an adverse view of definitive treatment for localized PCa relative to AM, but failed to highlight key nuances of the trial. Healthcare professionals and the lay public should be cautious in acquiring medical news through the general media. Additionally, the urologic community must continue to improve the quality of disseminated information, for example, through proactively engaging with the media, through social media and/or through participation in continuing education lecture series, so as to guide the knowledge translation process, especially upon publication of such potentially influential studies.

  20. 45 CFR 155.260 - Privacy and security of personally identifiable information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... AFFORDABLE CARE ACT General Functions of an Exchange § 155.260 Privacy and security of personally... information to the extent such information is necessary to carry out the functions described in § 155.200 of...: (1) Gain access to personally identifiable information submitted to an Exchange; or (2) Collect, use...

  1. Methylation array data can simultaneously identify individuals and convey protected health information: an unrecognized ethical concern.

    PubMed

    Philibert, Robert A; Terry, Nicolas; Erwin, Cheryl; Philibert, Winter J; Beach, Steven Rh; Brody, Gene H

    2014-01-01

    Genome-wide methylation arrays are increasingly used tools in studies of complex medical disorders. Because of their expense and potential utility to the scientific community, current federal policy dictates that data from these arrays, like those from genome-wide genotyping arrays, be deposited in publicly available databases. Unlike the genotyping information, access to the expression data is not restricted. An underlying supposition in the current nonrestricted access to methylation data is the belief that protected health and personal identifying information cannot be simultaneously extracted from these arrays. In this communication, we analyze methylation data from the Illumina HumanMethylation450 array and show that genotype at 1,069 highly informative loci, and both alcohol and smoking consumption information, can be derived from the array data. We conclude that both potentially personally identifying information and substance-use histories can be simultaneously derived from methylation array data. Because access to genetic information about a database subject or one of their relatives is critical to the de-identification process, this risk of de-identification is limited at the current time. We propose that access to genome-wide methylation data be restricted to institutionally approved investigators who accede to data use agreements prohibiting re-identification.

  2. Personal Genomic Information Management and Personalized Medicine: Challenges, Current Solutions, and Roles of HIM Professionals

    PubMed Central

    Alzu'bi, Amal; Zhou, Leming; Watzlaf, Valerie

    2014-01-01

    In recent years, the term personalized medicine has received more and more attention in the field of healthcare. The increasing use of this term is closely related to the astonishing advancement in DNA sequencing technologies and other high-throughput biotechnologies. A large amount of personal genomic data can be generated by these technologies in a short time. Consequently, the needs for managing, analyzing, and interpreting these personal genomic data to facilitate personalized care are escalated. In this article, we discuss the challenges for implementing genomics-based personalized medicine in healthcare, current solutions to these challenges, and the roles of health information management (HIM) professionals in genomics-based personalized medicine. PMID:24808804

  3. Managing personal health information in distributed research network environments.

    PubMed

    Bredfeldt, Christine E; Butani, Amy L; Pardee, Roy; Hitz, Paul; Padmanabhan, Sandy; Saylor, Gwyn

    2013-10-08

    Studying rare outcomes, new interventions and diverse populations often requires collaborations across multiple health research partners. However, transferring healthcare research data from one institution to another can increase the risk of data privacy and security breaches. A working group of multi-site research programmers evaluated the need for tools to support data security and data privacy. The group determined that data privacy support tools should: 1) allow for a range of allowable Protected Health Information (PHI); 2) clearly identify what type of data should be protected under the Health Insurance Portability and Accountability Act (HIPAA); and 3) help analysts identify which protected health information data elements are allowable in a given project and how they should be protected during data transfer. Based on these requirements we developed two performance support tools to support data programmers and site analysts in exchanging research data. The first tool, a workplan template, guides the lead programmer through effectively communicating the details of multi-site programming, including how to run the program, what output the program will create, and whether the output is expected to contain protected health information. The second performance support tool is a checklist that site analysts can use to ensure that multi-site program output conforms to expectations and does not contain protected health information beyond what is allowed under the multi-site research agreements. Together the two tools create a formal multi-site programming workflow designed to reduce the chance of accidental PHI disclosure.

  4. 45 CFR 164.528 - Accounting of disclosures of protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Accounting of disclosures of protected health... Health Information § 164.528 Accounting of disclosures of protected health information. (a) Standard: Right to an accounting of disclosures of protected health information. (1) An individual has a right to...

  5. A qualitative study on the use of personal information technology by persons with spinal cord injury.

    PubMed

    Mattar, Andrew A G; Hitzig, Sander L; McGillivray, Colleen F

    2015-01-01

    Previous work has shown that information technology (IT), such as personal computers and other digital devices (e.g. tablets, laptops, etc.), software, online resources and hand-held communication tools (e.g. cellphones), has benefits for health and well-being for persons with chronic health conditions. To date, the ways that persons with spinal cord injury (SCI) use IT in their daily activities has not been fully explored. Thus, the purpose of the study was to obtain an in-depth perspective of how people with SCI regularly use IT to gain insight on ways IT can be used to support health and well-being in the community for this population. Semi-structured interviews were conducted with community-dwelling persons with SCI (N = 10) who identified themselves as frequent-or-daily-users of IT. Qualitative content analysis was used to identify the ways that persons with SCI use personal IT. Ten themes related to IT use were identified: (1) Modifications allowing access to IT; (2) Convenience of IT and its perceived value; (3) IT as a scheduler/planner; (4) Challenges; (5) Contributions of IT to participation; (6) Access to information; (7) Influence of IT on well-being; (8) IT as a connector; (9) Issues of IT acquisition; and (10) Desires for future devices/technology. The findings suggest that IT use by people with SCI contributes to general health and well-being, by increasing access to SCI-related health information and opportunity for social participation. Despite the benefits offered by IT, persons with SCI have identified a degree of skepticism about the reliability and applicability of the health information they find online. Future work on developing and implementing IT for health and well-being post-SCI should take into account consumers' perspectives to facilitate uptake. Implications for Rehabilitation There is a need for a more refined understanding of how people with spinal cord injury (SCI) use information technology (IT) in their daily lives in order to

  6. Backward Channel Protection Based on Randomized Tree-Walking Algorithm and Its Analysis for Securing RFID Tag Information and Privacy

    NASA Astrophysics Data System (ADS)

    Choi, Wonjoon; Yoon, Myungchul; Roh, Byeong-Hee

    Eavesdropping on backward channels in RFID environments may cause severe privacy problems because it means the exposure of personal information related to tags that each person has. However, most existing RFID tag security schemes are focused on the forward channel protections. In this paper, we propose a simple but effective method to solve the backward channel eavesdropping problem based on Randomized-tree walking algorithm for securing tag ID information and privacy in RFID-based applications. In order to show the efficiency of the proposed scheme, we derive two performance models for the cases when CRC is used and not used. It is shown that the proposed method can lower the probability of eavesdropping on backward channels near to ‘0.’

  7. 78 FR 3971 - Children's Online Privacy Protection Rule

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-17

    ...The Commission amends the Children's Online Privacy Protection Rule (``COPPA Rule'' or ``Rule''), consistent with the requirements of the Children's Online Privacy Protection Act, to clarify the scope of the Rule and strengthen its protections for children's personal information, in light of changes in online technology since the Rule went into effect in April 2000. The final amended Rule includes modifications to the definitions of operator, personal information, and Web site or online service directed to children. The amended Rule also updates the requirements set forth in the notice, parental consent, confidentiality and security, and safe harbor provisions, and adds a new provision addressing data retention and deletion.

  8. 45 CFR 164.520 - Notice of privacy practices for protected health information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Health Information § 164.520 Notice of privacy practices for protected health information. (a) Standard... legal duties with respect to protected health information. (2) Exception for group health plans. (i) An... receive protected health information other than summary health information as defined in § 164.504(a) or...

  9. 45 CFR 164.520 - Notice of privacy practices for protected health information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Health Information § 164.520 Notice of privacy practices for protected health information. (a) Standard... legal duties with respect to protected health information. (2) Exception for group health plans. (i) An... receive protected health information other than summary health information as defined in § 164.504(a) or...

  10. Information quantity and quality affect the realistic accuracy of personality judgment.

    PubMed

    Letzring, Tera D; Wells, Shannon M; Funder, David C

    2006-07-01

    Triads of unacquainted college students interacted in 1 of 5 experimental conditions that manipulated information quantity (amount of information) and information quality (relevance of information to personality), and they then made judgments of each others' personalities. To determine accuracy, the authors compared the ratings of each judge to a broad-based accuracy criterion composed of personality ratings from 3 types of knowledgeable informants (the self, real-life acquaintances, and clinician-interviewers). Results supported the hypothesis that information quantity and quality would be positively related to objective knowledge about the targets and realistic accuracy. Interjudge consensus and self-other agreement followed a similar pattern. These findings are consistent with expectations based on models of the process of accurate judgment (D. C. Funder, 1995, 1999) and consensus (D. A. Kenny, 1994). Copyright 2006 APA, all rights reserved.

  11. The use of stereotypes and individuating information in political person perception.

    PubMed

    Crawford, Jarret T; Jussim, Lee; Madon, Stephanie; Cain, Thomas R; Stevens, Sean T

    2011-04-01

    This article introduces the political person perception model, which identifies conditions under which perceivers rely on stereotypes (party membership), individuating information (issue position), or both in political person perception. Three studies supported the model's predictions. Study 1 showed that perceivers gave primacy to target information that was narrowly relevant to a judgment, whether that information was stereotypic or individuating. Study 2 found that perceivers relied exclusively on individuating information when it was narrowly relevant to the judgment and relied on both stereotype and individuating information when individuating information was not narrowly relevant to the judgment but did imply a political ideology. Study 3 replicated these findings in a more ecologically valid context and showed that people relied on party information in the absence of narrowly relevant policy positions and when individuating information did not imply a political ideology. Implications for political person perception and theories of stereotyping are discussed.

  12. Do Smartphone Power Users Protect Mobile Privacy Better than Nonpower Users? Exploring Power Usage as a Factor in Mobile Privacy Protection and Disclosure.

    PubMed

    Kang, Hyunjin; Shin, Wonsun

    2016-03-01

    This study examines how consumers' competence at using smartphone technology (i.e., power usage) affects their privacy protection behaviors. A survey conducted with smartphone users shows that power usage influences privacy protection behavior not only directly but also indirectly through privacy concerns and trust placed in mobile service providers. A follow-up experiment indicates that the effects of power usage on smartphone users' information management can be a function of content personalization. Users, high on power usage, are less likely to share personal information on personalized mobile sites, but they become more revealing when they interact with nonpersonalized mobile sites.

  13. Foraging Bumble Bees Weigh the Reliability of Personal and Social Information.

    PubMed

    Dunlap, Aimee S; Nielsen, Matthew E; Dornhaus, Anna; Papaj, Daniel R

    2016-05-09

    Many animals, including insects, make decisions using both personally gathered information and social information derived from the behavior of other, usually conspecific, individuals [1]. Moreover, animals adjust use of social versus personal information appropriately under a variety of experimental conditions [2-5]. An important factor in how information is used is the information's reliability, that is, how consistently the information is correlated with something of relevance in the environment [6]. The reliability of information determines which signals should be attended to during communication [6-9], which types of stimuli animals should learn about, and even whether learning should evolve [10, 11]. Here, we show that bumble bees (Bombus impatiens) account for the reliability of personally acquired information (which flower color was previously associated with reward) and social information (which flowers are chosen by other bees) in making foraging decisions; however, the two types of information are not treated equally. Bees prefer to use social information if it predicts a reward at all, but if social information becomes entirely unreliable, flower color will be used instead. This greater sensitivity to the reliability of social information, and avoidance of conspecifics in some cases, may reflect the specific ecological circumstances of bee foraging. Overall, the bees' ability to make decisions based on both personally acquired and socially derived information, and the relative reliability of both, demonstrates a new level of sophistication and flexibility in animal, particularly insect, decision-making. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Prevalence Estimation of Protected Health Information in Swedish Clinical Text.

    PubMed

    Henriksson, Aron; Kvist, Maria; Dalianis, Hercules

    2017-01-01

    Obscuring protected health information (PHI) in the clinical text of health records facilitates the secondary use of healthcare data in a privacy-preserving manner. Although automatic de-identification of clinical text using machine learning holds much promise, little is known about the relative prevalence of PHI in different types of clinical text and whether there is a need for domain adaptation when learning predictive models from one particular domain and applying it to another. In this study, we address these questions by training a predictive model and using it to estimate the prevalence of PHI in clinical text written (1) in different clinical specialties, (2) in different types of notes (i.e., under different headings), and (3) by persons in different professional roles. It is demonstrated that the overall PHI density is 1.57%; however, substantial differences exist across domains.

  15. Factors influencing worker use of personal protective eyewear.

    PubMed

    Lombardi, David A; Verma, Santosh K; Brennan, Melanye J; Perry, Melissa J

    2009-07-01

    To identify and describe the array of factors that influence a workers' decision to wear personal protective eyewear (PPE) and the barriers that exist in preventing their use. A series of focus groups enrolled workers and supervisors primarily from manufacturing, construction, or service/retail industries that had potential exposure to eye injury hazards in their job tasks. Focus group sessions were facilitated to collect qualitative and quantitative data in two categories, "sought information" and "emergent themes", related to the factors influencing use of PPE. We conducted a series of 7 groups with 51 participants, 36 (71%) males and 15 (29%) females ranging in age from 19 to 64 years old, from a variety of occupations including construction (24%), production (22%), installation, repair and maintenance (14%), and healthcare (10%). Most were highly experienced in their occupation (>10 years); males (86%) and females (53%), and had received some safety training in the past (82%). The majority of workers in this study were required to wear PPE on their worksite (78%), however only 55% had a dedicated safety officer. A conceptual model that summarizes the "sought information" and "emergent themes" is presented that depicts the decision making process for the factors influencing use of PPE and consists of three primary branches; perceptions of hazards and risks, "barriers" to PPE usage, and enforcement and reinforcement. Lack of comfort/fit, and fogging and scratching of the eyewear were suggested as the most important barriers to PPE usage. Younger age and lack of safety training were other important factors affecting use of PPE. Several potentially modifiable factors identified would lead to an increase in workers' PPE use and encourage supervisors to provide ongoing positive feedback on the continuous use of PPE by workers at risk for an eye injury.

  16. 22 CFR 1003.5 - Access to personal information from Inter-American Foundation records.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 2 2013-04-01 2009-04-01 true Access to personal information from Inter-American Foundation records. 1003.5 Section 1003.5 Foreign Relations INTER-AMERICAN FOUNDATION RULES SAFEGUARDING PERSONAL INFORMATION IN IAF RECORDS § 1003.5 Access to personal information from Inter-American...

  17. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    PubMed

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004

  18. 20 CFR 636.2 - Protection of informants.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... assure a fair determination of the issues, or where necessary to effectively accomplish responsibilities... Information Act, the Privacy Act and other applicable law. (b) Retaliation prohibited. No person or agency may...

  19. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... supervisors should give consideration to those individuals with unlisted phone numbers, who do not want their...

  20. When does risk perception predict protection motivation for health threats? A person-by-situation analysis.

    PubMed

    Ferrer, Rebecca A; Klein, William M P; Avishai, Aya; Jones, Katelyn; Villegas, Megan; Sheeran, Paschal

    2018-01-01

    Although risk perception is a key concept in many health behavior theories, little research has explicitly tested when risk perception predicts motivation to take protective action against a health threat (protection motivation). The present study tackled this question by (a) adopting a multidimensional model of risk perception that comprises deliberative, affective, and experiential components (the TRIRISK model), and (b) taking a person-by-situation approach. We leveraged a highly intensive within-subjects paradigm to test features of the health threat (i.e., perceived severity) and individual differences (e.g., emotion reappraisal) as moderators of the relationship between the three types of risk perception and protection motivation in a within-subjects design. Multi-level modeling of 2968 observations (32 health threats across 94 participants) showed interactions among the TRIRISK components and moderation both by person-level and situational factors. For instance, affective risk perception better predicted protection motivation when deliberative risk perception was high, when the threat was less severe, and among participants who engage less in emotional reappraisal. These findings support the TRIRISK model and offer new insights into when risk perceptions predict protection motivation.

  1. When does risk perception predict protection motivation for health threats? A person-by-situation analysis

    PubMed Central

    Klein, William M. P.; Avishai, Aya; Jones, Katelyn; Villegas, Megan; Sheeran, Paschal

    2018-01-01

    Although risk perception is a key concept in many health behavior theories, little research has explicitly tested when risk perception predicts motivation to take protective action against a health threat (protection motivation). The present study tackled this question by (a) adopting a multidimensional model of risk perception that comprises deliberative, affective, and experiential components (the TRIRISK model), and (b) taking a person-by-situation approach. We leveraged a highly intensive within-subjects paradigm to test features of the health threat (i.e., perceived severity) and individual differences (e.g., emotion reappraisal) as moderators of the relationship between the three types of risk perception and protection motivation in a within-subjects design. Multi-level modeling of 2968 observations (32 health threats across 94 participants) showed interactions among the TRIRISK components and moderation both by person-level and situational factors. For instance, affective risk perception better predicted protection motivation when deliberative risk perception was high, when the threat was less severe, and among participants who engage less in emotional reappraisal. These findings support the TRIRISK model and offer new insights into when risk perceptions predict protection motivation. PMID:29494705

  2. The role of privacy protection in healthcare information systems adoption.

    PubMed

    Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui

    2013-10-01

    Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.

  3. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    PubMed Central

    Majeed, Abdul; Ullah, Farman; Lee, Sungchang

    2017-01-01

    Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims. PMID:28481298

  4. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data.

    PubMed

    Majeed, Abdul; Ullah, Farman; Lee, Sungchang

    2017-05-08

    Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims.

