Science.gov

Sample records for personal information protection

  1. Protecting Personal Information on Social Networking Sites

    ERIC Educational Resources Information Center

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  2. Protecting Your Child's Personal Information at School

    ERIC Educational Resources Information Center

    Federal Trade Commission, 2012

    2012-01-01

    Back to school--an annual ritual that includes buying new notebooks, packing lunches, coordinating transportation, and filling out forms: registration forms, health forms, permission slips, and emergency contact forms, to name a few. Many school forms require personal and, sometimes, sensitive information. In the wrong hands, this information can…

  3. Information processing capacity while wearing personal protective eyewear.

    PubMed

    Wade, Chip; Davis, Jerry; Marzilli, Thomas S; Weimar, Wendi H

    2006-08-15

    It is difficult to overemphasize the function vision plays in information processing, specifically in maintaining postural control. Vision appears to be an immediate, effortless event; suggesting that eyes need only to be open to employ the visual information provided by the environment. This study is focused on investigating the effect of Occupational Safety and Health Administration regulated personal protective eyewear (29 CFR 1910.133) on physiological and cognitive factors associated with information processing capabilities. Twenty-one college students between the ages of 19 and 25 years were randomly tested in each of three eyewear conditions (control, new and artificially aged) on an inclined and horizontal support surface for auditory and visual stimulus reaction time. Data collection trials consisted of 50 randomly selected (25 auditory, 25 visual) stimuli over a 10-min surface-eyewear condition trial. Auditory stimulus reaction time was significantly affected by the surface by eyewear interaction (F2,40 = 7.4; p < 0.05). Similarly, analysis revealed a significant surface by eyewear interaction in reaction time following the visual stimulus (F2,40 = 21.7; p < 0.05). The current findings do not trivialize the importance of personal protective eyewear usage in an occupational setting; rather, they suggest the value of future research focused on the effect that personal protective eyewear has on the physiological, cognitive and biomechanical contributions to postural control. These findings suggest that while personal protective eyewear may serve to protect an individual from eye injury, an individual's use of such personal protective eyewear may have deleterious effects on sensory information associated with information processing and postural control.

  4. Privacy protection for personal health information and shared care records.

    PubMed

    Neame, Roderick L B

    2014-01-01

    The protection of personal information privacy has become one of the most pressing security concerns for record keepers: this will become more onerous with the introduction of the European General Data Protection Regulation (GDPR) in mid-2014. Many institutions, both large and small, have yet to implement the essential infrastructure for data privacy protection and patient consent and control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring, has led to the imposition of increasingly significant monetary penalties for failure to protect privacy: these too are set to become more onerous under the GDPR, increasing to a maximum of 2% of annual turnover. There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information. This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy. This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing. REQUIREMENTS FOR PRIVACY: There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers) to keep patient information confidential and to share it only with the authorisation of the patient. To achieve this information storage and retrieval, communication systems must be appropriately configured. There are many components of this, which are discussed in this paper. Patients may consult clinicians anywhere and at any time: therefore, their data must be available for recipient-driven retrieval (i.e. like the World Wide Web) under patient control and kept private: a method for delivering this is outlined.

  5. 77 FR 59581 - Personal Identity Verification, Release and Handling of Restricted Information, Protection of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-28

    ... Personal Identity Verification, Release and Handling of Restricted Information, Protection of the Florida... rule is identified by RIN 2700-AD38, Personal Identity Verification. It was published in the...

  6. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  7. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  8. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  9. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  10. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  11. BC: campaign launched to protect personal health information.

    PubMed

    Garmaise, David

    2004-12-01

    A diverse group of rights, health, union, and HIV/AIDS organizations has launched a province-wide campaign to demand that the British Columbia government cease contracting out the administration of its medical plans to a private US company. The Right to Privacy Campaign (RPC) believes that the government's contract with Maximus Inc. places British Columbians' confidential health and related information within easy reach of US government agencies as a result of provisions in the USA PATRIOT Act and other US legislation.

  12. How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?

    PubMed Central

    Moreau, Katherine; Jonker, Elizabeth

    2011-01-01

    Background Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices. PMID:21317106

  13. How strong are passwords used to protect personal health information in clinical trials?

    PubMed

    El Emam, Khaled; Moreau, Katherine; Jonker, Elizabeth

    2011-02-11

    Findings and statements about how securely personal health information is managed in clinical research are mixed. The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices.

  14. Personal protective equipment

    MedlinePlus

    ... medlineplus.gov/ency/patientinstructions/000447.htm Personal protective equipment To use the sharing features on this page, please enable JavaScript. Personal protective equipment is special equipment you wear to create a ...

  15. Health care information and the protection of personal privacy: ethical and legal considerations.

    PubMed

    Gostin, L

    1997-10-15

    During the early 1990s, the U.S. government addressed the issue of providing universal health care to all its citizens. Although this issue has not been completely resolved, centralization of electronic data and sharing of health care information among insurers and providers have been pursued. The emergence of electronic data banks in health care has raised another issue: each citizen's right to privacy compared with the collective benefit to society when critical data on quality assurance and scientific research are shared by an array of network users. The choices we face are difficult, and the solution may necessarily reflect a compromise that alters traditional beliefs in the right to personal privacy. However, Congress can take the initiative by enacting statutes to ensure that sensitive information contained in electronic patient records is not divulged without a patient's consent and is protected against fraudulent access and abuse.

  16. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF EDUCATION PROTECTION AND ADVOCACY OF INDIVIDUAL RIGHTS What Conditions Must Be Met After an... 34 Education 2 2011-07-01 2010-07-01 true What are the requirements pertaining to the protection, use, and release of personal information? 381.31 Section 381.31 Education Regulations of the...

  17. 34 CFR 5.71 - Protection of personal privacy and proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... obligations of confidentiality. (a) No disclosure will be made of information of a personal and private nature... individuals who have access to such information, (3) the type and degree of risk of financial injury to be expected if disclosure occurs, and (4) the length of time such information should be regarded as retaining...

  18. Protecting Information

    NASA Astrophysics Data System (ADS)

    Loepp, Susan; Wootters, William K.

    2006-09-01

    For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science.Of particular interest are the potential impacts of quantum physics:(i) a quantum computer, if built, could crack our currently used public-key cryptosystems; and (ii) quantum cryptography promises to provide an alternative to these cryptosystems, basing its security on the laws of nature rather than on computational complexity. No prior knowledge of quantum mechanics is assumed, but students should have a basic knowledge of complex numbers, vectors, and matrices. Accessible to readers familiar with matrix algebra, vector spaces and complex numbers First undergraduate text to cover cryptography, error-correction, and quantum computation together Features exercises designed to enhance understanding, including a number of computational problems, available from www.cambridge.org/9780521534765

  19. About Personal Protective Equipment (PPE)

    MedlinePlus

    ... Equipment for Infection Control Questions About Personal Protective Equipment (PPE) Share Tweet Linkedin Pin it More sharing ... Print Q1. How do manufacturers ensure personal protective equipment (PPE) is safe and effective? A1. To help ...

  20. Personal, Anticipated Information Need

    ERIC Educational Resources Information Center

    Bruce, Harry

    2005-01-01

    Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…

  1. PERSONAL LEADERSHIP PROTECTS RESEARCH SUBJECTS

    USDA-ARS?s Scientific Manuscript database

    Personal leadership promotes the ethical conduct of human research activities. Leadership entails application of one’s cognitive abilities, technical skills, and emotional intelligence during the conduct of research activities, Personal leadership assures human research subject protection....

  2. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... representative in a timely manner. (2) Medical, psychological, or other information that the State unit... program. (2) Medical or psychological information that the State unit determines may be harmful to the... with law enforcement, fraud, or abuse, unless expressly prohibited by Federal or State laws or...

  3. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... representative in a timely manner. (2) Medical, psychological, or other information that the State unit... program. (2) Medical or psychological information that the State unit determines may be harmful to the... with law enforcement, fraud, or abuse, unless expressly prohibited by Federal or State laws or...

  4. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... representative in a timely manner. (2) Medical, psychological, or other information that the State unit... program. (2) Medical or psychological information that the State unit determines may be harmful to the... with law enforcement, fraud, or abuse, unless expressly prohibited by Federal or State laws or...

  5. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... representative in a timely manner. (2) Medical, psychological, or other information that the State unit... program. (2) Medical or psychological information that the State unit determines may be harmful to the... with law enforcement, fraud, or abuse, unless expressly prohibited by Federal or State laws or...

  6. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... representative in a timely manner. (2) Medical, psychological, or other information that the State unit... program. (2) Medical or psychological information that the State unit determines may be harmful to the... with law enforcement, fraud, or abuse, unless expressly prohibited by Federal or State laws or...

  7. Developing registries of volunteers: key principles to manage issues regarding personal information protection.

    PubMed

    Lévesque, Emmanuelle; Leclerc, Dominic; Puymirat, Jack; Knoppers, Bartha Maria

    2010-11-01

    Much biomedical research cannot be performed without recruiting human subjects. Increasingly, volunteer registries are being developed to assist researchers with this challenging task. Yet, volunteer registries raise confidentiality issues. Having recently developed a registry of volunteers, the authors searched for normative guidance on how to implement the principle of confidentiality. The authors found that the protection of confidentiality in registries are based on the 10 key elements which are elaborated in detail in the Canadian Standards Association Model Code. This paper describes how these 10 detailed key principles can be used during the developmental stages of volunteer registries.

  8. Personal Protective Equipment

    EPA Pesticide Factsheets

    Response personnel must wear the appropriate level of protection whenever near a hazardous release site. Level A is for the greatest exposure potential, and D is the minimum level. Examples range from totally encapsulated suits to hard hats.

  9. Problems experienced by nurses in relation to disclosure of patient data immediately after enforcement of the personal information protection law in Japan.

    PubMed

    Asanuma, Yuko; Yamanouchi, Kazushi; Sasaki, Noriko; Hosogoe, Sachiko

    2006-01-01

    An extension course for nurses providing details about the Act on the Protection of Personal Information was offered using a remote conferencing system. Experiences or problems related to disclosure of patient data were collected from the participants using a questionnaire. Most of the problems were placed in the category of disclosure of personal data to a third party, followed by those related to security safeguards and administration of employees. It is necessary for the JMHLW to gather more cases in order to expand the number of items in the Casebook by JMHLW. Also, systematic on-the-job education will be needed for nurses.

  10. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  11. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  12. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  13. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  14. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  15. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data

    PubMed Central

    Beck, Eduard J.; Gill, Wayne; De Lay, Paul R.

    2016-01-01

    Background As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs) may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV. The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The success of programs

  16. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data.

    PubMed

    Beck, Eduard J; Gill, Wayne; De Lay, Paul R

    2016-01-01

    Background As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs) may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV. The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The success of programs

  17. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data.

    PubMed

    Beck, Eduard J; Gill, Wayne; De Lay, Paul R

    2016-01-01

    As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs) may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV. The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The success of programs like

  18. Personal Protective Equipment for Pesticide Handlers

    EPA Pesticide Factsheets

    Personal protective equipment.use is subject to certain requirement under the Worker Protection Standard. Learn about these requirements, which include cleaning and maintenance, as well as standards for availability.

  19. Coming soon to a health sector near you: an advance look at the new Ontario Personal Health Information Protection Act (PHIPA): part II.

    PubMed

    Beardwood, John P; Kerr, J Alexis

    2005-01-01

    This is Part II of a two-part article that provides a broad overview and comparative study of the new Ontario health sector-specific privacy legislation. In Part I, which appeared in the previous issue of Healthcare Quarterly, we discussed the objectives, structure and scope of, as well as the substantive rights and obligations created by, the new Ontario Act. In Part II, we discuss the administrative obligations created by the Ontario Act, as well as the provisions relating to the enforcement of, and remedies available under, the Act. We also contrast the Ontario Act with the various approaches to the protection of personal health information that has already been adopted by other provinces, including Alberta, Saskatchewan and Manitoba.

  20. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... information pursuant to paragraph (c) of this section is governed by the principles of common law as... requesting assistance under the PAIR program, in accordance with the principles of common law as...

  1. Report: Cybersecurity Act of 2015 Report - CSB’s Policies and Procedures to Protect Systems With Personally Identifiable Information

    EPA Pesticide Factsheets

    Report #16-P-0254, August 1, 2016. CSB has one system that contains sensitive PII. Safeguarding such information in the possession of the government and preventing its breach is essential to ensuring CSB retains the trust of the American public.

  2. Report: Cybersecurity Act of 2015 Report - EPA’s Policies and Procedures to Protect Systems With Personally Identifiable Information

    EPA Pesticide Factsheets

    Report #16-P-0259, August 10, 2016. The EPA has 30 systems that contain sensitive PII. Safeguarding information and preventing system breaches are essential for ensuring the EPA retains the trust of the American public.

  3. A Personalized Information Environment for Digital Libraries.

    ERIC Educational Resources Information Center

    Jayawardana, Champa; Hewagamage, K. Priyantha; Hirakawa, Masahito

    2001-01-01

    Discussion of digital libraries focuses on the need for personalization capabilities so users can create their own personalized information environments. Highlights include material personalization; collection personalization; active reading; personalized retrieving; personalized filtering; and a prototype system. (LRW)

  4. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... information pursuant to paragraph (c) of this section is governed by the principles of common law as interpreted by the courts of the United States, except that, for purposes of any periodic audit, report, or... requesting assistance under the PAIR program, in accordance with the principles of common law as interpreted...

  5. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... information pursuant to paragraph (c) of this section is governed by the principles of common law as interpreted by the courts of the United States, except that, for purposes of any periodic audit, report, or... requesting assistance under the PAIR program, in accordance with the principles of common law as interpreted...

  6. Personal protection against biting insects and ticks

    PubMed Central

    2011-01-01

    Recent events with the first cases of local transmission of chikungunya and dengue fever virus in southern France by Aedes albopictus, adding to the nuisance and potential vectors that can be encountered when traveling in tropical or sub-tropical countries, has shown the value of a reflection on the Personal protection against vectors (PPAV). It is seen during an outbreak of vector-borne disease, or simply because of nuisance arthropods, that our fellow citizens try to protect themselves individually by using an arsenal of resources available on the market. Yet most of these means have been neither checked for effectiveness or safety tests, however, essential. Travellers, staff on mission or assignment, are looking for specific information on how to protect themselves or their families. Health workers had at their disposal so far indications that vary widely from one source to another. Therefore it seemed important to the Society of Travel Medicine (SMV) and the French Society of Parasitology (SFP) to initiate a reflection on this theme. This reflection took the form of recommendations for good practice, following the outline established by the French High Health Authority (HAS). The aim was to gather all relevant information, verified and validated and the format to be used not only by health personnel (doctors, pharmacists, nurses), but also by travel agents and individuals. This document highlights the need to take into account the risk of vector-borne diseases, some deadly, and the benefit of various methods of personal protection. The choice of methods is clearly oriented towards those whose effectiveness has been proven and potential risks assessed. The paper finally proposes two decision trees based on the transmission type (day or night) and kind of stay (short or roaming, long and steady). It concerns travellers, but also expatriates, residents and nomads. PMID:21395212

  7. Personal protection against biting insects and ticks.

    PubMed

    2011-02-01

    Recent events with the first cases of local transmission of chikungunya and dengue fever virus in southern France by Aedes albopictus, adding to the nuisance and potential vectors that can be encountered when traveling in tropical or sub-tropical countries, has shown the value of a reflection on the Personal protection against vectors (PPAV). It is seen during an outbreak of vector-borne disease, or simply because of nuisance arthropods, that our fellow citizens try to protect themselves individually by using an arsenal of resources available on the market. Yet most of these means have been neither checked for effectiveness or safety tests, however, essential. Travellers, staff on mission or assignment, are looking for specific information on how to protect themselves or their families. Health workers had at their disposal so far indications that vary widely from one source to another. Therefore it seemed important to the Society of Travel Medicine (SMV) and the French Society of Parasitology (SFP) to initiate a reflection on this theme. This reflection took the form of recommendations for good practice, following the outline established by the French High Health Authority (HAS). The aim was to gather all relevant information, verified and validated and the format to be used not only by health personnel (doctors, pharmacists, nurses), but also by travel agents and individuals. This document highlights the need to take into account the risk of vector-borne diseases, some deadly, and the benefit of various methods of personal protection. The choice of methods is clearly oriented towards those whose effectiveness has been proven and potential risks assessed. The paper finally proposes two decision trees based on the transmission type (day or night) and kind of stay (short or roaming, long and steady). It concerns travellers, but also expatriates, residents and nomads.

  8. Protection method for an optical information carrier

    NASA Astrophysics Data System (ADS)

    Pitsyuga, Vitaly V.; Kolesnikov, Michael Y.; Kosyak, Igor V.

    1997-02-01

    Now information protection on personal carriers (for example, cards) from an unauthorized access (UA) is a very important problem in connection with wide introduction of proper automatic systems for information processing in different spheres of human activity. These are financial, medical and information services, an access to restricted units and so on. There is proposed to use physical parameters of the special coating part (so-called restricted zone) to information protection on optical carriers (laser cards). There is formed restricted zone on the surface of the recording coating of a laser card. The unique information about every laser card to creating a protective passport from UA is obtained by readout of defects parameters.

  9. Economics of Personal Data Management: Fair Personal Information Trades

    NASA Astrophysics Data System (ADS)

    Tasidou, A.; Efraimidis, P. S.; Katos, V.

    Individuals today have no control over the way their personal information is being used even though they are the ones to suffer the consequences of any unwanted uses of their information. We propose addressing this externality through the creation of a market for personal information, where licenses to access individuals' personal information will be voluntarily traded. Through this market, satisfactory compensation to the information owner is provided, whilst personal information remains under the owner's control. Using cryptographic tools and micropayments we propose and develop a prototype for personal information trades where the above principles are implemented and tested.

  10. Data protection in health information systems (HIS).

    PubMed

    Griesser, G

    1989-01-01

    Information and communication systems in a health (care) environment are risky systems as the data processed, transmitted, stored and retrieved are person-related. An unjustified disclosure may compromise the individual's personal or social life. Therefore these systems must be subject to carefully designed and implemented protection procedures guaranteeing the correct use of those data, corresponding in the medical sphere with the ancient Oath of Hippokrates, as well as the preservation of their correctness, completeness etc., as requested by legal regulations valid for the location of the respective computer-aided information system. The same is true for the manual handling of person-related health data by conventional methods. In any case, the data subject's right of informational self determination must be taken into account.

  11. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Personal protective... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective equipment, including personal protective equipment for eyes, face, head, and extremities, protective clothing...

  12. Personal Protective Equipment - Protecting Healthcare Providers in an Ebola Outbreak

    PubMed Central

    2015-01-01

    Purpose The current Ebola epidemic that has devastated West Africa has infected and killed more healthcare providers than any other outbreak in the history of this virus. An improved understanding of pathogen transmission and the institution of strategies to protect infection healthcare providers are needed in infectious disease outbreak. This review connects what is known about Ebola virus transmission with personal protective equipment designed to arrest nosocomial transmission. Methods Articles pertaining to filovirus transmission and personal protective equipment in filovirus outbreaks were reviewed and are presented. Additionally, studies evaluating PPE as well as donning and doffing strategies are also presented. Findings Personal Protective equipment is one step in a comprehensive infection prevention and control strategy that is required to protect healthcare providers. Given that the Ebola virus is primarily transmitted through direct contact of mucous membranes and cuts in the skin with infected patients and/or their bodily fluids, it is necessary to cover these potential portals of infection with PPE as part of a structured and instructed donning and doffing procedure. Implications Current recommendations about PPE and the donning and doffing processes are based on anecdotal experience. However the use of non-human viruses can help provide evidence based guidelines on both PPE and processes. PMID:26452427

  13. Personal Privacy in an Information Society. Final Report.

    ERIC Educational Resources Information Center

    Privacy Protection Study Commission, Washington, DC.

    This report of the Privacy Protection Study Commission was prepared in response to a Congressional mandate to study data banks, automatic data processing programs, and information systems of governmental, regional and private organizations to determine standards and procedures in force for the protection of personal information. Recommendations…

  14. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Personal protective equipment. 170.240 Section 170.240 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS WORKER PROTECTION STANDARD Standard for Pesticide Handlers § 170.240 Personal protective equipment. (a...

  15. Insertion Loss of Personal Protective Clothing

    SciTech Connect

    Shull D.J.; Biesel, V.B.; Cunefare, K.A.

    1999-05-13

    'The use of personal protective clothing that covers the head is a common practice in many industries. Such personal protective clothing will impact the sound pressure level and the frequency content of sounds to which the wearer will be exposed. The use of such clothing, then, may impact speech and alarm audibility. A measure of the impact of such clothing is its insertion loss. Insertion loss measurements were performed on four types of personal protective clothing in use by Westinghouse Savannah River Company personnel which utilize cloth and plastic hood configurations to protect the head. All clothing configurations tested at least partially cover the ears. The measurements revealed that insertion loss of the items tested was notable at frequencies above 1000 Hz only and was a function of material stiffness and acoustic flanking paths to the ear. Further, an estimate of the clothing''s noise reduction rating reveals poor performance in that regard, even though the insertion loss of the test articles was significant at frequencies at and above 1000 Hz.'

  16. Overwhelming Physiological Regulation Through Personal Protection.

    PubMed

    Taylor, Nigel A S

    2015-11-01

    There is often a fine line between providing appropriate personal protection and compromising capability. In some situations, protection must come first. In other circumstances, capability becomes paramount. In the military, mission-specific objectives can force personal protection to be less than ideal. Indeed, levels of protection appropriate within the civilian context could jeopardise health and operational success, and for operations conducted in the heat involving load carriage and armored protection with almost total-body clothing coverage, it is the likely thermal impediment to performance that perhaps first comes to mind. Although this consideration is appropriate, it may direct attention away from the actual cause of, and therefore preventative solutions to, physiological collapse. For instance, although classical heat illness absolutely occurs at the age extremes, and it may affect all people when air temperatures are exceptionally hot, frank hyperthermia is not generally the primary cause of exhaustion when healthy clothed individuals are working in the heat. Instead, another homoeostatic process is implicated; blood pressure regulation. In addition to participating in temperature regulation, the cardiovascular system supports oxygen delivery, blood pressure regulatory, and waste removal requirements. Therefore, the elevated cardiac output accompanying work must be shared. Accordingly, the case will be developed that thermoregulatory failure is often not the primary causal mechanism for soldier collapse, although such individuals may be hyperthermic. Alternatively, moderately, but not excessively, hyperthermic soldiers working under these conditions are perhaps more likely to collapse from cardiovascular insufficiency that precipitates uncompensable hypotension.

  17. Electronic Health Record in Italy and Personal Data Protection.

    PubMed

    Bologna, Silvio; Bellavista, Alessandro; Corso, Pietro Paolo; Zangara, Gianluca

    2016-06-01

    The present article deals with the Italian Electronic Health Record (hereinafter EHR), recently introduced by Act 221/2012, with a specific focus on personal data protection. Privacy issues--e.g., informed consent, data processing, patients' rights and minors' will--are discussed within the framework of recent e-Health legislation, national Data Protection Code, the related Data Protection Authority pronouncements and EU law. The paper is aimed at discussing the problems arising from a complex, fragmentary and sometimes uncertain legal framework on e-Health.

  18. Protecting the Privacy and Security of Your Health Information

    MedlinePlus

    ... care providers and professionals, and the government. Federal laws require many of the key persons and organizations ... and Breach Notification Rules are the main Federal laws that protect your health information. The Privacy Rule ...

  19. Use of personal protective equipment for respiratory protection.

    PubMed

    Sargent, Edward V; Gallo, Frank

    2003-01-01

    Management of hazards in biomedical research facilities requires the application of the traditional industrial hygiene responsibilities of anticipation, recognition, evaluation, and control to characterize the work environment, evaluate tasks and equipment, identify hazards, define exposure groups, and recommend controls. Generally, the diversity and unique characteristics of hazards faced by laboratory and animal facility employees and the short-term and low-level nature of the exposures factor into the selection of proper exposure control measures in the laboratory. The proper selection of control measures is based on a hierarchy of elimination and minimization by engineering controls, followed last by personal protective equipment when exposures cannot be eliminated. Once it is decided that personal protective equipment is needed, specific regulations and guidelines define safety standards for research facilities, including the elements of a sound respiratory protection program. These elements include respirator selection (including appropriate protection factors), medical evaluation, fit testing, training, inspection, maintenance and care, quality, quantity and flow of breathing air, and routine and emergency use procedures.

  20. [Concept of personal data relating to health in the law of personal data protection].

    PubMed

    Navarrete, Jesús Rubí

    2006-01-01

    The Law on the Protection of Data states that health data are sensible data and therefore subject to a strengthened system of guarantees. In order to apply this, the information must make reference to physical persons and must be susceptible of being included within the concept of health data. The resolutions of the Spanish Agency for Data Protection and the rulings of the Courts provide very valuable elements to clarify both concepts.

  1. 29 CFR 1926.28 - Personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 8 2011-07-01 2011-07-01 false Personal protective equipment. 1926.28 Section 1926.28... Provisions § 1926.28 Personal protective equipment. (a) The employer is responsible for requiring the wearing of appropriate personal protective equipment in all operations where there is an exposure to...

  2. 49 CFR 214.111 - Personal protective equipment, generally.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... railroad or railroad contractor shall require the use of foot protection when the potential for foot injury... Personal protective equipment, generally. With the exception of foot protection, the railroad or...

  3. 49 CFR 214.111 - Personal protective equipment, generally.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... railroad or railroad contractor shall require the use of foot protection when the potential for foot injury... Personal protective equipment, generally. With the exception of foot protection, the railroad or...

  4. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a) Any person who organizes a non-governmental expedition to Antarctica and who does business in the United States shall notify expedition members of the environmental protection obligations of the...

  5. 78 FR 48683 - National Institute for Occupational Safety and Health (NIOSH) Personal Protective Technology (PPT...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-09

    ... Health (NIOSH) Personal Protective Technology (PPT) Program; Framework Document for the Healthcare Worker... availability of a document titled ``Framework for Setting the NIOSH PPT Program Action Plan for Healthcare... ). SUPPLEMENTARY INFORMATION: The NIOSH personal protective technology (PPT) program publishes and periodically...

  6. How Do Students Organize Personal Information Spaces?

    ERIC Educational Resources Information Center

    Hardof-Jaffe, Sharon; Hershkovitz, Arnon; Abu-Kishk, Hama; Bergman, Ofer; Nachmias, Rafi

    2009-01-01

    The purpose of this study is to empirically reveal strategies of students' organization of learning-related digital materials within an online personal information archive. Research population included 518 students who utilized the personal Web space allocated to them on the university servers for archiving information items, and data describing…

  7. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... prohibition against gloves for applicators and other handlers under the heading HAZARDS TO HUMANS (AND... personal protective equipment requirements apply to other uses. (c) Location of personal protective... protective equipment statements for pesticide handlers shall be in the HAZARDS TO HUMANS (AND DOMESTIC...

  8. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... prohibition against gloves for applicators and other handlers under the heading HAZARDS TO HUMANS (AND... personal protective equipment requirements apply to other uses. (c) Location of personal protective... protective equipment statements for pesticide handlers shall be in the HAZARDS TO HUMANS (AND DOMESTIC...

  9. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... prohibition against gloves for applicators and other handlers under the heading HAZARDS TO HUMANS (AND... personal protective equipment requirements apply to other uses. (c) Location of personal protective... protective equipment statements for pesticide handlers shall be in the HAZARDS TO HUMANS (AND DOMESTIC...

  10. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... prohibition against gloves for applicators and other handlers under the heading HAZARDS TO HUMANS (AND... personal protective equipment requirements apply to other uses. (c) Location of personal protective... protective equipment statements for pesticide handlers shall be in the HAZARDS TO HUMANS (AND DOMESTIC...

  11. Disclosing personal health information relating to adults who lack capacity.

    PubMed

    Griffith, Richard

    2014-03-01

    The need to share information about patients is vital to effective care and protection, especially where it relates to adults who lack decision-making capacity but it has to be balanced against the right to confidentiality. Like other health professionals, district nurses have a duty to maintain the confidentiality of patient information, and incapable adults have the right to expect their personal health information to be kept private. This right is guaranteed by the common-law duty of confidence, the Data Protection Act 1998 and the NHS Care Record Guarantee and confidentiality policy. This article discusses the district nurse's legal obligations when considering sharing information in relation to an incapable adult

  12. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Protection of personal privacy... personal privacy. (a) Any of the following personnel, medical, or similar records is within the statutory... personal privacy: (1) Personnel and background records personal to any officer or employee of...

  13. Adaptive Visualization for Focused Personalized Information Retrieval

    ERIC Educational Resources Information Center

    Ahn, Jae-wook

    2010-01-01

    The new trend on the Web has totally changed today's information access environment. The traditional information overload problem has evolved into the qualitative level beyond the quantitative growth. The mode of producing and consuming information is changing and we need a new paradigm for accessing information. Personalized search is one of…

  14. Adaptive Visualization for Focused Personalized Information Retrieval

    ERIC Educational Resources Information Center

    Ahn, Jae-wook

    2010-01-01

    The new trend on the Web has totally changed today's information access environment. The traditional information overload problem has evolved into the qualitative level beyond the quantitative growth. The mode of producing and consuming information is changing and we need a new paradigm for accessing information. Personalized search is one of…

  15. Privacy Protection Standards for the Information Sharing Environment

    DTIC Science & Technology

    2009-09-01

    information should be protected; society should have a say as well (Solove, 2008). Another theory is that of protecting the personhood of integrity of an...reporting, sharing, and analysis (9/11 Commission, 2003, p. 409) would seem to be equally applicable to the ISE as a whole as well . In making its...Constitutionality. As discussed above, the Supreme Court, on the whole, seems to be well disposed to the use of personal information for certain government

  16. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Standards and Technology. For paper records, disposal methods, such as tearing, burning, melting, chemical... (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Systems of Records § 310.13 Safeguarding personal information... and physical safeguards to ensure that the records in each system of records are protected from...

  17. Don't Take It Personal: European Union Legal Aspects of Procuring and Protecting Environmental Exposure Data in Population Biobanks Through the Use of a Geo-Information-Systems Toolkit.

    PubMed

    Bovenberg, Jasper Adriaan; de Hoogh, Kees; Knoppers, Bartha Maria; Hveem, Kristian; Hansell, Anna L

    2016-06-01

    Under European Union (EU) law, population-based cohort studies have the right to collect environmental data and to access geospatial data, at street level, on the web, from a host of public sources. As to geospatial information, they should be able to avail themselves of Member States' networks of services for geospatial data sets and services (discovery, viewing, downloading) via the Internet. On the other hand, linkage of health data of biobank participants to environmental data, using geospatial data, is limited, as it must satisfy the provisions of the EU Directive on the Protection of Personal Data, pursuant to which geospatial data regarding biobank participants are likely to qualify as personal data. Hence, we submit that the consents of biobank participants be reviewed to assess whether they cover the generation and linkage of geospatial data. We also submit that biobanks must have measures in place to prevent the re-identification of participants by use of their geospatial data. We present a model Geographic-Information-Systems (GIS) Toolkit, as an example of what measures could be taken to that effect.

  18. Incidence of ADL Disability in Older Persons, Physical Activities as a Protective Factor and the Need for Informal and Formal Care--Results from the SNAC-N Project.

    PubMed

    Sjölund, Britt-Marie; Wimo, Anders; Engström, Maria; von Strauss, Eva

    2015-01-01

    The aim of the study was to examine 1) the incidence of disability in Activities of Daily Living (ADL), in persons 78 years and older 2) explore whether being physical active earlier is a significant predictor of being disability free at follow-up and 3) describe the amount of informal and formal care in relation to ADL-disability. Data were used from a longitudinal community-based study in Nordanstig (SNAC-N), a part of the Swedish National Study on Aging and Care (SNAC). To study objectives 1) and 2) all ADL-independent participants at baseline (N = 307) were included; for objective 3) all participants 78 years and older were included (N = 316). Data were collected at baseline and at 3- and 6-year follow-ups. ADL-disability was defined as a need for assistance in one or more activities. Informal and formal care were measured using the Resource utilization in Dementia (RUD)-instrument. The incidence rates for men were similar in the age groups 78-81 and 84 years and older, 42.3 vs. 42.5/1000 person-years. For women the incidence rate for ADL-disability increased significantly from the age group 78-81 to the age group 84 years and older, 20.8 vs.118.3/1000 person-years. In the age group 78-81 years, being physically active earlier (aOR 6.2) and during the past 12 month (aOR 2.9) were both significant preventive factors for ADL-disability. Both informal and formal care increased with ADL-disability and the amount of informal care was greater than formal care. The incidence rate for ADL-disability increases with age for women and being physically active is a protective factor for ADL-disability. The incidence rate for ADL-disability increases with age for women, and being physical active is a protective factor for ADL-disability.

  19. Incidence of ADL Disability in Older Persons, Physical Activities as a Protective Factor and the Need for Informal and Formal Care – Results from the SNAC-N Project

    PubMed Central

    Sjölund, Britt-Marie; Wimo, Anders; Engström, Maria; von Strauss, Eva

    2015-01-01

    Background The aim of the study was to examine 1) the incidence of disability in Activities of Daily Living (ADL), in persons 78 years and older 2) explore whether being physical active earlier is a significant predictor of being disability free at follow-up and 3) describe the amount of informal and formal care in relation to ADL-disability. Methods Data were used from a longitudinal community-based study in Nordanstig (SNAC-N), a part of the Swedish National Study on Aging and Care (SNAC). To study objectives 1) and 2) all ADL-independent participants at baseline (N = 307) were included; for objective 3) all participants 78 years and older were included (N = 316). Data were collected at baseline and at 3- and 6-year follow-ups. ADL-disability was defined as a need for assistance in one or more activities. Informal and formal care were measured using the Resource utilization in Dementia (RUD)-instrument. Results The incidence rates for men were similar in the age groups 78-81and 84 years and older, 42.3 vs. 42.5/1000 person-years. For women the incidence rate for ADL-disability increased significantly from the age group 78–81 to the age group 84 years and older, 20.8 vs.118.3/1000 person-years. In the age group 78–81 years, being physically active earlier (aOR 6.2) and during the past 12 month (aOR 2.9) were both significant preventive factors for ADL-disability. Both informal and formal care increased with ADL-disability and the amount of informal care was greater than formal care. The incidence rate for ADL-disability increases with age for women and being physically active is a protective factor for ADL-disability. Conclusion The incidence rate for ADL-disability increases with age for women, and being physical active is a protective factor for ADL-disability. PMID:26407207

  20. [Protective glasses. Personal eye protection for professional use].

    PubMed

    Eppig, T; Speck, A; Zelzer, B; Langenbucher, A

    2014-01-01

    Several activities in the occupational environment or in leisure time implicate an increased risk of eye injuries. Many injuries could be prevented by wearing adequate eye protection devices; however, the selection of appropriate eye protection devices requires considerations of different attributes in order to achieve a maximum of protection efficiency. This article provides an overview on the three basic types of eye protection device, introduces the classification regarding optical and protective properties and gives some additional advice on the selection of protective eyewear beyond the current standard regulations.

  1. [Data protection as a personal right. Government Agency].

    PubMed

    Jacob, J

    1999-12-01

    The sector-specific secrets are traditionally regarded as the historical predecessors of general data protection law. The lecture demonstrates that they are not only aimed at protecting the individual's right to self-determination of the handling of his personal data. It also indicates that those particular secrets are, at the same time, serving for further purposes which are of importance in their respective sectors. The general (omnibus) data protection statues are given attention in the light of the beginning of automated information processing and in their role of guaranteeing the right to personal privacy, a role which the Federal Constitutional Court underlined in its census decision of 1983 and which became of general relevance in the course of the further developments. In conclusion, the report particularizes that, inter alia, statutory adaptations and amendments are necessary in order to preserve the effects of the doctor-patient confidentiality under the conditions of modern data processing. The examples given are comprising: health data on chip cards, health data in networks and the electronic record of the patient.

  2. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  3. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  4. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  5. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  6. Integrated Personal Protective Equipment Standards Support Model

    DTIC Science & Technology

    2008-04-01

    Finally, the cost is high and maintenance is more extensive. 1.3.2 Gloves Latex gloves, used to protect against blood-borne pathogens, offer negligible...protection against chemical warfare agents (CWAs). Chemical protective gloves may be made from several different materials. Butyl rubber gloves worn with...Dexterity problems with protective gloves have been well documented. Dexterity tests performed while wearing butyl rubber gloves showed that glove thickness

  7. Personal medical information system using laser card

    NASA Astrophysics Data System (ADS)

    Cho, Seong H.; Kim, Keun Ho; Choi, Hyung-Sik; Park, Hyun Wook

    1996-04-01

    The well-known hospital information system (HIS) and the picture archiving and communication system (PACS) are typical applications of multimedia to medical area. This paper proposes a personal medical information save-and-carry system using a laser card. This laser card is very useful, especially in emergency situations, because the medical information in the laser card can be read at anytime and anywhere if there exists a laser card reader/writer. The contents of the laser card include the clinical histories of a patient such as clinical chart, exam result, diagnostic reports, images, and so on. The purpose of this system is not a primary diagnosis, but emergency reference of clinical history of the patient. This personal medical information system consists of a personal computer integrated with laser card reader/writer, color frame grabber, color CCD camera and a high resolution image scanner optionally. Window-based graphical user interface was designed for easy use. The laser card has relatively sufficient capacity to store the personal medical information, and has fast access speed to restore and load the data with a portable size as compact as a credit card. Database items of laser card provide the doctors with medical data such as laser card information, patient information, clinical information, and diagnostic result information.

  8. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information? All... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... protection of nonpublic information in the Standards of Ethical Conduct for Employees of the Executive...

  9. A Personalized Health Information Retrieval System

    PubMed Central

    Wang, Yunli; Liu, Zhenkai

    2005-01-01

    Consumers face barriers when seeking health information on the Internet. A Personalized Health Information Retrieval System (PHIRS) is proposed to recommend health information for consumers. The system consists of four modules: (1) User modeling module captures user’s preference and health interests; (2) Automatic quality filtering module identifies high quality health information; (3) Automatic text difficulty rating module classifies health information into professional or patient educational materials; and (4) User profile matching module tailors health information for individuals. The initial results show that PHIRS could assist consumers with simple search strategies. PMID:16779435

  10. 32 CFR Appendix A to Part 310 - Safeguarding Personally Identifiable Information (PII)

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... granting access to the entire database. 8. Do not totally rely on proprietary software products to protect.... Personally identifiable information must also be protected while it is being processed or accessed in... safeguards that are adequate to protect the information against unauthorized disclosure, access, or...

  11. Improving Installation Level Classified Information Protection Programs.

    DTIC Science & Technology

    1987-04-01

    1987 Api ni 16. SUPPLEMENTARY NOTATION ITEM 11: CLASSIFIED INFORMATION PROTECTION-PROGRAMS 17. COSATI CODES 18. SUBJECT TERMS ( Continue on rwuerse if...nectmary and identify by block number) S FIELD GROUP SUB. GR. % 19. ABSTRACT ( Continue on reverse if necessary and identify by block numbero Recent DoD...USAF installation level classified information protection programs. II. BACKGROUND. Recent unauthorized disclosures of classified information to the

  12. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  13. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  14. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  15. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  16. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  17. Usage and Perceived Side Effects of Personal Protective Measures against Mosquitoes among Current Users in Delhi.

    PubMed

    Kohli, Charu; Kumar, Rajesh; Meena, G S; Singh, M M; Sahoo, Jyotiranjan; Ingle, G K

    2014-01-01

    Background. Mosquito-borne diseases constitute an important cause of morbidity and mortality. The use of personal protective measures (PPM) like mats, bednets, screening, repellents, liquid vaporizers, mosquito coils, and so forth has been advocated as an effective tool in control of mosquito-borne diseases, but data about the safety profile of personal protective measures is still scarce. Objective. To study the usage and side effects of personal protective measures against mosquitoes among current users in Delhi. Materials and Methods. A community-based cross-sectional study among 350 adult individuals selected by systematic sampling method. Data was collected using pretested semistructured questionnaire after taking written informed consent. Data was analysed using SPSS version 17. Chi-square/Fisher's Exact test was used for qualitative variables to find association and P value <0.05 was considered significant. Results. Out of 350 families selected, 210 belonged to rural area and 140 to urban area. Personal protective measures were used by 219 (62.5%) subjects. Liquid vaporizer was the most preferred method (41.4%). Most common perceived side effect of personal protective measures was headache (7.7%). Other perceived side effects were cough (3.2%), sore throat (2.7%), allergy (1.3%), and eye irritation (0.9%) predominantly among coil users. Conclusion. There is a need to have a close watch for side effects of personal protective measures among users. Further research is also needed to develop safe and effective personal protective measures against mosquitoes.

  18. Protection detail. Protecting against breach of electronic protected health information.

    PubMed

    Blass, Gerry; Miller, Susan A

    2010-01-01

    Covered entities need to conduct risk assessments that cover the requirements of HIPAA, HITECH and Meaningful use, and create a process for steady and consistent mitigation of known gaps and vulnerabilities based on risk. Reducing risk of vulnerabilities of unauthorized access to your ePHI can be done via safeguards and controls, plus audits and monitoring. When reducing risk is outside of a covered entities control, audits and monitoring are required in order to demonstrate due diligence. Know where your ePHI is stored, where it is at risk, and take steps now to reduce or eliminate the risk. Encrypt vulnerable locations. Encrypt sensitive data. By doing so, you will be protecting your organization by reducing risk of breach of ePHI. Finally, don't forget what is sometimes considered to be the hardest part--documenting your compliance activities in order to demonstrate evidence of due diligence in and avoid major $$$$ penalties for negligence under the HITECH Act of 2009.

  19. Divulging Personal Information within Learning Analytics Systems

    ERIC Educational Resources Information Center

    Ifenthaler, Dirk; Schumacher, Clara

    2015-01-01

    The purpose of this study was to investigate if students are prepared to release any personal data in order to inform learning analytics systems. Besides the well-documented benefits of learning analytics, serious concerns and challenges are associated with the application of these data driven systems. Most notably, empirical evidence regarding…

  20. Government Doublethink: Protection or Suppression in Information.

    ERIC Educational Resources Information Center

    Drake, Miriam A.

    2003-01-01

    Discusses regulations and actions related to government withholding, suppressing, and altering information since September 11, 2001. Topics include conflicting goals of an informed citizenry versus national security, science and technology progress versus protection of sensitive information, and public health versus ideology; political pressure;…

  1. Government Doublethink: Protection or Suppression in Information.

    ERIC Educational Resources Information Center

    Drake, Miriam A.

    2003-01-01

    Discusses regulations and actions related to government withholding, suppressing, and altering information since September 11, 2001. Topics include conflicting goals of an informed citizenry versus national security, science and technology progress versus protection of sensitive information, and public health versus ideology; political pressure;…

  2. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... operations areas and Safeguards Information in the hands of any person subject to the requirements of § 73.21... protected as Safeguards Information include non-public security-related requirements such as: (1) Physical protection. Information not classified as Restricted Data or National Security Information related...

  3. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... operations areas and Safeguards Information in the hands of any person subject to the requirements of § 73.21... protected as Safeguards Information include non-public security-related requirements such as: (1) Physical protection. Information not classified as Restricted Data or National Security Information related...

  4. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... operations areas and Safeguards Information in the hands of any person subject to the requirements of § 73.21... protected as Safeguards Information include non-public security-related requirements such as: (1) Physical protection. Information not classified as Restricted Data or National Security Information related...

  5. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... operations areas and Safeguards Information in the hands of any person subject to the requirements of § 73.21... protected as Safeguards Information include non-public security-related requirements such as: (1) Physical protection. Information not classified as Restricted Data or National Security Information related...

  6. Thermal Materials Protect Priceless, Personal Keepsakes

    NASA Technical Reports Server (NTRS)

    2014-01-01

    NASA astronaut Scott Parazynski led the development of materials and techniques for the inspection and repair of the shuttle’s thermal protection system. Parazynski later met Chris Shiver of Houston-based DreamSaver Enterprises LLC and used concepts from his work at Johnson Space Center to develop an enclosure that can withstand 98 percent of residential fires.

  7. 32 CFR 806b.10 - How to collect personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false How to collect personal information. 806b.10... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.10 How to collect personal information. Collect personal information directly from the subject of the record whenever possible. Only ask...

  8. Information Protection Engineering: Using Technology and Experience to Protect Assets

    DTIC Science & Technology

    2001-07-01

    advantage con- tained within intellectual capital , trade secrets, or other proprietary information. Newspaper headlines tell the story: • USA Today, 5...of-the-art computing and tele-communications technology, they find themselves increasingly vulner- able to compromises of hard-won intellectual ... capital , business secrets, and proprietary information. Moreover, the need to protect the integrity of infor- mation is equally important, even when

  9. Adaptive interface for personalizing information seeking.

    PubMed

    Narayanan, S; Koppaka, Lavanya; Edala, Narasimha; Loritz, Don; Daley, Raymond

    2004-12-01

    An adaptive interface autonomously adjusts its display and available actions to current goals and abilities of the user by assessing user status, system task, and the context. Knowledge content adaptability is needed for knowledge acquisition and refinement tasks. In the case of knowledge content adaptability, the requirements of interface design focus on the elicitation of information from the user and the refinement of information based on patterns of interaction. In such cases, the emphasis on adaptability is on facilitating information search and knowledge discovery. In this article, we present research on adaptive interfaces that facilitates personalized information seeking from a large data warehouse. The resulting proof-of-concept system, called source recommendation system (SRS), assists users in locating and navigating data sources in the repository. Based on the initial user query and an analysis of the content of the search results, the SRS system generates a profile of the user tailored to the individual's context during information seeking. The user profiles are refined successively and are used in progressively guiding the user to the appropriate set of sources within the knowledge base. The SRS system is implemented as an Internet browser plug-in to provide a seamless and unobtrusive, personalized experience to the users during the information search process. The rationale behind our approach, system design, empirical evaluation, and implications for research on adaptive interfaces are described in this paper.

  10. Personal protective equipment with integrated POF sensors

    NASA Astrophysics Data System (ADS)

    Witt, J.; Schukar, M.; Krebber, K.; Pažoutová, H.; Demuth, J.; Santostefano, N.; Mäkinen, H.; Pietrowski, P.

    2013-05-01

    Within the EU project i-Protect fibre optic sensors for measuring heart rate, respiratory rate and skin temperature are being developed. The plastic optical fibre (POF) sensors are based on macrobending effects, photoplethysmography and fluorescence thermometry. The sensors and monitoring units are integrated into underwear and are communicating wireless via body area network and communication unit with the rescue command centre. All sensors can be removed from the underwear to allow washing the textile. First prototypes of the fibre optic sensors were tested in comparison to commercial reference sensors.

  11. Personal Health Information Management: Consumers’ Perspectives

    PubMed Central

    Civan, Andrea; Skeels, Meredith M.; Stolyar, Anna; Pratt, Wanda

    2006-01-01

    Personal health information management (PHIM) refers to activities that support consumers’ access, integration, organization, and use of their personal health information. We investigated PHIM in the health consumer population using a focus group and participatory design. In collaboration with health consumers, we identified PHIM activities and explored the design of new supportive technology. Our findings describe prominent PHIM activities such as monitoring and assessing health, as well as health-related decision making, planning, and action. We describe design principles our participants used during the participatory design of a PHIM tool. These include individual control, sharing, integration, security and flexibility. These findings provide new insights into emerging ideas in consumer health informatics research and technology design. Understanding health consumers’ PHIM needs is an important step in creating technology to support these needs. PMID:17238322

  12. 77 FR 26776 - Agency Information Collection Activities: Declaration of Persons Who Performed Repairs or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Declaration of Persons Who Performed Repairs or Alterations AGENCY: U.S. Customs and Border Protection, Department of... collection. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security will...

  13. Predictors affecting personal health information management skills.

    PubMed

    Kim, Sujin; Abner, Erin

    2016-01-01

    This study investigated major factors affecting personal health records (PHRs) management skills associated with survey respondents' health information management related activities. A self-report survey was used to assess individuals' personal characteristics, health knowledge, PHR skills, and activities. Factors underlying respondents' current PHR-related activities were derived using principal component analysis (PCA). Scale scores were calculated based on the results of the PCA, and hierarchical linear regression analyses were used to identify respondent characteristics associated with the scale scores. Internal consistency of the derived scale scores was assessed with Cronbach's α. Among personal health information activities surveyed (N = 578 respondents), the four extracted factors were subsequently grouped and labeled as: collecting skills (Cronbach's α = 0.906), searching skills (Cronbach's α = 0.837), sharing skills (Cronbach's α = 0.763), and implementing skills (Cronbach's α = 0.908). In the hierarchical regression analyses, education and computer knowledge significantly increased the explanatory power of the models. Health knowledge (β = 0.25, p < 0.001) emerged as a positive predictor of PHR collecting skills. This study confirmed that PHR training and learning should consider a full spectrum of information management skills including collection, utilization and distribution to support patients' care and prevention continua.

  14. Predictors affecting personal health information management skills

    PubMed Central

    Abner, Erin

    2016-01-01

    Objectives This study investigated major factors affecting personal health records (PHRs) management skills associated with survey respondents’ health information management related activities. Methods A self-report survey was used to assess individuals’ personal characteristics, health knowledge, PHR skills, and activities. Factors underlying respondents current PHR-related activities were derived using Principle Component Analysis (PCA). Scale scores were calculated based on the results of the PCA, and hierarchical linear regression analyses were used to identify respondent characteristics associated with the scale scores. Internal consistency of the derived scale scores was assessed with Cronbach’s alpha. Results Among personal health information activities surveyed (N=578 respondents), the four extracted factors were subsequently grouped and labeled as: Collecting Skills (Cronbach’s α = .906), Searching skills (Cronbach’s α = .837), Sharing skills (Cronbach’s α = .763), and Implementing skills (Cronbach’s α = .908). In the hierarchical regression analyses, education and computer knowledge significantly increased the explanatory power of the models. Health knowledge (β = 0.25, P < 0.001) emerged as a positive predictor of PHR Collecting skills. Conclusions This study confirmed that PHR training and learning should consider a full spectrum of information management skills including collection, utilization, and distribution to support patients’ care and prevention continua. PMID:26268728

  15. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.6 Right of parent to... personal information to a website or online service, the operator of that website or online service is... permit the operator's further use or future online collection of personal information from that child...

  16. Rights to information access under the Data Protection Act.

    PubMed

    Dimond, Bridgit

    A patient has a legal right to access personal information held by health professionals on the basis of statutory provisions, such as the Data Protection Act 1998 and the regulations made under that Act, the Access to Health Reports Act 1988 (which is considered in a later article), and also on the basis of the common law, i.e. judge made or case law. Neither legal rights, however, give the patient an absolute right, but are qualified.

  17. Personalized genomic results: analysis of informational needs.

    PubMed

    Schmidlen, Tara J; Wawak, Lisa; Kasper, Rachel; García-España, J Felipe; Christman, Michael F; Gordon, Erynn S

    2014-08-01

    Use of genomic information in healthcare is increasing; however data on the needs of consumers of genomic information is limited. The Coriell Personalized Medicine Collaborative (CPMC) is a longitudinal study investigating the utility of personalized medicine. Participants receive results reflecting risk of common complex conditions and drug-gene pairs deemed actionable by an external review board. To explore the needs of individuals receiving genomic information we reviewed all genetic counseling sessions with CPMC participants. A retrospective qualitative review of notes from 157 genetic counseling inquiries was conducted. Notes were coded for salient themes. Five primary themes; "understanding risk", "basic genetics", "complex disease genetics", "what do I do now?" and "other" were identified. Further review revealed that participants had difficulty with basic genetic concepts, confused relative and absolute risks, and attributed too high a risk burden to individual single nucleotide polymorphisms (SNPs). Despite these hurdles, counseled participants recognized that behavior changes could potentially mitigate risk and there were few comments alluding to an overly deterministic or fatalistic interpretation of results. Participants appeared to recognize the multifactorial nature of the diseases for which results were provided; however education to understand the complexities of genomic risk information was often needed.

  18. A guide to unclassified sensitive information protection

    SciTech Connect

    Donahue, S.C.

    1996-11-14

    This document is a reference guide for CIC-Division employees who lead or participate in projects that use and/or produce unclassified sensitive information. It is intended for use on a case by case basis to develop project specific sensitive information handling procedures and standards. It contains criteria for identifying sensitive information and determining levels of sensitivity, and describes cost effective measures for protecting various levels of sensitive information. The goal of this document is to help establish good business practices that benefit both the Laboratory and its customers. Division personnel are encouraged to apply these guidelines.

  19. Web-browser encryption of personal health information

    PubMed Central

    2011-01-01

    Background Electronic health records provide access to an unprecedented amount of clinical data for research that can accelerate the development of effective medical practices. However it is important to protect patient confidentiality, as many medical conditions are stigmatized and disclosure could result in personal and/or financial loss. Results We describe a system for remote data entry that allows the data that would identify the patient to be encrypted in the web browser of the person entering the data. These data cannot be decrypted on the server by the staff at the data center but can be decrypted by the person entering the data or their delegate. We developed this system to solve a problem that arose in the context of clinical research, but it is applicable in a range of situations where sensitive information is stored and updated in a database and it is necessary to ensure that it cannot be viewed by any except those intentionally given access. Conclusion By developing this system, we are able to centralize the collection of some patient data while minimizing the risk that protected health information be made available to study personnel who are not authorized to use it. PMID:22073940

  20. Personalized online information search and visualization

    PubMed Central

    Chen, Dongquan; Orthner, Helmuth F; Sell, Susan M

    2005-01-01

    Background The rapid growth of online publications such as the Medline and other sources raises the questions how to get the relevant information efficiently. It is important, for a bench scientist, e.g., to monitor related publications constantly. It is also important, for a clinician, e.g., to access the patient records anywhere and anytime. Although time-consuming, this kind of searching procedure is usually similar and simple. Likely, it involves a search engine and a visualization interface. Different words or combination reflects different research topics. The objective of this study is to automate this tedious procedure by recording those words/terms in a database and online sources, and use the information for an automated search and retrieval. The retrieved information will be available anytime and anywhere through a secure web server. Results We developed such a database that stored searching terms, journals and et al., and implement a piece of software for searching the medical subject heading-indexed sources such as the Medline and other online sources automatically. The returned information were stored locally, as is, on a server and visible through a Web-based interface. The search was performed daily or otherwise scheduled and the users logon to the website anytime without typing any words. The system has potentials to retrieve similarly from non-medical subject heading-indexed literature or a privileged information source such as a clinical information system. The issues such as security, presentation and visualization of the retrieved information were thus addressed. One of the presentation issues such as wireless access was also experimented. A user survey showed that the personalized online searches saved time and increased and relevancy. Handheld devices could also be used to access the stored information but less satisfactory. Conclusion The Web-searching software or similar system has potential to be an efficient tool for both bench scientists

  1. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  2. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  3. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  4. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  5. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  6. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Personal protective equipment. 50-204.7 Section 50-204.7 Public Contracts and Property Management Other Provisions Relating to Public Contracts PUBLIC CONTRACTS, DEPARTMENT OF LABOR 204-SAFETY AND HEALTH STANDARDS FOR FEDERAL SUPPLY...

  7. 49 CFR 238.117 - Protection against personal injury.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Protection against personal injury. 238.117 Section 238.117 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... voltage equipment, electrical conductors and switches, and pipes carrying hot fluids or gases on...

  8. 49 CFR 238.117 - Protection against personal injury.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Protection against personal injury. 238.117 Section 238.117 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... voltage equipment, electrical conductors and switches, and pipes carrying hot fluids or gases on...

  9. 29 CFR 1926.28 - Personal protective equipment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 8 2012-07-01 2012-07-01 false Personal protective equipment. 1926.28 Section 1926.28 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION General Safety and Health...

  10. 29 CFR 1926.28 - Personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 8 2010-07-01 2010-07-01 false Personal protective equipment. 1926.28 Section 1926.28 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION General Safety and Health...

  11. 29 CFR 1926.28 - Personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 8 2013-07-01 2013-07-01 false Personal protective equipment. 1926.28 Section 1926.28 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION General Safety and Health...

  12. AIDS: Teaching Persons with Disabilities To Better Protect Themselves.

    ERIC Educational Resources Information Center

    Levy, Philip H.; And Others

    The Young Adult Institute (YAI), a private, nonprofit agency serving developmentally disabled persons in the New York City metropolitan area, designed and implemented a program which used a videotape and detailed staff training manual to teach clients how better to protect themselves from contracting acquired immune deficiency syndrome (AIDS). The…

  13. Evaluation of commercial products for personal protection against mosquitoes

    USDA-ARS?s Scientific Manuscript database

    Human landing catch studies were conducted in a semi-field setting to determine the efficacy of seven commercial products used for personal protection against mosquitoes. Experiments were conducted in two empty, insecticide free, greenhouse compartments, in Israel, with either 1500 Aedes albopictus...

  14. A patient privacy protection scheme for medical information system.

    PubMed

    Lu, Chenglang; Wu, Zongda; Liu, Mingyong; Chen, Wei; Guo, Junfang

    2013-12-01

    In medical information systems, there are a lot of confidential information about patient privacy. It is therefore an important problem how to prevent patient's personal privacy information from being disclosed. Although traditional security protection strategies (such as identity authentication and authorization access control) can well ensure data integrity, they cannot prevent system's internal staff (such as administrators) from accessing and disclosing patient privacy information. In this paper, we present an effective scheme to protect patients' personal privacy for a medical information system. In the scheme, privacy data before being stored in the database of the server of a medical information system would be encrypted using traditional encryption algorithms, so that the data even if being disclosed are also difficult to be decrypted and understood. However, to execute various kinds of query operations over the encrypted data efficiently, we would also augment the encrypted data with additional index, so as to process as much of the query as possible at the server side, without the need to decrypt the data. Thus, in this paper, we mainly explore how the index of privacy data is constructed, and how a query operation over privacy data is translated into a new query over the corresponding index so that it can be executed at the server side immediately. Finally, both theoretical analysis and experimental evaluation validate the practicality and effectiveness of our proposed scheme.

  15. Hazard Assessment of Personal Protective Clothing for Hydrogen Peroxide Service

    NASA Technical Reports Server (NTRS)

    Greene, Ben; McClure, Mark B.; Johnson, Harry T.

    2004-01-01

    Selection of personal protective equipment (PPE) for hydrogen peroxide service is an important part of the hazard assessment process. But because drip testing of chemical protective clothing for hydrogen peroxide service has not been reported for about 40 years, it is of great interest to test new protective clothing materials with new, high-concentration hydrogen peroxide following similar procedures. The suitability of PPE for hydrogen peroxide service is in part determined by observations made when hydrogen peroxide is dripped onto swatches of protective clothing material. Protective clothing material was tested as received, in soiled condition, and in grossly soiled condition. Materials were soiled by pretreating the material with potassium permanganate (KMnO4) solution then drying to promote a reaction. Materials were grossly soiled with solid KMnO4 to greatly promote reaction. Observations of results including visual changes to the hydrogen peroxide and materials, times to ignition, and self-extinguishing characteristics of the materials are reported.

  16. Chlorobenzylidenemalonitrile Gas Exposure from A Novelty Personal-Protection Gun

    PubMed Central

    Dong, Christopher; de la Garza, Albert

    2007-01-01

    We present an unusual case of chlorobenzylidenemalonitrile (CS) tear-gas exposure from the unwitting discharge of a personal-protection handgun loaded with CS gas. The gun was in a bag of toys purchased from a local thrift store and was discharged by a child. The responding paramedic presumptively identified the substance as CS based solely on personal experience. This recognition led to suboptimal field management of the incident with the paramedic failing to follow the standard operating procedures for an unknown chemical exposure. As this was a benign agent, there were no serious consequences. This case highlights the pre-hospital and emergency department challenges associated with the management of an unknown chemical exposure and the potential consequences if the chemical is a toxic substance. A methodical approach following established protocols can reduce the potential for negative outcomes. Review of the literature found no other report of CS gas exposure from such a personal-protection weapon. PMID:20440402

  17. EPA Plan for Reducing Personally Identifiable Information, January 2013

    EPA Pesticide Factsheets

    The EPA Privacy Policy, issued in 2007, establishes the framework and accountability for reducing Agency personally identifiable information (PII). Learn about the Agency's plan to reduce the collection of Personally Identifiable Information (PII).

  18. The Delicate Balance: Reconciling Privacy Protection with the Freedom of Information Principle.

    ERIC Educational Resources Information Center

    McCamus, John D.

    1986-01-01

    This comparison of freedom of information legislation in Canada and the United States focuses on the concern evident in both to protect personal privacy. Specific criteria for achieving a balance between access and privacy are articulated. (CLB)

  19. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Protection of restricted data and national security... Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National...

  20. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Protection of restricted data and national security... Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National...

  1. 45 CFR 164.524 - Access of individuals to protected health information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... protected health information about the individual in a designated record set, for as long as the protected health information is maintained in the designated record set, except for: (i) Psychotherapy notes; (ii... request for access is made by the individual's personal representative and a licensed health care...

  2. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data...

  3. 22 CFR 96.26 - Protection of information and documents by the accrediting entity.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of information and documents by the... ACCREDITATION OF AGENCIES AND APPROVAL OF PERSONS UNDER THE INTERCOUNTRY ADOPTION ACT OF 2000 (IAA) Evaluation of Applicants for Accreditation and Approval § 96.26 Protection of information and documents by...

  4. Hiding personal information reveals the worst.

    PubMed

    John, Leslie K; Barasz, Kate; Norton, Michael I

    2016-01-26

    Seven experiments explore people's decisions to share or withhold personal information, and the wisdom of such decisions. When people choose not to reveal information--to be "hiders"--they are judged negatively by others (experiment 1). These negative judgments emerge when hiding is volitional (experiments 2A and 2B) and are driven by decreases in trustworthiness engendered by decisions to hide (experiments 3A and 3B). Moreover, hiders do not intuit these negative consequences: given the choice to withhold or reveal unsavory information, people often choose to withhold, but observers rate those who reveal even questionable behavior more positively (experiments 4A and 4B). The negative impact of hiding holds whether opting not to disclose unflattering (drug use, poor grades, and sexually transmitted diseases) or flattering (blood donations) information, and across decisions ranging from whom to date to whom to hire. When faced with decisions about disclosure, decision-makers should be aware not just of the risk of revealing, but of what hiding reveals.

  5. 32 CFR 806b.10 - How to collect personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false How to collect personal information. 806b.10 Section 806b.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.10 How to collect personal information...

  6. 32 CFR 806b.10 - How to collect personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false How to collect personal information. 806b.10 Section 806b.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.10 How to collect personal information...

  7. 32 CFR 806b.10 - How to collect personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false How to collect personal information. 806b.10 Section 806b.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.10 How to collect personal information...

  8. 32 CFR 806b.10 - How to collect personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false How to collect personal information. 806b.10 Section 806b.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.10 How to collect personal information...

  9. 40 CFR 370.60 - How does a person obtain MSDS information about a specific facility?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false How does a person obtain MSDS... obtain MSDS information about a specific facility? Any person may obtain an MSDS for a specific facility by writing to the LEPC and asking for it. (a) If the LEPC has the MSDS, it must provide it to the...

  10. Hiding personal information reveals the worst

    PubMed Central

    John, Leslie K.; Barasz, Kate; Norton, Michael I.

    2016-01-01

    Seven experiments explore people’s decisions to share or withhold personal information, and the wisdom of such decisions. When people choose not to reveal information—to be “hiders”—they are judged negatively by others (experiment 1). These negative judgments emerge when hiding is volitional (experiments 2A and 2B) and are driven by decreases in trustworthiness engendered by decisions to hide (experiments 3A and 3B). Moreover, hiders do not intuit these negative consequences: given the choice to withhold or reveal unsavory information, people often choose to withhold, but observers rate those who reveal even questionable behavior more positively (experiments 4A and 4B). The negative impact of hiding holds whether opting not to disclose unflattering (drug use, poor grades, and sexually transmitted diseases) or flattering (blood donations) information, and across decisions ranging from whom to date to whom to hire. When faced with decisions about disclosure, decision-makers should be aware not just of the risk of revealing, but of what hiding reveals. PMID:26755591

  11. Personal Health Information in Canada: A Comparison of Citizen Expectations and Legislation

    ERIC Educational Resources Information Center

    Peekhaus, Wilhelm

    2008-01-01

    This paper explores whether the Canadian legislative protections in place to safeguard medical privacy meet the expectations of Canadians. An overview of current governance systems designed to protect the privacy of personal health information at both the federal and provincial levels is first presented. This is followed by an empirical analysis…

  12. Personal Health Information in Canada: A Comparison of Citizen Expectations and Legislation

    ERIC Educational Resources Information Center

    Peekhaus, Wilhelm

    2008-01-01

    This paper explores whether the Canadian legislative protections in place to safeguard medical privacy meet the expectations of Canadians. An overview of current governance systems designed to protect the privacy of personal health information at both the federal and provincial levels is first presented. This is followed by an empirical analysis…

  13. Personal protective equipment and decontamination of adults and children.

    PubMed

    Holland, Michael G; Cawthon, David

    2015-02-01

    Accurate identification of the hazardous material is essential for proper care. Efficient hospital security and triage must prevent contaminated victims from entering the emergency department (ED) and causing secondary contamination. The decontamination area should be located outside the ambulance entrance. Decontamination priorities are protection of the health care worker, utilization of Level C personal protective equipment, and proper decontamination of the exposed patient. Decontamination proceeds in a head-to-toe sequence. Run-off water is a hazardous waste. Hospital and Community Management Planning for these emergencies is essential for proper preparation and effective response to the hazardous materials incident. Copyright © 2015 Elsevier Inc. All rights reserved.

  14. Commercial products that convey personal health information in emergencies.

    PubMed

    Potini, Vishnu C; Weerasuriya, Dilani N; Lowery-North, Douglas W; Kellermann, Arthur L

    2011-12-01

    Describe commercially available products and services designed to convey personal health information in emergencies. The search engine Google®, supplemented by print ads, was used to identify companies and organizations that offer relevant products and services to the general market. Disease-specific, health system, and health plan-specific offerings were excluded. Vendor web sites were the primary sources of information, supplemented by telephone and e-mail queries to sales representatives. Perfect inter-rater agreement was achieved. Thirty-nine unique vendors were identified. Eight sell engraved jewelry. Three offer an embossed card or pamphlet. Twelve supply USB drives with various features. Eleven support password-protected web sites. Five maintain national call centers. Available media differed markedly with respect to capacity and accessibility. Quoted prices ranged from a one-time expenditure of $3.50 to an annual fee of $200. Associated features and annual fees varied widely. A wide range of products and services exist to help patients convey personal health information. Health care providers should be familiar with their features, so they can access the information in a disaster or emergency.

  15. 76 FR 17935 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... SECURITY Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National... Programs Directorate (NPPD), Office of Infrastructure Protection (IP) will submit the following Information... the Critical Infrastructure Information Act of 2002, (Sections 211-215, Title II, Subtitle B of the...

  16. [Safety analysis for astronaut and the personal protective equipment].

    PubMed

    Chen, J D; Sun, J B; Shi, H P; Sun, H L

    1999-12-01

    Objective. To analyze and study astronaut and his personal equipment safety. Method. Three of the most widely used approaches, failure mode and effect analysis (FMEA), fault tree analysis (FTA) and system hazards analysis (SHA) were used. Result. It was demonstrated that astronaut and the personal equipment are subjected to various potential hazards, such as human errors, astronaut illness, fire or space suit emergency decompression, etc. Their causes, mechanisms, possible effects and criticality of some critical potential hazards were analyzed and identified in more details with considerations of the historic accidents of manned spaceflight. And the compensating provisions and preventive measures for each hazard were discussed. Conclusion. The analysis study may be helpful in enhancing the safety of the astronaut and its personal protective equipment.

  17. Interoperability design of personal health information import service.

    PubMed

    Tuomainen, Mika; Mykkänen, Juha

    2012-01-01

    Availability of personal health information for individual use from professional patient records is an important success factor for personal health information management (PHIM) solutions such as personal health records. In this paper we focus on this crucial part of personal wellbeing information management splutions and report the interoperability design of personal information import service. Key requirements as well as design factors for interfaces between PHRs and EPRs are discussed. Open standards, low implementation threshold and the acknowledgement of local market and conventions are emphasized in the design.

  18. Optical encryption of personal identification information using orthogonal code

    NASA Astrophysics Data System (ADS)

    Islam, Mohammed N.; Alam, Mohammad S.