  5. Tuberculosis Infection Control in Health-Care Facilities: Environmental Control and Personal Protection.

    PubMed

    Lee, Ji Yeon

    2016-10-01

    Transmission of tuberculosis (TB) is a recognized risk to patients and healthcare workers in healthcare settings. The literature review suggests that implementation of combination control measures reduces the risk of TB transmission. Guidelines suggest a three-level hierarchy of controls including administrative, environmental, and respiratory protection. Among environmental controls, installation of ventilation systems is a priority because ventilation reduces the number of infectious particles in the air. Natural ventilation is cost-effective but depends on climatic conditions. Supplemented intervention such as air-cleaning methods including high efficiency particulate air filtration and ultraviolet germicidal irradiation should be considered in areas where adequate ventilation is difficult to achieve. Personal protective equipment including particulate respirators provides additional benefit when administrative and environmental controls cannot assure protection.

  6. Culturally Competent Informed-Consent Process to Evaluate a Social Policy for Older Persons With Low Literacy: The Mexican Case

    PubMed Central

    Aguila, Emma; Weidmer, Beverly A.; Illingworth, Alfonso Rivera; Martinez, Homero

    2017-01-01

    The informed-consent process seeks to provide complete information to participants about a research project and to protect personal information they may disclose. In this article, we present an informed-consent process that we piloted and improved to obtain consent from older adults in Yucatan, Mexico. Respondents had limited fluency in Spanish, spoke the local Mayan language, and had some physical limitations due to their age. We describe how we adapted the informed-consent process to comply with U.S. and Mexican regulations, while simplifying the forms and providing them in Spanish and Mayan. We present the challenges and lessons learned when dealing with low-literacy older populations, some with diminished autonomy, in a bilingual context and a binational approach to the legal framework. PMID:28824826

  7. Genetic information, non-discrimination, and privacy protections in genetic counseling practice.

    PubMed

    Prince, Anya E R; Roche, Myra I

    2014-12-01

    The passage of the Genetic Information Non Discrimination Act (GINA) was hailed as a pivotal achievement that was expected to calm the fears of both patients and research participants about the potential misuse of genetic information. However, 6 years later, patient and provider awareness of legal protections at both the federal and state level remains discouragingly low, thereby, limiting their potential effectiveness. The increasing demand for genetic testing will expand the number of individuals and families who could benefit from obtaining accurate information about the privacy and anti-discriminatory protections that GINA and other laws extend. In this paper we describe legal protections that are applicable to individuals seeking genetic counseling, review the literature on patient and provider fears of genetic discrimination and examine their awareness and understandings of existing laws, and summarize how genetic counselors currently discuss genetic discrimination. We then present three genetic counseling cases to illustrate issues of genetic discrimination and provide relevant information on applicable legal protections. Genetic counselors have an unprecedented opportunity, as well as the professional responsibility, to disseminate accurate knowledge about existing legal protections to their patients. They can strengthen their effectiveness in this role by achieving a greater knowledge of current protections including being able to identify specific steps that can help protect genetic information.

  8. Genetic Information, Non-Discrimination, and Privacy Protections in Genetic Counseling Practice

    PubMed Central

    Prince, Anya E.R.; Roche, Myra I.

    2014-01-01

    The passage of the Genetic Information Non Discrimination Act (GINA) was hailed as a pivotal achievement that was expected to calm the fears of both patients and research participants about the potential misuse of genetic information. However, six years later, patient and provider awareness of legal protections at both the federal and state level remains discouragingly low, thereby, limiting their potential effectiveness. The increasing demand for genetic testing will expand the number of individuals and families who could benefit from obtaining accurate information about the privacy and anti-discriminatory protections that GINA and other laws extend. In this paper we describe legal protections that are applicable to individuals seeking genetic counseling, review the literature on patient and provider fears of genetic discrimination and examine their awareness and understandings of existing laws, and summarize how genetic counselors currently discuss genetic discrimination. We then present three genetic counseling cases to illustrate issues of genetic discrimination and provide relevant information on applicable legal protections. Genetic counselors have an unprecedented opportunity, as well as the professional responsibility, to disseminate accurate knowledge about existing legal protections to their patients. They can strengthen their effectiveness in this role by achieving a greater knowledge of current protections including being able to identify specific steps that can help protect genetic information. PMID:25063358

  9. Social Norms Information Enhances the Efficacy of an Appearance-based Sun Protection Intervention

    PubMed Central

    Kulik, James A; Butler, Heather; Gerrard, Meg; Gibbons, Frederick X; Mahler, Heike

    2008-01-01

    This experiment examined whether the efficacy of an appearance-based sun protection intervention could be enhanced by the addition of social norms information. Southern California college students (N=125, predominantly female) were randomly assigned to either an appearance-based sun protection intervention-that consisted of a photograph depicting underlying sun damage to their skin (UV photo) and information about photoaging or to a control condition. Those assigned to the intervention were further randomized to receive information about what one should do to prevent photoaging (injunctive norms information), information about the number of their peers who currently use regular sun protection (descriptive norms information), both injunctive and descriptive norms information, or neither type of norms information. The results demonstrated that those who received the UV Photo/photoaging information intervention expressed greater sun protection intentions and subsequently reported greater sun protection behaviors than did controls. Further, the addition of both injunctive and descriptive norms information increased self-reported sun protection behaviors during the subsequent month. PMID:18448221

  10. Cognitive, personality, and social factors associated with adolescents' online personal information disclosure.

    PubMed

    Liu, Cong; Ang, Rebecca P; Lwin, May O

    2013-08-01

    The current study aims to understand the factors that influence adolescents' disclosure of personally identifiable information (PII) on social networking sites (SNSs). A survey was conducted among 780 adolescent participants (between 13 and 18) who were Facebook users. Structural equation modeling was used for analyzing the data and obtaining an overarching model that include cognitive, personality, and social factors that influence adolescents' PII disclosure. Results showed privacy concern as the cognitive factor reduces adolescents' PII disclosure and it serves as a potential mediator for personality and social factors. Amongst personality factors, narcissism was found to directly increase PII disclosure, and social anxiety indirectly decreases PII disclosure by increasing privacy concern. Amongst social factors, active parental mediation decreases PII disclosure directly and indirectly by increasing privacy concern. Restrictive parental mediation decreases PII disclosure only indirectly by increasing privacy concern. Implications of the findings to parents, educators, and policy makers were discussed. Copyright © 2013 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  11. Protecting Sensitive Information in Directory Services Using Virtual Directories

    NASA Astrophysics Data System (ADS)

    Claycomb, William; Shin, Dongwan

    Directory services are commonly used to store information related to individuals, and often act as a source for security services, such as authentication and access control, in collaborative applications within/across organizations. Hence, there is an urgent need to protect the sensitive information they contain. Existing solutions offer minimal protection against insider attacks, a growing threat to both government and industry data services. In this paper we present a solution for data protection that leverages virtual directories and data encryption to provide a user-centric approach to data protection, delegation, and collaboration. A security architecture is presented, along with the discussion of the benefits and vulnerabilities of our approach. We also discuss a proof-of-concept implementation and performance testing results.

  12. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Safeguarding personal information. 310.13 Section 310.13 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE... Standards and Technology. For paper records, disposal methods, such as tearing, burning, melting, chemical...

  13. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Safeguarding personal information. 310.13 Section 310.13 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE... Standards and Technology. For paper records, disposal methods, such as tearing, burning, melting, chemical...

  14. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Safeguarding personal information. 310.13 Section 310.13 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE... Standards and Technology. For paper records, disposal methods, such as tearing, burning, melting, chemical...

  15. The Changing Environment of Personal Information Systems.

    ERIC Educational Resources Information Center

    Burton, Hilary D.

    1985-01-01

    Discusses technological developments causing changes in personal information systems: increase in commercial support services; proliferation of microcomputers; capability to download from secondary services into private files; and developing desire to utilize functions such as electronic mail and automated office functions. Appendices list 21…

  16. 76 FR 42676 - Information Collection; Federal Excess Personal Property (FEPP) Inventory

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-19

    ... DEPARTMENT OF AGRICULTURE Forest Service Information Collection; Federal Excess Personal Property... collection, Federal Excess Personal Property (FEPP) Inventory. DATES: Comments must be received in writing on... Personal Property (FEPP) Inventory. OMB Number: 0596-218 Expiration Date of Approval: 12/31/2011. Type of...

  17. 30 CFR 1206.365 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Does ONRR protect information I provide? 1206.365 Section 1206.365 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Geothermal Resources § 1206.365 Does ONRR protect information...

  18. 30 CFR 1206.365 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Does ONRR protect information I provide? 1206.365 Section 1206.365 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Geothermal Resources § 1206.365 Does ONRR protect information...

  19. 30 CFR 1206.365 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Does ONRR protect information I provide? 1206.365 Section 1206.365 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Geothermal Resources § 1206.365 Does ONRR protect information...

  20. Sun protection practices among offspring of women with personal or family history of skin cancer.

    PubMed

    Geller, Alan C; Brooks, Daniel R; Colditz, Graham A; Koh, Howard K; Frazier, A Lindsay

    2006-04-01

    participants' mothers had received a diagnosis of skin cancer, and 783 participants' mothers reported a family history of melanoma. Between 1989 and 1999, 371 mothers of GUTS participants received a diagnosis of skin cancer: melanoma (n = 44), squamous cell (n = 39), and basal cell cancer (n = 311); 23 mothers received a diagnosis of > 1 type of skin cancer. Because GUTS includes siblings from the same family, the 371 mothers with skin cancer had 463 offspring in GUTS. Offspring of mothers with skin cancer were slightly more likely to report frequent sunburns in the past year compared with those with neither maternal diagnosis nor family history (39% vs 36%). Tanning bed use was not significantly different among those with either a maternal diagnosis of skin cancer or family history of melanoma as compared with nonaffected adolescents (8% vs 9% vs 10%). Sunscreen use among offspring of mothers with skin cancer was higher than among those whose mothers had a family history of melanoma or mothers with no personal history of skin cancer (42% vs 33% vs 34%). Tan-promoting attitudes were also similar across all groups. Only 25% thought that a natural skin color was most attractive, and on average, 25% in each group agreed that it was worth burning to get a tan. Children of mothers who had received a diagnosis > 2 years in the past were less likely to use sunscreen, more likely to sunburn, and more likely to use tanning beds than children of mothers with a more recent diagnosis, although the results did not reach statistical significance. Frequent sunburns, suboptimal sunscreen use, and high rates of tanning bed use are commonplace even among the children of health professionals who are at risk for developing skin cancer themselves as a result of personal or family history. With new information on family risk, pediatricians can use the potential of a teachable moment to ensure optimal sun protection for children who are at risk.

  1. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES...). (b)(1) Standard: Confidential communications requirements. (i) A covered health care provider must... communications of protected health information from the covered health care provider by alternative means or at...

  2. Making sense of personal health information: challenges for information visualization.

    PubMed

    Faisal, Sarah; Blandford, Ann; Potts, Henry W W

    2013-09-01

    This article presents a systematic review of the literature on information visualization for making sense of personal health information. Based on this review, five application themes were identified: treatment planning, examination of patients' medical records, representation of pedigrees and family history, communication and shared decision making, and life management and health monitoring. While there are recognized design challenges associated with each of these themes, such as how best to represent data visually and integrate qualitative and quantitative information, other challenges and opportunities have received little attention to date. In this article, we highlight, in particular, the opportunities for supporting people in better understanding their own illnesses and making sense of their health conditions in order to manage them more effectively.

  3. 30 CFR 1206.62 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Does ONRR protect information I provide? 1206.62 Section 1206.62 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Indian Oil § 1206.62 Does ONRR protect information I provide...

  4. 30 CFR 1206.62 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Does ONRR protect information I provide? 1206.62 Section 1206.62 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Indian Oil § 1206.62 Does ONRR protect information I provide...

  5. 30 CFR 1206.108 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Does ONRR protect information I provide? 1206.108 Section 1206.108 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Federal Oil § 1206.108 Does ONRR protect information I provide...

  6. 30 CFR 1206.108 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Does ONRR protect information I provide? 1206.108 Section 1206.108 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Federal Oil § 1206.108 Does ONRR protect information I provide...

  7. 30 CFR 1206.108 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Does ONRR protect information I provide? 1206.108 Section 1206.108 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Federal Oil § 1206.108 Does ONRR protect information I provide...

  8. 30 CFR 1206.62 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Does ONRR protect information I provide? 1206.62 Section 1206.62 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Indian Oil § 1206.62 Does ONRR protect information I provide...

  9. 30 CFR 206.365 - Does MMS protect information I provide?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Does MMS protect information I provide? 206.365 Section 206.365 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE INTERIOR MINERALS REVENUE MANAGEMENT PRODUCT VALUATION Geothermal Resources § 206.365 Does MMS protect information I provide? Certain...

  10. 30 CFR 206.108 - Does MMS protect information I provide?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Does MMS protect information I provide? 206.108 Section 206.108 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE INTERIOR MINERALS REVENUE MANAGEMENT PRODUCT VALUATION Federal Oil § 206.108 Does MMS protect information I provide? Certain...

  11. Performance of materials used for biological personal protective equipment against blood splash penetration.

    PubMed

    Shimasaki, Noriko; Shinohara, Katsuaki; Morikawa, Hideki

    2017-12-07

    For occupational safety, healthcare workers must select and wear appropriate personal protective equipment (PPE), protective clothing, and masks as countermeasures against exposure to infectious body fluids and blood splash. It is important for healthcare workers to ensure the protective performance of each PPE against penetration of pathogens. The International Standards Organization (ISO) 22609 test evaluates the effectiveness of medical facemasks to protect against penetration of splashed synthetic blood. However, in this method, the protective performance is determined only visually, without quantification of leaked liquid volume. Therefore, in this study, we modified the ISO 22609 test method to quantify the volume of leaked liquid and obtain a more accurate assessment of the protection performance. We tested non-woven and woven materials used for masks or protective clothing, and the performance of each material was classified using this new method. We found that the quantity of leaked synthetic blood was dependent on the structural characteristics of each material. These findings will allow healthcare workers to select the most appropriate PPE for a given situation or task.

  12. Performance of materials used for biological personal protective equipment against blood splash penetration

    PubMed Central

    SHIMASAKI, Noriko; SHINOHARA, Katsuaki; MORIKAWA, Hideki

    2017-01-01

    For occupational safety, healthcare workers must select and wear appropriate personal protective equipment (PPE), protective clothing, and masks as countermeasures against exposure to infectious body fluids and blood splash. It is important for healthcare workers to ensure the protective performance of each PPE against penetration of pathogens. The International Standards Organization (ISO) 22609 test evaluates the effectiveness of medical facemasks to protect against penetration of splashed synthetic blood. However, in this method, the protective performance is determined only visually, without quantification of leaked liquid volume. Therefore, in this study, we modified the ISO 22609 test method to quantify the volume of leaked liquid and obtain a more accurate assessment of the protection performance. We tested non-woven and woven materials used for masks or protective clothing, and the performance of each material was classified using this new method. We found that the quantity of leaked synthetic blood was dependent on the structural characteristics of each material. These findings will allow healthcare workers to select the most appropriate PPE for a given situation or task. PMID:28978815

  13. 45 CFR 164.502 - Uses and disclosures of protected health information: General rules.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Health Information § 164.502 Uses and disclosures of protected health information: General rules. (a) Standard. A covered entity or business associate may not use or disclose protected health information... protected health information as follows: (i) To the individual; (ii) For treatment, payment, or health care...

  14. Polycyclic aromatic hydrocarbons produced by electrocautery smoke and the use of personal protective equipment 1

    PubMed Central

    Claudio, Caroline Vieira; Ribeiro, Renata Perfeito; Martins, Júlia Trevisan; Marziale, Maria Helena Palucci; Solci, Maria Cristina; Dalmas, José Carlos

    2017-01-01

    ABSTRACT Objective: analyze the concentration of polycyclic aromatic hydrocarbons in electrocautery smoke in operating rooms and the use of personal protective equipment by the intraoperative team when exposed to hydrocarbons. Method: exploratory and cross-sectional field research conducted in a surgery center. Gases were collected by a vacuum suction pump from a sample of 50 abdominal surgeries in which an electrocautery was used. A form was applied to identify the use of personal protective equipment. Gases were analyzed using chromatography. Descriptive statistics and Spearman's test were used to treat data. Results: there were 17 (34%) cholecystectomies with an average duration of 136 minutes, while the average time of electrocautery usage was 3.6 minutes. Airborne hydrocarbons were detected in operating rooms in 100% of the surgeries. Naphthalene was detected in 48 (96.0%) surgeries and phenanthrene in 49 (98.0%). The average concentration of these compounds was 0.0061 mg/m3 and a strong correlation (0.761) was found between them. The intraoperative teams did not use respirator masks such as the N95. Conclusion: electrocautery smoke produces gases that are harmful to the health of the intraoperative team, which is a concern considering the low adherence to the use of personal protective equipment. PMID:28301033

  15. Personalized Information Environments: Do Public Libraries Want a Slice of the PIE?

    ERIC Educational Resources Information Center

    Worcester, Lea

    2003-01-01

    Discussion of personalized information environments (PIEs) focuses on library personalized interfaces. Describes academic library PIEs and commercial sites, such as Amazon.com that use personalization; explores the Public Library of Charlotte and Mecklenburg's personalized interface; and discusses opportunities and challenges PIEs offer public…

  16. 30 CFR 206.62 - Does MMS protect information I provide?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Does MMS protect information I provide? 206.62 Section 206.62 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE INTERIOR MINERALS REVENUE MANAGEMENT PRODUCT VALUATION Indian Oil § 206.62 Does MMS protect information I provide? The MMS will keep...

  17. Personal protective equipment, hygiene behaviours and occupational risk of illness after July 2011 flood in Copenhagen, Denmark.

    PubMed

    Wójcik, O P; Holt, J; Kjerulf, A; Müller, L; Ethelberg, S; Mølbak, K

    2013-08-01

    Incidence of various diseases can increase following a flood. We aimed to identify professionals in Copenhagen who became ill after contact with 2 July 2011 floodwater/sediment and determine risks and protective factors associated with illness. We conducted a cohort study of employees engaged in post-flood management activities. Participants completed a questionnaire collecting information about demographics, floodwater/sediment exposure, compliance with standard precautions, and symptoms of illness. Overall, 257 professionals participated, with 56 (22%) cases. Risk of illness was associated with not washing hands after floodwater/sediment contact [relative risk (RR) 2∙45], exposure to floodwater at work and home (RR 2∙35), smoking (RR 1∙92), direct contact with floodwater (RR 1∙86), and eating/drinking when in contact with floodwater (RR 1∙77). Professionals need to follow standard precautions when in contact with floodwater/sediment, especially proper hand hygiene after personal protective equipment use and before eating/drinking and smoking.

  18. 78 FR 46578 - Agency Information Collection Activities: Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-01

    ... , including any personal information provided. Sensitive personal information, such as account numbers or... to understand the impact of bundled products and services on the financial decision- making of... BUREAU OF CONSUMER FINANCIAL PROTECTION [Docket No CFPB-2013-0024] Agency Information Collection...

  19. 45 CFR 164.502 - Uses and disclosures of protected health information: general rules.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Health Information § 164.502 Uses and disclosures of protected health information: general rules. (a) Standard. A covered entity may not use or disclose protected health information, except as permitted or.... A covered entity is permitted to use or disclose protected health information as follows: (i) To the...

  20. 17 CFR 248.16 - Protection of Fair Credit Reporting Act.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... (CONTINUED) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Relation to Other Laws; Effective Date § 248.16 Protection of Fair Credit... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Protection of Fair Credit...

  1. 43 CFR 2.36 - Can a bureau release information protected by Exemption 4?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 1 2014-10-01 2014-10-01 false Can a bureau release information protected... release information protected by Exemption 4? If a bureau determines that the requested information is protected from release by Exemption 4 of the FOIA, the bureau has no discretion to release the information...

  2. 43 CFR 2.36 - Can a bureau release information protected by Exemption 4?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 43 Public Lands: Interior 1 2013-10-01 2013-10-01 false Can a bureau release information protected... release information protected by Exemption 4? If a bureau determines that the requested information is protected from release by Exemption 4 of the FOIA, the bureau has no discretion to release the information...

  3. Divulging Personal Information within Learning Analytics Systems

    ERIC Educational Resources Information Center

    Ifenthaler, Dirk; Schumacher, Clara

    2015-01-01

    The purpose of this study was to investigate if students are prepared to release any personal data in order to inform learning analytics systems. Besides the well-documented benefits of learning analytics, serious concerns and challenges are associated with the application of these data driven systems. Most notably, empirical evidence regarding…

  4. Convergence of Self-Reports and Informant Reports on the Personality Assessment Screener.

    PubMed

    Kelley, Shannon E; Edens, John F; Morey, Leslie C

    2017-12-01

    The present study is the first to investigate the Personality Assessment Screener, a brief self-report measure of risk for emotional and behavioral dysfunction, in relation to the informant report version of this instrument, the Personality Assessment Screener-Other. Among a sample of undergraduate roommate dyads ( N = 174), self-report and informant report total scores on the Personality Assessment Screener/Personality Assessment Screener-Other moderately converged ( r = 0.45), with generally greater agreement between perspectives observed for externalizing behaviors compared with internalizing distress. In addition, selves tended to report more psychological difficulties relative to informant ratings ( d = 0.45) with an average absolute discrepancy between sources of 6.31 ( SD = 4.96) out of a possible range of 66. Discrepancies between self-report and informant report were significantly associated with characteristics of the dyadic relationship (e.g., length of acquaintanceship) as well as the severity of self-reported psychological difficulties and positive impression management.

  5. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  6. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  7. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  8. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  9. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  10. 29 CFR 2400.4 - Collection and disclosure of personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 9 2011-07-01 2011-07-01 false Collection and disclosure of personal information. 2400.4 Section 2400.4 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH REVIEW COMMISSION REGULATIONS IMPLEMENTING THE PRIVACY ACT § 2400.4 Collection and disclosure of personal...

  11. 29 CFR 2400.4 - Collection and disclosure of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Collection and disclosure of personal information. 2400.4 Section 2400.4 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH REVIEW COMMISSION REGULATIONS IMPLEMENTING THE PRIVACY ACT § 2400.4 Collection and disclosure of personal...

  12. Determinants of Internet use as a preferred source of information on personal health.

    PubMed

    Lemire, Marc; Paré, Guy; Sicotte, Claude; Harvey, Charmian

    2008-11-01

    To understand the personal, social and cultural factors likely to explain recourse to the Internet as a preferred source of personal health information. A cross-sectional survey was conducted among a population of 2923 Internet users visiting a firmly established website that offers information on personal health. Multiple regression analysis was performed to identify the determinants of site use. The analysis template comprised four classes of determinants likely to explain Internet use: beliefs, intentions, user satisfaction and socio-demographic characteristics. Seven-point Likert scales were used. An analysis of the psychometric qualities of the variables provided compelling evidence of the construct's validity and reliability. A confirmatory factor analysis confirmed the correspondence with the factors predicted by the theoretical model. The regression analysis explained 35% of the variance in Internet use. Use was directly associated with five factors: perceived usefulness, importance given to written media in searches for health information, concern for personal health, importance given to the opinions of physicians and other health professionals, and the trust placed in the information available on the site itself. This study confirms the importance of the credibility of information on the frequency of Internet use as a preferred source of information on personal health. It also shows the potentially influential role of the Internet in the development of personal knowledge of health issues.

  13. 78 FR 12065 - National Institute for Occupational Safety and Health Personal Protective Technology for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-21

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Institute for Occupational Safety and Health Personal Protective Technology for Pesticide Handlers... for Disease Control and Prevention (CDC), Department of Health and Human Services (HHS). ACTION...

  14. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification of information requiring protection. Classifiers shall identify the level of classification of each classified... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Identification of information requiring...

  15. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification of information requiring protection. Classifiers shall identify the level of classification of each classified... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Identification of information requiring...

  16. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SAFETY TEAMS NATIONAL CONSTRUCTION SAFETY TEAMS Collection and Preservation of Evidence; Information... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any other...

  17. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... SAFETY TEAMS NATIONAL CONSTRUCTION SAFETY TEAMS Collection and Preservation of Evidence; Information... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any other...

  18. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... SAFETY TEAMS NATIONAL CONSTRUCTION SAFETY TEAMS Collection and Preservation of Evidence; Information... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any other...

  19. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... SAFETY TEAMS NATIONAL CONSTRUCTION SAFETY TEAMS Collection and Preservation of Evidence; Information... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any other...

  20. DEVELOPMENT OF PERSONAL PROTECTIVE EQUIPMENT FOR DECONTAMINATION AND DECOMMISSIONING

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    M.A. Ebadian, Ph.D.

    1999-01-01

    The purpose of this one-year investigation is to perform a technology integration/search, thereby ensuring that the safest and most cost-effective options are developed and subsequently used during the deactivation and decommissioning (D&D) of U.S. Department of Energy Environmental Management (DOE-EM) sites. Issues of worker health and safety are the main concern, followed by cost. Two lines of action were explored: innovative Personal Cooling Systems (PCS) and Personal Monitoring Equipment (PME). PME refers to sensors affixed to the worker that warn of an approaching heat stress condition, thereby preventing it. Three types of cooling systems were investigated: Pre-Chilled or Forced-Air Systemmore » (PCFA), Umbilical Fluid-Chilled System (UFCS), and Passive Vest System (PVS). Of these, the UFCS leads the way. The PVS or Gel pack vest lagged due to a limited cooling duration. And the PCFA or chilled liquid air supply was cumbersome and required an expensive and complex recharge system. The UFCS in the form of the Personal Ice Cooling System (PICS) performed exceptionally. The technology uses a chilled liquid circulating undergarment and a Personal Protective Equipment (PPE) external pump and ice reservoir. The system is moderately expensive, but the recharge is low-tech and inexpensive enough to offset the cost. There are commercially available PME that can be augmented to meet the DOE's heat stress alleviation need. The technology is costly, in excess of $4,000 per unit. Workers easily ignore the alarm. The benefit to health & safety is indirect so can be overlooked. A PCS is a more justifiable expenditure.« less

  1. 40 CFR 710.52 - Reporting information to EPA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... person who chooses to report information to EPA by means of magnetic media must submit the information... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Reporting information to EPA. 710.52... Reporting information to EPA. Any person who must report under this subpart, as described in § 710.48, must...

  2. 40 CFR 710.52 - Reporting information to EPA.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... person who chooses to report information to EPA by means of magnetic media must submit the information... 40 Protection of Environment 31 2011-07-01 2011-07-01 false Reporting information to EPA. 710.52... Reporting information to EPA. Any person who must report under this subpart, as described in § 710.48, must...

  3. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any other...

  4. Operator dermal exposure and protection provided by personal protective equipment and working coveralls during mixing/loading, application and sprayer cleaning in vineyards.

    PubMed

    Thouvenin, Isabelle; Bouneb, Françoise; Mercier, Thierry

    2017-06-01

    The efficiency of a working coverall combined with personal protective equipment to protect operators against dermal exposure to plant protection products under field conditions was studied. Operators wore a non-certified water-repellent finish polyester/cotton coverall plus a certified gown during the mixing/loading and the cleaning phases. Insecticide foliar application to a vineyard was selected as the exposure scenario. The overall dermal residue levels measured in this study were in the range of data recently collected in Europe. The water-repellent finish working coverall reduced body exposure by a factor of approximately 95%. Wearing a Category III Type 3 partial body gown during mixing/loading and cleaning of the application equipment led to a further protective effect of 98.7%. The combination of a water-repellent finish working coverall and partial body protection during specific tasks provided satisfactory levels of protection and can be considered as suitable protection for the conditions of use studied.

  5. Public preferences for communicating personal genomic risk information: a focus group study.

    PubMed

    Smit, Amelia K; Keogh, Louise A; Hersch, Jolyn; Newson, Ainsley J; Butow, Phyllis; Williams, Gabrielle; Cust, Anne E

    2016-12-01

    Personalized genomic risk information has the potential to motivate behaviour change and promote population health, but the success of this will depend upon effective risk communication strategies. To determine preferences for different graphical and written risk communication formats, and the delivery of genomic risk information including the mode of communication and the role of health professionals. Focus groups, transcribed and analysed thematically. Thirty-four participants from the public. Participants were provided with, and invited to discuss, a hypothetical scenario giving an individual's personalized genomic risk of melanoma displayed in several graphical formats. Participants preferred risk formats that were familiar and easy to understand, such as a 'double pie chart' and '100 person diagram' (pictograph). The 100 person diagram was considered persuasive because it humanized and personalized the risk information. People described the pie chart format as resembling bank data and food (such as cake and pizza). Participants thought that email, web-based platforms and postal mail were viable options for communicating genomic risk information. However, they felt that it was important that a health professional (either a genetic counsellor or 'informed' general practitioner) be available for discussion at the time of receiving the risk information, to minimize potential negative emotional responses and misunderstanding. Face-to-face or telephone delivery was preferred for delivery of high-risk results. These public preferences for communication strategies for genomic risk information will help to guide translation of genome-based knowledge into improved population health. © 2015 The Authors. Health Expectations. Published by John Wiley & Sons Ltd.

  6. A guide to unclassified sensitive information protection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Donahue, S.C.

    1996-11-14

    This document is a reference guide for CIC-Division employees who lead or participate in projects that use and/or produce unclassified sensitive information. It is intended for use on a case by case basis to develop project specific sensitive information handling procedures and standards. It contains criteria for identifying sensitive information and determining levels of sensitivity, and describes cost effective measures for protecting various levels of sensitive information. The goal of this document is to help establish good business practices that benefit both the Laboratory and its customers. Division personnel are encouraged to apply these guidelines.

  7. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.

    PubMed

    Namoğlu, Nihan; Ulgen, Yekta

    2013-01-01

    Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects.

  8. 12 CFR 911.6 - Persons and entities with access to unpublished information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Persons and entities with access to unpublished information. 911.6 Section 911.6 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.6 Persons and entities with access to...

  9. 12 CFR 911.6 - Persons and entities with access to unpublished information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Persons and entities with access to unpublished information. 911.6 Section 911.6 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.6 Persons and entities with access to...

  10. 12 CFR 911.6 - Persons and entities with access to unpublished information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Persons and entities with access to unpublished information. 911.6 Section 911.6 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.6 Persons and entities with access to...

  11. 12 CFR 911.6 - Persons and entities with access to unpublished information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Persons and entities with access to unpublished information. 911.6 Section 911.6 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.6 Persons and entities with access to...

  12. Five on one side: personal and social information in spatial choice.

    PubMed

    Brown, Michael F; Saxon, Marie E; Bisbing, Teagan; Evans, Jessica; Ruff, Jennifer; Stokesbury, Andrew

    2015-03-01

    To examine whether the outcome of a rat's own choices ("personal information") and the choice behavior of another rat ("social information") can jointly control spatial choices, rats were tested in an open field task in which they searched for food. For the rats of primary interest (Subject Rats), the baited locations were all on one side of the arena, but the specific locations baited and the side on which they occurred varied over trials. The Subject Rats were sometimes tested together with an informed "Model" rat that had learned to find food in the same five locations (all on the same side of the arena) on every trial. Unintended perceptual cues apparently controlled spatial choices at first, but when perceptual cues to food location were not available, choices were controlled by both personal information (allowing the baited side of the arena to be determined) and social information (allowing baited locations to be determined more precisely). This shows that control by personal and social information are not mutually exclusive and supports the view that these two kinds of information can be used flexibly and adaptively to guide spatial choices. This article is part of a Special Issue entitled: tribute to Tom Zentall. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. 32 CFR 806b.35 - Balancing protection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...

  14. 32 CFR 806b.35 - Balancing protection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...

  15. 32 CFR 806b.35 - Balancing protection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...

  16. 32 CFR 806b.35 - Balancing protection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...

  17. 32 CFR 806b.35 - Balancing protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...

  18. Privacy and Personal Information Held by Government: A Comparative Study, Japan and New Zealand

    NASA Astrophysics Data System (ADS)

    Cullen, Rowena

    This chapter reports on the concepts of information privacy and trust in government among citizens in Japan and New Zealand in a transnational, crosscultural study. Data from both countries are presented, and cultural and other factors are sought that might explain differences in attitudes shown. In both countries, citizens display a range of views, not related to age or gender. New Zealand citizens express concern about information privacy in relation to information held by government, but show a higher level of trust in government overall, and most attribute breaches of privacy to incompetence, rather than deliberate malfeasance. Japanese citizens interviewed also indicated that they had major concerns about information privacy, and had considerably less trust in government than New Zealand respondents showed. They were more inclined to attribute breaches of privacy to lax behavior in individuals than government systems. In both countries citizens showed an awareness of the tradeoffs necessary between personal privacy and the needs of the state to hold information for the benefit of all citizens, but knew little about the protection offered by privacy legislation, and expressed overall concern about privacy practices in the modern state. The study also provides evidence of cultural differences that can be related to Hofstede's dimensions of culture.

  19. The User-Subjective Approach to Personal Information Management Systems.

    ERIC Educational Resources Information Center

    Bergman, Ofer; Beyth-Marom, Ruth; Nachmias, Rafi

    2003-01-01

    Explains personal information management (PIM) systems and suggests a user-subjective approach to PIM system design. Advocates that PIM systems relate to the subjective value-added attributes that the user gives the stored data so that the user can find information again, recall it when needed, and use it effectively in the next interaction.…

  20. Family history assessment of personality disorders: I. Concordance with direct interview and between pairs of informants.

    PubMed

    Ferro, T; Klein, D N

    1997-01-01

    The present study examined the concordance of the Family History Interview for Personality Disorders (FHIPD) with diagnoses based on direct interviews and between pairs of informants. Subjects were 224 probands participating in a series of studies of the familial transmission of mood and personality disorders and their first-degree relatives. Proband informants and relatives provided information about themselves on the Structured Clinical Interview for DSM-III-R (SCID), Personality Disorder Examination (PDE), and Eysenck Personality Questionnaire (EPQ). Information from informants about relatives was collected with the FHIPD. All assessments were made blindly and independently. Using Kappa, concordance between proband informants' family histories and relative direct reports on specific personality disorders was low, ranging from -.01 to .28, with a median of .10. Kappa for a diagnosis of any personality disorder was .16. When two independent informant reports were compared, Kappas for specific Axis II disorders ranged from .10 to .72, with a median of .28. Kappa for a diagnosis of any personality disorder was .36. These data suggest that subjects and informants provide different perspectives on Axis II psychopathology, and support the use of both sources of information whenever possible.

  1. [A web information system for enhancing management and improving special care services provided to dependent persons].

    PubMed

    Alvarez-Bermejo, J A; Hernández-Capel, D M; Belmonte-Ureña, L J; Roca-Piera, J

    2009-01-01

    Ensuring the quality of services provided in centres where dependent persons are seen by specialist services, by improving and enhancing how information -salary, control of tasks, patients' records, etc.- is shared between staff and carers. A web information system has been developed and experimentally deployed to accomplish this. The accuracy of the system was evaluated by assessing how confident the employees were with it rather than relying on statistical data. It was experimentally deployed since January 2009 in Asociación de Personas con Discapacidad "El Saliente" that manages several day centres in Almeria, for dependent persons over 65 years old, particularly those affected by Alzheimer' disease. Incidence data was collected during the experimental period. A total of 84% of the employees thought that the system helped to manage documents, administrative duties, etc., and 92.4% said they could attend to really important tasks because the system was responsible for alerting them of every task, such as medication timetables, checking all patients were present (to prevent an Alzheimer affected person leaving the centre) etc. During this period the incidences reported were reduced by about a 30%, although data is still partially representative. As the life expectancy of the population gets longer, these centres will increase. Providing systems such as the one presented here would be of great help for administrative duties (sensitive data protection...) as well as ensuring high quality care and attention.