    2006-05-01

    Optical information processing techniques have been developed for information security and fraud deterrent applications. Several encryption methods have been proposed in the literature, which includes optical double random-phase encryption, polarization encoding, encryption and verification using a multiplexed minimum average correlation energy phase-encrypted filter. All these reports employed a pseudo-random number for the code. But as such numbers are not uncorrelated, the security is not guaranteed because a wrong code may also extract some of the features of the coded information. The objective of the paper is to develop an optical security system employing orthogonal code for protection of personal identification information. As the orthogonal codes have zero or minimum cross-correlation depending on the offset between the codes, a wrong code can not decrypt any information. Here a simple encryption technique is proposed in spatial domain, where the input images are first spread in one dimension using an optical lens and then multiplied by the respective code. Finally, the individual encrypted images are superimposed on a common spatial domain. The individual images can then be decrypted by correlating the received signal with the respective address code. Computer simulation results show that any information containing binary characters can be encrypted and then decrypted successfully. The encrypted images are found to be secure, because no unwanted reproduction is possible without having the appropriate code. The technique also offers an efficient use of the storage or transmission capacity. Therefore, the proposed optical encryption technique can be applied to securing personal identification or similar information.

  19. 78 FR 24234 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Personal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-24

    ...; Personal Protective Equipment Standard for General Industry ACTION: Notice. SUMMARY: The Department of... collection request (ICR) titled, ``Personal Protective Equipment Standard for General Industry,'' to the... that personal protective equipment (PPE)--including equipment for eyes, face, head, and extremities...

  20. Experimental Evaluation of the Effectiveness Offered by Different Types of Personal Protective Clothing Against Nanoaerosols

    NASA Astrophysics Data System (ADS)

    Domat, M.; Pla, J.; Cadavid-Rodríguez, M. C.; Fito, C.

    2017-06-01

    The rapid expansion of nanotechnology is outpacing health and safety recommendations for engineered nanomaterials. Thus, there is a lack of information about the effects that nanomaterials can induce in the human health. Nevertheless, workers in nanotechnology-related industries are potentially at risk of being exposed to nanomaterials. Therefore, there is a need of characterize the behaviour of personal protective equipment against penetration nanoparticles, in order to provide an adequate protection to the workers. In this study, the efficiency of several protective dermal equipment against water-based NaCl aerosol was evaluated. For this purpose, different protective clothing and gloves were selected to carry out the assays, simulating typical use conditions of protective equipment under occupational settings. Results obtained exposed that the level of protection offered by the distinct types of personal protective coveralls depended not only on the fabric, but also on their fitting to the body of the subject. On the other hand, the efficiency of the protective gloves was set in the range from 95% to 99%, depending on the thickness and the type of material.

  1. River Protection Project information systems assessment

    SciTech Connect

    JOHNSON, A.L.

    1999-07-28

    The Information Systems Assessment Report documents the results from assessing the Project Hanford Management Contract (PHMC) Hanford Data Integrator 2000 (HANDI 2000) system, Business Management System (BMS) and Work Management System phases (WMS), with respect to the System Engineering Capability Assessment Model (CAM). The assessment was performed in accordance with the expectations stated in the fiscal year (FY) 1999 Performance Agreement 7.1.1, item (2) which reads, ''Provide an assessment report on the selected Integrated Information System by July 31, 1999.'' This report assesses the BMS and WMS as implemented and planned for the River Protection Project (RPP). The systems implementation is being performed under the PHMC HANDI 2000 information system project. The project began in FY 1998 with the BMS, proceeded in FY 1999 with the Master Equipment List portion of the WMS, and will continue the WMS implementation as funding provides. This report constitutes an interim quality assessment providing information necessary for planning RPP's information systems activities. To avoid confusion, HANDI 2000 will be used when referring to the entire system, encompassing both the BMS and WMS. A graphical depiction of the system is shown in Figure 2-1 of this report.

  2. [Management System of Personal Data Protection in the Health Care Field].

    PubMed

    Yamamoto, Ryuichi

    2014-11-01

    In Japan, the law on personal data protection was enacted in 2005. Privacy is a human right, including the 1981 right to be let alone. The need for confidentiality in the health care field has been accepted since the ancient Greek era, and privacy in the 19th century was developed in this field. However, the concept of privacy has gradually altered, especially due to the development of information technology. The author suggests that the guideline for the security of heath information systems of the Ministry of Health, Labour, and Welfare is very important and information security management with PDCA cycles is essential for personal data protection in the health care field. In recent years, gathering a large amount of life logging or health-related data and analyzing such data for academic and/or industrial applications has become common. Revising privacy protection legislation has become an urgent political issue in many countries. The Japanese Government published their policy to personal data protection act in Dec. 2013. Balancing public benefit and privacy is a major task of future legislation. The author recommends that health care professionals pay attention to, participate in the discussion of, and make suggestions regarding this act.

  3. Insect repellents and associated personal protection for a reduction in human disease

    USDA-ARS?s Scientific Manuscript database

    Personal protection measures against biting arthropods include topical insect repellents, area repellents, insecticide-treated bednets and treated clothing. The literature on the effectiveness of personal protection products against arthropods is mainly limited to studies of prevention of bites, rat...

  4. Risk-Accepting Personality and Personal Protective Equipment Use within the Agricultural Health Study

    PubMed Central

    DellaValle, Curt T.; Hoppin, Jane A.; Hines, Cynthia J.; Andreotti, Gabriella; Alavanja, Michael C.R.

    2012-01-01

    Pesticide exposures can be reduced by use of personal protective equipment as well as proper mixing and application practices. We examined the effects of risk-accepting personality on personal protective equipment (PPE) use and mixing and application practices among private pesticide applicators and their spouses within the Agricultural Health Study (AHS) in Iowa and North Carolina and commercial applicators in Iowa. The AHS follow-up questionnaire included four questions designed to assess attitudes toward risk. Analysis was limited to those who were currently working on a farm or registered as a commercial applicator and indicated current pesticide use (n=25,166). Respondents who answered three or more questions in the affirmative (private applicators: n=4,160 (21%); commercial applicators: n=199 (14%); spouses: n=829 (23%)) were classified as having a risk-accepting personality. Logistic regression was used to evaluate specific work practices associated with risk-accepting attitudes. Among private applicators, the likelihood of using any PPE when mixing or loading pesticides was lower among risk-acceptors compared to risk-averse individuals (odds ratio (OR) = 0.72; 95% Confidence Interval (CI): 0.65 – 0.79). A similar relationship was observed among commercial applicators (OR = 0.77, 95% CI: 0.34 – 1.77) but not among spouses (OR = 1.09, 95% CI: 0.90 – 1.33). Among private applicators, risk-acceptors were more likely than the risk-averse to apply pesticides within 50 ft of the home (OR=1.21; 95% CI: 1.01 – 1.44), compared to further than ¼ mile. Our findings suggest that the decisions to use personal protective equipment and properly handle/apply pesticides may be driven by risk-accepting personality traits. PMID:22732067

  5. Effects of personal experience on self-protective behavior.

    PubMed

    Weinstein, N D

    1989-01-01

    This article seeks to further our understanding of self-protective behavior by examining the effects of a particularly powerful stimulus to action: personal experience. It reviews the effects of automobile accidents on seat belt use, criminal victimization other than rape on individual crime prevention efforts, natural hazards experience on both natural hazards preparedness and compliance with evacuation warnings, and myocardial infarction on smoking. Theories suggesting mechanisms that could link personal experience to behavior are described, and data concerning the effects of experience on some key variables in these theories are discussed. Tentative propositions are offered to resolve the many apparent discrepancies in this literature. These propositions concern the effects of experience on risk perceptions, the influence of experience on risk salience, the specificity of responses to victimization, and the duration of experience effects.

  6. Evaluation of commercial products for personal protection against mosquitoes.

    PubMed

    Revay, Edita E; Junnila, Amy; Xue, Rui-De; Kline, Daniel L; Bernier, Ulrich R; Kravchenko, Vasiliy D; Qualls, Whitney A; Ghattas, Nina; Müller, Günter C

    2013-02-01

    Human landing catch studies were conducted in a semi-field setting to determine the efficacy of seven commercial products used for personal protection against mosquitoes. Experiments were conducted in two empty, insecticide free, mesh-enclosed greenhouses, in Israel, with either 1500 Aedes albopictus or 1500 Culex pipiens released on consecutive study nights. The products tested in this study were the OFF!(®) Clip-On™ Mosquito Repellent (Metofluthrin 31.2%) and the Terminix(®) ALLCLEAR(®) Sidekick Mosquito Repeller (Cinnamon oil 10.5%; Eugenol 13%; Geranium oil 21%; Peppermint 5.3%; Lemongrass oil 2.6%), which are personal diffusers; Super Band™ Wristband (22% Citronella oil) and the PIC(®) Citronella Plus Wristband (Geraniol 15%; Lemongrass oil 5%, Citronella oil 1%); the Sonic Insect Repeller Keychain; the Mosquito Guard Patch (Oil of Lemon Eucalyptus 80mg), an adhesive-backed sticker for use on textiles; and the Mosquito Patch (vitamin B1 300mg), a transdermal patch. It was determined that the sticker, transdermal patch, wristbands and sonic device did not provide significant protection to volunteers compared with the mosquito attack rate on control volunteers who were not wearing a repellent device. The personal diffusers: - OFF!(®) Clip-On™ and Terminix(®) ALLCLEAR(®) Sidekick - provided superior protection compared with all other devices in this study. These diffusers reduced biting on the arms of volunteers by 96.28% and 95.26% respectively, for Ae. albopictus, and by 94.94% and 92.15% respectively, for Cx. pipiens. In a second trial conducted to compare these devices directly, biting was reduced by the OFF!(®) Clip-On™ and the Terminix(®) ALLCLEAR(®) by 87.55% and 92.83%, respectively, for Ae. albopictus, and by 97.22% and 94.14%, respectively, for Cx. pipiens. There was no significant difference between the performances of the two diffusers for each species.

  7. Large-scale Health Information Database and Privacy Protection*1

    PubMed Central

    YAMAMOTO, Ryuichi

    2016-01-01

    Japan was once progressive in the digitalization of healthcare fields but unfortunately has fallen behind in terms of the secondary use of data for public interest. There has recently been a trend to establish large-scale health databases in the nation, and a conflict between data use for public interest and privacy protection has surfaced as this trend has progressed. Databases for health insurance claims or for specific health checkups and guidance services were created according to the law that aims to ensure healthcare for the elderly; however, there is no mention in the act about using these databases for public interest in general. Thus, an initiative for such use must proceed carefully and attentively. The PMDA*2 projects that collect a large amount of medical record information from large hospitals and the health database development project that the Ministry of Health, Labour and Welfare (MHLW) is working on will soon begin to operate according to a general consensus; however, the validity of this consensus can be questioned if issues of anonymity arise. The likelihood that researchers conducting a study for public interest would intentionally invade the privacy of their subjects is slim. However, patients could develop a sense of distrust about their data being used since legal requirements are ambiguous. Nevertheless, without using patients’ medical records for public interest, progress in medicine will grind to a halt. Proper legislation that is clear for both researchers and patients will therefore be highly desirable. A revision of the Act on the Protection of Personal Information is currently in progress. In reality, however, privacy is not something that laws alone can protect; it will also require guidelines and self-discipline. We now live in an information capitalization age. I will introduce the trends in legal reform regarding healthcare information and discuss some basics to help people properly face the issue of health big data and privacy

  8. Large-scale Health Information Database and Privacy Protection.

    PubMed

    Yamamoto, Ryuichi

    2016-09-01

    Japan was once progressive in the digitalization of healthcare fields but unfortunately has fallen behind in terms of the secondary use of data for public interest. There has recently been a trend to establish large-scale health databases in the nation, and a conflict between data use for public interest and privacy protection has surfaced as this trend has progressed. Databases for health insurance claims or for specific health checkups and guidance services were created according to the law that aims to ensure healthcare for the elderly; however, there is no mention in the act about using these databases for public interest in general. Thus, an initiative for such use must proceed carefully and attentively. The PMDA projects that collect a large amount of medical record information from large hospitals and the health database development project that the Ministry of Health, Labour and Welfare (MHLW) is working on will soon begin to operate according to a general consensus; however, the validity of this consensus can be questioned if issues of anonymity arise. The likelihood that researchers conducting a study for public interest would intentionally invade the privacy of their subjects is slim. However, patients could develop a sense of distrust about their data being used since legal requirements are ambiguous. Nevertheless, without using patients' medical records for public interest, progress in medicine will grind to a halt. Proper legislation that is clear for both researchers and patients will therefore be highly desirable. A revision of the Act on the Protection of Personal Information is currently in progress. In reality, however, privacy is not something that laws alone can protect; it will also require guidelines and self-discipline. We now live in an information capitalization age. I will introduce the trends in legal reform regarding healthcare information and discuss some basics to help people properly face the issue of health big data and privacy

  9. Biological Aerosol Test Method and Personal Protective Equipment (PPE) Decon

    DTIC Science & Technology

    2011-05-01

    time they were used for viral TCID50 assay(s). The Spearman – Karber formula (Appendix C, C-3) was used to determine the concentration of viable virus...300 mL 50% glutaraldehyde, 2700 mL H2O. E-3 Virus quantification Spearman – Karber formula L = log10 TCID50 titer = X0 - (d/2) + d *∑ri/ni...AFRL-RX-TY-TR-2010-0070 BIOLOGICAL AEROSOL TEST METHOD AND PERSONAL PROTECTIVE EQUIPMENT (PPE) DECON Steven H. Hinrichs, Michael B

  10. Efficiency of personal protective equipment used in agriculture.

    PubMed

    Meirelles, Luiz Antônio; Veiga, Marcelo Motta; de Castro Moura Duarte, Francisco José

    2012-01-01

    Despite the practical importance of Personal Protective Equipment (PPE), both in production and in consumption, it is observed a main problem regarding the quality of many PPE�s used in Brazil. This study found a gap between the state of the art and the state of prevailing practices in the design of PPE�s, which main consequences affect the health of workers who use PPE in agriculture activities. The results of this study identified legal constraints of this occurrence, involving the validation of PPE designed for isolate agents, without the analysis of relevant activities and without prototypes experiments in more frequent use situation.

  11. Influences of Information Availability on Cognitive Processes in Person Perception.

    ERIC Educational Resources Information Center

    Lingle, John H.; Ostrom, Thomas M.

    Three experiments were conducted investigating information processing in a person perception task. A sequential judgement paradigm was employed in which subjects judged the suitability of stimulus persons for two different occupations. Traits describing each person were present for subjects' first judgements but not their second. Second decision…

  12. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  13. [Protection of genetic data in Spain. Analysis based on the general principles of personal data protection].

    PubMed

    García Amez, Javier

    2006-01-01

    The genetic data is Spain is not regulated specifically, rather, we must look at the regulation on the protection of data of a personal nature. This is turn, establishes a series of general principles to apply to any type of data. Analysing this with other regulations that are dispersed both in the national and international regulations, we can deduce the rights and obligations in this field. This highlights the fact that one can't dispose of the genetic data in the same manner as the personal data.

  14. 75 FR 9860 - Release, Handling, and Protection of Restricted Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-04

    ... use or disclosure. (d) If the contractor will be operating an information technology system for NASA..., Security Requirements for Unclassified Information Technology Resources, which requires the implementation of an Information Technology Security Plan to protect information processed, stored, or...

  15. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.5 Individual access to personal information... individuals under this section is not considered a “public release” of information. (c) Verification...

  16. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.4 Collecting personal information. (a) General... information on public Web sites without the express permission of the user. Requests for exceptions must...

  17. [Personal protection measures against blood-sucking insects and ticks].

    PubMed

    Orshan, Laor; Wilamowski, Amos; Pener, Hedva

    2010-09-01

    Blood-sucking arthropods are major vectors of various pathogens like viruses, bacteria, protozoa and nematodes. Preventing exposure to the vector is imperative especially when vaccine and prophylactic treatments are not available. Personal protection measures (PPM) are essential and often the only means available when dealing with blood-sucking disease transmitting arthropods. Awareness of the risk in the specific areas of travel is the first step to be taken before and while traveling. PPM include preventive personal behavior, suitable clothing, application of insect repellents to the skin, the use of space repellents, impregnation of clothing, camping gear and bed nets and, when necessary, ground spraying of insecticides. The registered and recommended active ingredients for skin application are Deet, picaridin (icaridin), p-menthane-3,8-diol (PMD) and IR3535. Volatile pyrethrins are used as space repellents while pyrethroids, especially permethrin, are employed for impregnation and for ground spraying. It is recommended to purchase only products registered in Israel or other developed countries. These products should have a detailed label specifying the concentration of the active ingredient, application instructions and the duration of protection.

  18. The Role of Personality in Musicians' Information Seeking for Creativity

    ERIC Educational Resources Information Center

    Kostagiolas, Petros; Lavranos, Charilaos; Martzoukou, Konstantina; Papadatos, Joseph

    2017-01-01

    Introduction: This paper explores the relationship between musicians' information seeking behaviour and their personality traits within the context of musical creativity. Although previous research has addressed different socio-technological and behavioral aspects of music information seeking, the role of personality characteristics around…

  19. Continuum Thinking and the Contexts of Personal Information Management

    ERIC Educational Resources Information Center

    Huvila, Isto; Eriksen, Jon; Häusner, Eva-Maria; Jansson, Ina-Maria

    2014-01-01

    Introduction: Recent personal information management literature has underlined the significance of the contextuality of personal information and its use. The present article discusses the applicability of the records continuum model and its generalisation, continuum thinking, as a theoretical framework for explicating the overlap and evolution of…

  20. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... for use by individuals who seek access to records about themselves that are maintained in a system of... personal information contained in the system of records except where access may be denied pursuant to an... personal information in a system of records to the system manager or to the office designated in the DoD...

  1. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... for use by individuals who seek access to records about themselves that are maintained in a system of... personal information contained in the system of records except where access may be denied pursuant to an... personal information in a system of records to the system manager or to the office designated in the DoD...

  2. Remote Effect of Insecticide-Treated Nets and the Personal Protection against Malaria Mosquito Bites.

    PubMed

    Moiroux, Nicolas; Chandre, Fabrice; Hougard, Jean-Marc; Corbel, Vincent; Pennetier, Cédric

    2017-01-01

    Experimental huts are part of the WHO process for testing and evaluation of Insecticide Treated Nets (ITN) in semi-field conditions. Experimental Hut Trials (EHTs) mostly focus on two main indicators (i.e., mortality and blood feeding reduction) that serve as efficacy criteria to obtain WHO interim recommendation. However, several other outputs that rely on counts of vectors collected in the huts are neglected although they can give useful information about vectors' behavior and personal protection provided by ITNs. In particular, EHTs allow to measure the deterrent effect and personal protection of ITNs. To provide a better assessment of ITNs efficacy, we performed a retrospective analysis of the deterrence and the personal protection against malaria transmission for 12 unwashed and 13 washed ITNs evaluated through EHTs conducted in West Africa. A significant deterrent effect was shown for six of the 12 unwashed ITNs tested. When washed 20 times, only three ITNs had significant deterrent effect (Rate Ratios (RR)<1; p<0.05) and three showed an apparent "attractiveness" (RR>1; p<0.01). When compared to the untreated net, all unwashed ITNs showed lower number of blood-fed Anopheles indicating a significant personal protection (RR<1, p<0.05). However, when washed 20 times, three ITNs that were found to be attractive did not significantly reduce human-vector contact (p>0.05). Current WHO efficacy criteria do not sufficiently take into account the deterrence effect of ITNs. Moreover, the deterrence variability is rarely discussed in EHT's reports. Our findings highlighted the long-range effect (deterrent or attractive) of ITNs that may have significant consequences for personal/community protection against malaria transmission. Indicators measuring the deterrence should be further considered for the evaluation of ITNs.

  3. Remote Effect of Insecticide-Treated Nets and the Personal Protection against Malaria Mosquito Bites

    PubMed Central

    Chandre, Fabrice; Hougard, Jean-Marc; Corbel, Vincent; Pennetier, Cédric

    2017-01-01

    Experimental huts are part of the WHO process for testing and evaluation of Insecticide Treated Nets (ITN) in semi-field conditions. Experimental Hut Trials (EHTs) mostly focus on two main indicators (i.e., mortality and blood feeding reduction) that serve as efficacy criteria to obtain WHO interim recommendation. However, several other outputs that rely on counts of vectors collected in the huts are neglected although they can give useful information about vectors’ behavior and personal protection provided by ITNs. In particular, EHTs allow to measure the deterrent effect and personal protection of ITNs. To provide a better assessment of ITNs efficacy, we performed a retrospective analysis of the deterrence and the personal protection against malaria transmission for 12 unwashed and 13 washed ITNs evaluated through EHTs conducted in West Africa. A significant deterrent effect was shown for six of the 12 unwashed ITNs tested. When washed 20 times, only three ITNs had significant deterrent effect (Rate Ratios (RR)<1; p<0.05) and three showed an apparent “attractiveness” (RR>1; p<0.01). When compared to the untreated net, all unwashed ITNs showed lower number of blood-fed Anopheles indicating a significant personal protection (RR<1, p<0.05). However, when washed 20 times, three ITNs that were found to be attractive did not significantly reduce human-vector contact (p>0.05). Current WHO efficacy criteria do not sufficiently take into account the deterrence effect of ITNs. Moreover, the deterrence variability is rarely discussed in EHT’s reports. Our findings highlighted the long-range effect (deterrent or attractive) of ITNs that may have significant consequences for personal/community protection against malaria transmission. Indicators measuring the deterrence should be further considered for the evaluation of ITNs. PMID:28129371

  4. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Rights to request privacy protection for protected... ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights to request privacy protection for protected health information....

  5. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Rights to request privacy protection for protected... ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights to request privacy protection for protected health information....

  6. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Rights to request privacy protection for protected... ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights to request privacy protection for protected health information....

  7. Contamination during doffing of personal protective equipment by healthcare providers

    PubMed Central

    Lim, Seong Mi; Cha, Won Chul; Chae, Minjung Kathy; Jo, Ik Joon

    2015-01-01

    Objective In this study, we aimed to describe the processes of both the donning and the doffing of personal protective equipment for Ebola and evaluate contamination during the doffing process. Methods We recruited study participants among physicians and nurses of the emergency department of Samsung Medical Center in Seoul, Korea. Participants were asked to carry out doffing and donning procedures with a helper after a 50-minute brief training and demonstration based on the 2014 Centers for Disease Control and Prevention protocol. Two separate cameras with high-density capability were set up, and the donning and doffing processes were video-taped. A trained examiner inspected all video recordings and coded for intervals, errors, and contaminations defined as the outside of the equipment touching the clinician’s body surface. Results Overall, 29 participants were enrolled. Twenty (68.9%) were female, and the mean age was 29.2 years. For the donning process, the average interval until the end was 234.2 seconds (standard deviation [SD], 65.7), and the most frequent errors occurred when putting on the outer gloves (27.5%), respirator (20.6%), and hood (20.6%). For the doffing process, the average interval until the end was 183.7 seconds (SD, 38.4), and the most frequent errors occurred during disinfecting the feet (37.9%), discarding the scrubs (17.2%), and putting on gloves (13.7%), respectively. During the doffing process, 65 incidences of contamination occurred (2.2 incidents/person). The most vulnerable processes were removing respirators (79.2%), removing the shoe covers (65.5%), and removal of the hood (41.3%). Conclusion A significant number of contaminations occur during the doffing process of personal protective equipment. PMID:27752591

  8. Protecting quantum information with optimal control

    NASA Astrophysics Data System (ADS)

    Grace, Matthew

    Quantum computation (QC) holds the promise of efficiently solving problems which are practically intractable for classical computers. However, realizing this advantage requires the precise control of a quantum information processor (QIP) and effective protection of this processor from the pernicious inuence of decoherence induced by the surrounding environment. Therefore, the ability to generate high-fidelity logical operations in the presence of environmental coupling is crucial. Methods of optimal control are applied to the field of quantum information processing, providing practical solutions for the generation of logical operations and the suppression of undesired environmental effects. The work contained in this dissertation explores important aspects of system and control design. Results obtained in this work (i) illustrate how practical QC can be greatly facilitated by optimal control theory and (ii) reveal interesting physical insights through the discovery of effective control mechanisms. A special design of the physical structure of quantum information systems is formulated which is naturally immune to certain types of decoherence and yields tremendous flexibility in the construction of logical operations for QC. A fundamental component of this design involves encoding the logical basis states of a quantum bit into multiple physical levels of the corresponding quantum system. This design also makes the QIP better suited for the interaction with ultrafast broadband laser fields used in quantum control applications. Numerical simulations demonstrate the utility of this encoding approach for thermally excited quantum systems. Optimization algorithms are developed which generate controls that protect the QIP from the effects of the environment, with or without the weak-coupling or Born approximation, and simultaneously achieve a target objective, e.g., a state-to-state transition or unitary quantum operation. For the optimal control of quantum operations, a

  9. Personal genomic information management and personalized medicine: challenges, current solutions, and roles of HIM professionals.

    PubMed

    Alzu'bi, Amal; Zhou, Leming; Watzlaf, Valerie

    2014-01-01

    In recent years, the term personalized medicine has received more and more attention in the field of healthcare. The increasing use of this term is closely related to the astonishing advancement in DNA sequencing technologies and other high-throughput biotechnologies. A large amount of personal genomic data can be generated by these technologies in a short time. Consequently, the needs for managing, analyzing, and interpreting these personal genomic data to facilitate personalized care are escalated. In this article, we discuss the challenges for implementing genomics-based personalized medicine in healthcare, current solutions to these challenges, and the roles of health information management (HIM) professionals in genomics-based personalized medicine.

  10. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or...

  11. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or...

  12. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or...

  13. Permeation Resistance of Personal Protective Equipment Materials to Monomethyhydrazine

    NASA Technical Reports Server (NTRS)

    Waller, J. M.; Williams, J. H.

    1997-01-01

    Permeation resistance was determined by measuring the breakthrough time and time-averaged vapor transmission rate of monomethylhydrazine (MMH) through two types of personal protective equipment (PPE). The two types of PPE evaluated were the totally encapsulating ILC Dover Chemturion Model 1212 chemical protective suit with accessories, and the FabOhio polyvinyl chloride (PVC) splash garment. Two exposure scenarios were simulated: (1) a saturated vapor exposure for 2 hours (h), and (2) a brief MMH 'splash' followed by a 2-h saturated vapor exposure. Time-averaged MMH concentrations inside the totally-encapsulating suit were calculated by summation of the area-weighted contributions made by each suit component. Results show that the totally encapsulating suit provides adequate protection at the new 10 ppb Threshold Limit Value Time-Weighted Average (TLV-TWA). The permeation resistance of the PVC splash garment to MMH was poorer than any of the totally encapsulating suit materials tested. Breakthrough occurred soon after initial vapor or 'splash' exposure.

  14. Permeation Resistance of Personal Protective Equipment Materials to Monomethyhydrazine

    NASA Technical Reports Server (NTRS)

    Waller, J. M.; Williams, J. H.

    1997-01-01

    Permeation resistance was determined by measuring the breakthrough time and time-averaged vapor transmission rate of monomethylhydrazine (MMH) through two types of personal protective equipment (PPE). The two types of PPE evaluated were the totally encapsulating ILC Dover Chemturion Model 1212 chemical protective suit with accessories, and the FabOhio polyvinyl chloride (PVC) splash garment. Two exposure scenarios were simulated: (1) a saturated vapor exposure for 2 hours (h), and (2) a brief MMH 'splash' followed by a 2-h saturated vapor exposure. Time-averaged MMH concentrations inside the totally-encapsulating suit were calculated by summation of the area-weighted contributions made by each suit component. Results show that the totally encapsulating suit provides adequate protection at the new 10 ppb Threshold Limit Value Time-Weighted Average (TLV-TWA). The permeation resistance of the PVC splash garment to MMH was poorer than any of the totally encapsulating suit materials tested. Breakthrough occurred soon after initial vapor or 'splash' exposure.

  15. DEVELOPMENT OF PERSONAL PROTECTIVE EQUIPMENT FOR DECONTAMINATION AND DECOMMISSIONING

    SciTech Connect

    M.A. Ebadian, Ph.D.

    1999-01-01

    The purpose of this one-year investigation is to perform a technology integration/search, thereby ensuring that the safest and most cost-effective options are developed and subsequently used during the deactivation and decommissioning (D&D) of U.S. Department of Energy Environmental Management (DOE-EM) sites. Issues of worker health and safety are the main concern, followed by cost. Two lines of action were explored: innovative Personal Cooling Systems (PCS) and Personal Monitoring Equipment (PME). PME refers to sensors affixed to the worker that warn of an approaching heat stress condition, thereby preventing it. Three types of cooling systems were investigated: Pre-Chilled or Forced-Air System (PCFA), Umbilical Fluid-Chilled System (UFCS), and Passive Vest System (PVS). Of these, the UFCS leads the way. The PVS or Gel pack vest lagged due to a limited cooling duration. And the PCFA or chilled liquid air supply was cumbersome and required an expensive and complex recharge system. The UFCS in the form of the Personal Ice Cooling System (PICS) performed exceptionally. The technology uses a chilled liquid circulating undergarment and a Personal Protective Equipment (PPE) external pump and ice reservoir. The system is moderately expensive, but the recharge is low-tech and inexpensive enough to offset the cost. There are commercially available PME that can be augmented to meet the DOE's heat stress alleviation need. The technology is costly, in excess of $4,000 per unit. Workers easily ignore the alarm. The benefit to health & safety is indirect so can be overlooked. A PCS is a more justifiable expenditure.

  16. Managing Personal and Group Collections of Information

    NASA Technical Reports Server (NTRS)

    Wolfe, Shawn R.; Wragg, Stephen D.; Chen, James R.; Koga, Dennis (Technical Monitor)

    1999-01-01

    The internet revolution has dramatically increased the amount of information available to users. Various tools such as search engines have been developed to help users find the information they need from this vast repository. Users often also need tools to help manipulate the growing amount of useful information they have discovered. Current tools available for this purpose are typically local components of web browsers designed to manage URL bookmarks. They provide limited functionalities to handle high information complexities. To tackle this have created DIAMS, an agent-based tool to help users or groups manage their information collections and share their collections with other. the main features of DIAMS are described here.

  17. Are Norms of Disclosure of Online and Offline Personal Information Associated with the Disclosure of Personal Information Online?

    ERIC Educational Resources Information Center

    Mesch, Gustavo S.; Beker, Guy

    2010-01-01

    This study investigated whether norms of self-disclosure of one's online and offline identity are linked to online disclosure of personal and intimate information. We expected online disclosure of personal and intimate information to be associated with norms of online disclosure. Secondary analysis of the 2006 Pew and American Life Survey of…

  18. Are Norms of Disclosure of Online and Offline Personal Information Associated with the Disclosure of Personal Information Online?

    ERIC Educational Resources Information Center

    Mesch, Gustavo S.; Beker, Guy

    2010-01-01

    This study investigated whether norms of self-disclosure of one's online and offline identity are linked to online disclosure of personal and intimate information. We expected online disclosure of personal and intimate information to be associated with norms of online disclosure. Secondary analysis of the 2006 Pew and American Life Survey of…

  19. The Personalized Information Retrieval Model Based on User Interest

    NASA Astrophysics Data System (ADS)

    Gong, Songjie

    Personalized information retrieval systems can help customers to gain orientation in information overload by determining which items are relevant for their interests. One type of information retrieval is content-based filtering. In content-based filtering, items contain words in natural language. Meanings of words in natural language are often ambiguous. The problem of word meaning disambiguation is often decomposed to determining semantic similarity of words. In this paper, the architecture of personalized information retrieval based on user interest is presented. The architecture includes user interface model, user interest model, detecting interest model and update model. It established a user model for personalized information retrieval based on user interest keyword list on client server, which can supply personalized information retrieval service for user with the communications and collaboration of all modules of the architecture.

  20. 48 CFR 32.1104 - Protection of EFT information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Protection of EFT... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 32.1104 Protection of EFT information. The Government shall protect against improper disclosure of contractors' EFT information. ...

  1. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Environmental protection information. 673.4... FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a) Any... States shall notify expedition members of the environmental protection obligations of the...

  2. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Environmental protection information. 673.4... FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a) Any... States shall notify expedition members of the environmental protection obligations of the...

  3. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Environmental protection information. 673.4... FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a) Any... States shall notify expedition members of the environmental protection obligations of the...

  4. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Environmental protection information. 673.4... FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a) Any... States shall notify expedition members of the environmental protection obligations of the...

  5. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 2 2013-07-01 2013-07-01 false Public information and consumer.../Maintenance Program Requirements § 51.368 Public information and consumer protection. (a) Public awareness... the test that were failed. (b) Consumer protection. The oversight agency shall institute procedures...

  6. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 2 2011-07-01 2011-07-01 false Public information and consumer.../Maintenance Program Requirements § 51.368 Public information and consumer protection. (a) Public awareness... the test that were failed. (b) Consumer protection. The oversight agency shall institute procedures...

  7. 48 CFR 32.1104 - Protection of EFT information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Protection of EFT... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 32.1104 Protection of EFT information. The Government shall protect against improper disclosure of contractors' EFT information....

  8. 48 CFR 32.1104 - Protection of EFT information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Protection of EFT... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 32.1104 Protection of EFT information. The Government shall protect against improper disclosure of contractors' EFT information....

  9. 48 CFR 32.1104 - Protection of EFT information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Protection of EFT... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 32.1104 Protection of EFT information. The Government shall protect against improper disclosure of contractors' EFT information....

  10. 48 CFR 32.1104 - Protection of EFT information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Protection of EFT... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 32.1104 Protection of EFT information. The Government shall protect against improper disclosure of contractors' EFT information....

  11. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 2 2010-07-01 2010-07-01 false Public information and consumer.../Maintenance Program Requirements § 51.368 Public information and consumer protection. (a) Public awareness... the test that were failed. (b) Consumer protection. The oversight agency shall institute...