  2. The search for person-related information in general practice: a qualitative study.

    PubMed

    Schrans, Diego; Avonts, Dirk; Christiaens, Thierry; Willems, Sara; de Smet, Kaat; van Boven, Kees; Boeckxstaens, Pauline; Kühlein, Thomas

    2016-02-01

    General practice is person-focused. Contextual information influences the clinical decision-making process in primary care. Currently, person-related information (PeRI) is neither recorded in a systematic way nor coded in the electronic medical record (EMR), and therefore not usable for scientific use. To search for classes of PeRI influencing the process of care. GPs, from nine countries worldwide, were asked to write down narrative case histories where personal factors played a role in decision-making. In an inductive process, the case histories were consecutively coded according to classes of PeRI. The classes found were deductively applied to the following cases and refined, until saturation was reached. Then, the classes were grouped into code-families and further clustered into domains. The inductive analysis of 32 case histories resulted in 33 defined PeRI codes, classifying all personal-related information in the cases. The 33 codes were grouped in the following seven mutually exclusive code-families: 'aspects between patient and formal care provider', 'social environment and family', 'functioning/behaviour', 'life history/non-medical experiences', 'personal medical information', 'socio-demographics' and 'work-/employment-related information'. The code-families were clustered into four domains: 'social environment and extended family', 'medicine', 'individual' and 'work and employment'. As PeRI is used in the process of decision-making, it should be part of the EMR. The PeRI classes we identified might form the basis of a new contextual classification mainly for research purposes. This might help to create evidence of the person-centredness of general practice. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  3. Linking temporal medical records using non-protected health information data.

    PubMed

    Bonomi, Luca; Jiang, Xiaoqian

    2017-01-01

    Modern medical research relies on multi-institutional collaborations which enhance the knowledge discovery and data reuse. While these collaborations allow researchers to perform analytics otherwise impossible on individual datasets, they often pose significant challenges in the data integration process. Due to the lack of a unique identifier, data integration solutions often have to rely on patient's protected health information (PHI). In many situations, such information cannot leave the institutions or must be strictly protected. Furthermore, the presence of noisy values for these attributes may result in poor overall utility. While much research has been done to address these challenges, most of the current solutions are designed for a static setting without considering the temporal information of the data (e.g. EHR). In this work, we propose a novel approach that uses non-PHI for linking patient longitudinal data. Specifically, our technique captures the diagnosis dependencies using patterns which are shown to provide important indications for linking patient records. Our solution can be used as a standalone technique to perform temporal record linkage using non-protected health information data or it can be combined with Privacy Preserving Record Linkage solutions (PPRL) when protected health information is available. In this case, our approach can solve ambiguities in results. Experimental evaluations on real datasets demonstrate the effectiveness of our technique.

  4. Personal Protective Equipment

    EPA Pesticide Factsheets

    Response personnel must wear the appropriate level of protection whenever near a hazardous release site. Level A is for the greatest exposure potential, and D is the minimum level. Examples range from totally encapsulated suits to hard hats.

  5. 49 CFR 1520.11 - Persons with a need to know.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ....11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.11 Persons with a need to know. (a) In general. A person has a need to...

  6. Perspectives on access to personal health information in New Zealand/Aotearoa.

    PubMed

    Menkes, David B; Hill, Charlotte J; Horsfall, Melissa; Jaye, Chrystal

    2008-12-01

    This study used group interviews to explore Māori and European New Zealander (Pakeha) perspectives on access to personal health information. Two predominant themes emerged: the tension between the individual and society, and differences inherent in the use of formal and informal moral codes. Māori and Pakeha differed in their concept of autonomy and relied on distinct moral codes when considering questions of access; Western values and moral codes were notably less relevant to Māori who described distinct, collectivist means of ensuring social care of the sick and dying. Pakeha but not Māori participants often used hypothetical situations to reach an abstract determination of 'who should know'; the latter instead used personal experience to decide case-by-case. Generational differences were also evident, particularly in the Māori groups. In conclusion, culture should be considered in access to personal health information in New Zealand. Similar cultural variation is likely to be found in other countries; recognition of such differences will help ensure that access to sensitive information is appropriate, inclusive, and ethical.

  7. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the subject...

  8. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the subject...

  9. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the subject...

  10. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the subject...

  11. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the subject...

  12. Personality and self-regulation: trait and information-processing perspectives.

    PubMed

    Hoyle, Rick H

    2006-12-01

    This article introduces the special issue of Journal of Personality on personality and self-regulation. The goal of the issue is to illustrate and inspire research that integrates personality and process-oriented accounts of self-regulation. The article begins by discussing the trait perspective on self-regulation--distinguishing between temperament and personality accounts--and the information-processing perspective. Three approaches to integrating these perspectives are then presented. These range from methodological approaches, in which constructs representing the two perspectives are examined in integrated statistical models, to conceptual approaches, in which the two perspectives are unified in a holistic theoretical model of self-regulation. The article concludes with an overview of the special issue contributions, which are organized in four sections: broad, integrative models of personality and self-regulation; models that examine the developmental origins of self-regulation and self-regulatory styles; focused programs of research that concern specific aspects or applications of self-regulation; and strategies for increasing the efficiency and effectiveness of self-regulation.

  13. [Personalized medicine and individual healthcare : Medical and information technology aspects].

    PubMed

    Niederlag, W; Lemke, H U; Rienhoff, O

    2010-08-01

    The individualization of medicine and healthcare appears to be following a general societal trend. The terms "personalized medicine" and "personal health" are used to describe this process. Here it must be emphasized that personalized medicine is not limited to pharmacogenomics, but that the spectrum of personalized medicine is much broader. Applications range from individualized diagnostics, patient-specific pharmacological therapy, therapy with individual prostheses and implants to therapy approaches using autologous cells, and from patient model-based therapy in the operating room, electronic patient records through to the individual care of patients in their home environment with the use of technical systems and services. Although in some areas practical solutions have already been found, most applications will not be fully developed for many years to come. Medical and information technology are essential to personalized medicine and personal health, each driving the other forward.

  14. Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications

    ERIC Educational Resources Information Center

    Cox, Trissa

    2012-01-01

    Information privacy is a major concern for consumers adopting emerging technologies dependent on location-based services. This study sought to determine whether a relationship exists among factors of personalization, locatability, perceived playfulness, privacy concern and behavioral intention to disclose personal information for individuals using…

  15. Quality of life in children surviving cancer: a personality and multi-informant perspective.

    PubMed

    De Clercq, Barbara; De Fruyt, Filip; Koot, Hans M; Benoit, Yves

    2004-12-01

    To describe quality of life (QoL) of children surviving cancer in relation to their personality, using self- and maternal reports and examining differences with healthy referents. Sixty-seven children who survived childhood cancer were compared with eighty-one healthy children on QoL and personality characteristics. Children who survived cancer reported higher QoL than healthy children, whereas there were no differences for personality. Two main effects emerged for informant with children rating themselves as less neurotic and more conscientious than their mothers. The correspondence between mothers and children was substantially higher for survivors for QoL and personality ratings. QoL and trait measures share substantial variance, and personality traits significantly predict QoL. Parental personality ratings explained child QoL beyond children's personality ratings. Personality traits contribute to quality of life, indicating that personality significantly influences child's quality of life beyond the experience of a negative life event such as surviving cancer and its treatment. From a diagnostic perspective, parental trait ratings are informative in addition to children's ratings of personality to understand children's QoL.

  16. "Insensitive" to touch: fabric-supported lubricant-swollen polymeric films for omniphobic personal protective gear.

    PubMed

    Damle, Viraj G; Tummala, Abhishiktha; Chandrashekar, Sriram; Kido, Cassidee; Roopesh, Ajay; Sun, Xiaoda; Doudrick, Kyle; Chinn, Jeff; Lee, James R; Burgin, Timothy P; Rykaczewski, Konrad

    2015-02-25

    The use of personal protective gear made from omniphobic materials that easily shed drops of all sizes could provide enhanced protection from direct exposure to most liquid-phase biological and chemical hazards and facilitate the postexposure decontamination of the gear. In recent literature, lubricated nanostructured fabrics are seen as attractive candidates for personal protective gear due to their omniphobic and self-healing characteristics. However, the ability of these lubricated fabrics to shed low surface tension liquids after physical contact with other objects in the surrounding, which is critical in demanding healthcare and military field operations, has not been investigated. In this work, we investigate the depletion of oil from lubricated fabrics in contact with highly absorbing porous media and the resulting changes in the wetting characteristics of the fabrics by representative low and high surface tension liquids. In particular, we quantify the loss of the lubricant and the dynamic contact angles of water and ethanol on lubricated fabrics upon repeated pressurized contact with highly absorbent cellulose-fiber wipes at different time intervals. We demonstrate that, in contrast to hydrophobic nanoparticle coated microfibers, fabrics encapsulated within a polymer that swells with the lubricant retain the majority of the oil and are capable of repelling high as well as low surface tension liquids even upon multiple contacts with the highly absorbing wipes. The fabric supported lubricant-swollen polymeric films introduced here, therefore, could provide durable and easy to decontaminate protection against hazardous biological and chemical liquids.

  17. Does the Second Amendment Protect the Gun Rights of Persons With Mental Illness?

    PubMed

    Appelbaum, Paul S

    2017-01-01

    Under federal law, persons who have been involuntarily hospitalized for psychiatric reasons are permanently barred from gun possession. That policy was challenged in 2012 by a Michigan man who had been committed 25 years earlier and who was blocked in 2011 from buying a gun. Considering his claim, the Sixth Circuit held that people with mental illness are not categorically excluded from Second Amendment protection and that an irreversible lifetime ban was unconstitutional. Although many mental health organizations and practitioners favor gun restrictions, they oppose discriminatory treatment of persons with mental illness, creating ambivalence about the decision, which presages greater involvement of mental health professionals in decisions regarding gun rights restoration.

  18. Associations between informant ratings of personality disorder traits, self-reports of personality, and directly observed behavior.

    PubMed

    Kaurin, Aleksandra; Sauerberger, Kyle S; Funder, David C

    2018-03-02

    Diagnoses of personality disorders (PD) must rely on judgments of observers-either clinicians or acquaintances-because personality disorders are primarily defined in terms of maladaptive interpersonal behavior. Little is known, however, about how closely acquaintances' judgments of PD traits relate to self-reports of theoretically relevant Big Five traits or directly observed behavioral outcomes in interpersonal situations. The present study examines associations between judgments of the 10 PD traits provided by close acquaintances, self-reports of PD-relevant Big Five personality traits, and observed interpersonal behaviors across three different three-person laboratory interactions (i.e., unstructured chat, cooperative task, competitive game). The sample consisted of 256 undergraduate students (130 females; M age  = 19.83, SD = 1.25). Four unacquainted observers independently rated participants' behaviors from video recordings. In line with previous work, informant reports of PD traits demonstrate strong convergent validity with relevant self-reported Big Five traits (as identified by Lynam & Widiger, 2001). Directly observed behavior is meaningfully associated with acquaintances' judgments and self-reports of PD-relevant traits, and the associations between these judgments and behavior are strongest for traits associated with histrionic and schizoid PD. Vector correlations between behavioral profiles associated with informant and self-reports show that both assessments have similar behavioral correlates. Associations between PD trait ratings and behavior appeared to differ as a function of gender, with males showing more and stronger correlations. Informants' ratings of PD traits are impressively accurate, converging both with self-reports of relevant traits and directly observed interpersonal behavior. Therefore, a comprehensive understanding of PDs and associated traits can be augmented by information from multiple acquaintances who have the

  19. Nurses' and patients' perceptions of privacy protection behaviours and information provision.

    PubMed

    Kim, Kyunghee; Han, Yonghee; Kim, Ji-Su

    2017-08-01

    With increased attention to patient privacy and autonomy, privacy protection and information provision for patients are becoming increasingly important. The aim of this study was to identify and analyse nurses' and patients' perceptions of the importance and performance of protecting patients' privacy and providing them with relevant information. This study is a descriptive cross-sectional investigation. Participants and research context: Participants were 168 patients hospitalised in medical and surgical wards and 176 nurses who cared for them. Ethical consideration: This study was approved by the Chung-Ang University Bioethics Committee, and informed written consent was collected from all participants. Nurses' recognition of the importance of protecting patients' privacy and providing adequate information was higher compared to their actual performance, and the nurses' level of performance was higher in comparison with the patients' recognition of its importance. Although a holistic approach to patient privacy protection and information provision is needed, the medical field has not embraced this model of care. These findings provide empirical data to create an ethical environment for the future, as considerable attention has been devoted to patients' rights and medical institutions' liability for providing explanations to patients.

  20. Is prevention of acute pesticide poisoning effective and efficient, with Locally Adapted Personal Protective Equipment? A randomized crossover study among farmers in Chitwan, Nepal.

    PubMed

    Varma, Anshu; Neupane, Dinesh; Ellekilde Bonde, Jens Peter; Jørs, Erik

    2016-07-26

    Farmers' risk of pesticide poisoning can be reduced with personal protective equipment but in low-income countries farmers' use of such equipment is limited. To examine the effectiveness and efficiency of Locally Adapted Personal Protective Equipment to reduce organophosphate exposure among farmers. In a crossover study, 45 male farmers from Chitwan, Nepal, were randomly allocated to work as usual applying organophosphate pesticides wearing Locally Adapted Personal Protective Equipment or Daily Practice Clothing. For seven days before each experiment, each farmer abstained from using pesticides. Before and after organophosphate application, an interview surveys and blood tests were carried out, and analyzed with paired t-test, frequencies and percentages. The difference between follow-up mean for acute organophosphate poisoning symptoms in the two groups was 0.13 [95% CI -0.22;0.49] and for plasma cholinesterase (U/ml) -0.03 [95% CI -0.11;0.06]. The difference between follow-up mean minus baseline mean for acute organophosphate poisoning symptoms in the two groups was 0.29 [95% CI -0.26;0.84] and for plasma cholinesterase (U/ml) -0.01 [95% CI --0.08;0.06]. Wearing the Locally Adapted Personal Protective Equipment versus Daily Practice Clothing gave the following results, respectively: comfort 75.6% versus 100%, sense of heat 64.4% versus 31.3%, other problems 44.4% versus 33.3%, likeability 95.6% versus 77.8%. We cannot support the expectation that our farmers in Chitwan, Nepal working with Locally Adapted Personal Protective Equipment would have fewer acute organophosphate poisoning symptoms, higher plasma cholinesterase (U/mL) and find it more efficient to work with the equipment than farmers working with their Daily Practice Clothing. Based on the farmers' working behavior, compounds used, intensity and exposure duration we conclude that Locally Adapted Personal Protective Equipment does not provide additional protection during usual work practices. However, our

  1. [A serious challenge for youth protection services: intervening with parents suffering from borderline personality disorder (BPD)].

    PubMed

    Laporte, Lise

    2007-01-01

    An exploratory survey of 68 youth protection services' workers in Montréal, who followed 1,030 children reveals that 39 % of these children have at least one parent who suffer from mental health problems. Among these parents, 48 % of mothers and 30 % of fathers have a personality disorder, and for the majority, a borderline personality disorder. This mental health problem is preoccupying for youth protection workers because of its high prevalence, its impact on children and case workers and the difficulties brought forth by having to intervene in a context of authority and within an organization not adapted to the management of this mental health problem. Some intervention's guidelines to work with these parents are presented as well as some challenges and future perspectives.

  2. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency enters...

  3. Flame-retardant contamination of firefighter personal protective clothing - A potential health risk for firefighters.

    PubMed

    Alexander, Barbara M; Baxter, C Stuart

    2016-09-01

    There is a high incidence of cardiovascular disease and certain cancers in firefighters that may be related to their occupational exposure to hazardous substances. Exposure may result from contaminated personal protective gear, as well as from direct exposure at fire scenes. This study characterized flame-retardant contamination on firefighter personal protective clothing to assess exposure of firefighters to these chemicals. Samples from used and unused firefighter protective clothing, including gloves, hoods and a coat wristlet, were extracted with methylene chloride and analyzed by EPA method 8270D Specific Ion Method (SIM) for polybrominated diphenyl ethers (PBDEs). Until recently PBDEs were some of the most common flame-retardant chemicals used in the US. Fifteen of the seventeen PBDEs for which analysis was performed were found on at least one clothing swatch. Every clothing sample, including an unused hood and all three layers of an unused glove, held a detectable concentration of at least one PBDE. These findings, along with previous research, suggest that firefighters are exposed to PBDE flame retardants at levels much higher than the general public. PBDEs are found widely dispersed in the environment and still persist in existing domestic materials such as clothing and furnishings. Firefighter exposure to flame retardants therefore merits further study.

  4. Privacy, Self-Regulation, and the Fight for Control of Personal Information.

    ERIC Educational Resources Information Center

    Johnston, Scott D.

    2000-01-01

    Examines the role of self-regulation in the establishment of an informational privacy policy. Discusses information technologies and changes in commerce; personal information in databases; demands for accountability; institutional and enforcement models; legislation; government failures; self-regulation and the individual; and potential problems…

  5. Attitudes regarding privacy of genomic information in personalized cancer therapy

    PubMed Central

    Rogith, Deevakar; Yusuf, Rafeek A; Hovick, Shelley R; Peterson, Susan K; Burton-Chase, Allison M; Li, Yisheng; Meric-Bernstam, Funda; Bernstam, Elmer V

    2014-01-01

    Objective To evaluate attitudes regarding privacy of genomic data in a sample of patients with breast cancer. Methods Female patients with breast cancer (n=100) completed a questionnaire assessing attitudes regarding concerns about privacy of genomic data. Results Most patients (83%) indicated that genomic data should be protected. However, only 13% had significant concerns regarding privacy of such data. Patients expressed more concern about insurance discrimination than employment discrimination (43% vs 28%, p<0.001). They expressed less concern about research institutions protecting the security of their molecular data than government agencies or drug companies (20% vs 38% vs 44%; p<0.001). Most did not express concern regarding the association of their genomic data with their name and personal identity (49% concerned), billing and insurance information (44% concerned), or clinical data (27% concerned). Significantly fewer patients were concerned about the association with clinical data than other data types (p<0.001). In the absence of direct benefit, patients were more willing to consent to sharing of deidentified than identified data with researchers not involved in their care (76% vs 60%; p<0.001). Most (85%) patients were willing to consent to DNA banking. Discussion While patients are opposed to indiscriminate release of genomic data, privacy does not appear to be their primary concern. Furthermore, we did not find any specific predictors of privacy concerns. Conclusions Patients generally expressed low levels of concern regarding privacy of genomic data, and many expressed willingness to consent to sharing their genomic data with researchers. PMID:24737606

  6. Framing and personalizing informed consent to prevent negative expectations: An experimental pilot study.

    PubMed

    Heisig, Sarah R; Shedden-Mora, Meike C; Hidalgo, Pablo; Nestoriuc, Yvonne

    2015-10-01

    Informing patients about medical treatments and their possible side effects is ethically and legally obligatory but may trigger negative expectations and nocebo-related side effects. This pilot study aims to investigate the effect of different informed consent procedures on treatment expectations for adjuvant breast cancer treatments (Study 1: endocrine therapy; Study 2: chemotherapy). Using an experimental 2-factorial design, healthy women were informed about endocrine therapy (n = 60) or chemotherapy (n = 64) within a hypothetical scenario. Information was framed with or without treatment benefit information and delivered in a personalized or standardized interaction. Primary outcomes were necessity-concern beliefs about the treatment and side-effect expectations, secondary outcomes were decisional conflicts. In Study 1, side-effect expectations (η²p= .08) and decisional conflicts (η²p = .07) were lower when framed treatment information was given. Providing personalized information resulted in more functional necessity-concern beliefs (η²p = .06) and lower decisional conflicts (η²p = .07). Personalizing and framing of information resulted in more functional necessity-concern beliefs (η²p = .10) and lower decisional conflicts. In Study 2, necessity-concern beliefs were more functional with framing (η²p = .06). Participants in the personalized groups reported lower decisional conflicts (η²p = .06). No differences in side-effect expectations were revealed. This is the first study to provide evidence for optimized treatment expectations through altered informed consent strategies. The results emphasize that framing and personalizing informed consent can positively influence treatment expectations and reduce decisional conflicts. However, generalizations are impaired by the study's pilot character. The potential to prevent nocebo responses in clinical practice should be analyzed. (PsycINFO Database Record (c) 2015 APA, all rights reserved).

  7. Use of categorical and individuating information in making inferences about personality.

    PubMed

    Krueger, J; Rothbart, M

    1988-08-01

    In three experiments, we explored the effects of categorical information (stereotypes) and case information (traits or behaviors) on judgments about an individual's characteristics. Subjects judged a target person's aggressiveness on the basis of a description containing both a broad social category and specific case information. In Experiment 1, the description included (a) a category that was either weakly or strongly related to aggressiveness and (b) a behavior that was unrelated, moderately diagnostic, or highly diagnostic of aggressiveness. Trait inferences were a function of both the stereotypic and the behavioral information. A single behavior was not sufficient to override the category effect. In Experiment 2, temporally consistent behaviors were presented as case information; under these conditions, category information had no effect on trait judgements. This finding was extended in Experiment 3 in which subjects predicted behaviors on the basis of the target person's sex and a moderately diagnostic trait.

  8. Fungicide application practices and personal protective equipment use among orchard farmers in the agricultural health study.

    PubMed

    Hines, C J; Deddens, J A; Coble, J; Alavanja, M C R

    2007-04-01

    Fungicides are routinely applied to deciduous tree fruits for disease management. Seventy-four private orchard applicators enrolled in the Agricultural Health Study participated in the Orchard Fungicide Exposure Study in 2002-2003. During 144 days of observation, information was obtained on chemicals applied and applicator mixing, application, personal protective, and hygiene practices. At least half of the applicators had orchards with <100 trees. Air blast was the most frequent application method used (55%), followed by hand spray (44%). Rubber gloves were the most frequently worn protective equipment (68% mix; 59% apply), followed by respirators (45% mix; 49% apply), protective outerwear (36% mix; 37% apply), and rubber boots (35% mix; 36% apply). Eye protection was worn while mixing and applying on only 35% and 41% of the days, respectively. Bivariate analyses were performed using repeated logistic or repeated linear regression. Mean duration of mixing, pounds of captan applied, total acres sprayed, and number of tank mixes sprayed were greater for air blast than for hand spray (p < 0.05). Spraying from a tractor/vehicle without an enclosed cab was associated with wearing some type of coverall (p < 0.05). Applicators often did not wash their hands after mixing (77%), a finding not explained by glove use. Glove use during mixing was associated with younger age, while wearing long-sleeve shirts was associated with older age (p < 0.05 each). Self-reported unusually high fungicide exposures were more likely on days applicators performed repairs (p < 0.05). These data will be useful for evaluating fungicide exposure determinants among orchard applicators.

  9. 2017 Fire Protection Informational Exchange Meeting

    DTIC Science & Technology

    documents the results of an information exchange meeting held May 1011, 2017 at the US Army Research Laboratory, which brought together interested...parties across the armed services to outline, as a community, the current state of the art in fire protection research and engineering and determine...where future efforts would be most advantageous. The forum provided the opportunity to strengthen old collaborations, begin new partnerships, and serve

  10. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... protection. Information not classified as Restricted Data or National Security Information related to.... Information not classified as Restricted Data or National Security Information related to the transportation... container when not in use. (3) A mobile device (such as a laptop computer) may also be used for the...

  11. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... protection. Information not classified as Restricted Data or National Security Information related to.... Information not classified as Restricted Data or National Security Information related to the transportation... container when not in use. (3) A mobile device (such as a laptop computer) may also be used for the...

  12. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... protection. Information not classified as Restricted Data or National Security Information related to.... Information not classified as Restricted Data or National Security Information related to the transportation... container when not in use. (3) A mobile device (such as a laptop computer) may also be used for the...

  13. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... protection. Information not classified as Restricted Data or National Security Information related to.... Information not classified as Restricted Data or National Security Information related to the transportation... container when not in use. (3) A mobile device (such as a laptop computer) may also be used for the...

  14. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... protection. Information not classified as Restricted Data or National Security Information related to.... Information not classified as Restricted Data or National Security Information related to the transportation... container when not in use. (3) A mobile device (such as a laptop computer) may also be used for the...

  15. Personality as a risk factor for illicit opioid use and a protective factor for illicit opioid dependence.

    PubMed

    Zaaijer, Eline R; Bruijel, Jessica; Blanken, Peter; Hendriks, Vincent; Koeter, Maarten W J; Kreek, Mary Jeanne; Booij, Jan; Goudriaan, Anna E; van Ree, Jan M; van den Brink, Wim

    2014-12-01

    Most studies investigating the role of personality as a risk factor for the development of opioid dependence compare dependent opioid users with healthy controls who never used heroin. In order to understand the potential protective role of personality, it is crucial to compare illicit opioid users who never became dependent with dependent opioid users. This study aims to examine the role of personality as a risk factor for opioid use and as a protective factor for the development of opioid dependence. Comparing personality factors between three groups: (1) 161 never-dependent illicit opioid users who have been using illicit opioids but never became opioid dependent; (2) 402 dependent opioid users in methadone maintenance treatment or heroin-assisted treatment; and (3) 135 healthy controls who never used heroin. Personality was assessed with a short version of Cloninger's Temperament and Character Inventory. Never-dependent opioid users reported more Novelty Seeking and Harm Avoidance and less Self-Directedness and Cooperativeness than healthy controls and more Reward Dependence and Self-Directedness, and less Harm Avoidance than dependent opioid users. Furthermore, never-dependent opioid users reported more Self-Transcendence than both dependent opioid users and healthy controls. Never-dependent opioid users may have started to use opioids partly due to their tendency to seek novel and/or spiritual experiences (high Novelty Seeking, high Self-Transcendence) and their tendency to avoid aversive stimuli (high Harm Avoidance), whereas they may have been protected against the development of dependence by their need for social approval (high Reward Dependence) and their self-efficacy (high Self-Directedness). Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  16. A Study of Personal Information Management Strategies for Online Faculty

    ERIC Educational Resources Information Center

    Kearns, Lorna R.; Frey, Barbara A.; Tomer, Christinger; Alman, Susan

    2014-01-01

    The literature suggests that personal information management is a serious challenge for many computer users. Online faculty are especially challenged because of the large number of electronic files necessitated by teaching online. Those who have experience in this environment may offer valuable insights regarding information management challenges…

  17. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Procedures for information concerning other persons. 1900.32 Section 1900.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA) Additional...

  18. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Procedures for information concerning other persons. 1900.32 Section 1900.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA) Additional...

  19. 75 FR 61412 - Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property (FFP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-05

    ... DEPARTMENT OF AGRICULTURE Forest Service Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property (FFP) Program Cooperative Agreements AGENCY: Forest Service, USDA... information collection, Federal Excess Personal Property (FEPP) and Firefighter Property (FFP) program...

  20. How information about other people's personal experiences can help with healthcare decision-making: a qualitative study.

    PubMed

    Entwistle, Vikki Ann; France, Emma F; Wyke, Sally; Jepson, Ruth; Hunt, Kate; Ziebland, Sue; Thompson, Andrew

    2011-12-01

    To investigate people's views of using 'general facts' and information about other people's 'personal experiences' for health-related decision-making. Sixty-two people, who between them had experience of five different focal health issues, participated in 12 focus groups and 9 interviews. Exploration of uses of the two types of information was supported by discussion of illustrative excerpts. There was less discussion of 'general facts'; participants thought it obvious that good decisions required these. Participants reported having used 'personal experiences' information to: recognise decisions that needed consideration; identify options; appraise options and make selections (including by developing and reflecting on their reasoning about possible choices); and support coping strategies. Their inclination to use 'personal experiences' information was apparently moderated by assessments of personal relevance, the motives of information providers and the 'balance' of experiences presented. People can use 'personal experiences' information in various ways to support their decision-making, and exercise some discrimination as they do. 'Personal experiences' information may help people in a number of ways in relation to decision-making. However, 'personal experiences' information does not replace the need for 'general facts' and care should be taken when it is used in resources for patients. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  1. Perception and personal protective measures toward mosquito bites by communities in Jaffna District, northern Sri Lanka.

    PubMed

    Surendran, S N; Kajatheepan, A

    2007-06-01

    Mosquito-borne diseases are of public health importance in war-torn northern Sri Lanka. The severity of mosquito bites and attitudes of the public toward mosquito problems were investigated using a structured questionnaire among communities in 3 administrative divisions in Jaffna District. One hundred fifty-four households were interviewed during this study. Sixty-four percent of the respondents reported that the mosquito problem was severe in their localities. Fifty-two percent stated that mosquito-biting activity was severe in the evening (1500 h-1900 h), 41% at night (after 1900 h), and 7% throughout the day. Severity of mosquito menace was found to have no association with type of house construction. Seventy-seven percent were able to name at least 1 disease transmitted by mosquitoes. Statistical analysis showed no association between education level and public awareness on mosquito-borne diseases. Nearly 88% were able to identify at least a breeding source of mosquitoes and most of them practice measures to eliminate suitable environments for mosquito breeding. Ninety-six percent used personal protective measures against mosquito bites during some seasons or throughout the year. Mosquito coils were the most commonly used personal protective method followed by bed nets. The monthly expenditure for personal protective measures varied from US$0.19 (LKR 20) to US$3.40 (LKR 350).

  2. 48 CFR 1503.104-5 - Disclosure, protection, and marking of contractor bid or proposal information and source...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Disclosure, protection, and... 1503.104-5 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 1503.104-5 Disclosure, protection, and...

  3. Putting the Focus Back on the Patient: How Privacy Concerns Affect Personal Health Information Sharing Intentions

    PubMed Central

    Sanders, G Lawrence

    2017-01-01

    Background Health care providers are driven by greater participation and systemic cost savings irrespective of benefits to individual patients derived from sharing Personal Health Information (PHI). Protecting PHI is a critical issue in the sharing of health care information systems; yet, there is very little literature examining the topic of sharing PHI electronically. A good overview of the regulatory, privacy, and societal barriers to sharing PHI can be found in the 2009 Health Information Technology for Economic and Clinical Health Act. Objective This study investigated the factors that influence individuals’ intentions to share their PHI electronically with health care providers, creating an understanding of how we can represent a patient’s interests more accurately in sharing settings, instead of treating patients like predetermined subjects. Unlike privacy concern and trust, patient activation is a stable trait that is not subject to change in the short term and, thus, is a useful factor in predicting sharing behavior. We apply the extended privacy model in the health information sharing context and adapt this model to include patient activation and issue involvement to predict individuals’ intentions. Methods This was a survey-based study with 1600+ participants using the Health Information National Trends Survey (HINTS) data to validate a model through various statistical techniques. The research method included an assessment of both the measurement and structural models with post hoc analysis. Results We find that privacy concern has the most influence on individuals’ intentions to share. Patient activation, issue involvement, and patient-physician relationship are significant predictors of sharing intention. We contribute to theory by introducing patient activation and issue involvement as proxies for personal interest factors in the health care context. Conclusions Overall, this study found that although patients are open to sharing their PHI

  4. Putting the Focus Back on the Patient: How Privacy Concerns Affect Personal Health Information Sharing Intentions.

    PubMed

    Abdelhamid, Mohamed; Gaia, Joana; Sanders, G Lawrence

    2017-09-13

    Health care providers are driven by greater participation and systemic cost savings irrespective of benefits to individual patients derived from sharing Personal Health Information (PHI). Protecting PHI is a critical issue in the sharing of health care information systems; yet, there is very little literature examining the topic of sharing PHI electronically. A good overview of the regulatory, privacy, and societal barriers to sharing PHI can be found in the 2009 Health Information Technology for Economic and Clinical Health Act. This study investigated the factors that influence individuals' intentions to share their PHI electronically with health care providers, creating an understanding of how we can represent a patient's interests more accurately in sharing settings, instead of treating patients like predetermined subjects. Unlike privacy concern and trust, patient activation is a stable trait that is not subject to change in the short term and, thus, is a useful factor in predicting sharing behavior. We apply the extended privacy model in the health information sharing context and adapt this model to include patient activation and issue involvement to predict individuals' intentions. This was a survey-based study with 1600+ participants using the Health Information National Trends Survey (HINTS) data to validate a model through various statistical techniques. The research method included an assessment of both the measurement and structural models with post hoc analysis. We find that privacy concern has the most influence on individuals' intentions to share. Patient activation, issue involvement, and patient-physician relationship are significant predictors of sharing intention. We contribute to theory by introducing patient activation and issue involvement as proxies for personal interest factors in the health care context. Overall, this study found that although patients are open to sharing their PHI, they still have concerns over the privacy of their PHI

  5. 77 FR 36290 - Renewal of Approved Information Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-18

    ... information that is necessary to implement two provisions of the Federal Cave Resources Protection Act--one.... Persons who use a telecommunication device for the deaf (TDD) may call the Federal Information Relay... Cave Resources Protection Act (16 U.S.C. 4301-4310). Frequency of Collection: On occasion. Estimated...

  6. 78 FR 29375 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ...), Office of Infrastructure Protection (IP), Infrastructure Information Collection Division (IICD... Forrest DHS/NPPD/IP/PCII, [email protected] . SUPPLEMENTARY INFORMATION: The PCII Program was... administered by DHS/ NPPD/IP/IICD. The PCII Program is responsible for ensuring compliance with the Regulation...

  7. 78 FR 73817 - Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property (FFP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... DEPARTMENT OF AGRICULTURE Forest Service Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property (FFP) Program Cooperative Agreements and Inventory AGENCY: Forest... on the revision of the currently approved information collection, Federal Excess Personal Property...

  8. 75 FR 9860 - Release, Handling, and Protection of Restricted Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-04

    ... (FAR) Supplement (NFS) to clarify the policy and procedures regarding the release of [email protected] SUPPLEMENTARY INFORMATION: A. Background Currently the NFS addresses the release of contractors' sensitive information and access to sensitive information in NFS Part 1837, Service Contracting...

  9. Comparison of Thermal Manikin Modeling and Human Subjects' Response During Use of Cooling Devices Under Personal Protective Ensembles in the Heat.

    PubMed

    Quinn, Tyler; Kim, Jung-Hyun; Seo, Yongsuk; Coca, Aitor

    2018-06-01

    IntroductionPersonal protective equipment (PPE) recommended for use in West Africa during the Ebola outbreak increased risk for heat illness, and countermeasures addressing this issue would be valuable.Hypothesis/ProblemThe purpose of this study was to examine the physiological impact and heat perception of four different personal cooling devices (PCDs) under impermeable PPE during low-intensity exercise in a hot and humid environment using thermal manikin modeling and human testing. Six healthy male subjects walked on a treadmill in a hot/humid environment (32°C/92% relative humidity [RH]) at three metabolic equivalents (METs) for 60 minutes wearing PPE recommended for use in West Africa and one of four different personal cooling devices (PCDs; PCD1, PCD2, PCD3, and PCD4) or no PCD for control (CON). The same ensembles were tested with thermal manikin modeling software in the same conditions to compare the results. All PCDs seemed to reduce physiological heat stress characteristics when worn under PPE compared to CON. Both the manikin and human testing provided similar results in core temperature (Tc) and heat sensation (HS) in both magnitude and relationship. While the manikin and human data provided similar skin temperature (Tsk) characterization, Tsk estimation by the manikin seemed to be slightly over-estimated. Weight loss, as estimated by the manikin, was under-estimated compared to the human measurement. Personal cooling device use in conjunction with impermeable PPE may be advantageous in mitigating physiological and perceptual burdens of heat stress. Evaluation of PCDs worn under PPE can be done effectively via human or manikin testing; however, Tsk may be over-estimated and weight loss may be under-estimated. Thermal manikin testing of PCDs may provide fast and accurate information to persons recommending or using PCDs with PPE. QuinnT, KimJH, SeoY, CocaA. Comparison of thermal manikin modeling and human subjects' response during use of cooling devices

  10. Control and prevention of healthcare-associated tuberculosis: the role of respiratory isolation and personal respiratory protection.