  12. Review of personal protection equipment used in practice.

    PubMed

    Hinkin, Jon; Gammon, John; Cutter, Jayne

    2008-01-01

    Standard precautions offer a consistent approach to infection control that does not rely on knowledge or suspicion of infection, and contributes to staff and patient safety by reducing the risk of exposure to potentially infectious material. One of the cornerstones of standard precautions is the appropriate use of personal protective equipment (PPE) whenever contact with blood or body fluids is anticipated. However, evidence suggests that compliance with standard precautions including correct use of PPE is inadequate. Demographic and epidemiological changes in the U.K., and the drive to provide more complex patient care outside acute hospitals may lead to increased infection risks for both patients and community healthcare workers. This review examines the importance and use of PPE by community nurses and discusses the implications for practice of poor compliance with standard precautions. Recommendations for practice will be made aimed at improving compliance with this important element of standard precautions.

  13. Personal protective equipment provision in prehospital care: a national survey.

    PubMed

    Krzanicki, D A; Porter, K M

    2009-12-01

    Safety in prehospital practice is a paramount principle. Personal protective equipment (PPE) use is intrinsic to safe practice. There is varied guidance as to what constitutes effective PPE. No evidence is available of what current provision encompasses. A questionnaire-based study directed to all ambulance trusts, British Association for Immediate Care (BASICS) schemes and air ambulance operations in England, Scotland and Wales. Total response rate was in excess of 66%. A specific protocol for PPE use was issued by 81%, 89% and 38% of ambulance trusts, air ambulance and BASICS schemes, respectively. There was a wide variation in provision of PPE both within and between different groups of providers. Fewer than 55% of providers had an evaluation system in place for reviewing PPE use. Many reasons account for the differences in provision. There is a clear need for a standard to be set nationally in conjunction with locally implemented evaluation and re-accreditation processes.

  14. 16 CFR 312.7 - Prohibition against conditioning a child's participation on collection of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Prohibition against conditioning a child's participation on collection of personal information. 312.7 Section 312.7 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.7...

  15. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of personal information collected from children. 312.8 Section 312.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8...

  16. Trust-based information system architecture for personal wellness.

    PubMed

    Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd

    2014-01-01

    Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed.

  17. PROMOTING FLUOROSCOPIC PERSONAL RADIATION PROTECTION EQUIPMENT: UNFAMILIARITY, FACTS AND FEARS.

    PubMed

    Balter, Stephen

    2017-04-01

    An incomplete understanding of risk can cause inappropriate fear. Personal protective equipment (PPE) offered for the prevention of brain cancer in interventional fluoroscopists (IR-PPE). Similar items are offered for cell-phone use (RF-PPE). Publications on fluoroscopy staff brain cancer and similar papers on cell-phone induced brain cancer were reviewed. An internet safety product search was performed, which resulted in many tens of thousands of hits. Vendor claims for either ionizing radiation or radio frequency products seldom addressed the magnitude of the risk. Individuals and institutions can buy a wide variety of safety goods. Any purchase of radioprotective equipment reduces the funds available to mitigate other safety risks. The estimated cost of averting an actuarial fatal brain cancer appears to be in the order of magnitude $10 000 000-$100 000 000. Unwarranted radiation fears should not drive the radiation protection system to the point of decreasing overall safety. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  18. 45 CFR 170.210 - Standards for health information technology to protect electronic health information created...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... protect electronic health information created, maintained, and exchanged. 170.210 Section 170.210 Public... Technology § 170.210 Standards for health information technology to protect electronic health information... integrity protected link. (b) Record actions related to electronic health information. The date, time...

  19. 45 CFR 170.210 - Standards for health information technology to protect electronic health information created...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... protect electronic health information created, maintained, and exchanged. 170.210 Section 170.210 Public... Technology § 170.210 Standards for health information technology to protect electronic health information... integrity protected link. (b) Record actions related to electronic health information. The date, time...

  20. Management Guide to the Protection of Information Resources.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…

  1. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Protection of foreign government information... SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Foreign Government Information § 2400.38 Protection of foreign government...

  2. Are Informant Reports of Personality More Internally Consistent Than Self Reports of Personality?

    PubMed

    Balsis, Steve; Cooper, Luke D; Oltmanns, Thomas F

    2015-08-01

    The present study examined whether informant-reported personality was more or less internally consistent than self-reported personality in an epidemiological community sample (n = 1,449). Results indicated that across the 5 NEO (Neuroticism-Extraversion-Openness) personality factors and the 10 personality disorder trait dimensions, informant reports tended to be more internally consistent than self reports, as indicated by equal or higher Cronbach's alpha scores and higher average interitem correlations. In addition, the informant reports collectively outperformed the self reports for predicting responses on a global measure of health, indicating that the informant reports are not only more reliable than self reports, but they can also be useful in predicting an external criterion. Collectively these findings indicate that informant reports tend to have greater internal consistency than self reports.

  3. RFID Based Context Information Security System Architecture for Securing Personal Information under Ubiquitous Environment

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Park, Gil-Cheol; Kim, Seoksoo

    2007-12-01

    In this study, framework for securing personal information among various contexts collected and utilized under ubiquitous environment is proposed. The proposed framework will analyze relativity among information used to determine the exposure of personal information according to circumstances where personal information is used. In addition, the study will define the definition of role-based structure and propose a structure applying password security system according to access level. Furthermore, the study will propose a method for building information security system using RFID tag information which generates context information.

  4. Personal property at the Oak Ridge Operations Office and the Office of Scientific and Technical Information

    SciTech Connect

    1998-04-01

    The Oak Ridge Operations Office (Operations Office) and the Office of Scientific and Technical Information (OSTI) are responsible for safeguarding and controlling personal property in their possession and in the possession of their contractors. Categories of personal property include vehicles, heavy mobile equipment, computers and software, office furniture and equipment, laboratory equipment, security and protection equipment, and shop equipment. The objective of this audit was to determine whether the Operations Office and OSTI adequately safeguarded and properly accounted for personal property in their possession and in the possession of their non-integrated contractors.

  5. Personal Information Search on Mobile Devices

    DTIC Science & Technology

    2007-09-01

    comparable features and capabilities. They have a microprocessor , read only memory (ROM), random access memory (RAM), a communication module, a...fails, the information in the RAM can be lost [19]. Modern mobile phones are generally equipped with system level microprocessors , which cut down on...or stereo , as well as for playing computer games, recording survey responses, and GPS (Global Positioning System) receivers. Newer PDAs also have

  6. Smartphone Mobile Application Delivering Personalized, Real-Time Sun Protection Advice: A Randomized Clinical Trial

    PubMed Central

    Buller, David B.; Berwick, Marianne; Lantz, Kathy; Buller, Mary Klein; Shane, James; Kane, Ilima; Liu, Xia

    2014-01-01

    Importance Mobile smart phones are rapidly emerging as an effective means of communicating with many Americans. Using mobile applications, they can access remote databases, track time and location, and integrate user input to provide tailored health information. Objective A smart phone mobile application providing personalized, real-time sun protection advice was evaluated in a randomized trial. Design The trial was conducted in 2012 and had a randomized pretest-posttest controlled design with a 10-week follow-up. Setting Data was collected from a nationwide population-based survey panel. Participants The trial enrolled a sample of n=604 non-Hispanic and Hispanic adults from the Knowledge Panel® aged 18 or older who owned an Android smart phone. Intervention The mobile application provided advice on sun protection (i.e., protection practices and risk of sunburn) and alerts (to apply/reapply sunscreen and get out of the sun), hourly UV Index, and vitamin D production based on the forecast UV Index, phone's time and location, and user input. Main Outcomes and Measures Percent of days using sun protection and time spent outdoors (days and minutes) in the midday sun and number of sunburns in the past 3 months were collected. Results Individuals in the treatment group reported more shade use but less sunscreen use than controls. Those who used the mobile app reported spending less time in the sun and using all protection behaviors combined more. Conclusions and Relevance The mobile application improved some sun protection. Use of the mobile application was lower than expected but associated with increased sun protection. Providing personalized advice when and where people are in the sun may help reduce sun exposure. PMID:25629710

  7. 78 FR 53478 - Proposed Information Collection; United States Park Police Personal History Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-29

    ... National Park Service Proposed Information Collection; United States Park Police Personal History Statement... Police Personal History Statement) to collect detailed personal history information from applicants... information, including financial data and residence history. Selective Service information and military...

  8. [Personalized medicine and individual healthcare : Medical and information technology aspects].

    PubMed

    Niederlag, W; Lemke, H U; Rienhoff, O

    2010-08-01

    The individualization of medicine and healthcare appears to be following a general societal trend. The terms "personalized medicine" and "personal health" are used to describe this process. Here it must be emphasized that personalized medicine is not limited to pharmacogenomics, but that the spectrum of personalized medicine is much broader. Applications range from individualized diagnostics, patient-specific pharmacological therapy, therapy with individual prostheses and implants to therapy approaches using autologous cells, and from patient model-based therapy in the operating room, electronic patient records through to the individual care of patients in their home environment with the use of technical systems and services. Although in some areas practical solutions have already been found, most applications will not be fully developed for many years to come. Medical and information technology are essential to personalized medicine and personal health, each driving the other forward.

  9. A security system for personal genome information at DNA level.

    PubMed

    Kawazoe, Yumi; Shiba, Toshikazu; Yamamoto, Masahito; Ohuchi, Azuma

    2002-01-01

    The personal information encoded in genomic DNA should not be made available to the public. With the increasing discoveries of new genes, it has become necessary to establish a security system for personal genome information. Although many security systems that are applied for electrical information in computers have been developed and established, there is no security system for information at DNA level. In this paper, we describe a new security system for information encoded within DNA. The original genomic DNA was mixed with many kinds of dummy DNAs (mixtures of natural and/or artificial DNAs) resulting in the masking of the original information. Using these dummy molecules, we succeeded to completely 'lock'the original genome information. If this information must be 'unlocked', it can be extracted and analyzed by a removal of dummy DNAs using molecular tagging techniques or by selective amplification using key primers.

  10. Implementing personalized medicine with asymmetric information on prevalence rates.

    PubMed

    Antoñanzas, Fernando; Juárez-Castelló, Carmelo A; Rodríguez-Ibeas, Roberto

    2016-12-01

    Although personalized medicine is becoming the new paradigm to manage some diseases, the economics of personalized medicine have only focused on assessing the efficiency of specific treatments, lacking a theoretical framework analyzing the interactions between pharmaceutical firms and healthcare systems leading to the implementation of personalized treatments. We model the interaction between the hospitals and the manufacturer of a new treatment as an adverse selection problem where the firm does not have perfect information on the prevalence across hospitals of the genetic characteristics of the patients making them eligible to receive a new treatment. As a result of the model, hospitals with high prevalence rates benefit from the information asymmetry only when the standard treatment is inefficient when applied to the patients eligible to receive the new treatment. Otherwise, information asymmetry has no value. Personalized medicine may be fully or partially implemented depending on the proportion of high prevalence hospitals.

  11. Blocking of Person Information in Small Social Groupings: The Information of Person Categories.

    DTIC Science & Technology

    1983-12-20

    activity can be seen as an exten- sion of early impression formation research (e.g., Asch , 1946) and its focus on the nature of person gestalts. That...implications of the present results for current theoretical and empirical orientations toward impression formation research. ’NV Blocking of Person... impression formation involves studying reactions to an isolated target person. This stands in marked contrast to the manner in which we typically receive

  12. 76 FR 50487 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-15

    ... SECURITY Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National... Information (PCII) Stakeholder Survey. DHS previously published this ICR in the Federal Register on March 31... Federal, state, and local entities with homeland security duties. This survey is designed to...

  13. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any other...

  14. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any other...

  15. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any other...

  16. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any other...

  17. Stockpile Model of Personal Protective Equipment in Taiwan.

    PubMed

    Chen, Yu-Ju; Chiang, Po-Jung; Cheng, Yu-Hsin; Huang, Chun-Wei; Kao, Hui-Yun; Chang, Chih-Kai; Huang, Hsun-Miao; Liu, Pei-Yin; Wang, Jen-Hsin; Chih, Yi-Chien; Chou, Shu-Mei; Yang, Chin-Hui; Chen, Chang-Hsun

    The Taiwan Centers for Disease Control (Taiwan CDC) has established a 3-tier personal protective equipment (PPE) stockpiling framework that could maintain a minimum stockpile for the surge demand of PPE in the early stage of a pandemic. However, PPE stockpiling efforts must contend with increasing storage fees and expiration problems. In 2011, the Taiwan CDC initiated a stockpile replacement model in order to optimize the PPE stockpiling efficiency, ensure a minimum stockpile, use the government's limited funds more effectively, and achieve the goal of sustainable management. This stockpile replacement model employs a first-in-first-out principle in which the oldest stock in the central government stockpile is regularly replaced and replenished with the same amount of new and qualified products, ensuring the availability and maintenance of the minimum stockpiles. In addition, a joint electronic procurement platform has been established for merchandising the replaced PPE to local health authorities and medical and other institutions for their routine or epidemic use. In this article, we describe the PPE stockpile model in Taiwan, including the 3-tier stockpiling framework, the operational model, the components of the replacement system, implementation outcomes, epidemic supports, and the challenges and prospects of this model.

  18. Stockpile Model of Personal Protective Equipment in Taiwan

    PubMed Central

    Chen, Yu-Ju; Cheng, Yu-Hsin; Huang, Chun-Wei; Kao, Hui-Yun; Chang, Chih-Kai; Huang, Hsun-Miao; Liu, Pei-Yin; Wang, Jen-Hsin; Chih, Yi-Chien; Chou, Shu-Mei; Yang, Chin-Hui; Chen, Chang-Hsun

    2017-01-01

    The Taiwan Centers for Disease Control (Taiwan CDC) has established a 3-tier personal protective equipment (PPE) stockpiling framework that could maintain a minimum stockpile for the surge demand of PPE in the early stage of a pandemic. However, PPE stockpiling efforts must contend with increasing storage fees and expiration problems. In 2011, the Taiwan CDC initiated a stockpile replacement model in order to optimize the PPE stockpiling efficiency, ensure a minimum stockpile, use the government's limited funds more effectively, and achieve the goal of sustainable management. This stockpile replacement model employs a first-in-first-out principle in which the oldest stock in the central government stockpile is regularly replaced and replenished with the same amount of new and qualified products, ensuring the availability and maintenance of the minimum stockpiles. In addition, a joint electronic procurement platform has been established for merchandising the replaced PPE to local health authorities and medical and other institutions for their routine or epidemic use. In this article, we describe the PPE stockpile model in Taiwan, including the 3-tier stockpiling framework, the operational model, the components of the replacement system, implementation outcomes, epidemic supports, and the challenges and prospects of this model. PMID:28418743

  19. 45 CFR 164.502 - Uses and disclosures of protected health information: general rules.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...: adults and emancipated minors. If under applicable law a person has authority to act on behalf of an... authority to act on behalf of an individual who is an unemancipated minor in making decisions related to... act as an individual, with respect to protected health information pertaining to a health care...

  20. Personality and information gathering in free-ranging great tits.

    PubMed

    van Overveld, Thijs; Matthysen, Erik

    2013-01-01

    One aspect of animal personality that has been well described in captivity, but received only little attention in studies in the wild, is that personality types may vary in their behavioural flexibility towards environmental changes. A fundamental factor underlying such differences is believed to be the degree to which individual behavior is guided by environmental stimuli. We tested this hypothesis in the wild using free-ranging great tits. Personality variation was quantified using exploratory behaviour in a novel environment, which has previously been shown to be repeatable and correlated with other behaviours in this and other populations of the same species. By temporarily removing food at feeding stations we examined whether birds with different personality differed in returning to visit empty feeders as this may provide information on how birds continue to sample their environment after a sudden change in conditions. In two summer experiments, we found that fast-exploring juveniles visited empty feeders less often compared to slow-exploring juveniles. In winter, sampling behaviour was sex dependent but not related to personality. In both seasons, we found that birds who sampled empty feeders more often were more likely to rediscover food after we again re-baited the feeding stations, but there was no effect of personality. Our results show that personality types may indeed differ in ways of collecting environmental information, which is consistent with the view of personalities as different styles of coping with environmental changes. The adaptive value of these alternative behavioural tactics, however, needs to be further explored.

  1. 32 CFR 644.394 - Protection of disposal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 4 2011-07-01 2011-07-01 false Protection of disposal information. 644.394... PROPERTY REAL ESTATE HANDBOOK Disposal Predisposal Action § 644.394 Protection of disposal information. To... to Army or Air Force requirements. (The Air Force preliminary real estate disposal directive is not...

  2. 12 CFR 568.5 - Protection of customer information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Protection of customer information. 568.5 Section 568.5 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.5 Protection of customer information. Savings associations and their subsidiaries...

  3. Personal Protective Equipment: Protecting Health Care Providers in an Ebola Outbreak.

    PubMed

    Fischer, William A; Weber, David; Wohl, David A

    2015-11-01

    The recent Ebola epidemic that devastated West Africa has infected and killed more health care providers than any other outbreak in the history of this virus. An improved understanding of pathogen transmission and the institution of strategies to protect health care providers against infection are needed in infectious disease outbreaks. This review connects what is known about Ebola virus transmission with personal protective equipment (PPE) designed to arrest nosocomial transmission. Articles pertaining to filovirus transmission and PPE in filovirus outbreaks were reviewed and findings are presented. In addition, studies that evaluated PPE and donning and doffing strategies are presented. PPE is one step in a comprehensive infection prevention and control strategy that is required to protect health care providers. Given that the Ebola virus is primarily transmitted through direct contact of mucous membranes and cuts in the skin with infected patients and/or their bodily fluids, it is necessary to cover these potential portals of infection with PPE as part of a structured and instructed donning and doffing procedure. Current recommendations about PPE and the donning and doffing processes are based on anecdotal experience. However, the use of non-human viruses can help provide evidence-based guidelines on both PPE and donning and doffing processes. Copyright © 2015 Elsevier HS Journals, Inc. All rights reserved.

  4. A Study of Personal Information Management Strategies for Online Faculty

    ERIC Educational Resources Information Center

    Kearns, Lorna R.; Frey, Barbara A.; Tomer, Christinger; Alman, Susan

    2014-01-01

    The literature suggests that personal information management is a serious challenge for many computer users. Online faculty are especially challenged because of the large number of electronic files necessitated by teaching online. Those who have experience in this environment may offer valuable insights regarding information management challenges…

  5. Using personality characteristics to individualize information to cancer patient.

    PubMed

    Kallergis, G

    2008-01-01

    Disclosure of information to cancer patients is an issue of continuous and great interest. There is a wide-scale debate underway about the questions "do we disclose diagnosis or not", "what should we tell", "how much information should we reveal". Usually, the answers to those questions are general rules of approaching the patient, instructions and general communication skills. What we are missing here is individualization, tailoring information and communication to each patient according to their own personality characteristics. The purpose of this paper was to provide a guide that will make individualization possible, taking into account personality characteristics. We provide a description of the main personality types and of how we can use character traits to inform a patient or otherwise, how do we tailor information to a patient's personality characteristics. Thus, we address the questions of how much do we inform, what words should we use, what do we say, when do we say it and how can information be in line with the therapeutic relationship and patient follow up. On the whole, there is the view that information within the context of doctor-patient communication should be a subject of training. We agree with this view and that is one of the reasons why training workshops are being held at the Metaxa Cancer Hospital.

  6. The User-Subjective Approach to Personal Information Management Systems.

    ERIC Educational Resources Information Center

    Bergman, Ofer; Beyth-Marom, Ruth; Nachmias, Rafi

    2003-01-01

    Explains personal information management (PIM) systems and suggests a user-subjective approach to PIM system design. Advocates that PIM systems relate to the subjective value-added attributes that the user gives the stored data so that the user can find information again, recall it when needed, and use it effectively in the next interaction.…

  7. Information Centers for Newly Blind Persons in Israel.

    ERIC Educational Resources Information Center

    Dickstein, N.; Gozovsky, M.

    1994-01-01

    This article describes the development and implementation of an innovative program of information centers in Israel that is designed to identify newly blind persons and to give them first-hand information about available services, as well as to stimulate an awareness of rehabilitation services among medical personnel. (Author/DB)

  8. Personal Genomic Information Management and Personalized Medicine: Challenges, Current Solutions, and Roles of HIM Professionals

    PubMed Central

    Alzu'bi, Amal; Zhou, Leming; Watzlaf, Valerie

    2014-01-01

    In recent years, the term personalized medicine has received more and more attention in the field of healthcare. The increasing use of this term is closely related to the astonishing advancement in DNA sequencing technologies and other high-throughput biotechnologies. A large amount of personal genomic data can be generated by these technologies in a short time. Consequently, the needs for managing, analyzing, and interpreting these personal genomic data to facilitate personalized care are escalated. In this article, we discuss the challenges for implementing genomics-based personalized medicine in healthcare, current solutions to these challenges, and the roles of health information management (HIM) professionals in genomics-based personalized medicine. PMID:24808804

  9. Shared Expectations for Protection of Identifiable Health Care Information

    PubMed Central

    Wynia, Matthew K; Coughlin, Steven S; Alpert, Sheri; Cummins, Deborah S; Emanuel, Linda L

    2001-01-01

    ongoing data quality, limitations on how identifiable information may be used, and provisions for meaningful accountability. CONCLUSIONS This process established consensus on 34 measurable ethical expectations for the protection of privacy and confidentiality in health care. These expectations should apply to any organization with access to personally identifiable health information, including managed care organizations, physician groups, hospitals, other provider organizations, and purchasers. Performance measurement on these expectations may improve accountability across the health care system. PMID:11251761

  10. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Physical protection of personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property...-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection of...

  11. Protecting personal data in epidemiological research: DataSHIELD and UK law.

    PubMed

    Wallace, Susan E; Gaye, Amadou; Shoush, Osama; Burton, Paul R

    2014-01-01

    Data from individual collections, such as biobanks and cohort studies, are now being shared in order to create combined datasets which can be queried to ask complex scientific questions. But this sharing must be done with due regard for data protection principles. DataSHIELD is a new technology that queries nonaggregated, individual-level data in situ but returns query data in an anonymous format. This raises questions of the ability of DataSHIELD to adequately protect participant confidentiality. An ethico-legal analysis was conducted that examined each step of the DataSHIELD process from the perspective of UK case law, regulations, and guidance. DataSHIELD reaches agreed UK standards of protection for the sharing of biomedical data. All direct processing of personal data is conducted within the protected environment of the contributing study; participating studies have scientific, ethics, and data access approvals in place prior to the analysis; studies are clear that their consents conform with this use of data, and participants are informed that anonymisation for further disclosure will take place. DataSHIELD can provide a flexible means of interrogating data while protecting the participants' confidentiality in accordance with applicable legislation and guidance. © 2014 S. Karger AG, Basel.

  12. Chest Compression With Personal Protective Equipment During Cardiopulmonary Resuscitation

    PubMed Central

    Chen, Jie; Lu, Kai-Zhi; Yi, Bin; Chen, Yan

    2016-01-01

    Abstract Following a chemical, biological, radiation, and nuclear incident, prompt cardiopulmonary resuscitation (CPR) procedure is essential for patients who suffer cardiac arrest. But CPR when wearing personal protection equipment (PPE) before decontamination becomes a challenge for healthcare workers (HCW). Although previous studies have assessed the impact of PPE on airway management, there is little research available regarding the quality of chest compression (CC) when wearing PPE. A present randomized cross-over simulation study was designed to evaluate the effect of PPE on CC performance using mannequins. The study was set in one university medical center in the China. Forty anesthesia residents participated in this randomized cross-over study. Each participant performed 2 min of CC on a manikin with and without PPE, respectively. Participants were randomized into 2 groups that either performed CC with PPE first, followed by a trial without PPE after a 180-min rest, or vice versa. CPR recording technology was used to objectively quantify the quality of CC. Additionally, participants’ physiological parameters and subjective fatigue score values were recorded. With the use of PPE, a significant decrease of the percentage of effective compressions (41.3 ± 17.1% with PPE vs 67.5 ± 15.6% without PPE, P < 0.001) and the percentage of adequate compressions (67.7 ± 18.9% with PPE vs 80.7 ± 15.5% without PPE, P < 0.001) were observed. Furthermore, the increases in heart rate, mean arterial pressure, and subjective fatigue score values were more obvious with the use of PPE (all P < 0.01). We found significant deterioration of CC performance in HCW with the use of a level-C PPE, which may be a disadvantage for enhancing survival of cardiac arrest. PMID:27057878

  13. How clean is "clean"? Regulations and standards for workplace clothing and personal protective equipment.

    PubMed

    Sirianni, Greg; Borak, Jonathan

    2010-02-01

    To compile current regulations and advisory recommendations on cleanliness of worker clothing and personal protective equipment and to evaluate the adequacy of criteria for determining whether cleanliness has been achieved. Systematic review of information provided by federal agencies (eg, OSHA, MSHA, and NIOSH), nongovernmental advisory bodies (eg, ACGIH, AIHA, and ANSI), and manufacturers of protective clothing and equipment. We identified an array of terms describing "cleanliness" and the processes for achieving "cleanliness" that were almost never defined in regulations and recommendations. We also found a general lack of criteria for determining whether cleanliness and/or sterility have been achieved. There is need to harmonize cleanliness-related terminology, establish best practices for equipment cleaning and sterilization, implement a signage systems to provide equipment-specific cleaning instructions, and adopt objective criteria for determining what is "clean."

  14. Ubiquitous Data Management in a Personal Information Environment

    NASA Astrophysics Data System (ADS)

    Mohammad, Atif Farid

    This paper presents a novel research work on Personal Information Environment (PIE), which is a relatively new field to get explored. PIE is a self managing pervasive environment. It contains an individual's personal pervasive information associated within user's related or non-related contextual environments. Contexts are vitally important because they control, influence and affect everything within them by dominating its pervasive content(s). This paper shows in depth the achievement of Personal Information Environment, which deals with a user's devices, which are to be spontaneous, readily self-manageable on autonomic basis. This paper shows an actual implementation of pervasive data management of a PIE-user, which contains append and update of PIE's data from the last device used by the user to another PIE devices for further processing and storage needs. Data recharging is utilized to transmit and receive data among PIE devices.

  15. What Your Can Do to Protect Your Health Information

    MedlinePlus

    ... computer is lost or stolen. There are medical identity thieves that could try to use your personal ... or physician statements. For more information about medical identity theft, visit the Federal Trade Commission (FTC) website ...

  16. Managing personal health information in distributed research network environments

    PubMed Central

    2013-01-01

    Background Studying rare outcomes, new interventions and diverse populations often requires collaborations across multiple health research partners. However, transferring healthcare research data from one institution to another can increase the risk of data privacy and security breaches. Methods A working group of multi-site research programmers evaluated the need for tools to support data security and data privacy. The group determined that data privacy support tools should: 1) allow for a range of allowable Protected Health Information (PHI); 2) clearly identify what type of data should be protected under the Health Insurance Portability and Accountability Act (HIPAA); and 3) help analysts identify which protected health information data elements are allowable in a given project and how they should be protected during data transfer. Based on these requirements we developed two performance support tools to support data programmers and site analysts in exchanging research data. Results The first tool, a workplan template, guides the lead programmer through effectively communicating the details of multi-site programming, including how to run the program, what output the program will create, and whether the output is expected to contain protected health information. The second performance support tool is a checklist that site analysts can use to ensure that multi-site program output conforms to expectations and does not contain protected health information beyond what is allowed under the multi-site research agreements. Conclusions Together the two tools create a formal multi-site programming workflow designed to reduce the chance of accidental PHI disclosure. PMID:24099117

  17. Managing personal health information in distributed research network environments.

    PubMed

    Bredfeldt, Christine E; Butani, Amy L; Pardee, Roy; Hitz, Paul; Padmanabhan, Sandy; Saylor, Gwyn

    2013-10-08

    Studying rare outcomes, new interventions and diverse populations often requires collaborations across multiple health research partners. However, transferring healthcare research data from one institution to another can increase the risk of data privacy and security breaches. A working group of multi-site research programmers evaluated the need for tools to support data security and data privacy. The group determined that data privacy support tools should: 1) allow for a range of allowable Protected Health Information (PHI); 2) clearly identify what type of data should be protected under the Health Insurance Portability and Accountability Act (HIPAA); and 3) help analysts identify which protected health information data elements are allowable in a given project and how they should be protected during data transfer. Based on these requirements we developed two performance support tools to support data programmers and site analysts in exchanging research data. The first tool, a workplan template, guides the lead programmer through effectively communicating the details of multi-site programming, including how to run the program, what output the program will create, and whether the output is expected to contain protected health information. The second performance support tool is a checklist that site analysts can use to ensure that multi-site program output conforms to expectations and does not contain protected health information beyond what is allowed under the multi-site research agreements. Together the two tools create a formal multi-site programming workflow designed to reduce the chance of accidental PHI disclosure.

  18. Colloquium: Protecting quantum information against environmental noise

    NASA Astrophysics Data System (ADS)

    Suter, Dieter; Álvarez, Gonzalo A.

    2016-10-01

    Quantum technologies represent a rapidly evolving field in which the specific properties of quantum mechanical systems are exploited to enhance the performance of various applications such as sensing, transmission, and processing of information. Such devices can be useful only if the quantum systems also interact with their environment. However, the interactions with the environment can degrade the specific quantum properties of these systems, such as coherence and entanglement. It is therefore essential that the interaction between a quantum system and the environment is controlled in such a way that the unwanted effects of the environment are suppressed while the necessary interactions are retained. This Colloquium gives an overview, aimed at newcomers to this field, of some of the challenges that need to be overcome to achieve this goal. A number of techniques have been developed for this purpose in different areas of physics including magnetic resonance, optics, and quantum information. They include the application of static or time-dependent fields to the quantum system, which are designed to average the effect of the environmental interactions to zero. Quantum error correction schemes were developed to detect and eliminate certain errors that occur during the storage and processing of quantum information. In many physical systems, it is useful to use specific quantum states that are intrinsically less susceptible to environmental noise for encoding the quantum information. The dominant contribution to the loss of information is pure dephasing, i.e., through the loss of coherence in quantum mechanical superposition states. Accordingly, most schemes for reducing loss of information focus on dephasing processes. This is also the focus of this Colloquium.

  19. Personality and Information Gathering in Free-Ranging Great Tits

    PubMed Central

    van Overveld, Thijs; Matthysen, Erik

    2013-01-01

    One aspect of animal personality that has been well described in captivity, but received only little attention in studies in the wild, is that personality types may vary in their behavioural flexibility towards environmental changes. A fundamental factor underlying such differences is believed to be the degree to which individual behavior is guided by environmental stimuli. We tested this hypothesis in the wild using free-ranging great tits. Personality variation was quantified using exploratory behaviour in a novel environment, which has previously been shown to be repeatable and correlated with other behaviours in this and other populations of the same species. By temporarily removing food at feeding stations we examined whether birds with different personality differed in returning to visit empty feeders as this may provide information on how birds continue to sample their environment after a sudden change in conditions. In two summer experiments, we found that fast-exploring juveniles visited empty feeders less often compared to slow-exploring juveniles. In winter, sampling behaviour was sex dependent but not related to personality. In both seasons, we found that birds who sampled empty feeders more often were more likely to rediscover food after we again re-baited the feeding stations, but there was no effect of personality. Our results show that personality types may indeed differ in ways of collecting environmental information, which is consistent with the view of personalities as different styles of coping with environmental changes. The adaptive value of these alternative behavioural tactics, however, needs to be further explored. PMID:23383299

  20. 10 CFR 37.31 - Protection of information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Protection of information. 37.31 Section 37.31 Energy NUCLEAR REGULATORY COMMISSION PHYSICAL PROTECTION OF CATEGORY 1 AND CATEGORY 2 QUANTITIES OF RADIOACTIVE... the regulations and laws. (e) The licensee shall retain all fingerprint and criminal history...

  1. Report: Assessing EPA’s Efforts to Protect Sensitive Information

    EPA Pesticide Factsheets

    Report #2006-S-00006, September 19, 2006. This is the EPA OIG's completed Data Collection Instrument, as prescribed by the PCIE to use in meeting its requirements under OMB Memo M-06-16, Protection of Sensitive Agency Information.

  2. Personal Malpractice Liability of Reference Librarians and Information Brokers.

    ERIC Educational Resources Information Center

    Gray, John A.

    1988-01-01

    Reviews common law contract and tort bases for malpractice liability and their applicability to reference librarians, special librarians, and information brokers. The discussion covers the legal bases for professional malpractice liability, the librarian-patron relationship, the likelihood of lawsuits, and the need for personal liability…

  3. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.4 Collecting personal information. (a) General..., the Privacy Act Statement is not required if the individual is only requested to furnish or verify the... a Privacy Act system of records. (4) When asking an individual for his or her SSN or other...

  4. 32 CFR 327.6 - Collecting personal information

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) PRIVACY PROGRAM DEFENSE COMMISSARY AGENCY PRIVACY ACT PROGRAM § 327.6 Collecting personal information (a... identification purposes in connection with the normal use of his or her records. (d) Privacy act statements. When... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used...

  5. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.4 Collecting personal information. (a) General..., the Privacy Act Statement is not required if the individual is only requested to furnish or verify the... a Privacy Act system of records. (4) When asking an individual for his or her SSN or other...

  6. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    PubMed

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004

  7. Solving the software protection problem with intrinsic personal physical unclonable functions.

    SciTech Connect

    Nithyanand, Rishab; Sion, Radu

    2011-09-01

    Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure (within reasonable error bounds) but hard to clone. The unclonability property comes from the accepted hardness of replicating the multitude of characteristics introduced during the manufacturing process. This makes PUFs useful for solving problems such as device authentication, software protection, licensing, and certified execution. In this paper, we focus on the effectiveness of PUFs for software protection in offline settings. We first argue that traditional (black-box) PUFs are not useful for protecting software in settings where communication with a vendor's server or third party network device is infeasible or impossible. Instead, we argue that Intrinsic PUFs are needed to solve the above mentioned problems because they are intrinsically involved in processing the information that is to be protected. Finally, we describe how sources of randomness in any computing device can be used for creating intrinsic-personal-PUFs (IP-PUF) and present experimental results in using standard off-the-shelf computers as IP-PUFs.

  8. A qualitative study on the use of personal information technology by persons with spinal cord injury.

    PubMed

    Mattar, Andrew A G; Hitzig, Sander L; McGillivray, Colleen F

    2015-01-01

    Previous work has shown that information technology (IT), such as personal computers and other digital devices (e.g. tablets, laptops, etc.), software, online resources and hand-held communication tools (e.g. cellphones), has benefits for health and well-being for persons with chronic health conditions. To date, the ways that persons with spinal cord injury (SCI) use IT in their daily activities has not been fully explored. Thus, the purpose of the study was to obtain an in-depth perspective of how people with SCI regularly use IT to gain insight on ways IT can be used to support health and well-being in the community for this population. Semi-structured interviews were conducted with community-dwelling persons with SCI (N = 10) who identified themselves as frequent-or-daily-users of IT. Qualitative content analysis was used to identify the ways that persons with SCI use personal IT. Ten themes related to IT use were identified: (1) Modifications allowing access to IT; (2) Convenience of IT and its perceived value; (3) IT as a scheduler/planner; (4) Challenges; (5) Contributions of IT to participation; (6) Access to information; (7) Influence of IT on well-being; (8) IT as a connector; (9) Issues of IT acquisition; and (10) Desires for future devices/technology. The findings suggest that IT use by people with SCI contributes to general health and well-being, by increasing access to SCI-related health information and opportunity for social participation. Despite the benefits offered by IT, persons with SCI have identified a degree of skepticism about the reliability and applicability of the health information they find online. Future work on developing and implementing IT for health and well-being post-SCI should take into account consumers' perspectives to facilitate uptake. Implications for Rehabilitation There is a need for a more refined understanding of how people with spinal cord injury (SCI) use information technology (IT) in their daily lives in order to

  9. Cognitive, personality, and social factors associated with adolescents' online personal information disclosure.

    PubMed

    Liu, Cong; Ang, Rebecca P; Lwin, May O

    2013-08-01

    The current study aims to understand the factors that influence adolescents' disclosure of personally identifiable information (PII) on social networking sites (SNSs). A survey was conducted among 780 adolescent participants (between 13 and 18) who were Facebook users. Structural equation modeling was used for analyzing the data and obtaining an overarching model that include cognitive, personality, and social factors that influence adolescents' PII disclosure. Results showed privacy concern as the cognitive factor reduces adolescents' PII disclosure and it serves as a potential mediator for personality and social factors. Amongst personality factors, narcissism was found to directly increase PII disclosure, and social anxiety indirectly decreases PII disclosure by increasing privacy concern. Amongst social factors, active parental mediation decreases PII disclosure directly and indirectly by increasing privacy concern. Restrictive parental mediation decreases PII disclosure only indirectly by increasing privacy concern. Implications of the findings to parents, educators, and policy makers were discussed.

  10. Socio-technical aspects of the use of health related personal information for management and research.

    PubMed

    Iversen, K R; Grøtan, T O

    1996-10-01

    This paper focuses on the organisational, technical and ethical aspects related to the use of person identifiable health information for various health care management, administration, finance, research and educational purposes. It is based on the ethical standpoint that to the individuals in question, the identifiable health information represents the uttermost sensitive and critical information. In addition, nobody, possibly apart from the patients themselves, may claim ownership of such information. Thus identifiable health information should be (per individual) kept as collected and protected as possible, within the scope of the patient provider relationship. Identifiable health information should, whenever possible and reasonable, be restricted to the health care professionals providing the treatment and care to the patient, and only be made available to others, e.g. for management, research or educational purposes, either in anonymous or pseudonymous form. Secure information management (SIM) is presented as the socio-technical means to facilitate our ethical standpoint in a practical health care environment.

  11. Attitudes Formation by Small but Meaningful Personal Information.

    PubMed

    Kim, Jaejoong; Lee, Sang Won; Kwak, Minwook; Lee, Kyueun; Jeong, Bumseok

    2017-05-01

    People often evaluate others using fragmentary but meaningful personal information in recent days through social media. It is not clear that whether this process is implicit or explicit and what kind of information is more important in such process.We examined the effects of several meaningful fragmentary information onattitude. Thirty three KAIST students were provided four fragmentary information about four virtual people that are meaningful in evaluating people and frequently seen in real life situations, and were asked to imagine that person during four follow-up sessions. Explicit and Implicit attitudes were measured using Likert scale and Implicit Association Test respectively. Also, eye tracking was done to find out the most important information. Strong explicit attitudes, were formed toward both men and women, and weak but significant implicit attitudes, were generated toward men only. Eyetracking results showed that people spent more time reading morality information. Our results indicate that explicit attitudes are made by propositional learning, which is the main component for evaluating others with several meaningful fragmentary information, and implicit attitudes are formed by top down process. And as well as those of previous studies, morality information was suggested as the most important factor in developing attitudes.

  12. Informed consent in direct-to-consumer personal genome testing: the outline of a model between specific and generic consent.

    PubMed

    Bunnik, Eline M; Janssens, A Cecile J W; Schermer, Maartje H N

    2014-09-01

    Broad genome-wide testing is increasingly finding its way to the public through the online direct-to-consumer marketing of so-called personal genome tests. Personal genome tests estimate genetic susceptibilities to multiple diseases and other phenotypic traits simultaneously. Providers commonly make use of Terms of Service agreements rather than informed consent procedures. However, to protect consumers from the potential physical, psychological and social harms associated with personal genome testing and to promote autonomous decision-making with regard to the testing offer, we argue that current practices of information provision are insufficient and that there is a place--and a need--for informed consent in personal genome testing, also when it is offered commercially. The increasing quantity, complexity and diversity of most testing offers, however, pose challenges for information provision and informed consent. Both specific and generic models for informed consent fail to meet its moral aims when applied to personal genome testing. Consumers should be enabled to know the limitations, risks and implications of personal genome testing and should be given control over the genetic information they do or do not wish to obtain. We present the outline of a new model for informed consent which can meet both the norm of providing sufficient information and the norm of providing understandable information. The model can be used for personal genome testing, but will also be applicable to other, future forms of broad genetic testing or screening in commercial and clinical settings.

  13. Smartphone mobile application delivering personalized, real-time sun protection advice: a randomized clinical trial.

    PubMed

    Buller, David B; Berwick, Marianne; Lantz, Kathy; Buller, Mary Klein; Shane, James; Kane, Ilima; Liu, Xia

    2015-05-01

    Mobile smartphones are rapidly emerging as an effective means of communicating with many Americans. Using mobile applications (apps), they can access remote databases, track time and location, and integrate user input to provide tailored health information. A smartphone mobile app providing personalized, real-time sun protection advice was evaluated in a randomized clinical trial. The trial was conducted in 2012 and had a randomized pretest-posttest controlled design with a 10-week follow-up. Data were collected from a nationwide population-based survey panel. A sample of 604 non-Hispanic and Hispanic adults from the Knowledge Panel 18 years or older who owned an Android smartphone were enrolled. The mobile app provided advice on sun protection (ie, protection practices and risk of sunburn) and alerts (to apply or reapply sunscreen and get out of the sun), hourly UV Index, and vitamin D production based on the forecast UV Index, the phone's time and location, and user input. Percentage of days using sun protection and time spent outdoors (days and minutes) in the midday sun and number of sunburns in the past 3 months were collected. Individuals in the treatment group reported more shade use (mean days staying in the shade, 41.0% vs 33.7%; P = .03) but less sunscreen use (mean days, 28.6% vs 34.5%; P = .048) than controls. There was no significant difference in number of sunburns in the past 3 months (mean, 0.60 in the treatment group vs 0.62 for controls; P = .87). Those who used the mobile app reported spending less time in the sun (mean days keeping time in the sun to a minimum, 60.4% for app users vs 49.3% for nonusers; P = .04) and using all protection behaviors combined more (mean days, 39.4% vs 33.8%; P = .04). The mobile app improved some sun protection. Use of the mobile app was lower than expected but associated with increased sun protection. Providing personalized advice when and where people are in the sun may help reduce sun exposure.

  14. Personal Protective Equipment In Animal Research Back To The Basics (A review paper) Running title: Personal Protective equipment in Animal Research A Review

    DTIC Science & Technology

    2016-12-02

    Meanwhile, the latter was enacted to protect employees against the effects of high intensity occupational noise. Specific to animal research , an OSHP should...Personal protective equipment in animal research – back to the basics A review paper Jason Villano,1,* Janet Follo,2 Mark Chappell,3 Morris...University of Michigan, Ann Arbor, MI 3United States Army Medical Research Institute of Infectious Diseases, United States Army, Fort Detrick, MD 4INDA

  15. Sharing sensitive personal health information through Facebook: the unintended consequences.

    PubMed

    Househ, Mowafa

    2011-01-01

    The purpose of this paper was to explore the types of sensitive health information posted by individuals through social network media sites such as Facebook. The researcher found several instances in which individuals, who could be identified by their user profiles, posted personal and sensitive health information related to mental and genetic disorders and sexually transmitted diseases. The data suggest that Facebook users should be made aware of the potential harm that may occur when sharing sensitive health information publicly through Facebook. Ethical considerations in undertaking such research are also examined.

  16. Particle swarm optimization using multi-information characteristics of all personal-best information.

    PubMed

    Huang, Song; Tian, Na; Wang, Yan; Ji, Zhicheng

    2016-01-01

    Convergence stagnation is the chief difficulty to solve hard optimization problems for most particle swarm optimization variants. To address this issue, a novel particle swarm optimization using multi-information characteristics of all personal-best information is developed in our research. In the modified algorithm, two positions are defined by personal-best positions and an improved cognition term with three positions of all personal-best information is used in velocity update equation to enhance the search capability. This strategy could make particles fly to a better direction by discovering useful information from all the personal-best positions. The validity of the proposed algorithm is assessed on twenty benchmark problems including unimodal, multimodal, rotated and shifted functions, and the results are compared with that obtained by some published variants of particle swarm optimization in the literature. Computational results demonstrate that the proposed algorithm finds several global optimum and high-quality solutions in most case with a fast convergence speed.

  17. Exploring Healthcare Consumer Acceptance of Personal Health Information Management Technology through Personal Health Record Systems

    ERIC Educational Resources Information Center

    Wu, Huijuan

    2013-01-01

    Healthcare technologies are evolving from a practitioner-centric model to a patient-centric model due to the increasing need for technology that directly serves healthcare consumers, including healthy people and patients. Personal health information management (PHIM) technology is one of the technologies designed to enhance an individual's ability…

  18. Exploring Healthcare Consumer Acceptance of Personal Health Information Management Technology through Personal Health Record Systems

    ERIC Educational Resources Information Center

    Wu, Huijuan

    2013-01-01

    Healthcare technologies are evolving from a practitioner-centric model to a patient-centric model due to the increasing need for technology that directly serves healthcare consumers, including healthy people and patients. Personal health information management (PHIM) technology is one of the technologies designed to enhance an individual's ability…

  19. PCASSO: a design for secure communication of personal health information via the internet.

    PubMed

    Baker, D B; Masys, D R

    1999-05-01

    The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.

  20. Personal Protection Measures Against Mosquitoes, Ticks, and Other Arthropods.

    PubMed

    Alpern, Jonathan D; Dunlop, Stephen J; Dolan, Benjamin J; Stauffer, William M; Boulware, David R

    2016-03-01

    Arthropod-associated diseases are a major cause of morbidity among travelers. Obtaining a detailed travel itinerary and understanding traveler-specific and destination-specific risk factors can help mitigate the risk of vector-borne diseases. DEET, picaridin, PMD, and IR3535 are insect repellents that offer sufficient protection against arthropod bites. IR3535 does not provide adequate protection against Anopheles mosquitoes, and should be avoided in malaria-endemic regions. General protective measures, such as bite avoidance, protective clothing, insecticide-treated bed nets, and insecticide-treated clothing, should be recommended, especially in malaria-endemic areas. Spatial repellents may prevent nuisance biting, but have not been shown to prevent against vector-borne disease.

  1. 49 CFR 1522.125 - Protection of information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program § 1522.125 Protection of information. (a) Sensitive Security Information. Each validation... authorized by TSA, no validation firm, or any of its officers, Security Coordinators, validators,...

  2. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Amendment of protected health information. 164.526 Section 164.526 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information §...

  3. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Amendment of protected health information. 164.526 Section 164.526 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information §...

  4. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  5. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  6. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  7. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  8. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Amendment of protected health information. 164.526 Section 164.526 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164...

  9. Theft of information in the take-grant protection model

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    Using the information transfer extensions to the Take-Grant Protection Model, the concept of theft of information is defined and necessary and sufficient conditions for such theft to occur are presented, as well as bounds on the number of actors involved in such theft. Finally, the application of these results to reference monitors are explored.

  10. [Exposure to mineral oils at worksites and novel solutions for polymer protective materials in selected personal protective equipment].

    PubMed

    Krzemińska, Sylwia; Irzmańska, Emilia

    2011-01-01

    Exposure of workers to health hazards due to contact with mineral oils occurs primarily in the chemical, petrochemical, machine-building, metallurgic and car industries. Under worksite conditions, the respiratory system and the skin are the primary routes of entry of mineral oils into the human body. Long-term exposure of the skin to oily substances may lead not only to irritation and allergic lesions. The studies conducted in this area have confirmed a significant increase in the incidence of skin cancers in persons chronically exposed to mineral oils. Protection of workers' health at worksites associated with the risk of contact with mineral oils requires, in addition to collective protective and organizational solutions, personal protective equipment with appropriate protection and utility parameters confirmed by laboratory tests. The essential preventive measures include protection of the human skin by means of appropriate protective clothing and gloves, which provide an effective barrier against a wide spectrum of chemical compounds present in mineral oils. Knowledge of polymer materials is the prerequisite for designing more and more effective and functional protective clothing and gloves. Studies aimed at obtaining higher levels of skin protection against varied toxic substances, including mineral oils, have been conducted, among others, to develop modern glove and clothing materials ensuring resistance to oils. The rapid progress of nanotechnology and the use of nanoadditives in polymer materials has made it possible to undertake works aimed at developing modern polymer nanostructures designed for construction of oil-resistant protective clothing and gloves. In this review paper the authors have presented the current knowledge of polymer materials, from traditional ones to polymer nanostructures, used in personal equipment protecting against mineral oils.

  11. The role of genetic information in personalized medicine.

    PubMed

    Gamma, Alex

    2013-01-01

    Personalized medicine is the latest promise of a gene-centered biomedicine to provide treatments custom-tailored to the specific needs of patients. Although surrounded by much hype, personalized medicine at present lacks the empirical and theoretical foundations necessary to render it a realistic long-term perspective. In particular, the role of genetic data and the relationship between causal understanding, prediction, prevention, and treatment of a disease need clarifying. This article critically examines the concept of information in genetics and its relation to modern-day genetic determinism, using pharmacogenetics, personalized medicine's core discipline, as a test case. The article concludes that: (1) genetic knowledge does not constitute a privileged basis for personalized medicine because there is an a priori complete causal parity of genetic and nongenetic resources of development; and (2) prediction, prevention, and treatment all depend on a causal-mechanistic understanding that will follow only from integrating data across the whole gamut of developmental factors-genetic and non-genetic. In a future successful personalized medicine, genes will have no special status, either as determinants of phenotype, markers of disease or as targets of treatment.

  12. Blast Mitigation Seat Analysis - Assessment of the Effect of Personal Protective Equipment on the 5th Percentile Female Anthropomorphic Test Devices Performance in Drop Tower Evaluations (Briefing Charts)

    DTIC Science & Technology

    2015-08-01

    U.S. ARMY TANK AUTOMOTIVE RESEARCH, DEVELOPMENT AND ENGINEERING CENTER Blast Mitigation Seat Analysis – Assessment of the Effect of Personal ...notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does...AND SUBTITLE Blast Mitigation Seat Analysis - Assessment of the Effect of Personal Protective Equipment on the 5th Percentile Female Anthropomorphic

  13. Evaluating Common De-Identification Heuristics for Personal Health Information

    PubMed Central

    Jabbouri, Sam; Sams, Scott; Drouet, Youenn; Power, Michael

    2006-01-01

    Background With the growing adoption of electronic medical records, there are increasing demands for the use of this electronic clinical data in observational research. A frequent ethics board requirement for such secondary use of personal health information in observational research is that the data be de-identified. De-identification heuristics are provided in the Health Insurance Portability and Accountability Act Privacy Rule, funding agency and professional association privacy guidelines, and common practice. Objective The aim of the study was to evaluate whether the re-identification risks due to record linkage are sufficiently low when following common de-identification heuristics and whether the risk is stable across sample sizes and data sets. Methods Two methods were followed to construct identification data sets. Re-identification attacks were simulated on these. For each data set we varied the sample size down to 30 individuals, and for each sample size evaluated the risk of re-identification for all combinations of quasi-identifiers. The combinations of quasi-identifiers that were low risk more than 50% of the time were considered stable. Results The identification data sets we were able to construct were the list of all physicians and the list of all lawyers registered in Ontario, using 1% sampling fractions. The quasi-identifiers of region, gender, and year of birth were found to be low risk more than 50% of the time across both data sets. The combination of gender and region was also found to be low risk more than 50% of the time. We were not able to create an identification data set for the whole population. Conclusions Existing Canadian federal and provincial privacy laws help explain why it is difficult to create an identification data set for the whole population. That such examples of high re-identification risk exist for mainstream professions makes a strong case for not disclosing the high-risk variables and their combinations identified here

  14. Knowledge of personal information and caregiver awareness in Alzheimer's disease.

    PubMed

    Ala, Thomas A; Berck, Lilla G; Popovich, Ann M

    2005-01-01

    We assessed the ability of 73 patients with Alzheimer's disease (AD) to recall important personal information like their names, their caregivers 'names, their addresses, and their telephone numbers. We also assessed their caregivers' awareness of their abilities. There was an association between the abilities of the patients and their Mini-Mental Status Examination (MMSE) scores, with the patients with the lowest MMSE scores making the most errors. Five to 10 percent of the mildest patients were unable to state their addresses and telephone numbers correctly. The caregivers of the patients with intermediate MMSE scores made the most errors in their predictions, with up to 50 percent being incorrect and up to 37 percent overestimating their patients' abilities. We concluded that AD patients lose their ability to provide personal information as their illness progresses. Caregivers of patients with MMSE ranging from 10 to 25 are the most likely to be unaware of their patients' impairment. These findings highlight safety concerns in AD.

  15. Audit Report on "Protection of the Department of Energy's Unclassified Sensitive Electronic Information"

    SciTech Connect

    2009-08-01

    The Department of Energy and its contractors store and process massive quantities of sensitive information to accomplish national security, energy, science, and environmental missions. Sensitive unclassified data, such as personally identifiable information (PII), official use only, and unclassified controlled nuclear information require special handling and protection to prevent misuse of the information for inappropriate purposes. Industry experts have reported that more than 203 million personal privacy records have been lost or stolen over the past three years, including information maintained by corporations, educational institutions, and Federal agencies. The loss of personal and other sensitive information can result in substantial financial harm, embarrassment, and inconvenience to individuals and organizations. Therefore, strong protective measures, including data encryption, help protect against the unauthorized disclosure of sensitive information. Prior reports involving the loss of sensitive information have highlighted weaknesses in the Department's ability to protect sensitive data. Our report on Security Over Personally Identifiable Information (DOE/IG-0771, July 2007) disclosed that the Department had not fully implemented all measures recommended by the Office of Management and Budget (OMB) and required by the National Institute of Standards and Technology (NIST) to protect PII, including failures to identify and encrypt PII maintained on information systems. Similarly, the Government Accountability Office recently reported that the Department had not yet installed encryption technology to protect sensitive data on the vast majority of laptop computers and handheld devices. Because of the potential for harm, we initiated this audit to determine whether the Department and its contractors adequately safeguarded sensitive electronic information. The Department had taken a number of steps to improve protection of PII. Our review, however, identified

  16. 78 FR 9918 - Protections Against Trafficking In Persons In Federal Contracts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-12

    ... Trafficking In Persons In Federal Contracts AGENCY: Department of Defense (DoD), General Services... Executive Order (E.O.) 13627, Strengthening Protections Against Trafficking In Persons In Federal Contracts, and Title XVII of the National Defense Authorization Act, Public Law 112-239, the End Trafficking...

  17. Protecting Sensitive Information in Directory Services Using Virtual Directories

    NASA Astrophysics Data System (ADS)

    Claycomb, William; Shin, Dongwan

    Directory services are commonly used to store information related to individuals, and often act as a source for security services, such as authentication and access control, in collaborative applications within/across organizations. Hence, there is an urgent need to protect the sensitive information they contain. Existing solutions offer minimal protection against insider attacks, a growing threat to both government and industry data services. In this paper we present a solution for data protection that leverages virtual directories and data encryption to provide a user-centric approach to data protection, delegation, and collaboration. A security architecture is presented, along with the discussion of the benefits and vulnerabilities of our approach. We also discuss a proof-of-concept implementation and performance testing results.

  18. Review of chamber design requirements for testing of personal protective clothing ensembles.

    PubMed

    Gao, Pengfei; King, William P; Shaffer, Ronald

    2007-08-01

    This review focuses on the physical requirements for conducting ensemble testing and describes the salient issues that organizations involved in the design, test, or certification of personal protective equipment (PPE) and protective clothing ensembles need to consider for strategic planning. Several current and proposed PPE ensemble test practices and standards were identified. The man-in-simulant test (MIST) is the primary procedure used by the military to evaluate clothing ensembles for protection against chemical and biological warfare agents. MIST has been incorporated into the current editions of protective clothing and equipment standards promulgated by the National Fire Protection Association (NFPA). ASTM has recently developed a new test method (ASTM F 2588-06) for MIST evaluation of protective ensembles. Other relevant test methods include those described in International Organization for Standardization (ISO) standards. The primary differences among the test methods were the choice of test challenge material (e.g., sulfur hexafluoride, methyl salicylate, sodium chloride particles, corn oil, fluorophore-impregnated silica) and the exercise protocol for the subject(s). Although ensemble test methods and standards provide detailed descriptions of the test procedures, none give specific requirements for chamber design. A literature survey identified 28 whole-body exposure chambers that have been or could potentially be used for testing protective clothing ensembles using human test subjects. Median chamber size, median floor space, and median volume per subject were calculated from 15 chambers (involving human test subjects), where size information is available. Based on the literature survey of existing chambers and the review of the current and proposed standards and test methods, chamber design requirements will be dictated by the test methods selected. Due to widely different test conditions for aerosol/particulate and vapor ensemble testing, it is

  19. Using personal digital assistants to access drug information.

    PubMed

    McCreadie, Scott R; Stevenson, James G; Sweet, Burgunda V; Kramer, Mike

    2002-07-15

    The use of personal digital assistants (PDAs) to access drug information in a health system is described. Given the widespread use of PDAs at an 872-bed university health system, an opportunity existed to provide current drug information to physicians via these devices. As part of the health system's intranet, extensive online content had been made available through a browser; extension to PDAs was a natural next step. There were two primary requirements: the ability to synchronize information with the database server when a PDA was used and the development of content and applications by using existing staff. Mobile enterprise software was chosen that supports multiple PDA platforms, is easy to use, and does not require programming skills. The software works through customized "channels," or collections of information from a content provider. The customized channel service works over the Internet. Two channels of content were created, an ambulatory care channel and an inpatient care channel. The ambulatory care channel contains a list of preferred ambulatory care agents, poison control information, the locations of outpatient pharmacies, drug information, and safety tips for prescribing. The inpatient channel contains the inpatient formulary, current news and events, information on currrent drug shortages and recalls, pharmacy contact information, and medication safety tips. When a user synchronizes his or her PDA, the software contacts the department's intranet servers and processes the request. The data are compressed and downloaded to the user's PDA. A university health system successfully used PDAs to access drug and other information.

  20. Informed consent for research participation in frail older persons.

    PubMed

    Barron, Jeremy S; Duffey, Patricia L; Byrd, Linda Jo; Campbell, Robin; Ferrucci, Luigi

    2004-02-01

    Informed consent has been the most scrutinized and controversial aspect of clinical research ethics. Institutional review boards (IRBs), government regulatory agencies, and the threat of litigation have all contributed to increasingly detailed consent documents that hope to ensure that subjects are not misled or coerced. Unfortunately, the growing regulatory burden on researchers has not succeeded in protecting subjects, but has rather made the consent process less effective and has discouraged research on vulnerable populations. As a matter of fact, investigators and ethicists continue to identify failures of the consenting process, particularly concerning participation in research of older individuals. The challenges involved in ensuring appropriate consent from the elderly include physical frailty, reduced autonomy and privacy, and impaired decision-making capacity due to dementia, delirium, or other neuropsychiatric illnesses. Ageism among investigators also contributes to failure of informed consent. The evaluation and continuing re-evaluation of an individual's decision-making capacity is critical but difficult. In the most extreme cases, the older adult's ability to participate in the consent process is clearly impaired. However, in many instances, the decision-making capacity is only partially impaired but declines during the course of a research project. Implementing methods of effective communication may enable many frail elderly individuals to make informed decisions. Special challenges are posed by research on end-of-life care, which typically involves frail, older subjects who are uniquely vulnerable, and research is conducted in institutional settings where subtle violations of autonomy are routine. Clearly, the frail elderly represent a vulnerable population that deserves special attention when developing and evaluating an informed consent process. Two important ethical conflicts should be kept in mind. First, although vulnerable older patients must

  1. Protective measures, personal experience, and the affective psychology of time.

    PubMed

    Peters, E; Kunreuther, H; Sagara, N; Slovic, P; Schley, D R

    2012-12-01

    We examined the role of time and affect in intentions to purchase a risk-protective measure (Studies 1 and 2) and explored participant abilities to factor time into the likelihood judgments that presumably underlie such intentions (Study 3). Participants worried more about losing their possessions and were more likely to purchase a protective measure given a longer term lease than a short-term lease, but only if their belongings were described in affect-poor terms. If described instead as being particularly special and affect-rich, participants neglected time and were about equally likely to purchase a risk-protective measure for shorter and longer term leases. However, and consistent with prior literature, the cognitive mechanism underlying this time-neglect-with-affect-richness effect seemed to be the greater use of the affect heuristic in the shorter term than the longer term. Study 2 results demonstrated that prior experience with having been burglarized amplified the interactive effect of time and affect. Greater deliberation did not attenuate this effect as hypothesized whether deliberation was measured through numeracy or manipulated through instructions. The results of Study 3 indicated that few participants are able to calculate correctly the risk numbers necessary to take time into account. Two possible solutions to encourage more purchases of protective measures in the long term are discussed. © 2012 Society for Risk Analysis.

  2. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... steel-toe shoes or steel-toe boots) and non-specialty prescription safety eyewear, provided that the... and allows the employee, at his or her request, to use shoes or boots with built-in metatarsal protection, the employer is not required to reimburse the employee for the shoes or boots. (4) The...

  3. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... steel-toe shoes or steel-toe boots) and non-specialty prescription safety eyewear, provided that the... and allows the employee, at his or her request, to use shoes or boots with built-in metatarsal protection, the employer is not required to reimburse the employee for the shoes or boots. (4) The...

  4. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... steel-toe shoes or steel-toe boots) and non-specialty prescription safety eyewear, provided that the... and allows the employee, at his or her request, to use shoes or boots with built-in metatarsal protection, the employer is not required to reimburse the employee for the shoes or boots. (4) The...

  5. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... steel-toe shoes or steel-toe boots) and non-specialty prescription safety eyewear, provided that the... and allows the employee, at his or her request, to use shoes or boots with built-in metatarsal protection, the employer is not required to reimburse the employee for the shoes or boots. (4) The...

  6. Information bias in contingent valuation: effects of personal relevance, quality of information, and motivational orientation

    Treesearch

    Icek Ajzen; Thomas C. Brown; Lori H. Rosenthal

    1996-01-01

    A laboratory experiment examined the potential for information bias in contingent valuation (CV). Consistent with the view that information about a public or private good can function as a persuasive communication, willingness to pay (WTP) was found to increase with the quality of arguments used to describe the good, especially under conditions of high personal...

  7. Are health care personnel trained in correct use of personal protective equipment?

    PubMed

    John, Amrita; Tomas, Myreen E; Cadnum, Jennifer L; Mana, Thriveen S C; Jencson, Annette; Shaikh, Aaron; Zabarsky, Trina F; Wilson, Brigid M; Donskey, Curtis J

    2016-07-01

    Effective use of personal protective equipment (PPE) is essential to protect personnel and patients in health care settings. However, in a survey of 222 health care personnel, PPE training was often suboptimal with no requirement for demonstration of proficiency. Fourteen percent of physicians reported no previous training in use of PPE. Published by Elsevier Inc.

  8. Effectiveness of Personal Protective Equipment for Healthcare Workers Caring for Patients with Filovirus Disease: A Rapid Review

    PubMed Central

    Quach, Pauline; Hamel, Candyce; Thavorn, Kednapa; Garritty, Chantelle; Skidmore, Becky; Vallenas, Constanza; Norris, Susan L.; Egger, Matthias; Eremin, Sergey; Ferri, Mauricio; Shindo, Nahoko; Moher, David

    2015-01-01

    Background A rapid review, guided by a protocol, was conducted to inform development of the World Health Organization’s guideline on personal protective equipment in the context of the ongoing (2013–present) Western African filovirus disease outbreak, with a focus on health care workers directly caring for patients with Ebola or Marburg virus diseases. Methods Electronic databases and grey literature sources were searched. Eligibility criteria initially included comparative studies on Ebola and Marburg virus diseases reported in English or French, but criteria were expanded to studies on other viral hemorrhagic fevers and non-comparative designs due to the paucity of studies. After title and abstract screening (two people to exclude), full-text reports of potentially relevant articles were assessed in duplicate. Fifty-seven percent of extraction information was verified. The Grading of Recommendations Assessment, Development and Evaluation framework was used to inform the quality of evidence assessments. Results Thirty non-comparative studies (8 related to Ebola virus disease) were located, and 27 provided data on viral transmission. Reporting of personal protective equipment components and infection prevention and control protocols was generally poor. Conclusions Insufficient evidence exists to draw conclusions regarding the comparative effectiveness of various types of personal protective equipment. Additional research is urgently needed to determine optimal PPE for health care workers caring for patients with filovirus. PMID:26451847

  9. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., and to direct the operator to delete the child's personal information; and (3) Notwithstanding any... information from his or her child or has directed the operator to delete the child's personal information. ...

  10. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., and to direct the operator to delete the child's personal information; and (3) Notwithstanding any... information from his or her child or has directed the operator to delete the child's personal information. ...

  11. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., and to direct the operator to delete the child's personal information; and (3) Notwithstanding any... information from his or her child or has directed the operator to delete the child's personal information. ...

  12. 22 CFR 1003.5 - Access to personal information from Inter-American Foundation records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Access to personal information from Inter... SAFEGUARDING PERSONAL INFORMATION IN IAF RECORDS § 1003.5 Access to personal information from Inter-American... Foundation, 1515 Wilson Boulevard, Rosslyn, Virginia 22209. Personal contacts should normally be made...

  13. The role of privacy protection in healthcare information systems adoption.

    PubMed

    Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui

    2013-10-01

    Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.

  14. Experimental evaluation of personal protection devices against graphite nanoaerosols: fibrous filter media, masks, protective clothing, and gloves.

    PubMed

    Golanski, L; Guiot, A; Rouillon, F; Pocachard, J; Tardif, F

    2009-06-01

    In this study, different conventional personal protection devices (fibrous filters, cartridges for respirators, protective clothing, and gloves) well qualified for micron particles were tested with graphite nanoparticles ranging from 10 to 100 nm (electrical mobility diameter). For this purpose, two specific test benches were designed: one for filter-based devices which are tested under a controlled air flow and other for gloves and protective clothing based on the "through diffusion method." The penetration versus particle size shows for most tested filter media the behavior predicted by the theoretical Brownian capture: penetration decreases when particle diameter decreases. No thermal rebound was detected until 10 nm for graphite nanoparticles. Protective clothes were tested by two methods and same trends were obtained. Nonwoven fabrics (air-tight materials) are much more efficient against nanoparticles than cotton and paper. Gloves tested by "through diffusion technique," in static condition seem to efficiently protect against graphite nanoparticles in spite of their important porosity.

  15. Examination of an Electronic Patient Record Display Method to Protect Patient Information Privacy.

    PubMed

    Niimi, Yukari; Ota, Katsumasa

    2017-02-01

    Electronic patient records facilitate the provision of safe, high-quality medical care. However, because personnel can view almost all stored information, this study designed a display method using a mosaic blur (pixelation) to temporarily conceal information patients do not want shared. This study developed an electronic patient records display method for patient information that balanced the patient's desire for personal information protection against the need for information sharing among medical personnel. First, medical personnel were interviewed about the degree of information required for both individual duties and team-based care. Subsequently, they tested a mock display method that partially concealed information using a mosaic blur, and they were interviewed about the effectiveness of the display method that ensures patient privacy. Participants better understood patients' demand for confidentiality, suggesting increased awareness of patients' privacy protection. However, participants also indicated that temporary concealment of certain information was problematic. Other issues included the inconvenience of removing the mosaic blur to obtain required information and risk of insufficient information for medical care. Despite several issues with using a display method that temporarily conceals information according to patient privacy needs, medical personnel could accept this display method if information essential to medical safety remains accessible.

  16. Heat Strain in Personal Protective Clothing: Challenges and Intervention Strategies

    NASA Astrophysics Data System (ADS)

    McLellan, T. M.; Daanen, H. A. M.

    Humans rely on sweat evaporation during exercise in the heat to promote cooling and to maintain thermal homeostasis. In protective clothing, however, sweat evaporation is severely hampered and this may lead to uncompensable heat strain, where core body temperature continues to rise leading to physical exhaustion and the cessation of work. The tolerance time depends on three main factors: (1) the initial core temperature that may be reduced by heat acclimation and pre-cooling, (2) the final core temperature, which can be increased due to physical training, and (3) the rate of change in body core temperature, which is dependent on the thermal environment, work rate and individual factors like body composition. Methods to reduce heat strain in protective clothing include: (1) increasing clothing permeability for air, (2) adjusting pacing strategy, including work/rest schedules, (3) physical training, and (4) cooling interventions.

  17. Safety Evaluation Tests of Personal Protective Equipment for Ordnance Operations

    DTIC Science & Technology

    1978-08-01

    Results During the fragmentation test. some types of eyewear sustained more impacts than others, simply because of the difference in surface area...exposure of the eyewear. As a consequence. more data points exist on some eyewear than others. However. sufficient impacts were sustained by all to... sustained four impacts, two of which were deflections and two of which were embedments. The relative protection factor was calculated to be 100’,; (see

  18. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... employment). (d) School and year of graduation. (e) Home of record. (f) Home address and phone. (g) Age and... sensitive units. (i) Office and unit address and duty phone for overseas or for routinely deployable...