    PubMed

    Humphreys, H

    2007-05-01

    Although the prevalence of tuberculosis continues to decline in most developed countries, the risk of healthcare-associated tuberculosis, remains for patients or healthcare staff. Outbreaks of healthcare-associated tuberculosis are usually associated with delays in diagnosis and treatment, or the care of patients in sub-optimal facilities. The control and prevention of tuberculosis in hospitals is best achieved by three approaches, namely administrative (early investigation diagnosis, etc.), engineering (physical facilities e.g. ventilated isolation rooms) and personal respiratory protection (face sealing masks which are filtered). Recent guidelines on the prevention of tuberculosis in healthcare facilities from Europe and the USA have many common themes. In the UK, however, negative pressure isolation rooms are recommended only for patients with suspected multi-drug resistant TB and personal respiratory protection, i.e. filtered masks, are not considered necessary unless multi-drug resistant TB is suspected, or where aerosol-generating procedures are likely. In the US, the standard of care for patients with infectious tuberculosis is a negative pressure ventilated room and the use of personal respiratory protection for all healthcare workers entering the room of a patient with suspected or confirmed tuberculosis. The absence of clinical trials in this area precludes dogmatic recommendations. Nonetheless, observational studies and mathematical modelling suggest that all measures are required for effective prevention. Even when policies and facilities are optimal, there is a need to regularly review and audit these as sometimes compliance is less than optimal. The differences in recommendations may reflect the variations in epidemiology and the greater use of BCG vaccination in the UK compared with the United States. There is a strong argument for advising ventilated facilities and personal respiratory protection for the care of all patients with tuberculosis, as

  11. Towards Socially-Responsible Management of Personal Information in Social Networks

    NASA Astrophysics Data System (ADS)

    Morin, Jean-Henry

    Considering the increasing number of Personal Information (PI) used and shared in our now common social networked interactions, privacy issues, retention and how such information are manages have become important. Most approaches rely on one-way disclaimers and policies, often complex, hard to find and lacking ease of understanding for ordinary users of such common networks. Thus leaving little room for users to actually retain any control how the released information is actually used and managed once it has been put online. Additionally, personal information (PI) may include digital artifacts and contributions for which people would legitimately like to retain some rights over their use and their lifetime. Of particular interest in this category is the notion of the "right to forget" we no longer have control over, given the persistent nature of the Internet and its ability to retain information forever. This paper examines this issue from the point of view of the user and social responsibility, arguing for the need to augment information with an additional set of metadata about its usage and management. We discuss the use of DRM technologies in this context as a possible direction.

  12. 77 FR 26776 - Agency Information Collection Activities: Declaration of Persons Who Performed Repairs or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Agency Information Collection... Protection, Department of Homeland Security. ACTION: 30-Day notice and request for comments; Extension of an existing information collection. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of...

  13. 77 FR 35700 - Protected Critical Infrastructure Information (PCII) Program Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ... Information (PCII) Program Survey AGENCY: National Protection and Programs Directorate, DHS. ACTION: 60-day... its training programs. The information collected by this survey serves this purpose. The survey data... Information (PCII) Program Survey. OMB Number: 1670-0012. Frequency: Annually. Affected Public: Federal, state...

  14. 76 FR 17935 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... Infrastructure Protection (IP) will submit the following Information Collection Request to the Office of... questions about this Information Collection Request should be forwarded to DHS/NPPD/IP, Attn: Emily R... PCII Program is administered by IP's Infrastructure Information Collection Division (IICD). The PCII...

  15. Information bias in contingent valuation: effects of personal relevance, quality of information, and motivational orientation

    Treesearch

    Icek Ajzen; Thomas C. Brown; Lori H. Rosenthal

    1996-01-01

    A laboratory experiment examined the potential for information bias in contingent valuation (CV). Consistent with the view that information about a public or private good can function as a persuasive communication, willingness to pay (WTP) was found to increase with the quality of arguments used to describe the good, especially under conditions of high personal...

  16. Personalizing Information Retrieval Using Task Features, Topic Knowledge, and Task Products

    ERIC Educational Resources Information Center

    Liu, Jingjing

    2010-01-01

    Personalization of information retrieval tailors search towards individual users to meet their particular information needs by taking into account information about users and their contexts, often through implicit sources of evidence such as user behaviors and contextual factors. The current study looks particularly at users' dwelling behavior,…

  17. Personalized health care system with virtual reality rehabilitation and appropriate information for seniors.

    PubMed

    Gachet Páez, Diego; Aparicio, Fernando; de Buenaga, Manuel; Padrón, Víctor

    2012-01-01

    The concept of the information society is now a common one, as opposed to the industrial society that dominated the economy during the last years. It is assumed that all sectors should have access to information and reap its benefits. Elderly people are, in this respect, a major challenge, due to their lack of interest in technological progress and their lack of knowledge regarding the potential benefits that information society technologies might have on their lives. The Naviga Project (An Open and Adaptable Platform for the Elderly and Persons with Disability to Access the Information Society) is a European effort, whose main goal is to design and develop a technological platform allowing elder people and persons with disability to access the internet and the information society. Naviga also allows the creation of services targeted to social networks, mind training and personalized health care. In this paper we focus on the health care and information services designed on the project, the technological platform developed and details of two representative elements, the virtual reality hand rehabilitation and the health information intelligent system.

  18. Personalized Health Care System with Virtual Reality Rehabilitation and Appropriate Information for Seniors

    PubMed Central

    Páez, Diego Gachet; Aparicio, Fernando; de Buenaga, Manuel; Padrón, Víctor

    2012-01-01

    The concept of the information society is now a common one, as opposed to the industrial society that dominated the economy during the last years. It is assumed that all sectors should have access to information and reap its benefits. Elderly people are, in this respect, a major challenge, due to their lack of interest in technological progress and their lack of knowledge regarding the potential benefits that information society technologies might have on their lives. The Naviga Project (An Open and Adaptable Platform for the Elderly and Persons with Disability to Access the Information Society) is a European effort, whose main goal is to design and develop a technological platform allowing elder people and persons with disability to access the internet and the information society. Naviga also allows the creation of services targeted to social networks, mind training and personalized health care. In this paper we focus on the health care and information services designed on the project, the technological platform developed and details of two representative elements, the virtual reality hand rehabilitation and the health information intelligent system. PMID:22778598

  19. 45 CFR 164.520 - Notice of privacy practices for protected health information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.520 Notice of privacy practices for protected health information. (a) Standard... 45 Public Welfare 1 2014-10-01 2014-10-01 false Notice of privacy practices for protected health...

  20. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Amendment of protected health information. 164.526 Section 164.526 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164...

  1. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Amendment of protected health information. 164.526 Section 164.526 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164...

  2. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Amendment of protected health information. 164.526 Section 164.526 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164...

  3. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Amendment of protected health information. 164.526 Section 164.526 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164...

  4. Perceived patient control over personal health information in the presence of context-specific concerns

    NASA Astrophysics Data System (ADS)

    Nanayakkara, Prabhashi A.

    Information privacy issues have plagued the world of electronic media since its inception. This research focused mainly on factors that increase or decrease perceived patient control over personal health information (CTL) in the presence of context-specific concerns. Control agency theory was used for the paper's theoretical contributions. Personal and proxy control agencies acted as the independent variables, and context-specific concerns for information privacy (CFIP) were used as the moderator between proxy control agency, healthcare provider, and CTL. Demographic data and three control variables-- the desire for information control, privacy experience, and trust propensity--were also included in the model to gauge the contribution to CTL from external factors. Only personal control agency and desire for information control were found to impact CTL.

  5. Geographic Data as Personal Data in Four EU Member States

    NASA Astrophysics Data System (ADS)

    de Jong, A. J.; van Loenen, B.; Zevenbergen, J. A.

    2016-06-01

    The EU Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data aims at harmonising data protection legislation in the European Union. This should promote the free flow of products and services within the EU. This research found a wide variety of interpretations of the application of data protection legislation to geographic data. The variety was found among the different EU Member States, the different stakeholders and the different types of geographic data. In the Netherlands, the Data Protection Authority (DPA) states that panoramic images of streets are considered personal data. While Dutch case law judges that the data protection legislation does not apply if certain features are blurred and no link to an address is provided. The topographic datasets studied in the case studies do not contain personal data, according to the Dutch DPA, while the German DPA and the Belgian DPA judge that topographic maps of a large scale can contain personal data, and impose conditions on the processing of topographic maps. The UK DPA does consider this data outside of the scope of legal definition of personal data. The patchwork of differences in data protection legislation can be harmonised by using a traffic light model. This model focuses on the context in which the processing of the data takes place and has four categories of data: (1) sensitive personal data, (2) personal data, (3), data that can possibly lead to identification, and (4) non-personal data. For some geographic data, for example factual data that does not reveal sensitive information about a person, can be categorised in the third category giving room to opening up data under the INSPIRE Directive.

  6. The Adult Personality Functioning Assessment (APFA): factors influencing agreement between subject and informant.

    PubMed

    Hill, J; Fudge, H; Harrington, R; Pickles, A; Rutter, M

    1995-03-01

    The Adult Personality Functioning Assessment (APFA) provides ratings of interpersonal and social role performance in six domains over substantial periods of time. Ratings based on subject and informant accounts using the APFA were compared. There was good agreement for estimates of levels of dysfunction, and moderate agreement for type of dysfunction. An anticipated under-reporting of difficulties by subjects was not found. The extent of personality dysfunction was predictive of whether a close informant was available; however, closeness of informant was not consistently associated with subject-informant agreement.

  7. Dissemination of Information in Developing Countries: The Personal Computer and beyond

    ERIC Educational Resources Information Center

    Wong, Wai-Man

    2005-01-01

    With the blooming of information in digital format, dissemination of information is becoming a big challenge for developing countries. It is not only due to the limited provision of personal computers--in addition, the technological infrastructure and the ability to access information are also becoming major concerns in developing countries. This…

  8. Information security governance: a risk assessment approach to health information systems protection.

    PubMed

    Williams, Patricia A H

    2013-01-01

    It is no small task to manage the protection of healthcare data and healthcare information systems. In an environment that is demanding adaptation to change for all information collection, storage and retrieval systems, including those for of e-health and information systems, it is imperative that good information security governance is in place. This includes understanding and meeting legislative and regulatory requirements. This chapter provides three models to educate and guide organisations in this complex area, and to simplify the process of information security governance and ensure appropriate and effective measures are put in place. The approach is risk based, adapted and contextualized for healthcare. In addition, specific considerations of the impact of cloud services, secondary use of data, big data and mobile health are discussed.

  9. 32 CFR 806b.10 - How to collect personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false How to collect personal information. 806b.10 Section 806b.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... parties when: (a) You must verify information. (b) You want opinions or evaluations. (c) You can't contact...

  10. 32 CFR 806b.10 - How to collect personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false How to collect personal information. 806b.10 Section 806b.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... parties when: (a) You must verify information. (b) You want opinions or evaluations. (c) You can't contact...

  11. 78 FR 20900 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-08

    ....gov , including any personal information provided. Sensitive personal information, such as account... and empowerment programs, and practices that can improve financial decision-making skills and outcomes... BUREAU OF CONSUMER FINANCIAL PROTECTION [Docket No. CFPB-2013-0007] Agency Information Collection...

  12. 78 FR 4873 - Electrical Protective Equipment Standard and the Electric Power Generation, Transmission, and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-23

    ..., personal protective equipment, insulating and shielding materials, and insulated tools for working on or...] Electrical Protective Equipment Standard and the Electric Power Generation, Transmission, and Distribution... the information collection requirements specified in its standards on Electrical Protective Equipment...

  13. Advance Directives as Support of Autonomy for Persons with Dementia? A Pilot Study among Persons with Dementia and Their Informal Caregivers.

    PubMed

    Schmidhuber, Martina; Haeupler, Sandra; Marinova-Schmidt, Velislava; Frewer, Andreas; Kolominsky-Rabas, Peter L

    2017-01-01

    Advance directives could be an important instrument to support a person's will once he/she is not able to consent anymore - if composed competently. A survey was conducted to identify the level of knowledge concerning possibilities and limits of advance directives. The study was conducted as part of the Bavarian Dementia Survey (BayDem). Data were collected from January 2014 to December 2015 by structured face-to-face interviews. Study participants were persons with dementia and their informal caregivers ( n = 74). In total, 66% reported having written an advance directive. Concerning the participants' knowledge about possibilities and limitations of advance directives, a lack of knowledge was noted about the possibility to revoke an advance directive. Furthermore, 70% of informal caregivers and 56% of persons with dementia were not aware of the possibility to include dementia-specific terms in the advance directive. It is necessary to optimize structures for public information and education concerning the topic of advance directives for persons with dementia.

  14. Relationships: empirical contribution. Understanding personality pathology in adolescents: the five factor model of personality and social information processing.

    PubMed

    Hessels, Christel; van den Hanenberg, Danique; de Castro, Bram Orobio; van Aken, Marcel A G

    2014-02-01

    This study seeks to integrate two research traditions that lie at the base of the understanding of personality pathology in adolescents. The first research tradition refers to normal personality according to the Five Factor Model (FFM). The second tradition specifies the key feature of personality disorder as the capacity to mentalize, which can be reflected in Social Information Processing (SIP). In a clinical sample of 96 adolescents, the authors investigated response generation, coping strategy, and memories of past frustrating experiences as part of SIP, as mediator in the relationship between personality and personality pathology, and a possible moderating role of personality on the relationship between SIP and personality pathology. The hypothesized mediation, by which the effects of personality dimensions on personality pathology was expected to be mediated by SIP variables, was found only for the effect of Neuroticism, most specifically on BPD, which appeared to be mediated by memories the patients had about past frustrating conflict situations with peers. Some moderating effects of personality on the relationship between SIP variables and personality pathology were found, suggesting that high Agreeableness and sometimes low Neuroticism can buffer this relationship. These results suggest that personality dimensions and social cognitions both independently and together play a role in adolescents' personality pathology.

  15. Policies to protect persons with dementia in assisted living: déjà vu all over again?

    PubMed

    Kaskie, Brian P; Nattinger, Matthew; Potter, Andrew

    2015-04-01

    Continued growth in the number of individuals with dementia residing in assisted living (AL) raises concerns about their safety and protection. In this Forum, we review current AL practices relevant to residents with dementia and present a rationale for examining the government role in protecting these individuals within this context. Since public oversight of AL is currently a state prerogative, we assess states' regulatory activity across 3 domains closely related to safety and protection of persons with dementia: environmental features, staffing, and use of chemical restraints. We then step back to consider the state policymaking environment and assess the feasibility of developing a minimum standard of regulations from one state to the next. This Forum concludes with a historical comparison between the contemporary AL market and the nursing home care market prior to the Nursing Home Reform Act of 1987, and we discuss how an increased amount of federal interest could improve existing state efforts to protect persons with dementia residing in AL. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  16. Information barrier technology applied to less restrictive environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacArthur, D. W.; Langner, D. C.; Hypes, P. A.

    2004-01-01

    The information barrier is an important part of any system that allows inspector verification of declared classified materials. In this context, the information barrier must protect classified information while allowing the inspectors to reach correct and independent conclusions concerning the veracity of the declaration. Although other applications may not involve national security, information barrier techniques can still be used to protect information considered sensitive by individuals, commercial entities, or national organizations. Other potential areas of application include homeland security and airport screening, personal information disclosed by modern scanning techniques, nuclear information not considered classified but still sensitive, and industrial secretmore » information that could be compromised during 3rd party acceptance testing. Modern personnel screening devices are limited more by their potential for release of personal information than by technology. Screening systems that could be used in airports and other sensitive areas are often not utilized because the same system that can show the details of weapons carried on a person's body can also reveal potentially embarrassing and sensitive details of the body itself. Much other nuclear information, as well as industrially secret information, while not actually classified, is not appropriate for widespread dissemination. In both cases an inspector may need to verify elements of the manufacturer's or owner's claims, but at the same time not disclose sensitive information to either the inspector or the general public. Thus, information barrier technology, although originally developed for protection of nuclear weapons information, is also directly usable in a number of counter-terrorism and nonproliferation applications. Although these applications may not (or may) require the same level of rigor as the original application to classified items, many of the same techniques can be used in

  17. 75 FR 82041 - Notice of Proposed Information Collection: Comment Request; Floodplain Management and Protection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ... Information Collection: Comment Request; Floodplain Management and Protection of Wetlands AGENCY: Office of... following information: Title of Proposal: Floodplain Management and Protection of Wetlands. OMB Control... Executive Order 11990, ``Protection of Wetlands.'' Each respondent that proposes to use HUD assistance to...

  18. 48 CFR 3028.106-6 - Furnishing information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Furnishing information... Financial Protections 3028.106-6 Furnishing information. (b) The contracting officer shall, upon request... suppliers. When furnishing surety information, the inquirer may also be informed that: (1) Persons believing...

  19. Use of remote video auditing to validate Ebola level II personal protective equipment competency.

    PubMed

    Allar, Peter J; Frank-Cooper, Madalyn

    2015-06-01

    Faced with an Ebola-related mandate to regularly train frontline hospital staff with the donning and doffing of personal protective equipment, a community hospital's emergency department implemented remote video auditing (RVA) to assist in the training and remediation of its nursing staff. RVA was found to be useful in assessing performance and facilitating remediation. Copyright 2015, SLACK Incorporated.

  20. Money makes you reveal more: consequences of monetary cues on preferential disclosure of personal information

    PubMed Central

    Mukherjee, Sumitava; Manjaly, Jaison A.; Nargundkar, Maithilee

    2013-01-01

    With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure. PMID:24273524

  1. Money makes you reveal more: consequences of monetary cues on preferential disclosure of personal information.

    PubMed

    Mukherjee, Sumitava; Manjaly, Jaison A; Nargundkar, Maithilee

    2013-01-01

    With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure.

  2. Protecting posted genes: social networking and the limits of GINA.

    PubMed

    Soo-Jin Lee, Sandra; Borgelt, Emily

    2014-01-01

    The combination of decreased genotyping costs and prolific social media use is fueling a personal genetic testing industry in which consumers purchase and interact with genetic risk information online. Consumers and their genetic risk profiles are protected in some respects by the 2008 federal Genetic Information Nondiscrimination Act (GINA), which forbids the discriminatory use of genetic information by employers and health insurers; however, practical and technical limitations undermine its enforceability, given the everyday practices of online social networking and its impact on the workplace. In the Web 2.0 era, employers in most states can legally search about job candidates and employees online, probing social networking sites for personal information that might bear on hiring and employment decisions. We examine GINA's protections for online sharing of genetic information as well as its limitations, and propose policy recommendations to address current gaps that leave employees' genetic information vulnerable in a Web-based world.