  19. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... employment). (d) School and year of graduation. (e) Home of record. (f) Home address and phone. (g) Age and... sensitive units. (i) Office and unit address and duty phone for overseas or for routinely deployable...

  20. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., separated). (b) Number, name, and sex of dependents. (c) Civilian educational degrees and major areas of... date of birth (year). (h) Present or future assignments for overseas or for routinely deployable or...

  1. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... employment). (d) School and year of graduation. (e) Home of record. (f) Home address and phone. (g) Age and... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  2. Insect repellents and associated personal protection for a reduction in human disease.

    PubMed

    Debboun, M; Strickman, D

    2013-03-01

    Personal protection measures against biting arthropods include topical insect repellents, area repellents, insecticide-treated bednets and treated clothing. The literature on the effectiveness of personal protection products against arthropods is mainly limited to studies of prevention of bites, rather than prevention of disease. Tungiasis was successfully controlled by application of topical repellents and scrub typhus was reduced through the use of treated clothing. Successful reduction of leishmaniasis was achieved through the use of topical repellents, treated bednets and treated clothing in individual studies. Malaria has been reduced by the use of insecticide-treated bednets (ITN), certain campaigns involving topical repellents, and the combination of treated bednets and topical repellents. Although area repellents such as mosquito coils are used extensively, their ability to protect humans from vector-transmitted pathogens has not been proven. Taken together, the literature indicates that personal protection measures must be used correctly to be effective. A study that showed successful control of malaria by combining treated bednets and topical repellents suggests that combinations of personal protection measures are likely to be more effective than single methods. Implementation of successful programmes based on personal protection will require a level of cooperation commonly associated with other basic societal functions, such as education and food safety. Published 2012. This article is a U.S. Government work and is in the public domain in the USA.

  3. Determinants of the Rigor of State Protection Policies for Persons With Dementia in Assisted Living.

    PubMed

    Nattinger, Matthew C; Kaskie, Brian

    2017-01-01

    Continued growth in the number of individuals with dementia residing in assisted living (AL) facilities raises concerns about their safety and protection. However, unlike federally regulated nursing facilities, AL facilities are state-regulated and there is a high degree of variation among policies designed to protect persons with dementia. Despite the important role these protection policies have in shaping the quality of life of persons with dementia residing in AL facilities, little is known about their formation. In this research, we examined the adoption of AL protection policies pertaining to staffing, the physical environment, and the use of chemical restraints. For each protection policy type, we modeled policy rigor using an innovative point-in-time approach, incorporating variables associated with state contextual, institutional, political, and external factors. We found that the rate of state AL protection policy adoptions remained steady over the study period, with staffing policies becoming less rigorous over time. Variables reflecting institutional policy making, including legislative professionalism and bureaucratic oversight, were associated with the rigor of state AL dementia protection policies. As we continue to evaluate the mechanisms contributing to the rigor of AL protection policies, it seems that organized advocacy efforts might expand their role in educating state policy makers about the importance of protecting persons with dementia residing in AL facilities and moving to advance appropriate policies.

  4. Personalized disclosure by information-on-demand: attending to patients' needs in the informed consent process.

    PubMed

    Siegal, Gil; Bonnie, Richard J; Appelbaum, Paul S

    2012-01-01

    Obtaining informed consent has typically become a stylized ritual of presenting and signing a form, in which physicians are acting defensively and patients lack control over the content and flow of information. This leaves patients at risk both for being under-informed relative to their decisional needs and of receiving more information than they need or desire. By personalizing the process of seeking and receiving information and allowing patients to specify their desire for information in a prospective manner, we aim to shift genuine control over the informational process to patients. A new paradigm of Information on Demand, such as we suggest, would also enhance legal certainty, achieve greater congruence between the information patients want and the information they receive, and promote more meaningful patient-physician interactions, a desirable outcome that has been difficult to achieve by other means. © 2012 American Society of Law, Medicine & Ethics, Inc.

  5. [Use of personal protective equipment for motorcycle taxi drivers: perception of risks and associated factors].

    PubMed

    Teixeira, Jules Ramon Brito; Santos, Ninalva de Andrade; Sales, Zenilda Nogueira; Moreira, Ramon Missias; Boery, Rita Narriman Silva de Oliveira; Boery, Eduardo Nagib; Santos, Ramon Araújo dos; Mota, Tilson Nunes

    2014-04-01

    This study aimed to examine the practices and perceptions of motorcycle taxi drivers concerning the use of personal protective equipment (PPE), based on field research and an exploratory and descriptive qualitative approach. Thirty motorcycle taxi drivers from Jequié, Bahia State, Brazil, were interviewed. Data collection used a semi-structured interview and questionnaire. Data were analyzed using thematic content analysis. The results showed: Category 1 - risk perception, subcategory conditioning/determinant factors for the use of PPE; Category 2 - adherence, subcategory adherence to the use of personal protective equipment; Category 3 - PPE as a protective factor against traffic accidents, subcategories 1 - work-related accidents, 2 - use of PPE at the time of the accident, 3 - non-use of PPE at the time of the accident. Finally, motorcycle taxi drivers clearly have some knowledge of personal protective equipment and even acknowledge the importance of its use, despite not always using it properly.

  6. Open consent, biobanking and data protection law: can open consent be 'informed' under the forthcoming data protection regulation?

    PubMed

    Hallinan, Dara; Friedewald, Michael

    2015-01-01

    This article focuses on whether a certain form of consent used by biobanks--open consent--is compatible with the Proposed Data Protection Regulation. In an open consent procedure, the biobank requests consent once from the data subject for all future research uses of genetic material and data. However, as biobanks process personal data, they must comply with data protection law. Data protection law is currently undergoing reform. The Proposed Data Protection Regulation is the culmination of this reform and, if voted into law, will constitute a new legal framework for biobanking. The Regulation puts strict conditions on consent--in particular relating to information which must be given to the data subject. It seems clear that open consent cannot meet these requirements. 4 categories of information cannot be provided with adequate specificity: purpose, recipient, possible third country transfers, data collected. However, whilst open consent cannot meet the formal requirements laid out by the Regulation, this is not to say that these requirements are substantially undebateable. Two arguments could be put forward suggesting the applicable consent requirements should be rethought. First, from policy documents regarding the drafting process, it seems that the informational requirements in the Regulation are so strict in order to protect the data subject from risks inherent in the use of the consent mechanism in a certain context--exemplified by the online context. There are substantial differences between this context and the biobanking context. Arguably, a consent transaction in the biobanking does not present the same type of risk to the data subject. If the risks are different, then perhaps there are also grounds for a reconsideration of consent requirements? Second, an argument can be made that the legislator drafted the Regulation based on certain assumptions as to the nature of 'data'. The authors argue that these assumptions are difficult to apply to genetic data

  7. Design of access control methods for protecting the confidentiality of patient information in networked systems.

    PubMed Central

    Bowen, J. W.; Klimczak, J. C.; Ruiz, M.; Barnes, M.

    1997-01-01

    Public awareness of the potential for violation of personal privacy in clinical information systems is increasing. Much of this increase can be attributed to the popularity and publicity of the World Wide Web. Nightly news reports of intruder break-ins and flaws in Internet software security have stimulated public interest in the security of clinical information systems available over the web. As part of the development of systems designed to provide clinical narratives to physicians over the Internet, we are exploring designs that provide additional protection and security to these systems. Specifically, we are developing and testing automated access control measures based on provider-patient relationships for controlling access to personally identifiable patient information. PMID:9357586

  8. 75 FR 61412 - Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property (FFP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-05

    ... Forest Service Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property... Personal Property (FEPP) and Firefighter Property (FFP) program Cooperative Agreements. DATES: Comments... Personal Property (FEPP) and Firefighter Property (FFP) Cooperative Agreements. OMB Number: 0596-NEW. Type...

  9. Executive Guide to the Protection of Information Resources.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    The purpose of this guide is to help the policy maker address a series of questions regarding the protection and safety of computer systems and data processed within his/her agency. It introduces information systems security concerns, outlines the management issues that must be addressed by agency policies and programs, and describes the essential…

  10. 32 CFR 644.394 - Protection of disposal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... to Army or Air Force requirements. (The Air Force preliminary real estate disposal directive is not... 32 National Defense 4 2014-07-01 2013-07-01 true Protection of disposal information. 644.394 Section 644.394 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL...

  11. 32 CFR 644.394 - Protection of disposal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... to Army or Air Force requirements. (The Air Force preliminary real estate disposal directive is not... 32 National Defense 4 2013-07-01 2013-07-01 false Protection of disposal information. 644.394 Section 644.394 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL...

  12. 32 CFR 644.394 - Protection of disposal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... to Army or Air Force requirements. (The Air Force preliminary real estate disposal directive is not... 32 National Defense 4 2010-07-01 2010-07-01 true Protection of disposal information. 644.394 Section 644.394 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL...

  13. 32 CFR 644.394 - Protection of disposal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... to Army or Air Force requirements. (The Air Force preliminary real estate disposal directive is not... 32 National Defense 4 2012-07-01 2011-07-01 true Protection of disposal information. 644.394 Section 644.394 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL...

  14. 15 CFR 325.16 - Protecting confidentiality of information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Protecting confidentiality of information. 325.16 Section 325.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE MISCELLANEOUS REGULATIONS...

  15. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the subject...

  16. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the subject...

  17. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the subject...

  18. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the subject...

  19. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the subject...

  20. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Protection of foreign government information. 2400.38 Section 2400.38 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY...

  1. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Protection of foreign government information. 2400.38 Section 2400.38 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY...

  2. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Protection of foreign government information. 2400.38 Section 2400.38 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY...

  3. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Protection of foreign government information. 2400.38 Section 2400.38 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY...

  4. Balancing Good Intentions: Protecting the Privacy of Electronic Health Information

    ERIC Educational Resources Information Center

    McClanahan, Kitty

    2008-01-01

    Electronic information is a vital but complex component in the modern health care system, fueling ongoing efforts to develop a universal electronic health record infrastructure. This innovation creates a substantial tension between two desirable values: the increased quality and utility of patient medical records and the protection of the privacy…

  5. Balancing Good Intentions: Protecting the Privacy of Electronic Health Information

    ERIC Educational Resources Information Center

    McClanahan, Kitty

    2008-01-01

    Electronic information is a vital but complex component in the modern health care system, fueling ongoing efforts to develop a universal electronic health record infrastructure. This innovation creates a substantial tension between two desirable values: the increased quality and utility of patient medical records and the protection of the privacy…

  6. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  7. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  8. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  9. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  10. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED...

  11. 17 CFR 248.10 - Limits on disclosure of nonpublic personal information to nonaffiliated third parties.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...: Privacy of Consumer Financial Information and Safeguarding Personal Information Limits on Disclosures § 248.10 Limits on disclosure of nonpublic personal information to nonaffiliated third parties. (a)(1... nonpublic personal information to nonaffiliated third parties. 248.10 Section 248.10 Commodity...

  12. 17 CFR 248.10 - Limits on disclosure of nonpublic personal information to nonaffiliated third parties.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...: Privacy of Consumer Financial Information and Safeguarding Personal Information Limits on Disclosures § 248.10 Limits on disclosure of nonpublic personal information to nonaffiliated third parties. (a)(1... nonpublic personal information to nonaffiliated third parties. 248.10 Section 248.10 Commodity...

  13. Outdoor workers' acceptance of personal protective measures against solar ultraviolet radiation.

    PubMed

    Weber, Marko; Uller, Andreas; Schulmeister, Karl; Brusl, Helmut; Hann, Hans; Kindl, Peter

    2007-01-01

    The acceptance and usability of personal protection against solar UV radiation was evaluated in a field study with a group of tinsmiths in Austria. The personal protective measures (PPM) tested involved four categories: shirts, headwear, sunglasses and topically applied sunscreens; at least six different products per category were tested. Recommendations for the "ideal" shirt, headwear, pair of sunglasses and topical sunscreen are given based on data from questionnaires, i.e., from the point of view of the workers, independently from the actual physical level of protection (such as low transmittance or area of coverage) provided. It is argued that in practice it is important to consider the acceptance and usability of protective measures as well as the level of physical protection when providing PPM.

  14. Public good, personal privacy: a citizens' deliberation about using medical information for pharmacoepidemiological research.

    PubMed

    Parkin, Lianne; Paul, Charlotte

    2011-02-01

    Epidemiologists have long argued for access to personal medical information in order to undertake research in the public interest, while legislation and ethical guidelines have increasingly focused on protecting the privacy of individuals. How the public weighs up these public interest and privacy arguments is unclear. A citizens' jury was held to explore public views about the use of medical information for the post-marketing surveillance of medicine safety. A steering group of stakeholders oversaw the process, including the framing of the question for the jury and the selection of expert witnesses and jurors. An independent chair and facilitator managed the 3-day hearing. The jury unanimously concluded that researchers contracted by a public body should be permitted to use medical information about identifiable people, without their consent, to study the safety of medicines--providing existing ethical guidelines and relevant laws are followed. Jurors who were initially uncomfortable about the use of information without their express consent all became more comfortable after obtaining further information and deliberating with other jurors. This outcome suggests that an informed public does not place personal privacy above societal benefits in the particular circumstance of medicines' safety research, given appropriate privacy safeguards. The specificity of the example, the framing of the public interest and privacy considerations--in the context of scientific, legal, ethical, clinical and consumer input--and the opportunity to deliberate, may explain why the conclusions of the jury differ from public opinion surveys about secondary uses of medical information.

  15. Do medical students receive training in correct use of personal protective equipment?

    PubMed Central

    John, Amrita; Tomas, Myreen E.; Hari, Aditya; Wilson, Brigid M.; Donskey, Curtis J.

    2017-01-01

    ABSTRACT Background: Healthcare personnel often use incorrect technique for donning and doffing of personal protective equipment (PPE). Objective: We tested the hypothesis that medical students receive insufficient training on correct methods for donning and doffing PPE. Methods: We conducted a cross-sectional survey of medical students on clinical rotations at two teaching hospitals to determine the type of training they received in PPE technique. The students performed simulations of contaminated PPE removal with fluorescent lotion on gloves and were assessed for correct PPE technique and skin and/or clothing contamination. To obtain additional information on PPE training during medical education, residents, fellows, and attending physicians completed written questionnaires on PPE training received during medical school and on knowledge of PPE protocols recommended by the Centers for Disease Control and Prevention. Results: Of 27 medical students surveyed, only 11 (41%) reported receiving PPE training, and none had received training requiring demonstration of proficiency. During simulations, 25 of 27 (92.5%) students had one or more lapses in technique and 12 (44%) contaminated their skin with fluorescent lotion. For 100 residents, fellows and attending physicians representing 67 different medical schools, only 53% reported receiving training in use of PPE and only 39% selected correct donning and doffing sequence. Conclusions: Our findings suggest that there is a need for development of effective strategies to train medical students in correct use of PPE. Abbreviations: PPE: Personal protective equipment; MRSA: Methicillin-resistant Staphylococcus aureus; SARS: Severe acute respiratory syndrome; MERS: Middle East respiratory syndrome; WHO: World Health Organization; CDC: Centers for Disease Control and Prevention; OSCE: Objective structured clinical examination PMID:28178912

  16. Intimate Partner Survivors’ Help-Seeking and Protection Efforts: A Person-Oriented Analysis

    PubMed Central

    Nurius, Paula S.; Macy, Rebecca J.; Nwabuzor, Ijeoma; Holt, Victoria L.

    2014-01-01

    Domestic violence advocates and researchers advocate for a survivor-centered approach for assisting women experiencing intimate partner violence (IPV), with individualized safety plans and services; yet little empirical work has been done to determine IPV survivors’ specific combinations of vulnerabilities and assets that might inform such an approach. Using latent profile analysis of a cohort of 448 survivors, five distinct subgroups were previously identified in terms of biopsychosocial asset and vulnerability profiles. The purpose of the current study was to apply person-oriented methodology for survivor-centered investigation of differences in help-seeking and protective actions according to subgroup membership within this cohort. Though not differing demographically, the subgroups were found to differ significantly and meaningfully in their patterns of IPV help-seeking and protective actions. Thus, reliance on population-aggregate linear relationships between IPV exposure and safety efforts may risk overlooking important variation by vulnerability and asset profile, and knowledge of distinct clusters among functioning profiles may help with understanding of survivors’ coping strategies. The authors outline service-need considerations across the subgroups and provide guidance for targeted outreach, locating IPV survivors and matching services to their needs. PMID:20448232

  17. Intimate partner survivors' help-seeking and protection efforts: a person-oriented analysis.

    PubMed

    Nurius, Paula S; Macy, Rebecca J; Nwabuzor, Ijeoma; Holt, Victoria L

    2011-02-01

    Domestic violence advocates and researchers advocate for a survivor-centered approach for assisting women experiencing intimate partner violence (IPV), with individualized safety plans and services; yet little empirical work has been done to determine IPV survivors' specific combinations of vulnerabilities and assets that might inform such an approach. Using latent profile analysis of a cohort of 448 survivors, five distinct subgroups were previously identified in terms of biopsychosocial asset and vulnerability profiles. The purpose of the current study was to apply person-oriented methodology for survivor-centered investigation of differences in help-seeking and protective actions according to subgroup membership within this cohort. Though not differing demographically, the subgroups were found to differ significantly and meaningfully in their patterns of IPV help-seeking and protective actions. Thus, reliance on population-aggregate linear relationships between IPV exposure and safety efforts may risk overlooking important variation by vulnerability and asset profile, and knowledge of distinct clusters among functioning profiles may help with understanding of survivors' coping strategies.The authors outline service-need considerations across the subgroups and provide guidance for targeted outreach, locating IPV survivors and matching services to their needs.

  18. Fluorescence-based optical chemical sensors for personal protection

    NASA Astrophysics Data System (ADS)

    Korent Urek, Špela; Lobnik, Aleksandra; Turel, Matejka

    2010-04-01

    The World Health Organization has reported that each year approximately 3 million people are poised by organophosphate substances (pesticides and nerve agents) resulting in 220,000 deaths. Organophosphates (OP) are toxic compounds which cause rapid and severe inhibition of serine proteases, most markedly acetylcholinesterase, which is vital to nerve function. This inhibition is often fatal. OP nerve agents are generally stable, easy to disperse, and highly toxic. They can be absorbed through the skin, by ingestion, or by respiration. A release of a nerve agent has the potential to rapidly affect a large number of people. The ease of manufacturing and dispensability of nerve agents, as well as available, inexpensive starting materials make these agents a weapon of choice for criminal terrorist attacks. One of the major steps toward protection against dangerous substances is to develop sensor devices that can act as an early warning system to the endangered people.

  19. You are born with your genes: justice and protection against discrimination in the use of genetic information.

    PubMed

    Francis, Leslie P

    2010-01-01

    Genetic information poses an apparent paradox for justice in health care. On the one hand, genetic information seems to be exactly the kind of information that it is unjust to take into account in the distribution of important goods. On the other hand, genetic information may increasingly become useful in individual patient care as evidence for personalized medicine increases. Although it is important to emphasize the difference between genetic information and the social construct of race, nonetheless, the historical interplay between discrimination based on assumptions about heritability and discrimination based on race are significant. Thus, this article defends the importance of paying very close attention to protections in the use of genetic information. Three current examples of inadequate protection are cited. First, informed consent to genetic testing should incorporate potential confidentiality risks raised by this information. Second, the Genetic Information Nondiscrimination Act is too porous to protect employees from their employers' possession of genetic information; if such information is used in discriminatory ways, burdens of seeking protection then fall on the employees. More stringent strategies for protecting information are thus desirable. Finally, current designs of interoperable health records fail to allow for the sequestration of genetic information. Efforts to develop such sequestration techniques should be encouraged; among other benefits, they would be helpful in shielding genetic information from employers. (c) 2010 Mount Sinai School of Medicine.

  20. Personal Protective Equipment for Filovirus Epidemics: A Call for Better Evidence

    PubMed Central

    Sprecher, Armand G.; Caluwaerts, An; Draper, Mike; Feldmann, Heinz; Frey, Clifford P.; Funk, Renée H.; Kobinger, Gary; Le Duc, James W.; Spiropoulou, Christina; Williams, Warren Jon

    2015-01-01

    Personal protective equipment (PPE) is an important part of worker protection during filovirus outbreaks. The need to protect against a highly virulent fluid-borne pathogen in the tropical environment imposes a heat stress on the wearer that is itself a safety risk. No evidence supports the choice of PPE employed in recent outbreaks, and standard testing procedures employed by the protective garment industry do not well simulate filovirus exposure. Further research is needed to determine the appropriate PPE for filoviruses and the heat stress that it imposes. PMID:25821225

  1. Use and disclosure of health information and protection of patient privacy in Taiwan.

    PubMed

    Liu, Han-Hsi

    2010-03-01

    This paper examines Taiwan's current regulatory system for the use of healthcare information from the viewpoint of patient privacy protection. The author proposes a patient-centered, cooperative system centered on the "traffic light theory", as a solution to the potential conflict between the use of healthcare information and the protection of patient privacy. Taiwan, a country with a national healthcare insurance program and state-of-the-art electronic technology, takes a distinctive approach to the protection of patient privacy. On January 1st, 2004, the Bureau of National Health Insurance (BNHI) implemented a comprehensive embedded integrated circuit (IC) card, which puts the wide-ranging health information of its 22 million beneficiaries online to facilitate review of use and disclosure. It is well understood that healthcare information is of a personal and sensitive nature, demanding stringent privacy protection. Nevertheless, there is no denying the potential benefit of using personal health information (PHI) to achieve public good, especially in the area of cost containment. The comprehensive e-health system in Taiwan greatly facilitates copying, transmission, and use of PHI, but does the regulatory system provide enough safeguards for patient privacy? Because the law in Taiwan does not provide clear standards for the use and disclosure of healthcare information, healthcare providers are either too conservative or too aggressive. While most healthcare providers keep their oath of confidentiality, some rogue members severely abuse patient privacy. This paper proposes a "traffic-light system" to remedy this situation. Flashing yellow lights allow aggressive drivers to ignore others, while causing overly cautious drivers to be too hesitant. The author contends that clear standards should have been established for healthcare providers. Like car drivers, healthcare providers need red and green traffic signals. The law should indicate, through workable privacy

  2. Personal Information Management for Nurses Returning to School.

    PubMed

    Bowman, Katherine

    2015-12-01

    Registered nurses with a diploma or an associate's degree are encouraged to return to school to earn a Bachelor of Science in Nursing degree. Until they return to school, many RNs have little need to regularly write, store, and retrieve work-related papers, but they are expected to complete the majority of assignments using a computer when in the student role. Personal information management (PIM) is a system of organizing and managing electronic information that will reduce computer clutter, while enhancing time use, task management, and productivity. This article introduces three PIM strategies for managing school work. Nesting is the creation of a system of folders to form a hierarchy for storing and retrieving electronic documents. Each folder, subfolder, and document must be given a meaningful unique name. Numbering is used to create different versions of the same paper, while preserving the original document. Copyright 2015, SLACK Incorporated.

  3. Banking on health: Personal records and information exchange.

    PubMed

    Ball, Marion J; Gold, Jonathan

    2006-01-01

    Consumer demand for personal health records (PHRs) and the capabilities provided by regional health information organizations (RHIOs) will change healthcare, just as automatic teller machines have changed banking. The PHR is predicated on the existence of electronic medical records (EMRs) and electronic health records (EHRs). Patient and consumer principles guiding the development of the PHR reflect issues of access, control, privacy, and security. Working models illustrate the variations of RHIOs and PHRs possible and suggest the benefits that electronic information exchange can accrue for healthcare and healthcare consumers. Today both the private and public sectors are working to define the issues involved in efforts that are now taking place and that will transform healthcare. Consumers are ready for the type of changes that will improve healthcare quality.

  4. Information support systems for cultural heritage protection against flooding

    NASA Astrophysics Data System (ADS)

    Nedvedova, K.; Pergl, R.

    2015-08-01

    The goal of this paper is to present use of different kind of software applications to create complex support system for protection of cultural heritage against flooding. The project is very complex and it tries to cover the whole area of the problem from prevention to liquidation of aftermath effects. We used GIS for mapping the risk areas, ontology systems for vulnerability assessment application and the BORM method (Business Object Relation Modelling) for flood protection system planning guide. Those modern technologies helped us to gather a lot of information in one place and provide the knowledge to the broad audience.

  5. 77 FR 25499 - Notice of Proposed Information Collection: Comment Request; Personal Financial and Credit Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT Notice of Proposed Information Collection: Comment Request; Personal Financial and... also lists the following information: Title of Proposal: Personal Financial and Credit Statement....

  6. Information Services to the Disadvantaged Person: A Challenge for Information Professionals in Thailand.

    ERIC Educational Resources Information Center

    Butdisuwan, Sujin

    This paper considers the provision of library and information services to disadvantaged persons in Thailand and focuses on the need to provide appropriate staff training to library staff working with these groups. The results of a number of specific projects are used as illustrative examples. The paper begins with an overview of the disadvantaged…

  7. Ethical considerations in internet use of electronic protected health information.

    PubMed

    Polito, Jacquelyn M

    2012-03-01

    Caregivers, patients, and their family members are increasingly reliant on social network websites for storing, communicating, and referencing medical information. The Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule seeks balance by protecting the privacy of patients' health information and assuring that this information is available to those who need it to provide health care. Though federal and state governments have created laws and policies to safeguard patient privacy and confidentiality, the laws are inadequate against the rapid and innovative use of electronic health websites. As Internet use broadens access to information, health professionals must be aware that this information is not always secure. We must identify and reflect on medical ethics issues and be accountable for maintaining privacy for the patient.

  8. [The real-world effectiveness of personal protective equipment and additional risks for workers' health].

    PubMed

    Denisov, É I; Morozova, T V; Adeninskaia, E E; Kur'erov, N N

    2013-01-01

    The effectiveness of personal protective equipment (PPE) of hearing, respiratory organs and hands is considered. It is shown that real effect of PPE is twice lower than declared by supplier; this presumes some derating system. The aspects of discomfort and additional risks are analyzed. The hygienic and physiologic evaluation of PPE is required along with elaboration of an official document (OSH standard or sanitary regulation) on selection, personal fit, organization of use and individual training of workers and their motivation.

  9. 78 FR 29375 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ... critical infrastructure information not customarily in the public domain and related to the security of... SECURITY Protected Critical Infrastructure Information (PCII) Office Self- Assessment Questionnaire AGENCY... Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Infrastructure...

  10. 75 FR 82041 - Notice of Proposed Information Collection: Comment Request; Floodplain Management and Protection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ...] Notice of Proposed Information Collection: Comment Request; Floodplain Management and Protection of... lists the following information: Title of Proposal: Floodplain Management and Protection of Wetlands..., ``Floodplain Management,'' and Executive Order 11990, ``Protection of Wetlands.'' Each respondent that...

  11. Hand hygiene and the use of personal protective equipment.

    PubMed

    Wyeth, Jenny

    Infection prevention and control nurses (IPCNs) have an extremely wide remit in relation to the facilitation of appropriate infection prevention and control practice within healthcare environments. In order to be effective IPCNs need to be involved at all stages of healthcare service delivery and need to form close working relationships with staff at all levels and in all departments within their organisation. The provision of the necessary facilities within the clinical environment, along with the ongoing training and support of staff are essential prerequisites to changing the behaviour of staff in order to consistently deliver effective hand hygiene and other infection prevention and control practices. Auditing of practice and the investigation of incidents enable the identification of areas of practice requiring improvement, which subsequently informs the continual development of training programmes and initiatives with a view to improving patient and staff safety. IPCNs need to be able to react swiftly to the emergence of new infectious organisms and/or evidence to identify what is required in order to ensure that staff are compliant with anticipated practice to maintain the safety of the patients in their care, themselves and their colleagues.

  12. An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives

    PubMed Central

    Neri, Emilio; Jonker, Elizabeth

    2007-01-01

    Background The public is concerned about the privacy of their health information, especially as more of it is collected, stored, and exchanged electronically. But we do not know the extent of leakage of personal health information (PHI) from data custodians. One form of data leakage is through computer equipment that is sold, donated, lost, or stolen from health care facilities or individuals who work at these facilities. Previous studies have shown that it is possible to get sensitive personal information (PI) from second-hand disk drives. However, there have been no studies investigating the leakage of PHI in this way. Objectives The aim of the study was to determine the extent to which PHI can be obtained from second-hand computer disk drives. Methods A list of Canadian vendors selling second-hand computer equipment was constructed, and we systematically went through the shuffled list and attempted to purchase used disk drives from the vendors. Sixty functional disk drives were purchased and analyzed for data remnants containing PHI using computer forensic tools. Results It was possible to recover PI from 65% (95% CI: 52%-76%) of the drives. In total, 10% (95% CI: 5%-20%) had PHI on people other than the owner(s) of the drive, and 8% (95% CI: 7%-24%) had PHI on the owner(s) of the drive. Some of the PHI included very sensitive mental health information on a large number of people. Conclusions There is a strong need for health care data custodians to either encrypt all computers that can hold PHI on their clients or patients, including those used by employees and subcontractors in their homes, or to ensure that their computers are destroyed rather than finding a second life in the used computer market. PMID:17942386

  13. Drunk personality: reports from drinkers and knowledgeable informants.

    PubMed

    Winograd, Rachel P; Steinley, Douglas L; Sher, Kenneth J

    2014-06-01

    Existing literature supports the five-factor model (FFM) of personality (i.e., Extraversion, Agreeableness, Conscientiousness, Emotional Stability, and Intellect or Openness) as a comprehensive representation of stable aspects of mood, affect, and behavior. This study evaluated the FFM as a framework for both self-perceptions of drunkenness (i.e., individual changes in mood, affect, and behavior associated with one's own intoxication), as well "drinking buddies'" perceptions of their friends' drunkenness (i.e., changes in mood, affect, and behavior associated with friends' intoxication) and the association of reported sober-to-drunk differences with negative alcohol-related consequences. College-student drinkers (N = 374; 187 drinking buddy pairs) reported on their sober and drunk levels of the 5 factors, as well as those of their drinking buddies. Buddies completed parallel assessments for themselves and their friends to ensure rater agreement. All participants completed assessments of harmful alcohol outcomes experienced within the past year. Regardless of reporter, differences between drunken and sober states were found across all 5 factors and agreement between self and informant reports was consistently significant and comparable across sober and drunk conditions. Low levels of drunk Conscientiousness and drunk Emotional Stability were associated with experiencing more alcohol-related consequences, even when controlling for sober factor levels and binge-drinking frequency. Findings support the use of the FFM as a clinically relevant framework for organizing differences in personality expression associated with intoxication and the validity of self-reports of drunk personality. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  14. Drunk Personality: Reports from Drinkers and Knowledgeable Informants

    PubMed Central

    Winograd, Rachel P.; Steinley, Douglas; Sher, Kenneth J.

    2014-01-01

    Objective Existing literature supports the Five-Factor Model (FFM) of personality (i.e., Extraversion, Agreeableness, Conscientiousness, Emotional Stability, and Intellect or Openness) as a comprehensive representation of stable aspects of mood, affect, and behavior. This study evaluated the FFM as a framework for both self-perceptions of drunkenness (i.e. individual changes in mood, affect, and behavior associated with one’s own intoxication), as well “drinking buddies’” perceptions of their friends’ drunkenness (i.e., changes in mood, affect, and behavior associated with a friend’s intoxication) and the association of reported sober-to-drunk differences with negative alcohol-related consequences. Method College-student drinkers (N = 374 [187 “drinking buddy” pairs]) reported on their sober and drunk levels of the five factors, as well as those of their drinking buddy. Buddies completed parallel assessments for themselves and their friend in order for rater agreement to be determined. All participants completed assessments of harmful alcohol outcomes experienced within the past year. Results Regardless of reporter, differences between drunken and sober states were found across all five factors and agreement between self and informant reports was consistently significant and comparable across sober and drunk conditions. Low levels of drunk Conscientiousness and drunk Emotional Stability were associated with experiencing more alcohol-related consequences, even when controlling for sober factor levels and binge drinking frequency. Conclusions Findings support the use of the FFM as a clinically relevant framework for organizing differences in personality expression associated with intoxication and the validity of self-reports of drunk personality. PMID:24796850

  15. Theft of information in the take-grant protection model

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    Questions of information flow are in many ways more important than questions of access control, because the goal of many security policies is to thwart the unauthorized release of information, not merely the illicit obtaining of access rights to that information. The Take-Grant Protection Model is a theoretical tool for examining such issues because conditions necessary and sufficient for information to flow between two objects, and for rights to objects to be obtained or stolen, are known. These results are extended by examining the question of information flow from an object the owner of which is unwilling to release that information. Necessary and sufficient conditions for such theft of information to occur are derived, and bounds on the number of subjects that must take action for the theft to occur are presented. To emphasize the usefulness of these results, the security policies of complete isolation, transfer of rights with the cooperation of an owner, and transfer of information (but not rights) with the cooperation of the owner are presented; the last is used to model a simple reference monitor guarding a resource.

  16. [Interaction of nurses and women caring informally for dependent persons].

    PubMed

    Delicado Useros, M V; Candel Parra, E; Alfaro Espín, A; López Máñez, M; García Borge, C

    2004-03-15

    To find the attitudes that primary care nurses in Albacete have towards family carers. Qualitative research using discussion groups. Primary care in Albacete: 5 health centres, 2 rural and 3 urban. Nurses following a primary care home visit programme, of both sexes, differing experience and training, and coming from both rural and urban areas took part. Exclusion criterion: nurses in management and administrative posts at time of recruitment. They were recruited by primary care nurses in line with the profiles of participants required. Information was collected through discussion in the groups, which was recorded and later transcribed for analysis. Those taking part in the 2 discussion groups had the following characteristics: 3 men and 8 women. 5 of them were from rural health centres (HC) and 6 from urban HC; 3 had under 2 years experience in the Home Visit Programme (HVP) and 8 had over 5 years experience in it; 5 completed their nursing studies before 1990, and 6 afterwards. In the chats it was clear that the broad experience of PC nurses made them aware of the health situation and quality of life of informal carers, of the loneliness of these and the inter-personal conflicts that occur in families when a situation of dependency arises. Nurses had their educational function towards the carers assumed despite the limitations. The view that the responsibility for the care of the dependent person is the family's was predominant, and a concern for lack of resources and support was appreciated. Nurses had a view of the carer as a resource and barely perceived her as a patient.