  3. Library workers' personal beliefs about childhood vaccination and vaccination information provision.

    PubMed

    Keselman, Alla; Smith, Catherine Arnott; Hundal, Savreen

    2014-07-01

    This is a report on the impact of library workers' personal beliefs on provision of vaccination information. Nine public librarians were interviewed about a hypothetical scenario involving a patron who is concerned about possible vaccination-autism connections. The analysis employed thematic coding. Results suggested that while most participants supported childhood vaccination, tension between their personal views and neutrality impacted their ability to conduct the interaction. The neutrality stance, though consonant with professional guidelines, curtails librarians' ability to provide accurate health information. Outreach and communication between public and health sciences libraries can help librarians provide resources to address health controversies.

  4. Library workers' personal beliefs about childhood vaccination and vaccination information provision*

    PubMed Central

    Keselman, Alla; Smith, Catherine Arnott; Hundal, Savreen

    2014-01-01

    This is a report on the impact of library workers' personal beliefs on provision of vaccination information. Nine public librarians were interviewed about a hypothetical scenario involving a patron who is concerned about possible vaccination-autism connections. The analysis employed thematic coding. Results suggested that while most participants supported childhood vaccination, tension between their personal views and neutrality impacted their ability to conduct the interaction. The neutrality stance, though consonant with professional guidelines, curtails librarians' ability to provide accurate health information. Outreach and communication between public and health sciences libraries can help librarians provide resources to address health controversies. PMID:25031563

  5. 34 CFR 300.123 - Confidentiality of personally identifiable information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... THE EDUCATION OF CHILDREN WITH DISABILITIES State Eligibility Additional Eligibility Requirements... 34 Education 2 2010-07-01 2010-07-01 false Confidentiality of personally identifiable information. 300.123 Section 300.123 Education Regulations of the Offices of the Department of Education (Continued...

  6. 34 CFR 300.123 - Confidentiality of personally identifiable information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... THE EDUCATION OF CHILDREN WITH DISABILITIES State Eligibility Additional Eligibility Requirements... 34 Education 2 2011-07-01 2010-07-01 true Confidentiality of personally identifiable information. 300.123 Section 300.123 Education Regulations of the Offices of the Department of Education (Continued...

  7. The public health information infrastructure. A national review of the law on health information privacy.

    PubMed

    Gostin, L O; Lazzarini, Z; Neslund, V S; Osterholm, M T

    1996-06-26

    Our objectives were to review and analyze the laws in the 50 states, the District of Columbia, and Puerto Rico that regulate the acquisition, storage, and use of public health data and to offer proposals for reform of the laws on public health information privacy. Virtually all states reported some statutory protection for governmentally maintained health data for public health information in general (49 states), communicable diseases (42 states), and sexually transmitted diseases (43 states). State statutes permitted disclosure of data for statistical purposes (42 states), contact tracing (39 states), epidemiologic investigations (22 states), and subpoena or court order (14 states). The survey revealed significant problems that affect both the development of fair and effective public health information systems and the protection of privacy. Statutes may be silent about the degree of privacy protection afforded, confer weaker privacy protection to certain kinds of information, or grant health officials broad discretion to disseminate personal information. Our proposals for law reform are based on a meeting of experts at the Carter Presidential Center under the auspices of the Centers for Disease Control and Prevention and the Council of State and Territorial Epidemiologists: (1) an independent data protection commission should be established, (2) health authorities should justify the collection of personally identifiable information, (3) subjects should be given basic information about data practices, (4) data should be held and used in accordance with fair information practices, (5) legally binding privacy and security assurances should attach to identifiable health information with significant penalties for breach of these assurances, (6) disclosure of data should be made only for purposes consistent with the original collection, and (7) secondary uses beyond those originally intended by the data collector should be permitted only with informed consent.

  8. 78 FR 26101 - Advisory Committee for Aviation Consumer Protection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-03

    ... and enforcement initiatives affecting consumer protection in air travel. The meeting will also address privacy of personally identifiable information collected in connection with the purchase of air travel from airlines and travel agents. Issues to be addressed are: what information is collected and by whom...

  9. Rapid detection of person information in a naturalistic scene.

    PubMed

    Fletcher-Watson, Sue; Findlay, John M; Leekam, Susan R; Benson, Valerie

    2008-01-01

    A preferential-looking paradigm was used to investigate how gaze is distributed in naturalistic scenes. Two scenes were presented side by side: one contained a single person (person-present) and one did not (person-absent). Eye movements were recorded, the principal measures being the time spent looking at each region of the scenes, and the latency and location of the first fixation within each trial. We studied gaze patterns during free viewing, and also in a task requiring gender discrimination of the human figure depicted. Results indicated a strong bias towards looking to the person-present scene. This bias was present on the first fixation after image presentation, confirming previous findings of ultra-rapid processing of complex information. Faces attracted disproportionately many fixations, the preference emerging in the first fixation and becoming stronger in the following ones. These biases were exaggerated in the gender-discrimination task. A tendency to look at the object being fixated by the person in the scene was shown to be strongest at a slightly later point in the gaze sequence. We conclude that human bodies and faces are subject to special perceptual processing when presented as part of a naturalistic scene.

  10. Medical students and personal smartphones in the clinical environment: the impact on confidentiality of personal health information and professionalism.

    PubMed

    Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C

    2014-05-22

    Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students' use of personal smartphones for clinical work. The intent of the study was to examine final-year medical students' experience with and attitudes toward using personal mobile technology in the clinical environment, with respect to the perceived impact on patient confidentiality and provider professionalism. Cross-sectional surveys were completed by final-year medical students at the University of Toronto. Respondents were asked about the type of personal mobile phone they use, security features on their personal phone, experiences using their personal phone during clinical rotations, and attitudes about using their personal phone for clinical work purposes. The overall response rate was 45.4% (99/218). Smartphone ownership was prevalent (98%, 97/99) with the majority (86%, 85/99) of participants using their personal phones for patient-related communication during clinical rotations. A total of 26% (26/99) of participants reported not having any type of security feature on their personal phone, 94% (90/96) of participants agreed that using their personal phone for clinical work makes them more efficient, and 86% (82/95) agreed that their personal phone allows them to provide better patient care. Although 68% (65/95) of participants believe that the use of personal phones for patient-related communication with colleagues poses a risk to the privacy and confidentiality of patient health information, 22% (21/96) of participants still use their personal phone to text or email identifiable patient data to colleagues. Our findings suggest that the use of personal smartphones for clinical work by medical students is prevalent. There is a need to more fully address

  11. Critical Infrastructure Protection II, The International Federation for Information Processing, Volume 290.

    NASA Astrophysics Data System (ADS)

    Papa, Mauricio; Shenoi, Sujeet

    The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

  12. 78 FR 60874 - National Institute for Occupational Safety and Health Personal Protective Technology Program and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-02

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention [CDC-2013-0015... extension of comment period. SUMMARY: On August 14, 2013, the Director of the National Institute for... September 17, 2013 to provide (1) a summary of the work conducted by the NIOSH Personal Protective...

  13. The Need for a Privacy Standard for Medical Devices That Transmit Protected Health Information Used in the Precision Medicine Initiative for Diabetes and Other Diseases.

    PubMed

    Klonoff, David C; Price, W Nicholson

    2017-03-01

    Privacy is an important concern for the Precision Medicine Initiative (PMI) because success of this initiative will require the public to be willing to participate by contributing large amounts of genetic/genomic information and sensor data. This sensitive personal information is intended to be used only for specified research purposes. Public willingness to participate will depend on the public's level of trust that their information will be protected and kept private. Medical devices may constantly provide information. Therefore, assuring privacy for device-generated information may be essential for broad participation in the PMI. Privacy standards for devices should be an important early step in the development of the PMI.

  14. Protecting quantum Fisher information in curved space-time

    NASA Astrophysics Data System (ADS)

    Huang, Zhiming

    2018-03-01

    In this work, we investigate the quantum Fisher information (QFI) dynamics of a two-level atom interacting with quantized conformally coupled massless scalar fields in de Sitter-invariant vacuum. We first derive the master equation that governs its evolution. It is found that the QFI decays with evolution time. Furthermore, we propose two schemes to protect QFI by employing prior weak measurement (WM) and post measurement reversal (MR). We find that the first scheme can not always protect QFI and the second scheme has prominent advantage over the first scheme.

  15. Personal Malpractice Liability of Reference Librarians and Information Brokers.

    ERIC Educational Resources Information Center

    Gray, John A.

    1988-01-01

    Reviews common law contract and tort bases for malpractice liability and their applicability to reference librarians, special librarians, and information brokers. The discussion covers the legal bases for professional malpractice liability, the librarian-patron relationship, the likelihood of lawsuits, and the need for personal liability…

  16. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...'s Privacy Act request and corresponding Army actions be included in the individual's military... the information is filed and retrieved by the constituent's name or personal identifier. The said... child's rights of access under this part, unless the records were created or maintained pursuant to...

  17. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...'s Privacy Act request and corresponding Army actions be included in the individual's military... the information is filed and retrieved by the constituent's name or personal identifier. The said... child's rights of access under this part, unless the records were created or maintained pursuant to...

  18. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...'s Privacy Act request and corresponding Army actions be included in the individual's military... the information is filed and retrieved by the constituent's name or personal identifier. The said... child's rights of access under this part, unless the records were created or maintained pursuant to...

  19. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...'s Privacy Act request and corresponding Army actions be included in the individual's military... the information is filed and retrieved by the constituent's name or personal identifier. The said... child's rights of access under this part, unless the records were created or maintained pursuant to...

  20. Enhancing privacy and data protection in electronic medical environments.

    PubMed

    Gritzalis, Stefanos

    2004-12-01

    Raising awareness and providing guidance to on-line data protection is by all means a crucial issue worldwide. Equally important is the issue of applying privacy-related legislation in a coherent and coordinated way. Both these topics become even more critical when referring to medical environments and thus to the protection of patients' privacy and medical data. Electronic medical transactions require the transmission of personal and medical information over insecure communication channels like the Internet. It is therefore a rather straightforward task to construct "patient profiles " that capture the electronic medical behavior of a patient, or even reveal sensitive information in regard with her/his medical history. Clearly, the consequence from maintaining such profiles is the violation of the patient's privacy. This paper studies medical environments that can support electronic medical transactions or/and the provision of medical information through the Web. Specifically it focuses on the countermeasures that the various actor categories can employ for protecting the privacy of personal and medical data transmitted during electronic medical transactions.

  1. Factors Surgical Team Members Perceive Influence Choices of Wearing or Not Wearing Personal Protective Equipment during Operative/Invasive Procedures

    ERIC Educational Resources Information Center

    Cuming, Richard G.

    2009-01-01

    Exposure to certain bloodborne pathogens can prematurely end a person's life. Healthcare workers (HCWs), especially those who are members of surgical teams, are at increased risk of exposure to these pathogens. The proper use of personal protective equipment (PPE) during operative/invasive procedures reduces that risk. Despite this, some HCWs fail…

  2. Theft of information in the take-grant protection model

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    Using the information transfer extensions to the Take-Grant Protection Model, the concept of theft of information is defined and necessary and sufficient conditions for such theft to occur are presented, as well as bounds on the number of actors involved in such theft. Finally, the application of these results to reference monitors are explored.

  3. 7 CFR 799.13 - Environmental information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Environmental information. 799.13 Section 799.13... AGRICULTURE ENVIRONMENTAL PROTECTION ENVIRONMENTAL QUALITY AND RELATED ENVIRONMENTAL CONCERNS-COMPLIANCE WITH THE NATIONAL ENVIRONMENTAL POLICY ACT § 799.13 Environmental information. Interested persons may...

  4. 7 CFR 799.13 - Environmental information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Environmental information. 799.13 Section 799.13... AGRICULTURE ENVIRONMENTAL PROTECTION ENVIRONMENTAL QUALITY AND RELATED ENVIRONMENTAL CONCERNS-COMPLIANCE WITH THE NATIONAL ENVIRONMENTAL POLICY ACT § 799.13 Environmental information. Interested persons may...

  5. 7 CFR 799.13 - Environmental information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Environmental information. 799.13 Section 799.13... AGRICULTURE ENVIRONMENTAL PROTECTION ENVIRONMENTAL QUALITY AND RELATED ENVIRONMENTAL CONCERNS-COMPLIANCE WITH THE NATIONAL ENVIRONMENTAL POLICY ACT § 799.13 Environmental information. Interested persons may...

  6. 7 CFR 799.13 - Environmental information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 7 2013-01-01 2013-01-01 false Environmental information. 799.13 Section 799.13... AGRICULTURE ENVIRONMENTAL PROTECTION ENVIRONMENTAL QUALITY AND RELATED ENVIRONMENTAL CONCERNS-COMPLIANCE WITH THE NATIONAL ENVIRONMENTAL POLICY ACT § 799.13 Environmental information. Interested persons may...

  7. 7 CFR 799.13 - Environmental information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Environmental information. 799.13 Section 799.13... AGRICULTURE ENVIRONMENTAL PROTECTION ENVIRONMENTAL QUALITY AND RELATED ENVIRONMENTAL CONCERNS-COMPLIANCE WITH THE NATIONAL ENVIRONMENTAL POLICY ACT § 799.13 Environmental information. Interested persons may...

  8. Aging: empirical contribution. A longitudinal analysis of personality disorder dimensions and personality traits in a community sample of older adults: perspectives from selves and informants.

    PubMed

    Cooper, Luke D; Balsis, Steve; Oltmanns, Thomas F

    2014-02-01

    Research has indicated that personality disorders (PDs) and normal-range personality traits generally "get better" with time, as evidenced by mean-level decreases in PD traits and mean-level increases in broad factors such as emotional stability, agreeableness, and conscientiousness. One limitation of many of these studies is their reliance on self reported data. In the current study, the authors analyzed the 2.5-year course of PD dimensions and normal personality traits in a representative sample of adults approaching later life (originally ages 55-65) by using a semistructured diagnostic interview as well as self- and informant-reported data from two personality inventories. Consistent with previous literature, many self-reported PD traits showed mean-level decreases over time, and self-reported normal-range personality traits generally showed positive aging effects (e.g., mean-level increases in emotional stability, agreeableness, and conscientiousness). Surprisingly, however, informant-reported PD traits often demonstrated small but significant increases over time, and informant-reported normal-range personality generally "worsened" with age (e.g., mean-level decreases in extraversion, agreeableness, and conscientiousness). Informant reports may challenge the finding that personality and PDs tend to "improve" over time.

  9. 15 CFR 325.16 - Protecting confidentiality of information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS...

  10. Informing the Design of Direct-to-Consumer Interactive Personal Genomics Reports.

    PubMed

    Shaer, Orit; Nov, Oded; Okerlund, Johanna; Balestra, Martina; Stowell, Elizabeth; Ascher, Laura; Bi, Joanna; Schlenker, Claire; Ball, Madeleine

    2015-06-12

    In recent years, people who sought direct-to-consumer genetic testing services have been increasingly confronted with an unprecedented amount of personal genomic information, which influences their decisions, emotional state, and well-being. However, these users of direct-to-consumer genetic services, who vary in their education and interests, frequently have little relevant experience or tools for understanding, reasoning about, and interacting with their personal genomic data. Online interactive techniques can play a central role in making personal genomic data useful for these users. We sought to (1) identify the needs of diverse users as they make sense of their personal genomic data, (2) consequently develop effective interactive visualizations of genomic trait data to address these users' needs, and (3) evaluate the effectiveness of the developed visualizations in facilitating comprehension. The first two user studies, conducted with 63 volunteers in the Personal Genome Project and with 36 personal genomic users who participated in a design workshop, respectively, employed surveys and interviews to identify the needs and expectations of diverse users. Building on the two initial studies, the third study was conducted with 730 Amazon Mechanical Turk users and employed a controlled experimental design to examine the effectiveness of different design interventions on user comprehension. The first two studies identified searching, comparing, sharing, and organizing data as fundamental to users' understanding of personal genomic data. The third study demonstrated that interactive and visual design interventions could improve the understandability of personal genomic reports for consumers. In particular, results showed that a new interactive bubble chart visualization designed for the study resulted in the highest comprehension scores, as well as the highest perceived comprehension scores. These scores were significantly higher than scores received using the

  11. The ethical framing of personalized medicine.

    PubMed

    Joly, Yann; Saulnier, Katie M; Osien, Gladys; Knoppers, Bartha M

    2014-10-01

    Personalized medicine encompasses the use of biological information such as genomics to provide tailored interventions for patients. The review explores the ethical, legal, and social issues that have emerged with personalized medicine and must be considered because of the complex nature of providing individualized care within a clinical setting. Recent studies found that the use of personalized medicine presents challenges in multiple areas: biobanking and informed consent, confidentiality, genetic discrimination, return of results, access to treatment, clinical translation, direct-to-consumer genetic testing, emerging duties, and knowledge mobilization. Although personalized medicine provides benefits in treating patients in a manner that is more suited to their genetic profile, there are challenges that must be discussed to ensure the protection and fair treatment of individuals. The issues concerning personalized medicine are widespread, and range from individual privacy to the stratification and discrimination of sub-populations based on ethnicity. These issues have considerable impact on the individual and society. A thorough exploration of these ethical issues may identify novel challenges as well as potential avenues for resolution.

  12. Plasticizer contamination of firefighter personal protective clothing--a potential factor in increased health risks in firefighters.

    PubMed

    Lacey, Steven; Alexander, Barbara M; Baxter, C Stuart

    2014-01-01

    Chemical exposures may be responsible for firefighters' elevated incidences of cancer and cardiovascular disease. This study characterized semivolatile chemical contamination on firefighter personal protective clothing to assess exposure of firefighters to these chemicals. Samples from used firefighter protective clothing, including gloves, hood, and one coat wristlet, were extracted with methylene chloride and analyzed by EPA method 8270 for semivolatile contaminants, including 20 polycyclic aromatic hydrocarbons (PAHs) and 6 phthalate diesters. Twenty-two of the chemicals of interest were found on at least one clothing swatch. Only di-(2-ethylhexyl) phthalate (DEHP), a plasticizer, added to polyvinyl chloride (PVC) to increase flexibility, was found on every swatch. DEHP concentrations were the highest of any chemical measured, and were 52 to 875 times higher than any PAH concentration measured. DEHP was also detected on most items of unused firefighter personal protective clothing, although at much lower levels. These findings suggest that firefighters are exposed to high levels of DEHP, a probable human carcinogen, and at levels much higher than PAHs, the semivolatile toxic combustion products most extensively studied historically. Firefighter exposure to DEHP and other phthalate diesters therefore merits further study.