  17. Relationships: empirical contribution. Understanding personality pathology in adolescents: the five factor model of personality and social information processing.

    PubMed

    Hessels, Christel; van den Hanenberg, Danique; de Castro, Bram Orobio; van Aken, Marcel A G

    2014-02-01

    This study seeks to integrate two research traditions that lie at the base of the understanding of personality pathology in adolescents. The first research tradition refers to normal personality according to the Five Factor Model (FFM). The second tradition specifies the key feature of personality disorder as the capacity to mentalize, which can be reflected in Social Information Processing (SIP). In a clinical sample of 96 adolescents, the authors investigated response generation, coping strategy, and memories of past frustrating experiences as part of SIP, as mediator in the relationship between personality and personality pathology, and a possible moderating role of personality on the relationship between SIP and personality pathology. The hypothesized mediation, by which the effects of personality dimensions on personality pathology was expected to be mediated by SIP variables, was found only for the effect of Neuroticism, most specifically on BPD, which appeared to be mediated by memories the patients had about past frustrating conflict situations with peers. Some moderating effects of personality on the relationship between SIP variables and personality pathology were found, suggesting that high Agreeableness and sometimes low Neuroticism can buffer this relationship. These results suggest that personality dimensions and social cognitions both independently and together play a role in adolescents' personality pathology.

  18. Preferred sources of health information in persons with multiple sclerosis: degree of trust and information sought.

    PubMed

    Marrie, Ruth Ann; Salter, Amber R; Tyry, Tuula; Fox, Robert J; Cutter, Gary R

    2013-03-17

    Effective health communication is important for informed decision-making, yet little is known about the range of information sources used by persons with multiple sclerosis (MS), the perceived trust in those information sources, or how this might vary according to patient characteristics. We aimed to investigate the sources of health information used by persons with MS, their preferences for the source of health information, and levels of trust in those information sources. We also aimed to evaluate how these findings varied according to participant characteristics. In 2011, participants in the North American Research Committee on Multiple Sclerosis (NARCOMS) Registry were asked about their sources of health information using selected questions adapted from the 2007 Health Information National Trends (HINTS) survey. Of 12,974 eligible participants, 66.18% (8586/12,974) completed the questionnaire. Mass media sources, rather than interpersonal information sources, were the first sources used by 83.22% (5953/7153) of participants for general health topics and by 68.31% (5026/7357) of participants for MS concerns. Specifically, the Internet was the first source of health information for general health issues (5332/7267, 73.40%) and MS (4369/7376, 59.23%). In a logistic regression model, younger age, less disability, and higher annual income were independently associated with increased odds of use of mass media rather than interpersonal sources of information first. The most trusted information source was a physician, with 97.94% (8318/8493) reporting that they trusted a physician some or a lot. Information sought included treatment for MS (4470/5663, 78.93%), general information about MS (3378/5405, 62.50%), paying for medical care (1096/4282, 25.59%), where to get medical care (787/4282, 18.38%), and supports for coping with MS (2775/5031, 55.16%). Nearly 40% (2998/7521) of participants had concerns about the quality of the information they gathered. Although

  19. Preferred Sources of Health Information in Persons With Multiple Sclerosis: Degree of Trust and Information Sought

    PubMed Central

    Salter, Amber R; Tyry, Tuula; Fox, Robert J; Cutter, Gary R

    2013-01-01

    Background Effective health communication is important for informed decision-making, yet little is known about the range of information sources used by persons with multiple sclerosis (MS), the perceived trust in those information sources, or how this might vary according to patient characteristics. Objective We aimed to investigate the sources of health information used by persons with MS, their preferences for the source of health information, and levels of trust in those information sources. We also aimed to evaluate how these findings varied according to participant characteristics. Methods In 2011, participants in the North American Research Committee on Multiple Sclerosis (NARCOMS) Registry were asked about their sources of health information using selected questions adapted from the 2007 Health Information National Trends (HINTS) survey. Results Of 12,974 eligible participants, 66.18% (8586/12,974) completed the questionnaire. Mass media sources, rather than interpersonal information sources, were the first sources used by 83.22% (5953/7153) of participants for general health topics and by 68.31% (5026/7357) of participants for MS concerns. Specifically, the Internet was the first source of health information for general health issues (5332/7267, 73.40%) and MS (4369/7376, 59.23%). In a logistic regression model, younger age, less disability, and higher annual income were independently associated with increased odds of use of mass media rather than interpersonal sources of information first. The most trusted information source was a physician, with 97.94% (8318/8493) reporting that they trusted a physician some or a lot. Information sought included treatment for MS (4470/5663, 78.93%), general information about MS (3378/5405, 62.50%), paying for medical care (1096/4282, 25.59%), where to get medical care (787/4282, 18.38%), and supports for coping with MS (2775/5031, 55.16%). Nearly 40% (2998/7521) of participants had concerns about the quality of the

  20. 78 FR 12065 - National Institute for Occupational Safety and Health Personal Protective Technology for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-21

    ... HUMAN SERVICES Centers for Disease Control and Prevention National Institute for Occupational Safety and Health Personal Protective Technology for Pesticide Handlers: Stakeholder Meeting AGENCY: The National Institute for Occupational Safety and Health (NIOSH) of the Centers for Disease Control and Prevention (CDC...

  1. Risk and Protective Factors Associated with Personal Mastery Among Sexual Minority African American Female Sex Workers

    PubMed Central

    Buttram, Mance E.; Surratt, Hilary L.; Kurtz, Steven P.

    2014-01-01

    Research among sexual minorities has traditionally examined problems such as substance use, HIV risk, mental health problems, and victimization. Among sexual minority street-based female sex workers, these vulnerabilities can be magnified. Grounded in theories of resilience, this study examines risk and protective factors associated with a high level of personal mastery among a vulnerable population of women. Data are drawn from baseline interviews from street-based African American female sex workers enrolled in a randomized intervention trial in Miami, Florida. We compare sexual minority (N=197) and heterosexual (N=365) women on measures of risk and protective factors; among sexual minority women we present logistic regression analyses which reveal that severe mental distress and HIV transmission risk are associated with low levels of personal mastery, while protective factors of transportation access and social support are associated with high levels of personal mastery. These findings suggest that these protective factors may potentially facilitate the development of personal mastery and represent beneficial avenues for intervention efforts. PMID:25530691

  2. Use of remote video auditing to validate Ebola level II personal protective equipment competency.

    PubMed

    Allar, Peter J; Frank-Cooper, Madalyn

    2015-06-01

    Faced with an Ebola-related mandate to regularly train frontline hospital staff with the donning and doffing of personal protective equipment, a community hospital's emergency department implemented remote video auditing (RVA) to assist in the training and remediation of its nursing staff. RVA was found to be useful in assessing performance and facilitating remediation. Copyright 2015, SLACK Incorporated.

  3. 77 FR 33688 - Revisions to the Export Administration Regulations (EAR): Control of Personal Protective...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-07

    ... Administration Regulations (EAR): Control of Personal Protective Equipment, Shelters, and Related Items the... controlled on the CCL and by the EAR. This proposed rule is being published in conjunction with a proposed... Control List (CCL) in Supplement No. 1 to Part 774 of the Export Administration Regulations (EAR)....

  4. 45 CFR 164.520 - Notice of privacy practices for protected health information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... receive protected health information other than summary health information as defined in § 164.504(a) or... Health Information § 164.520 Notice of privacy practices for protected health information. (a) Standard... legal duties with respect to protected health information. (2) Exception for group health plans. (i) An...

  5. Review of Extracting Information From the Social Web for Health Personalization

    PubMed Central

    Karlsen, Randi; Bonander, Jason

    2011-01-01

    In recent years the Web has come into its own as a social platform where health consumers are actively creating and consuming Web content. Moreover, as the Web matures, consumers are gaining access to personalized applications adapted to their health needs and interests. The creation of personalized Web applications relies on extracted information about the users and the content to personalize. The Social Web itself provides many sources of information that can be used to extract information for personalization apart from traditional Web forms and questionnaires. This paper provides a review of different approaches for extracting information from the Social Web for health personalization. We reviewed research literature across different fields addressing the disclosure of health information in the Social Web, techniques to extract that information, and examples of personalized health applications. In addition, the paper includes a discussion of technical and socioethical challenges related to the extraction of information for health personalization. PMID:21278049

  6. [A web information system for enhancing management and improving special care services provided to dependent persons].

    PubMed

    Alvarez-Bermejo, J A; Hernández-Capel, D M; Belmonte-Ureña, L J; Roca-Piera, J

    2009-01-01

    Ensuring the quality of services provided in centres where dependent persons are seen by specialist services, by improving and enhancing how information -salary, control of tasks, patients' records, etc.- is shared between staff and carers. A web information system has been developed and experimentally deployed to accomplish this. The accuracy of the system was evaluated by assessing how confident the employees were with it rather than relying on statistical data. It was experimentally deployed since January 2009 in Asociación de Personas con Discapacidad "El Saliente" that manages several day centres in Almeria, for dependent persons over 65 years old, particularly those affected by Alzheimer' disease. Incidence data was collected during the experimental period. A total of 84% of the employees thought that the system helped to manage documents, administrative duties, etc., and 92.4% said they could attend to really important tasks because the system was responsible for alerting them of every task, such as medication timetables, checking all patients were present (to prevent an Alzheimer affected person leaving the centre) etc. During this period the incidences reported were reduced by about a 30%, although data is still partially representative. As the life expectancy of the population gets longer, these centres will increase. Providing systems such as the one presented here would be of great help for administrative duties (sensitive data protection...) as well as ensuring high quality care and attention.

  7. Consumer support for health information exchange and personal health records: a regional health information organization survey.

    PubMed

    Patel, Vaishali N; Dhopeshwarkar, Rina V; Edwards, Alison; Barrón, Yolanda; Sparenborg, Jeffrey; Kaushal, Rainu

    2012-06-01

    In order to characterize consumer support for electronic health information exchange (HIE) and personal health records (PHRs) in a community where HIE is underway, we conducted a survey of English speaking adults who visited primary care practices participating in a regional community-wide clinical data exchange, during August, 2008. Amongst the 117 respondents, a majority supported physicians' use of HIE (83%) or expressed interest in potentially using PHRs (76%). Consumers' comfort sending personal information electronically over the Internet and their perceptions regarding the potential benefits of HIE were independently associated with their support for HIE. Consumers' prior experience using the Internet to manage their healthcare, perceptions regarding the potential benefits of PHRs and college education were independently associated with potential PHR use. Bolstering consumer support for HIE and PHRs will require addressing privacy and security concerns, demonstrating clinical benefits, and reaching out to those who are less educated and computer literate.

  8. [Personal protective equipments: considerations on the requirements and characteristics of selection and use].

    PubMed

    Galbiati, C

    2010-01-01

    The choice of PPE (Personal Protective Equipment) required two steps: the first related to the security features and the second related to ergonomics assessments and acceptance by the user. For the first aspect the legislation and technical regulations set clear requirements PPE, but choose a PPE's supplier means, of course, also make an assessment on the cost for PPE and service providers related. We will consider the technical, structural and ergonomic for PPE, to understand how to move towards the right solution. An important reference is the Ministerial Decree 2 maggio 2001: Criteria for identification and use of personal protective equipment (PPE), which describes the criteria for selection of proper protective equipment only for certain types of PPE for other the references is the European legislation or some guidelines.

  9. Personalized Information Environments: Do Public Libraries Want a Slice of the PIE?

    ERIC Educational Resources Information Center

    Worcester, Lea

    2003-01-01

    Discussion of personalized information environments (PIEs) focuses on library personalized interfaces. Describes academic library PIEs and commercial sites, such as Amazon.com that use personalization; explores the Public Library of Charlotte and Mecklenburg's personalized interface; and discusses opportunities and challenges PIEs offer public…

  10. Servicemembers Civil Relief Act: Information on Mortgage Protections and Related Education Efforts

    DTIC Science & Technology

    2014-01-01

    SERVICEMEMBERS CIVIL RELIEF ACT Information on Mortgage Protections and Related Education Efforts Report to...2014 to 00-00-2014 4. TITLE AND SUBTITLE Servicemembers Civil Relief Act: Information on Mortgage Protections and Related Education Efforts 5a...Information on Mortgage Protections and Related Education Efforts Why GAO Did This Study SCRA seeks to protect eligible active duty military personnel in

  11. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Protected Critical Infrastructure Information... SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.4 Protected Critical Infrastructure Information... Assistant Secretary for Infrastructure Protection. (b) Appointment of a PCII Program Manager. The Under...

  12. The European Conformity Assessment Procedures and the Quality Assurance Instruments for Personal Protective Equipment in the Internal Market.

    PubMed

    Lambert, Joachim

    1995-01-01

    Conformity assessment procedures prescribed by European legislation are presented and their concrete implementation is illustrated by the example of personal protective equipment (PPE). The different categories of PPE defined by Council Directive 89/686/EEC are explained with reference to the applicable conformity assessment elements. Quality assurance of production is presented as the central element of the conformity assessment procedure for complex PPE. Special emphasis is put on the necessity of having a regular exchange of views and information among notified bodies in Europe. Ways in which third countries can eventually carry out conformity assessment on the basis of a contract with the European Community Commission are explained.

  13. Personal health records: Consumer attitudes toward privacy and security of their personal health information.

    PubMed

    Lafky, Deborah Beranek; Horan, Thomas A

    2011-03-01

    Personal health record (PHR) systems are a subject of intense interest in the move to improve healthcare accessibility and quality. Although a number of vendors continue to put forward PHR systems, user-centered design research has lagged, and it has not been clear what features are important to prospective PHR users. Here, we report on a user-centered design study that combines qualitative and quantitative approaches to investigate several dimensions relevant to PHR design, and to look at the effect of health status on user needs. The results indicate that health status, especially disability and chronic illness, is relevant to PHR design. Further, the results provide empirical evidence about the role of privacy and security in users' attitudes toward PHR use. The exact nature of these attitudes differs from widely held perceptions about consumer values in healthcare information management.

  14. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... members of the Military Services and all married persons are not considered minors regardless of age, and... person or organization (for example, personal telephone lists or memory aids) that are retained or... notes are an extension of the individual's memory. These notes, however, must be maintained...

  15. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... members of the Military Services and all married persons are not considered minors regardless of age, and... person or organization (for example, personal telephone lists or memory aids) that are retained or... notes are an extension of the individual's memory. These notes, however, must be maintained...

  16. The structure of informal social networks of persons with profound intellectual and multiple disabilities.

    PubMed

    Kamstra, A; van der Putten, A A J; Vlaskamp, C

    2015-05-01

    Persons with less severe disabilities are able to express their needs and show initiatives in social contacts, persons with profound intellectual and multiple disabilities (PIMD), however, depend on others for this. This study analysed the structure of informal networks of persons with PIMD. Data concerning the number, type and frequency of contacts were collected in 205 persons with PIMD. The mean number of contact persons was 5.1 (range: 0-26, SD: 4.2) per year. 79.4% of the contact persons are family, with an average of 72.3 contacts per year. Parents had significantly more contact compared to the other informal contact persons. In 2.2% of the sample contacts with peers were seen. The informal networks of persons with PIMD consist mainly of family. The question arises how informal networks can be expanded and which role professionals have in this process. © 2014 John Wiley & Sons Ltd.

  17. 10 CFR 1044.11 - How do you protect the information that you want to disclose?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false How do you protect the information that you want to... 2000 § 1044.11 How do you protect the information that you want to disclose? To protect classified information and unclassified controlled nuclear information you plan to disclose, you must: (a) Only...

  18. 77 FR 39573 - Additional Identifying Information Associated With Persons Whose Property and Interests in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-03

    ... Office of Foreign Assets Control Additional Identifying Information Associated With Persons Whose... Treasury's Office of Foreign Assets Control (``OFAC'') is publishing additional indentifying information... on June 1, 2012. FOR FURTHER INFORMATION CONTACT: Assistant Director, Sanctions...

  19. Information Operations: A Research Aid Includes Coverage of: Information Warfare, Information Assurance, and Infrastructure Protection.

    DTIC Science & Technology

    1997-09-01

    Response Team, Defense Information Systems Agency, National Imagery and Mapping Agency, escrowed encryption standard, multilevel information...systems security initiative (MISSI), and Fortezza encryption card. Characteristics of Information Warfare, Information Warfare Panel 1 Fred Giessler, Ph.D...Directive 42 July 5, 1990 NSD 42 addresses U.S. Government capabilities for securing national security systems against technical exploitation and

  20. Attenuation of X and Gamma Rays in Personal Radiation Shielding Protective Clothing.

    PubMed

    Kozlovska, Michaela; Cerny, Radek; Otahal, Petr

    2015-11-01

    A collection of personal radiation shielding protective clothing, suitable for use in case of accidents in nuclear facilities or radiological emergency situations involving radioactive agents, was gathered and tested at the Nuclear Protection Department of the National Institute for Nuclear, Chemical and Biological Protection, Czech Republic. Attenuating qualities of shielding layers in individual protective clothing were tested via spectra measurement of x and gamma rays, penetrating them. The rays originated from different radionuclide point sources, the gamma ray energies of which cover a broad energy range. The spectra were measured by handheld spectrometers, both scintillation and High Purity Germanium. Different narrow beam geometries were adjusted using a special testing bench and a set of various collimators. The main experimentally determined quantity for individual samples of personal radiation shielding protective clothing was x and gamma rays attenuation for significant energies of the spectra. The attenuation was assessed comparing net peak areas (after background subtraction) in spectra, where a tested sample was placed between the source and the detector, and corresponding net peak areas in spectra, measured without the sample. Mass attenuation coefficients, which describe attenuating qualities of shielding layers materials in individual samples, together with corresponding lead equivalents, were determined as well. Experimentally assessed mass attenuation coefficients of the samples were compared to the referred ones for individual heavy metals.

  1. [Personal identification using information from cranio-facial region].

    PubMed

    Minaguchi, Kiyoshi

    2007-11-01

    Much of Forensic Odontology is concerned with personal identification, through examination of cranio-facial region. This paper describes several studies in which we worked with materials derived from cranio-facial region. The following topics are addressed : (1) Human saliva contains proteins specific to salivary glands, proteins which are highly polymorphic compared with those found in other body fluids. In particular, six genes for proline-rich proteins coded many proteins found in human saliva, and we found several of them. At least five kinds of cystatin are secreted in saliva. We constructed recombinant polymorphic proteins, cystatin SAl and SA2. Using these proteins, we compared effects of amino acid mutation on protease inhibitor activity, and demonstrated a novel function for type-2 cystatin cytokine-inducing activity. (2) Among autosomal STR loci, we identified the D12S67 locus as highly polymorphic, with a heterozygosity of 95%, by investigating differences in nucleotide repeat units. Highly polymorphic autosomal STR loci offer an effective forensic tool under certain conditions, in addition to multiplex PCR, and therefore merit further study in forensic practice. (3) Although digitalization is prevalent in photography, analog images are preferable in certain circumstances as they offer better resolution. (4) Usually, information on mtDNA polymorphisms from HV1 and HV2 in the control region is used in forensic practice. However, information from the coding region considerably increases the discrimination power of mtDNA polymorphisms. It is important to increase the volume of coding region information available with regard to mtDNA polymorphisms for future forensic practice. (5) Y-STR polymorphisms are closely associated with binary haplogroups, and it is possible to estimate a binary haplogroup from an STR haplotype. (6) Mitochondrial DNA and Y-chromosomal polymorphisms can be used to determine geographic origin in individuals from East Asia, something

  2. Heat strain imposed by personal protective ensembles: quantitative analysis using a thermoregulation model

    NASA Astrophysics Data System (ADS)

    Xu, Xiaojiang; Gonzalez, Julio A.; Santee, William R.; Blanchard, Laurie A.; Hoyt, Reed W.

    2016-07-01

    The objective of this paper is to study the effects of personal protective equipment (PPE) and specific PPE layers, defined as thermal/evaporative resistances and the mass, on heat strain during physical activity. A stepwise thermal manikin testing and modeling approach was used to analyze a PPE ensemble with four layers: uniform, ballistic protection, chemical protective clothing, and mask and gloves. The PPE was tested on a thermal manikin, starting with the uniform, then adding an additional layer in each step. Wearing PPE increases the metabolic rates (dot{M}) , thus dot{M} were adjusted according to the mass of each of four configurations. A human thermoregulatory model was used to predict endurance time for each configuration at fixed dot{M} and at its mass adjusted dot{M} . Reductions in endurance time due to resistances, and due to mass, were separately determined using predicted results. Fractional contributions of PPE's thermal/evaporative resistances by layer show that the ballistic protection and the chemical protective clothing layers contribute about 20 %, respectively. Wearing the ballistic protection over the uniform reduced endurance time from 146 to 75 min, with 31 min of the decrement due to the additional resistances of the ballistic protection, and 40 min due to increased dot{M} associated with the additional mass. Effects of mass on heat strain are of a similar magnitude relative to effects of increased resistances. Reducing resistances and mass can both significantly alleviate heat strain.

  3. SP: Performance of materials used for biological personal protective equipment against blood splash penetration.

    PubMed

    Shimasaki, Noriko; Shinohara, Katsuaki; Morikawa, Hideki

    2017-10-05

    For occupational safety, healthcare workers must select and wear appropriate personal protective equipment (PPE), protective clothing and masks, to countermeasure against exposure to infectious body fluid and blood splash. It is important for healthcare workers to ensure the protective performance against penetration of pathogens in each PPE. The International Standards Organization (ISO) 22609 test evaluates the effectiveness of medical face masks to protect against penetration of splashed synthetic blood. However, in this method, protective performance is determined only visually, without quantification of leaked liquid volume. In this study, we modified the ISO 22609 test method to quantify the volume of leaked liquid in order to obtain a more accurate assessment of protection performance. We tested non-woven and woven materials used for masks or protective clothing, and the performance of each material could be classified by this new method. Furthermore, it was found that the quantity of leaked synthetic blood was dependent on the structural characteristics of each material. These findings will allow health workers to select the most appropriate PPE under a given situation or task.

  4. [A serious challenge for youth protection services: intervening with parents suffering from borderline personality disorder (BPD)].

    PubMed

    Laporte, Lise

    2007-01-01

    An exploratory survey of 68 youth protection services' workers in Montréal, who followed 1,030 children reveals that 39 % of these children have at least one parent who suffer from mental health problems. Among these parents, 48 % of mothers and 30 % of fathers have a personality disorder, and for the majority, a borderline personality disorder. This mental health problem is preoccupying for youth protection workers because of its high prevalence, its impact on children and case workers and the difficulties brought forth by having to intervene in a context of authority and within an organization not adapted to the management of this mental health problem. Some intervention's guidelines to work with these parents are presented as well as some challenges and future perspectives.

  5. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON... and Protection Data Bank § 61.14 Confidentiality of Healthcare Integrity and Protection Data Bank...

  6. Personal Record Keeping. The CIRcular: Consumer Information Report 21.

    ERIC Educational Resources Information Center

    Bank of America NT & SA, San Francisco, CA.

    This report explains the importance of keeping personal records, describes types of records to keep, and suggests places in which to keep them and ways to organize them. Guidelines are offered for keeping the following types of records: (1) personal documents (family records, wills, passports, diplomas, and social security cards); (2) property…

  7. Personal Record Keeping. The CIRcular: Consumer Information Report 21.

    ERIC Educational Resources Information Center

    Bank of America NT & SA, San Francisco, CA.

    This report explains the importance of keeping personal records, describes types of records to keep, and suggests places in which to keep them and ways to organize them. Guidelines are offered for keeping the following types of records: (1) personal documents (family records, wills, passports, diplomas, and social security cards); (2) property…

  8. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... refusal to provide his or her Social Security Number (SSN) unless the SSN was required for access by... personal notes of individuals used as memory aids. These documents are not Privacy Act records and are not...'s personal convenience and the notes are restricted to that of memory aids; (iii) Not the result of...

  9. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... Program administration. (a) Preparedness Directorate Program Management. The Secretary of...

  10. Privacy and Personal Information Held by Government: A Comparative Study, Japan and New Zealand

    NASA Astrophysics Data System (ADS)

    Cullen, Rowena

    This chapter reports on the concepts of information privacy and trust in government among citizens in Japan and New Zealand in a transnational, crosscultural study. Data from both countries are presented, and cultural and other factors are sought that might explain differences in attitudes shown. In both countries, citizens display a range of views, not related to age or gender. New Zealand citizens express concern about information privacy in relation to information held by government, but show a higher level of trust in government overall, and most attribute breaches of privacy to incompetence, rather than deliberate malfeasance. Japanese citizens interviewed also indicated that they had major concerns about information privacy, and had considerably less trust in government than New Zealand respondents showed. They were more inclined to attribute breaches of privacy to lax behavior in individuals than government systems. In both countries citizens showed an awareness of the tradeoffs necessary between personal privacy and the needs of the state to hold information for the benefit of all citizens, but knew little about the protection offered by privacy legislation, and expressed overall concern about privacy practices in the modern state. The study also provides evidence of cultural differences that can be related to Hofstede's dimensions of culture.

  11. Polycyclic aromatic hydrocarbons produced by electrocautery smoke and the use of personal protective equipment 1

    PubMed Central

    Claudio, Caroline Vieira; Ribeiro, Renata Perfeito; Martins, Júlia Trevisan; Marziale, Maria Helena Palucci; Solci, Maria Cristina; Dalmas, José Carlos

    2017-01-01

    ABSTRACT Objective: analyze the concentration of polycyclic aromatic hydrocarbons in electrocautery smoke in operating rooms and the use of personal protective equipment by the intraoperative team when exposed to hydrocarbons. Method: exploratory and cross-sectional field research conducted in a surgery center. Gases were collected by a vacuum suction pump from a sample of 50 abdominal surgeries in which an electrocautery was used. A form was applied to identify the use of personal protective equipment. Gases were analyzed using chromatography. Descriptive statistics and Spearman's test were used to treat data. Results: there were 17 (34%) cholecystectomies with an average duration of 136 minutes, while the average time of electrocautery usage was 3.6 minutes. Airborne hydrocarbons were detected in operating rooms in 100% of the surgeries. Naphthalene was detected in 48 (96.0%) surgeries and phenanthrene in 49 (98.0%). The average concentration of these compounds was 0.0061 mg/m3 and a strong correlation (0.761) was found between them. The intraoperative teams did not use respirator masks such as the N95. Conclusion: electrocautery smoke produces gases that are harmful to the health of the intraoperative team, which is a concern considering the low adherence to the use of personal protective equipment. PMID:28301033

  12. Person re-identification employing 3D scene information

    NASA Astrophysics Data System (ADS)

    Bak, Sławomir; Brémond, François

    2015-09-01

    The person reidentification task applied in a real-world scenario is addressed. Finding people in a network of cameras is challenging due to significant variations in lighting conditions, different color responses, and different camera viewpoints. State-of-the-art algorithms are likely to fail due to serious perspective and pose changes. Most of the existing approaches try to cope with all these changes by applying metric learning tools to find a transfer function between a camera pair while ignoring the body alignment issue. Additionally, this transfer function usually depends on the camera pair and requires labeled training data for each camera. This might be unattainable in a large camera network. We employ three-dimensional scene information for minimizing perspective distortions and estimating the target pose. The estimated pose is further used for splitting a target trajectory into reliable chunks, each one with a uniform pose. These chunks are matched through a network of cameras using a previously learned metric pool. However, instead of learning transfer functions that cope with all appearance variations, we propose to learn a generic metric pool that only focuses on pose changes. This pool consists of metrics, each one learned to match a specific pair of poses and not being limited to a specific camera pair. Automatically estimated poses determine the proper metric, thus improving matching. We show that metrics learned using only a single camera can significantly improve the matching across the whole camera network, providing a scalable solution. We validated our approach on publicly available datasets, demonstrating increase in the reidentification performance.

  13. Utilization of personal protective equipment and associated factors among textile factory workers at Hawassa Town, Southern Ethiopia.

    PubMed

    Tadesse, Sebsibe; Kelaye, Temesgen; Assefa, Yalemzewod

    2016-01-01

    Use of personal protective equipment is one of the important measures to safeguard workers from exposure to occupational hazards, especially in developing countries. However, there is a dearth of studies describing personal protective equipment utilization in Ethiopia. The present study has determined the magnitude of personal protective equipment utilization and identified associated factors among textile factory workers at Hawassa Town, southern Ethiopia. An institution-based cross-sectional study was conducted among textile factory workers at Hawassa Town, southern Ethiopia from January to March 2014. Stratified sampling followed by simple random sampling techniques was used to select the total of 660 study participants. A pre-tested and structured questionnaire was used to collect data. Multivariate analyses were employed to see the effect of explanatory variables on dependent variable. The magnitude of personal protective equipment utilization was 82.4 %. Service duration of >10 years [AOR: 0.23, 95 % CI: (0.09, 0.58)], availability of personal protective equipments [AOR: 21.73, 95 % CI: (8.62, 54.79)], shift work [AOR: 2.28, 95 % CI: (1.12, 4.66)], alcohol drinking [AOR: 0.26, 95 % CI: (0.10, 0.66)], and cigarette smoking [AOR: 0.20, 95 % CI: (0.05, 0.78)] were factors significantly associated with use of personal protective equipment. In this study a relatively higher personal protective equipment utilization rate was reported compared to other studies in developing countries. However, this does not mean that there will be no need for further strengthening the safety programs as there are significant proportion of the workers still does not use all the necessary personal protective equipment during work. Interventions to promote use personal protective equipment should focus on areas, such as service duration, availability of protective equipment, presence of shift work, and control of substance abuse.

  14. [Personal protective and healthcare seeking behaviors urban residents before and during an influenza pandemic in Beijing].

    PubMed

    Zhao, Jin-hui; Zhou, Xiao-lei; Su, Yang; Jiang, Xiao-hong; Zhang, Li-jie; Ma, Hui-lai; Shi, Guo-qing; Zhu, Bao-ping; Zeng, Guang

    2009-11-01

    To provide evidence-based recommendations to the government on strategies for reducing the impact of the imminent influenza pandemic, we conducted a survey on the personal protective and healthcare seeking behaviors of Beijing residents in the wake of the worldwide epidemic of the novel 2009 H1N1 influenza virus, and potential changes in these behaviors during a full-blown pandemic. We used a two-stage Mitofsky-Waksberg telephone survey to collect information for Beijing residents >/= 18 years of age and weighted the sample by the census estimate of Beijing population for 2008. A structured questionnaire was used to collect information about the respondents' knowledge regarding the novel influenza virus, current personal protective and healthcare seeking behaviors during a full-blown influenza pandemic. 286 Beijing urban residents were interviewed during May 15 to 18 (response rate: 62%). 77% (95%CI: 71% - 82%) of the residents that they would cover their sneezes at home, and 93% (95%CI: 89% - 96%) would do so in a public place. Of the residents would cover their sneezes at home, 66% (95%CI: 57% - 74%) would covered their sneezes by hand, 33% (95%CI: 25% - 42%) by facial tissue, and only 0.4% (95%CI: 0.1% - 2.9%) by sleeves. Similarly, of the residents would cover their sneezes at a public place, 64% (95%CI: 56% - 71%) would cover their sneezes by hand, 33% (95%CI: 26% - 41%) by facial tissue and 0% by sleeves. 46% (95%CI: 32% - 59%) of the residents would wash their hands after covering their sneezes with hand in public places, and 77% (95%CI: 64% - 89%) would do so at home. Higher percentages of residents would wear a mask (63%, 95%CI: 56% - 70%) and get vaccinated (43%, 95%CI: 37% - 50%) during a pandemic than under currently situation (3.5%, 95%CI: 1.7% - 7.0% for wearing a mask; 13%, 95%CI: 9.8% - 18% for getting vaccinated). 86% (95%CI: 81% - 89%) of the residents would visit a doctor for an influenza-like illness during a pandemic, similar to the percentage

  15. Information security governance: a risk assessment approach to health information systems protection.

    PubMed

    Williams, Patricia A H

    2013-01-01

    It is no small task to manage the protection of healthcare data and healthcare information systems. In an environment that is demanding adaptation to change for all information collection, storage and retrieval systems, including those for of e-health and information systems, it is imperative that good information security governance is in place. This includes understanding and meeting legislative and regulatory requirements. This chapter provides three models to educate and guide organisations in this complex area, and to simplify the process of information security governance and ensure appropriate and effective measures are put in place. The approach is risk based, adapted and contextualized for healthcare. In addition, specific considerations of the impact of cloud services, secondary use of data, big data and mobile health are discussed.

  16. Automatic detection of protected health information from clinic narratives.

    PubMed

    Yang, Hui; Garibaldi, Jonathan M

    2015-12-01

    This paper presents a natural language processing (NLP) system that was designed to participate in the 2014 i2b2 de-identification challenge. The challenge task aims to identify and classify seven main Protected Health Information (PHI) categories and 25 associated sub-categories. A hybrid model was proposed which combines machine learning techniques with keyword-based and rule-based approaches to deal with the complexity inherent in PHI categories. Our proposed approaches exploit a rich set of linguistic features, both syntactic and word surface-oriented, which are further enriched by task-specific features and regular expression template patterns to characterize the semantics of various PHI categories. Our system achieved promising accuracy on the challenge test data with an overall micro-averaged F-measure of 93.6%, which was the winner of this de-identification challenge. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. "Insensitive" to touch: fabric-supported lubricant-swollen polymeric films for omniphobic personal protective gear.

    PubMed

    Damle, Viraj G; Tummala, Abhishiktha; Chandrashekar, Sriram; Kido, Cassidee; Roopesh, Ajay; Sun, Xiaoda; Doudrick, Kyle; Chinn, Jeff; Lee, James R; Burgin, Timothy P; Rykaczewski, Konrad

    2015-02-25

    The use of personal protective gear made from omniphobic materials that easily shed drops of all sizes could provide enhanced protection from direct exposure to most liquid-phase biological and chemical hazards and facilitate the postexposure decontamination of the gear. In recent literature, lubricated nanostructured fabrics are seen as attractive candidates for personal protective gear due to their omniphobic and self-healing characteristics. However, the ability of these lubricated fabrics to shed low surface tension liquids after physical contact with other objects in the surrounding, which is critical in demanding healthcare and military field operations, has not been investigated. In this work, we investigate the depletion of oil from lubricated fabrics in contact with highly absorbing porous media and the resulting changes in the wetting characteristics of the fabrics by representative low and high surface tension liquids. In particular, we quantify the loss of the lubricant and the dynamic contact angles of water and ethanol on lubricated fabrics upon repeated pressurized contact with highly absorbent cellulose-fiber wipes at different time intervals. We demonstrate that, in contrast to hydrophobic nanoparticle coated microfibers, fabrics encapsulated within a polymer that swells with the lubricant retain the majority of the oil and are capable of repelling high as well as low surface tension liquids even upon multiple contacts with the highly absorbing wipes. The fabric supported lubricant-swollen polymeric films introduced here, therefore, could provide durable and easy to decontaminate protection against hazardous biological and chemical liquids.