  13. 76 FR 56781 - Notice of Proposed Information Collection: Comment Request, Protection and Enhancement of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-14

    ... Information Collection: Comment Request, Protection and Enhancement of Environmental Quality AGENCY: Office of... Federal Information Relay Service at 1-800-877- 8339. SUPPLEMENTARY INFORMATION: The Department will... accordance with HUD environmental regulations, 24 CFR part 50: ``Protection and Enhancement of Environmental...

  14. 'Balancing risk' after fall-induced hip fracture: the older person's need for information.

    PubMed

    McMillan, Laura; Booth, Joanne; Currie, Kay; Howe, Tracey

    2014-12-01

    Hip fracture is a significant cause of morbidity and mortality in older people. Healthcare professionals have a role to identify and respond to challenges and concerns that older people face as they strive to manage risk of future falls and rebuild confidence and independence after discharge. This study aimed to explore the postdischarge concerns of older people after fall-induced hip fracture. Glaser's approach to the grounded theory method guided qualitative interviews conducted with 19 older people in their own homes up to 3 months post discharge, in two health authority areas. A theory of 'taking control' was generated. 'Balancing risk' emerged as a key strategy that older people employed to help them to take control after discharge home. Older people attempted to control or 'balance' their risk of future falls and dependence by implementing two further strategies: 'protective guarding' and 'following orders'. The instinctive strategy of protective guarding and the learned strategy of following orders were implemented simultaneously and were characterised by older people aiming to pace their progress and balance risk safely and appropriately. To apply these strategies, older people required information from healthcare professionals. In circumstances where older people did not receive or did not understand the information provided, they were left 'grasping to understand' and were more likely to miscalculate risk. This leads to damaged confidence and in some cases further falls. The concept of balancing risk aims to help healthcare professionals understand the older person's perspective of hip fracture and to recognise the efforts that people make to guard against further injury and dependence in the early postdischarge period. © 2013 Blackwell Publishing Ltd.

  15. Exploring Healthcare Consumer Acceptance of Personal Health Information Management Technology through Personal Health Record Systems

    ERIC Educational Resources Information Center

    Wu, Huijuan

    2013-01-01

    Healthcare technologies are evolving from a practitioner-centric model to a patient-centric model due to the increasing need for technology that directly serves healthcare consumers, including healthy people and patients. Personal health information management (PHIM) technology is one of the technologies designed to enhance an individual's ability…

  16. Understanding views on everyday use of personal health information: Insights from community dwelling older adults.

    PubMed

    Hartzler, A L; Osterhage, K; Demiris, G; Phelan, E A; Thielke, S M; Turner, A M

    2018-09-01

    Older adults apply various strategies to pursue healthy aging, but we know little about their views and use of personal health information to accomplish those ends. As a first step in formulating the role of personal health information management (PHIM) in healthy aging, we explored the perspectives of older adults on health and health information used in their everyday lives through four focus groups with 25 community-dwelling adults aged 60 and over. We found that the concept of wellness-the holistic and multidimensional nature of health and wellbeing-plays prominently in how older adults think about health and health information. Participants expressed wellness from a position of personal strength, rather than health-related deficits, by focusing on wellness activities for staying healthy through: (1) personal health practices, (2) social network support, and (3) residential community engagement. Although these themes involve personal health information, existing PHIM systems that focus on disease management are generally not designed to support wellness activities. Substantial opportunity exists to fill this wellness support gap with innovative health information technology designed for older adults. Findings carry implications for the design of PHIM tools that support healthy aging and methods for engaging older adults as co-producers of this critical support.

  17. Advance Directives as Support of Autonomy for Persons with Dementia? A Pilot Study among Persons with Dementia and Their Informal Caregivers

    PubMed Central

    Schmidhuber, Martina; Haeupler, Sandra; Marinova-Schmidt, Velislava; Frewer, Andreas; Kolominsky-Rabas, Peter L.

    2017-01-01

    Background Advance directives could be an important instrument to support a person's will once he/she is not able to consent anymore – if composed competently. A survey was conducted to identify the level of knowledge concerning possibilities and limits of advance directives. Methods The study was conducted as part of the Bavarian Dementia Survey (BayDem). Data were collected from January 2014 to December 2015 by structured face-to-face interviews. Study participants were persons with dementia and their informal caregivers (n = 74). Results In total, 66% reported having written an advance directive. Concerning the participants' knowledge about possibilities and limitations of advance directives, a lack of knowledge was noted about the possibility to revoke an advance directive. Furthermore, 70% of informal caregivers and 56% of persons with dementia were not aware of the possibility to include dementia-specific terms in the advance directive. Conclusion It is necessary to optimize structures for public information and education concerning the topic of advance directives for persons with dementia. PMID:29118785

  18. Applying a health behavior theory to explore the influence of information and experience on arsenic risk representations, policy beliefs, and protective behavior.

    PubMed

    Severtson, Dolores J; Baumann, Linda C; Brown, Roger L

    2006-04-01

    The common sense model (CSM) shows how people process information to construct representations, or mental models, that guide responses to health threats. We applied the CSM to understand how people responded to information about arsenic-contaminated well water. Constructs included external information (arsenic level and information use), experience (perceived water quality and arsenic-related health effects), representations, safety judgments, opinions about policies to mitigate environmental arsenic, and protective behavior. Of 649 surveys mailed to private well users with arsenic levels exceeding the maximum contaminant level, 545 (84%) were analyzed. Structural equation modeling quantified CSM relationships. Both external information and experience had substantial effects on behavior. Participants who identified a water problem were more likely to reduce exposure to arsenic. However, about 60% perceived good water quality and 60% safe water. Participants with higher arsenic levels selected higher personal safety thresholds and 20% reported a lower arsenic level than indicated by their well test. These beliefs would support judgments of safe water. A variety of psychological and contextual factors may explain judgments of safe water when information suggested otherwise. Information use had an indirect effect on policy beliefs through understanding environmental causes of arsenic. People need concrete information about environmental risk at both personal and environmental-systems levels to promote a comprehensive understanding and response. The CSM explained responses to arsenic information and may have application to other environmental risks.

  19. A curriculum focused on informed empathy improves attitudes toward persons with disabilities.

    PubMed

    Miller, Sonya R

    2013-06-01

    Empathy is an important component of the provider-patient relationship. In the United States one in five persons has a disability. Persons with disabilities perceive gaps in health care providers' understanding of their health care preferences and needs. The purpose of this study was to use valid and reliable assessment methods to investigate the association between empathy and attitudes toward persons with disabilities and advocacy. An educational module was developed to enhance health care students' capacity for informed empathy. Pre- and post-assessment measures included the Attitude toward Disabled Persons scale (ATDP), the Attitudes toward Patient Advocacy Microsocial scale (AMIA) and the Interpersonal Reactivity Index (IRI). ATDP (t(94) = -5.95, p = .000) and AMIA (t(92) = -5.99, p = .000) scores increased significantly after the education module. Correlations between the pre- or post-module ATDP or AMIA scores and the IRI scores were not significant. Empathy in general may not be sufficient to ensure optimal attitudes toward persons with disabilities or advocacy in pre-health care professionals. However, a curriculum based on informed empathy and focused on the experiences of persons with disabilities can result in more positive attitudes toward and advocacy for people with disabilities.

  20. Personal Digital Information Archiving among Students of Social Sciences and Humanities

    ERIC Educational Resources Information Center

    Krtalic, Maja; Marcetic, Hana; Micunovic, Milijana

    2016-01-01

    Introduction: As both academic citizens and active participants in information society who use information, students produce huge amounts of personal digital data and documents. It is therefore important to raise questions about their awareness, responsibility, tendencies and activities they undertake to preserve their collective digital heritage.…

  1. Knowledge, attitude, and practice of Indonesian farmers regarding the use of personal protective equipment against pesticide exposure.

    PubMed

    Yuantari, Maria G C; Van Gestel, Cornelis A M; Van Straalen, Nico M; Widianarko, Budi; Sunoko, Henna R; Shobib, Muhammad N

    2015-03-01

    The use of synthetic pesticides in tropical countries has increased over the years, following the intensification of agriculture. However, awareness among farmers of the importance of protecting themselves from hazards associated with pesticide application is still lacking, especially in Indonesia. This paper reports results of an inventory on knowledge and attitudes regarding pesticide use by melon farmers of a village in Central Java, Indonesia. The importance of using personal protective equipment such as hats, masks, goggles, boots, and gloves on agricultural land is known and well understood by the farmers. However, in practice, only 3.8 % were wearing glasses and 1.9 % were using boots. In fact, the masks used only consisted of a part of their shirt tied around the mouth. The farmers were not wearing long pants and shirts with long sleeves and used the same clothes for more than 1 day without washing. Almost no farmers used personal protective equipment that was standard, in good condition, and complete. Based on the results of statistical analysis, no significant relationship was found between knowledge and attitude on the required practices on the one hand and the use of personal protective equipment in practice on the other hand. This shows that improved knowledge and attitudes are not enough to change the behavior of farmers to work in a healthy and safe way. The gap between knowledge and practice needs to be bridged by a more interactive and participatory training model. It is therefore of paramount importance to develop a special toolkit for pesticide risk reduction which is developed in a participatory manner involving the farmers as the main actors through a series of focus group discussions and field simulations.

  2. Privacy by design in personal health monitoring.

    PubMed

    Nordgren, Anders

    2015-06-01

    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted.

  3. [A guide to good practice for information security in the handling of personal health data by health personnel in ambulatory care facilities].

    PubMed

    Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel

    2014-04-01

    The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.

  4. Occupational sun protection: workplace culture, equipment provision and outdoor workers' characteristics.

    PubMed

    Reeder, Anthony I; Gray, Andrew; McCool, Judith P

    2013-01-01

    The aim of this study was to describe outdoor workers' sun-protective practices, workplace sun-safety culture and sun-protective equipment provision; investigate the association of demographic, personal and occupational factors with sun-protective practices; and identify potential strategies for improving workers' sun protection. The present study used a clustered survey design with randomly identified employers in nine occupations. Employees provided questionnaire measures of demographics, personal characteristics (skin type, skin cancer risk perceptions, tanning attitudes, sun-exposure knowledge), personal occupational sun protection practices (exposure reduction, use of sun-protective clothing, sunscreen and shade), workplace sun-protective equipment provision and perceived workplace sun-safety culture. Summative scores were calculated for attitudes, knowledge, workplace provision and culture. A multivariable model was built with worker and workplace variables as plausible predictors of personal sun protection. In this study, 1,061 workers (69% participation) from 112 workplaces provided sufficient information for analysis. Sex, age, prioritized ethnicity, education and risk perception differed significantly between occupational groups (p<0.001), as did workers' sun-protective practices and workplace sun-protection equipment provision and supportive culture. After adjustment, each one-point increase in Workplace Sun-safety Culture 2013Score (range 12 points) was associated with a 0.16 higher Personal Sun-Protection Score (p<0.001), and each one-point increase in Workplace Provision Score (range 4 points) was associated with a 0.14 higher score (p<0.001). Sun Protection Score was significantly associated with skin response to sun exposure (p<0.001), female sex (p=0.021), tanning attitudes (p=0.022) and occupation (p=0.049), but not ethnicity, age education, knowledge or skin cancer risk perception. Protective equipment provision and sun-protective workplace

  5. 29 CFR 1910.136 - Foot protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... OCCUPATIONAL SAFETY AND HEALTH STANDARDS Personal Protective Equipment § 1910.136 Foot protection. (a) General... § 1910.6; (ii) ANSI Z41-1999, “American National Standard for Personal Protection—Protective Footwear... Personal Protection—Protective Footwear,” which is incorporated by reference in § 1910.6. (2) Protective...

  6. 29 CFR 1910.136 - Foot protection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... OCCUPATIONAL SAFETY AND HEALTH STANDARDS Personal Protective Equipment § 1910.136 Foot protection. (a) General... § 1910.6; (ii) ANSI Z41-1999, “American National Standard for Personal Protection—Protective Footwear... Personal Protection—Protective Footwear,” which is incorporated by reference in § 1910.6. (2) Protective...

  7. 32 CFR 2004.21 - Protection of Classified Information [201(e)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Protection of Classified Information [201(e)]. 2004.21 Section 2004.21 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY...

  8. Avian influenza A/H7N9 risk perception, information trust and adoption of protective behaviours among poultry farmers in Jiangsu Province, China.

    PubMed

    Cui, Bin; Liao, Qiuyan; Lam, Wendy Wing Tak; Liu, Zong Ping; Fielding, Richard

    2017-05-18

    Poultry farmers are at high-risk from avian influenza A/H7N9 infection due to sustained occupational exposures to live poultry. This study examined factors associated with poultry farmers' adoption of personal protective behaviours (PPBs) based on Protection Motivation Theory (PMT). Totally, 297 poultry farmers in three cities of Jiangsu Province, China were interviewed during November 2013-January 2014. Data on PMT constructs, perceived trustworthiness of A/H7N9 information from mass media (formal sources), friends and family (informal sources), intention to adopt and actual adoption of PPBs and respondents' demographics were collected. Structural equation modeling (SEM) identified associations between demographic factors and PMT constructs associated with A/H7N9-oriented PPB intention. Moderated mediation analysis examined how demographics moderated the effects of information trust on PPB intention via risk perceptions of A/H7N9. Respondents generally perceived low vulnerability to A/H7N9 infection. The SEM found that male respondents perceived lower severity of (β = -0.23), and lower vulnerability to (β = -0.15) A/H7N9 infection; age was positively associated with both perceived personal vulnerability to (β = 0.21) and perceived self-efficacy (β = 0.24) in controlling A/H7N9; education was positively associated with perceived response efficacy (β = 0.40). Furthermore, perceived vulnerability (β = 0.16), perceived self-efficacy (β = 0.21) and response efficacy (β = 0.67) were positively associated with intention to adopt PPBs against A/H7N9. More trust in informal information (TII) was only significantly associated with greater PPB intention through its positive association with perceived response efficacy. Age significantly moderated the associations of TII with perceived Self-efficacy and perceived response efficacy, with younger farmers who had greater TII perceiving lower self-efficacy but higher response efficacy. Poultry farmers

  9. Using Personal Computers To Acquire Special Education Information. Revised. ERIC Digest #429.

    ERIC Educational Resources Information Center

    ERIC Clearinghouse on Handicapped and Gifted Children, Reston, VA.

    This digest offers basic information about resources, available to users of personal computers, in the area of professional development in special education. Two types of resources are described: those that can be purchased on computer diskettes and those made available by linking personal computers through electronic telephone networks. Resources…

  10. The impact of social and organizational factors on workers' use of personal protective equipment: a multilevel approach.

    PubMed

    Torp, Steffen; Grøgaard, Jens B; Moen, Bente E; Bråtveit, Magne

    2005-08-01

    On the basis of the job demands-control-support model by Karasek and Theorell, we investigated how social and organizational factors influence workers' use of personal protective equipment (PPE). A cross-sectional study was performed among 1420 workers in 203 motor vehicle-repair garages. Multilevel modeling was performed to account for the hierarchical structure of the data. Social and management support correlated positively with PPE use at the worker level. Low demands measured at the garage level and having a health and safety management system at the garage also correlated with active use of PPE. An interaction effect between social support and garage-level demands was observed. In addition to health information and provision of PPE, focusing on social and organizational factors seems necessary to get more workers to comply with the instructions on PPE use.

  11. 76 FR 6815 - Proposed Information Collection, OMB Control Number 1004-NEW

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-08

    ... enable the BLM to respond to problems, protect natural and cultural resources, and develop appropriate... personal identifying information in your comment, you should be aware that your entire comment--including your personal identifying information--may be made publicly available at any time. While you can ask us...

  12. 16 CFR 1061.8 - Information on the heightened degree of protection afforded.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... protection afforded. 1061.8 Section 1061.8 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION GENERAL APPLICATIONS FOR EXEMPTION FROM PREEMPTION § 1061.8 Information on the heightened degree of protection afforded... State or local requirement provides a significantly higher degree of protection from the risk of injury...

  13. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  14. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  15. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  16. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  17. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  18. 78 FR 43880 - Information Collection Request Submitted to OMB for Review and Approval; Comment Request; Notice...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... personal information provided, unless the comment includes profanity, threats, information claimed to be... ENVIRONMENTAL PROTECTION AGENCY [EPA-OPP-2012-0544; FRL-9534-8] Information Collection Request... Environmental Protection Agency has submitted an information collection request (ICR), ``Notice of Supplemental...

  19. An Examination of Organizational Information Protection in the Era of Social Media: A Study of Social Network Security and Privacy Protection

    ERIC Educational Resources Information Center

    Maar, Michael C.

    2013-01-01

    This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve their proficiency in information security and ability to detect deceptive…

  20. Personal Web home pages of adolescents with cancer: self-presentation, information dissemination, and interpersonal connection.

    PubMed

    Suzuki, Lalita K; Beale, Ivan L

    2006-01-01

    The content of personal Web home pages created by adolescents with cancer is a new source of information about this population of potential benefit to oncology nurses and psychologists. Individual Internet elements found on 21 home pages created by youths with cancer (14-22 years old) were rated for cancer-related self-presentation, information dissemination, and interpersonal connection. Examples of adolescents' online narratives were also recorded. Adolescents with cancer used various Internet elements on their home pages for cancer-related self-presentation (eg, welcome messages, essays, personal history and diary pages, news articles, and poetry), information dissemination (e.g., through personal interest pages, multimedia presentations, lists, charts, and hyperlinks), and interpersonal connection (eg, guestbook entries). Results suggest that various elements found on personal home pages are being used by a limited number of young patients with cancer for self-expression, information access, and contact with peers.