  18. A fractionation of the physiological burden of the personal protective equipment worn by firefighters.

    PubMed

    Taylor, Nigel A S; Lewis, Michael C; Notley, Sean R; Peoples, Gregory E

    2012-08-01

    Load carriage increases physiological strain, reduces work capacity and elevates the risk of work-related injury. In this project, the separate and combined physiological consequences of wearing the personal protective equipment used by firefighters were evaluated. The overall impact upon performance was first measured in 20 subjects during a maximal, job-related obstacle course trial and an incremental treadmill test to exhaustion (with and without protective equipment). The fractional contributions of the thermal protective clothing, helmet, breathing apparatus and boots were then separately determined during steady-state walking (4.8 km h(-1), 0% gradient) and bench stepping (20 cm at 40 steps min(-1)). The protective equipment reduced exercise tolerance by 56% on a treadmill, with the ambulatory oxygen consumption reserve (peak minus steady-state walking) being 31% lower. For the obstacle course, performance declined by 27%. Under steady-state conditions, the footwear exerted the greatest relative metabolic impact during walking and bench stepping, being 8.7 and 6.4 times greater per unit mass than the breathing apparatus. Indeed, the relative influence of the clothing on oxygen cost was at least three times that of the breathing apparatus. Therefore, the most efficient way to reduce the physiological burden of firefighters' protective equipment, and thereby increase safety, would be to reduce the mass of the boots and thermal protective clothing.

  19. Tuberculosis Infection Control in Health-Care Facilities: Environmental Control and Personal Protection.

    PubMed

    Lee, Ji Yeon

    2016-10-01

    Transmission of tuberculosis (TB) is a recognized risk to patients and healthcare workers in healthcare settings. The literature review suggests that implementation of combination control measures reduces the risk of TB transmission. Guidelines suggest a three-level hierarchy of controls including administrative, environmental, and respiratory protection. Among environmental controls, installation of ventilation systems is a priority because ventilation reduces the number of infectious particles in the air. Natural ventilation is cost-effective but depends on climatic conditions. Supplemented intervention such as air-cleaning methods including high efficiency particulate air filtration and ultraviolet germicidal irradiation should be considered in areas where adequate ventilation is difficult to achieve. Personal protective equipment including particulate respirators provides additional benefit when administrative and environmental controls cannot assure protection.

  20. Tuberculosis Infection Control in Health-Care Facilities: Environmental Control and Personal Protection

    PubMed Central

    2016-01-01

    Transmission of tuberculosis (TB) is a recognized risk to patients and healthcare workers in healthcare settings. The literature review suggests that implementation of combination control measures reduces the risk of TB transmission. Guidelines suggest a three-level hierarchy of controls including administrative, environmental, and respiratory protection. Among environmental controls, installation of ventilation systems is a priority because ventilation reduces the number of infectious particles in the air. Natural ventilation is cost-effective but depends on climatic conditions. Supplemented intervention such as air-cleaning methods including high efficiency particulate air filtration and ultraviolet germicidal irradiation should be considered in areas where adequate ventilation is difficult to achieve. Personal protective equipment including particulate respirators provides additional benefit when administrative and environmental controls cannot assure protection. PMID:27790274

  1. Recent developments and needs in materials used for personal protective equipment and their testing.

    PubMed

    Dolez, Patricia I; Vu-Khanh, Toan

    2009-01-01

    The field of personal protective equipment (PPE) has led to several high technology innovations. Indeed, improved protection against the various possible encountered risks is looked for, in particular at the workplace. This has generated the development of new materials and new manufacturing technologies, as well as the introduction of new applications for existing ones. However, the remaining challenges are numerous. This paper presents some of the new technologies introduced in the field of protective clothing against heat and flames, mechanical risks and chemical aggressors. It also describes new challenges that are currently worked on, in particular the effect of service aging and the need for testing methods that reproduce realuse conditions. Finally, it discusses various existing and potential applications of nanomaterials and smart textiles for PPE.

  2. A guide to the selection of personal protective equipment for use in responding to a release of chemical warfare agents

    SciTech Connect

    Foust, C.B.

    1997-10-01

    Recognition by the US Army that a potential threat to the public from continued storage was potentially as great a threat as from transportation and the final demilitarization of chemical agents gave rise to the Chemical Stockpile Emergency Preparedness Program (CSEPP). CSEPP is a civilian community emergency preparedness program complementing the Department of Defense`s initiative to destroy domestic stockpiles of aged chemical warface munitions. An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with any HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern the selection of personal protective equipment (PPE). PPE includes all clothing, respirators and detection equipment used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel. FEMA requested that ORNL create training materials for CSEPP participants. These training materials were to provide information on a variety of topics and answer questions that a typical CSEPP participant might ask, including the following: how did the Army select the CSEPP recommended ensemble (i.e., protective clothing, respiratory equipment, and detection equipment); how does the CSEPP participant know this ensemble is the right PPE for chemical warfare agents and will actually protect him; what are the concept of operations and work rules? Does one need to know what the CSEPP concept of operations and work rules include? This report describes the training document ORNL created.

  3. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    PubMed

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  4. 76 FR 80966 - Agency Information Collection Activities; Proposed Collection: Age, Sex, and Race of Persons...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-27

    ... Federal Bureau of Investigation Agency Information Collection Activities; Proposed Collection: Age, Sex, and Race of Persons Arrested 18 Years of Age and Over; Age, Sex, and Race of Persons Arrested Under 18... the form/collection: Age, Sex, and Race of Persons Arrested 18 Years of Age and Over; Age, Sex,...

  5. The Structure of Informal Social Networks of Persons with Profound Intellectual and Multiple Disabilities

    ERIC Educational Resources Information Center

    Kamstra, A.; van der Putten, A. A. J.; Vlaskamp, C.

    2015-01-01

    Background: Persons with less severe disabilities are able to express their needs and show initiatives in social contacts, persons with profound intellectual and multiple disabilities (PIMD), however, depend on others for this. This study analysed the structure of informal networks of persons with PIMD. Materials and Methods: Data concerning the…

  6. The Structure of Informal Social Networks of Persons with Profound Intellectual and Multiple Disabilities

    ERIC Educational Resources Information Center

    Kamstra, A.; van der Putten, A. A. J.; Vlaskamp, C.

    2015-01-01

    Background: Persons with less severe disabilities are able to express their needs and show initiatives in social contacts, persons with profound intellectual and multiple disabilities (PIMD), however, depend on others for this. This study analysed the structure of informal networks of persons with PIMD. Materials and Methods: Data concerning the…

  7. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... identity for first party requesters. (1) Before granting access to personal data, an individual will.... (8) DA activities will not honor any Privacy Act requests for investigative, intelligence, or any...

  8. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... identity for first party requesters. (1) Before granting access to personal data, an individual will.... (8) DA activities will not honor any Privacy Act requests for investigative, intelligence, or any...

  9. Quantitative Information Differences Between Object-Person Presentation Methods

    ERIC Educational Resources Information Center

    Boyd, J. Edwin; Perry, Raymond P.

    1972-01-01

    Subjects used significantly more adjectives, on an adjective checklist (ACL), in giving their impressions of an object-person; based on written and audiovisual presentations, more than audio presentations. (SD)

  10. Quantitative Information Differences Between Object-Person Presentation Methods

    ERIC Educational Resources Information Center

    Boyd, J. Edwin; Perry, Raymond P.

    1972-01-01

    Subjects used significantly more adjectives, on an adjective checklist (ACL), in giving their impressions of an object-person; based on written and audiovisual presentations, more than audio presentations. (SD)

  11. Putting the Focus Back on the Patient: How Privacy Concerns Affect Personal Health Information Sharing Intentions.

    PubMed

    Abdelhamid, Mohamed; Gaia, Joana; Sanders, G Lawrence

    2017-09-13

    Health care providers are driven by greater participation and systemic cost savings irrespective of benefits to individual patients derived from sharing Personal Health Information (PHI). Protecting PHI is a critical issue in the sharing of health care information systems; yet, there is very little literature examining the topic of sharing PHI electronically. A good overview of the regulatory, privacy, and societal barriers to sharing PHI can be found in the 2009 Health Information Technology for Economic and Clinical Health Act. This study investigated the factors that influence individuals' intentions to share their PHI electronically with health care providers, creating an understanding of how we can represent a patient's interests more accurately in sharing settings, instead of treating patients like predetermined subjects. Unlike privacy concern and trust, patient activation is a stable trait that is not subject to change in the short term and, thus, is a useful factor in predicting sharing behavior. We apply the extended privacy model in the health information sharing context and adapt this model to include patient activation and issue involvement to predict individuals' intentions. This was a survey-based study with 1600+ participants using the Health Information National Trends Survey (HINTS) data to validate a model through various statistical techniques. The research method included an assessment of both the measurement and structural models with post hoc analysis. We find that privacy concern has the most influence on individuals' intentions to share. Patient activation, issue involvement, and patient-physician relationship are significant predictors of sharing intention. We contribute to theory by introducing patient activation and issue involvement as proxies for personal interest factors in the health care context. Overall, this study found that although patients are open to sharing their PHI, they still have concerns over the privacy of their PHI

  12. Why don't pesticide applicators protect themselves? Exploring the use of personal protective equipment among Colombian smallholders.

    PubMed

    Feola, Giuseppe; Binder, Claudia R

    2010-01-01

    The misuse of personal protective equipment (PPE) during pesticide application was investigated among smallholders in Colombia. The integrative agent-centered (IAC) framework and a logistic regression approach were adopted. The results suggest that the descriptive social norm was significantly influencing PPE use. The following were also important: (1) having experienced pesticide-related health problems; (2) age; (3) the share of pesticide application carried out; and (4) the perception of PPE hindering work. Interestingly, the influence of these factors differed for different pieces of PPE. Since conformity to the social norm is a source of rigidity in the system, behavioral change may take the form of a discontinuous transition. In conclusion, five suggestions for triggering a transition towards more sustainable PPE use are formulated: (1) diversifying targets/tools; (2) addressing structural aspects; (3) sustaining interventions in the long-term; (4) targeting farmers' learning-by-experience; and (5) targeting PPE use on a collective level.

  13. Identifying Personality Pathology Associated With Major Depressive Episodes: Incremental Validity of Informant Reports

    PubMed Central

    Galione, Janine N.; Oltmanns, Thomas F.

    2016-01-01

    Major limitations are associated with the use of a single source of information to assess personality pathology. The construct validity of standardized interviews and informant reports on personality pathology has been established relative to other measures of personality pathology, but it is also important to consider these measures in relation to other constructs that should be related to personality pathology. One example is major depression. In this study, we evaluated whether less common clinical methods of assessment for measuring the same personality pathology constructs, including semistructured interviews and informant reports, demonstrate unique validity, using major depressive episode (MDE) as the external criterion. This analysis focuses on a representative, community-based sample of 1,437 participants and informants. We conducted a hierarchical logistic regression analysis and determined the order of entering the predictor variables based on likelihood of being used in a clinical setting as well as empirical recommendations. Each step of our regression model significantly increased our ability to predict lifetime MDE, including self, interviewer, and informant reports of personality pathology. Overall, these findings indicate that multiple sources of personality assessment provide unique information about the relationship between maladaptive personality traits and a history of MDE. Thus, semistructured diagnostic interviews and informant reports can be used as a resource to improve the validity of personality assessments. PMID:24004355

  14. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 4 3 , provides additional guidance regarding For Official Use Only information. 3 http://www.dtic.mil/whs/directives/corres/pdf/54007r_0998/p54007r.pdf. (c) Do not disclose personal information...

  15. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 4 3 , provides additional guidance regarding For Official Use Only information. 3 http://www.dtic.mil/whs/directives/corres/pdf/54007r_0998/p54007r.pdf. (c) Do not disclose personal information...

  16. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 4 3 , provides additional guidance regarding For Official Use Only information. 3 http://www.dtic.mil/whs/directives/corres/pdf/54007r_0998/p54007r.pdf. (c) Do not disclose personal information...

  17. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 4 3 , provides additional guidance regarding For Official Use Only information. 3 http://www.dtic.mil/whs/directives/corres/pdf/54007r_0998/p54007r.pdf. (c) Do not disclose personal information...

  18. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 4 3 , provides additional guidance regarding For Official Use Only information. 3 http://www.dtic.mil/whs/directives/corres/pdf/54007r_0998/p54007r.pdf. (c) Do not disclose personal information...

  19. 76 FR 51125 - Additional Identifying Information Associated With Persons Whose Property and Interests in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-17

    ... Organizations.'' FOR FURTHER INFORMATION CONTACT: Assistant Director, Sanctions Compliance & Evaluation Office... Office of Foreign Assets Control Additional Identifying Information Associated With Persons Whose..., ``Blocking Property of Transnational Criminal Organizations.'' AGENCY: Office of Foreign Assets Control...

  20. Exploring Information Literacy in Relationship: Intelligence and Personality as Factors

    ERIC Educational Resources Information Center

    Cooper, Timothy A.

    2012-01-01

    In the last three decades, the domain of Information Literacy (IL) has caught the attention of international college educators and information professionals. The explosion of information in education, government and business requires college students to have the skills necessary to enter an information-rich digital age. These skills include the…

  1. Defining Requirements and Applying Information Modeling for Protecting Enterprise Assets

    NASA Astrophysics Data System (ADS)

    Fortier, Stephen C.; Volk, Jennifer H.

    The advent of terrorist threats has heightened local, regional, and national governments' interest in emergency response and disaster preparedness. The threat of natural disasters also challenges emergency responders to act swiftly and in a coordinated fashion. When a disaster occurs, an ad hoc coalition of pre-planned groups usually forms to respond to the incident. History has shown that these “system of systems” do not interoperate very well. Communications between fire, police and rescue components either do not work or are inefficient. Government agencies, non-governmental organizations (NGOs), and private industry use a wide array of software platforms for managing data about emergency conditions, resources and response activities. Most of these are stand-alone systems with very limited capability for data sharing with other agencies or other levels of government. Information technology advances have facilitated the movement towards an integrated and coordinated approach to emergency management. Other communication mechanisms, such as video teleconferencing, digital television and radio broadcasting, are being utilized to combat the challenges of emergency information exchange. Recent disasters, such as Hurricane Katrina and the tsunami in Indonesia, have illuminated the weaknesses in emergency response. This paper will discuss the need for defining requirements for components of ad hoc coalitions which are formed to respond to disasters. A goal of our effort was to develop a proof of concept that applying information modeling to the business processes used to protect and mitigate potential loss of an enterprise was feasible. These activities would be modeled both pre- and post-incident.

  2. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... represented on the Senior Policy Operating Group shall, to the extent permitted by law, share information on... international trafficking in persons. In its coordinating role, the Senior Policy Operating Group shall... INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION §...

  3. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... represented on the Senior Policy Operating Group shall, to the extent permitted by law, share information on... international trafficking in persons. In its coordinating role, the Senior Policy Operating Group shall... INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION §...

  4. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... represented on the Senior Policy Operating Group shall, to the extent permitted by law, share information on... international trafficking in persons. In its coordinating role, the Senior Policy Operating Group shall... INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION §...

  5. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... represented on the Senior Policy Operating Group shall, to the extent permitted by law, share information on... international trafficking in persons. In its coordinating role, the Senior Policy Operating Group shall... INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION §...

  6. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... represented on the Senior Policy Operating Group shall, to the extent permitted by law, share information on... international trafficking in persons. In its coordinating role, the Senior Policy Operating Group shall... INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION §...

  7. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 26 Internal Revenue 13 2012-04-01 2012-04-01 false Information returns by person making... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years... in section 85 (c)) aggregating $10 or more to any individual during any calendar year shall file a...

  8. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 26 Internal Revenue 13 2013-04-01 2013-04-01 false Information returns by person making... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years... in section 85 (c)) aggregating $10 or more to any individual during any calendar year shall file a...

  9. 12 CFR 911.6 - Persons and entities with access to unpublished information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Persons and entities with access to unpublished information. 911.6 Section 911.6 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.6 Persons and entities with access to...

  10. 12 CFR 911.6 - Persons and entities with access to unpublished information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Persons and entities with access to unpublished information. 911.6 Section 911.6 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.6 Persons and entities with access to...

  11. 12 CFR 911.6 - Persons and entities with access to unpublished information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Persons and entities with access to unpublished information. 911.6 Section 911.6 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.6 Persons and entities with access to...

  12. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  13. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  14. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  15. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  16. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  17. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 4 2014-10-01 2014-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  18. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  19. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 4 2013-10-01 2013-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  20. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 4 2012-10-01 2012-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  1. Guidelines for the Selection, Training, and Placement of Blind Persons in Information Service Expediting.

    ERIC Educational Resources Information Center

    Vieceli, Louis; And Others

    A potentially suitable job for the college educated blind person is that of an Information Service Expediter (ISE), an occupation which uses telecommunications equipment to provide clients with information services. A conference was held to develop specific guidelines for the selection, training, and placement of blind persons as ISE's. Papers…

  2. Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications

    ERIC Educational Resources Information Center

    Cox, Trissa

    2012-01-01

    Information privacy is a major concern for consumers adopting emerging technologies dependent on location-based services. This study sought to determine whether a relationship exists among factors of personalization, locatability, perceived playfulness, privacy concern and behavioral intention to disclose personal information for individuals using…

  3. 12 CFR 911.6 - Persons and entities with access to unpublished information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Persons and entities with access to unpublished information. 911.6 Section 911.6 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.6 Persons and entities with access...

  4. Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications

    ERIC Educational Resources Information Center

    Cox, Trissa

    2012-01-01

    Information privacy is a major concern for consumers adopting emerging technologies dependent on location-based services. This study sought to determine whether a relationship exists among factors of personalization, locatability, perceived playfulness, privacy concern and behavioral intention to disclose personal information for individuals using…

  5. Toward a genetically-informed model of borderline personality disorder.

    PubMed

    Livesley, John

    2008-02-01

    This article describes a conceptual framework for describing borderline personality disorder (BPD) based on empirical studies of the phenotypic structure and genetic architecture of personality. The proposed phenotype has 2 components: (1) a description of core self and interpersonal pathology-the defining features of personality disorder-as these features are expressed in the disorder; and (2) a set of traits based on the anxious-dependent or emotional dysregulation factor of the four-factor model of PD. Four kinds of traits are described: emotional (anxiousness, emotional reactivity, emotional intensity, and pessimistic-anhedonia), interpersonal (submissiveness, insecure attachment, social apprehensiveness, and need for approval), cognitive (cognitive dysregulation), and self-harm (behaviors and ideas). Formulation of the phenotype was guided by the conceptualization of personality as a system of interrelated sub-systems. The psychopathology associated with BPD involves most components of the system. The trait structure of the disorder is assumed to reflect the genetic architecture of personality and individual traits are assumed to be based on adaptive mechanisms. It is suggested that borderline traits are organized around the trait of anxiousness and that an important feature of BPD is dysregulation of the threat management system leading to pervasive fearfulness and unstable emotions. The interpersonal traits are assumed to be heritable characteristics that evolved to deal with interpersonal threats that arose as a result of social living. The potential for unstable and conflicted interpersonal relationships that is inherent to the disorder is assumed to result from the interplay between the adaptive structure of personality and psychosocial adversity. The etiology of the disorder is discussed in terms of biological and environmental factors associated with each component of the phenotype.

  6. Flame-retardant contamination of firefighter personal protective clothing - A potential health risk for firefighters.

    PubMed

    Alexander, Barbara M; Baxter, C Stuart

    2016-09-01

    There is a high incidence of cardiovascular disease and certain cancers in firefighters that may be related to their occupational exposure to hazardous substances. Exposure may result from contaminated personal protective gear, as well as from direct exposure at fire scenes. This study characterized flame-retardant contamination on firefighter personal protective clothing to assess exposure of firefighters to these chemicals. Samples from used and unused firefighter protective clothing, including gloves, hoods and a coat wristlet, were extracted with methylene chloride and analyzed by EPA method 8270D Specific Ion Method (SIM) for polybrominated diphenyl ethers (PBDEs). Until recently PBDEs were some of the most common flame-retardant chemicals used in the US. Fifteen of the seventeen PBDEs for which analysis was performed were found on at least one clothing swatch. Every clothing sample, including an unused hood and all three layers of an unused glove, held a detectable concentration of at least one PBDE. These findings, along with previous research, suggest that firefighters are exposed to PBDE flame retardants at levels much higher than the general public. PBDEs are found widely dispersed in the environment and still persist in existing domestic materials such as clothing and furnishings. Firefighter exposure to flame retardants therefore merits further study.

  7. Medical Students and Personal Smartphones in the Clinical Environment: The Impact on Confidentiality of Personal Health Information and Professionalism

    PubMed Central

    Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C

    2014-01-01

    Background Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students’ use of personal smartphones for clinical work. Objective The intent of the study was to examine final-year medical students’ experience with and attitudes toward using personal mobile technology in the clinical environment, with respect to the perceived impact on patient confidentiality and provider professionalism. Methods Cross-sectional surveys were completed by final-year medical students at the University of Toronto. Respondents were asked about the type of personal mobile phone they use, security features on their personal phone, experiences using their personal phone during clinical rotations, and attitudes about using their personal phone for clinical work purposes. Results The overall response rate was 45.4% (99/218). Smartphone ownership was prevalent (98%, 97/99) with the majority (86%, 85/99) of participants using their personal phones for patient-related communication during clinical rotations. A total of 26% (26/99) of participants reported not having any type of security feature on their personal phone, 94% (90/96) of participants agreed that using their personal phone for clinical work makes them more efficient, and 86% (82/95) agreed that their personal phone allows them to provide better patient care. Although 68% (65/95) of participants believe that the use of personal phones for patient-related communication with colleagues poses a risk to the privacy and confidentiality of patient health information, 22% (21/96) of participants still use their personal phone to text or email identifiable patient data to colleagues. Conclusions Our findings suggest that the use of personal smartphones for clinical work by medical students

  8. Medical students and personal smartphones in the clinical environment: the impact on confidentiality of personal health information and professionalism.

    PubMed

    Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C

    2014-05-22

    Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students' use of personal smartphones for clinical work. The intent of the study was to examine final-year medical students' experience with and attitudes toward using personal mobile technology in the clinical environment, with respect to the perceived impact on patient confidentiality and provider professionalism. Cross-sectional surveys were completed by final-year medical students at the University of Toronto. Respondents were asked about the type of personal mobile phone they use, security features on their personal phone, experiences using their personal phone during clinical rotations, and attitudes about using their personal phone for clinical work purposes. The overall response rate was 45.4% (99/218). Smartphone ownership was prevalent (98%, 97/99) with the majority (86%, 85/99) of participants using their personal phones for patient-related communication during clinical rotations. A total of 26% (26/99) of participants reported not having any type of security feature on their personal phone, 94% (90/96) of participants agreed that using their personal phone for clinical work makes them more efficient, and 86% (82/95) agreed that their personal phone allows them to provide better patient care. Although 68% (65/95) of participants believe that the use of personal phones for patient-related communication with colleagues poses a risk to the privacy and confidentiality of patient health information, 22% (21/96) of participants still use their personal phone to text or email identifiable patient data to colleagues. Our findings suggest that the use of personal smartphones for clinical work by medical students is prevalent. There is a need to more fully address

  9. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... protection. 51.368 Section 51.368 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR.../M program of the air quality problem, the requirements of Federal and State law, the role of motor vehicles in the air quality problem, the need for and benefits of an inspection program, how to maintain a...

  10. Personality information: does it influence attractiveness ratings of various body sizes?

    PubMed

    Fisak, Brian; Tantleff-Dunn, Stacey; Peterson, Rachel D

    2007-06-01

    In the present study, the influence of personality information on attractiveness ratings of different body sizes was examined. Specifically, participants were presented with either no personality information, negative information, or positive information about a hypothetical female target and asked to rate the smallest and largest figure that they would consider attractive for her using a figure rating scale. Consistent with the study hypotheses: (1) participants chose a wider range of figures as attractive for a female described to have a positive personality when compared to the range chosen when no personality information was provided; (2) females selected wider attractive ranges than males; and (3) other participant characteristics (i.e., physical appearance anxiety and body mass) were found to predict attractive ranges selected by participants. These findings may have implications for the treatment of body-image disturbance, as the findings suggest that personality, rather than appearance alone, may be a factor in perceptions of attractiveness of various body sizes.

  11. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... judgment is made that access to such records could have an adverse effect on the mental or physical health..., the individual will be asked to provide the name of a personal health care provider, and the records will be provided to that health care provider, along with an explanation of why access without...

  12. Personality and Information Processing Speed: Independent Influences on Intelligent Performance

    ERIC Educational Resources Information Center

    Bates, Timothy C.; Rock, Andrew

    2004-01-01

    Raven's matrices and inspection time (IT) were recorded from 56 subjects under five arousal levels. Raven's and IT correlated strongly (r = -0.7) as predicted by processing-speed theories of "g." In line with Eysenck's [Eysenck, H. J. (1967). "The biological basis of personality". Springfield, IL: Thomas] arousal theory of extraversion, there was…

  13. Personality and Information Processing Speed: Independent Influences on Intelligent Performance

    ERIC Educational Resources Information Center

    Bates, Timothy C.; Rock, Andrew

    2004-01-01

    Raven's matrices and inspection time (IT) were recorded from 56 subjects under five arousal levels. Raven's and IT correlated strongly (r = -0.7) as predicted by processing-speed theories of "g." In line with Eysenck's [Eysenck, H. J. (1967). "The biological basis of personality". Springfield, IL: Thomas] arousal theory of extraversion, there was…

  14. How Does Iranian's Legal System Protect Human Vulnerability and Personal Integrity in Medical Research?

    PubMed Central

    Karoubi, Mohammad Taghi; Akhondi, Mohammad Mehdi

    2011-01-01

    The astonishing advance of medical science in recent decades has had endless advantages for humans, including improved level of health, prevention of disease and advances in treatment. These advances depend to a great extent on conducting continuous research. However, besides its enormous advantages, the sole interest of medical science undermines the principles of respect for human vulnerability and personal integrity, in both positive and negative approaches. The positive approach refers to the people who participate in research and practice, while the negative approach refers to people who are deprived of research and practice. The authors of this work, based on legal or moral grounds try to analyse the tension between the principle of respect for human vulnerability and personal integrity and the interest of medical science. Undoubtedly, in applying scientific knowledge and medical practice human vulnerability should be taken into account. In this regard, especially vulnerable individuals and groups should be protected and the personal integrity of such individuals respected. In the light of the merits of Islamic law, this paper is designed to examine the significance of the principles of human vulnerability and personal integrity in medical research by studying the international documents as formalised by UNESCO in order to explore the place of these principles in the Iranian legal system. PMID:23408269

  15. Influence of Hearing Risk Information on the Motivation and Modification of Personal Listening Device Use.

    PubMed

    Serpanos, Yula C; Berg, Abbey L; Renne, Brittany

    2016-12-01

    The purpose of this study was (a) to investigate the behaviors, knowledge, and motivators associated with personal listening device (PLD) use and (b) to determine the influence of different types of hearing health risk education information (text with or without visual images) on motivation to modify PLD listening use behaviors in young adults. College-age students (N = 523) completed a paper-and-pencil survey tapping their behaviors, knowledge, and motivation regarding listening to music or media at high volume using PLDs. Participants rated their motivation to listen to PLDs at lower volume levels following each of three information sets: text only, behind-the-ear hearing aid image with text, and inner ear hair cell damage image with text. Acoustically pleasing and emotional motives were the most frequently cited (38%-45%) reasons for listening to music or media using a PLD at high volume levels. The behind-the-ear hearing aid image with text information was significantly (p < .0001) more motivating to participants than text alone or the inner ear hair cell damage image with text. Evocative imagery using hearing aids may be an effective approach in hearing protective health campaigns for motivating safer listening practices with PLDs in young adults.

  16. Historical development of legal protection for the rights of mentally ill persons in France.

    PubMed

    Thoret, Y; Kantin, S

    1994-12-01

    The authors trace the development of legal protection of the rights of mentally ill persons to the experiences of Gabriel-Honoré de Riqueti, the Count of Mirabeau, who was imprisoned without due process more than 200 years ago. Influenced by the ideas of the leaders of the American Revolution, he later became a representative to the French Republic's National Assembly and played a pivotal role in defining human rights, including the rights of mentally ill persons, in France. He advocated involvement of judicial authorities in any decision to confine a citizen, even in the case of mental disorder. French civil commitment legislation of 1838 established the authority of physicians and civil officials in commitment decisions, but limited judicial involvement to review after commitment. A new 1990 law limits judicial involvement to review after commitment, but extends the rights of hospitalized patients in many areas.

  17. Respecting, protecting, persons, humans, and conceptual muddles in the bioethics convention.

    PubMed

    Delkeskamp-Hayes, C

    2000-04-01

    The Convention on Human Rights and Biomedicine confuses respect for a person's right to self-determination with concern about protecting human beings generally. In a legal document, this mixture of deontological with utilitarian considerations undermines what it should preserve: respect for human dignity as the foundation of modern rights-based democracies. Falling prey to the ambiguity of freedom, the Convention blurs the dividing line between morality and the law. The document should be remedied through distinguishing fundamental rights from social 'rights', persons as entitled to the right to self-determination from born humans as entitled to the right to life and from members of the human species as entitled to the morally responsible care of voting majorities. For the cultivating of the required responsibility, the conditions for an adequate public debate should be secured.

  18. Personalized Recommendations Based on Users' Information-Centered Social Networks

    ERIC Educational Resources Information Center

    Lee, Danielle

    2013-01-01

    The overwhelming amount of information available today makes it difficult for users to find useful information and as the solution to this information glut problem, recommendation technologies emerged. Among the several streams of related research, one important evolution in technology is to generate recommendations based on users' own social…

  19. Personalized Recommendations Based on Users' Information-Centered Social Networks

    ERIC Educational Resources Information Center

    Lee, Danielle

    2013-01-01

    The overwhelming amount of information available today makes it difficult for users to find useful information and as the solution to this information glut problem, recommendation technologies emerged. Among the several streams of related research, one important evolution in technology is to generate recommendations based on users' own social…

  20. Information processing schemes based on monolayer protected metallic nanoclusters.

    PubMed

    Cervera, Javier; Mafé, Salvador

    2011-09-01

    Nanostructures are potentially useful as building blocks to complement future electronics because of their high versatility and packing densities. The fabrication and characterization of particular nanostructures and the use of new theoretical tools to describe their properties are receiving much attention. However, the integration of these individual systems into general schemes that could perform simple tasks is also necessary because modern electronics operation relies on the concerted action of many basic units. We review here new conceptual schemes that can allow information processing with ligand or monolayer protected metallic nanoclusters (MPCs) on the basis of the experimentally demonstrated and theoretically described electrical characteristics of these nanostructures. In particular, we make use of the tunnelling current through a metallic nanocluster attached to the electrodes by ligands. The nanostructure is described as a single electron transistor (SET) that can be gated by an external potential. This fact permits exploiting information processing schemes in approximately defined arrays of MPCs. These schemes include: (i) binary, multivalued, and reversible logic gates; (ii) an associative memory and a synchronization circuit; and (iii) two signal processing nanodevices based on parallel arrays of MPCs and nanoswitches. In each case, the practical operation of the nanodevice is based on the SET properties of MPCs reported experimentally. We examine also some of the practical problems that should be addressed in future experimental realizations: the stochastic nature of the electron tunnelling, the relatively low operation temperatures, and the limited reliability caused by the weak signals involved and the nanostructure variability. The perspectives to solve these problems are based on the potentially high degree of scalability of the nanostructures.

  1. 30 CFR 280.70 - What data and information will be protected from public disclosure?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false What data and information will be protected from public disclosure? 280.70 Section 280.70 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT... CONTINENTAL SHELF Data Requirements Protections § 280.70 What data and information will be protected...

  2. 45 CFR 61.12 - Requesting information from the Healthcare Integrity and Protection Data Bank.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Integrity and Protection Data Bank. 61.12 Section 61.12 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION... Integrity and Protection Data Bank § 61.12 Requesting information from the Healthcare Integrity and...

  3. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2013-01-01 2013-01-01 false Protected Critical Infrastructure...

  4. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2014-01-01 2014-01-01 false Protected Critical Infrastructure...

  5. Effectiveness of soap formulations containing deet and permethrin as personal protection against outdoor mosquitoes in Malaysia.

    PubMed

    Yap, H H

    1986-03-01

    Two soap formulations, both containing 20% deet and one each containing permethrin at 0.5 and 1.0%, respectively, were applied to exposed arms and legs of volunteers as personal protection against outdoor human biting mosquitoes in six locations on Penang Island, Malaysia. The predominant mosquito species collected from these locations were Aedes albopictus, Mansonia uniformis, Culex gelidus, Anopheles lesteri and Armigeres subalbatus. Efficacy and residual effects up to 4 hours indicated good protection against these species. Reduction in mosquito landing-biting rates in treated groups ranged from 83.8 to 100.0%. At high densities, small percentages of Ma. uniformis and An. lesteri landed or bit on treated skin. Use of the soap formulations in terms of cost-effectiveness, safety and overall vector control strategy for some tropical diseases is discussed.

  6. Search and seizure law practical advice and interpretation for nuclear protective force persons

    SciTech Connect

    Cadwell, J.J.

    1983-07-01

    Recent Supreme Court decisions, which interpret the 200-year-old Fourth Amendment of the U.S. Constitution, are used to provide a brief overview of some search and seizure subjects important to management and officers responsible for physical protection of nuclear facilities. The overview is framed in practical terms in order to make the comments applicable to the everyday activity of nuclear protective force persons. The Supreme Court has described several exceptions where searches and seizures (arrests) are permitted without a warrant, despite the Fourth Amendment which states that warrants are always required. The seven exceptions briefly discussed are search incidents to a lawful arrest, the automobile search exception, the suitcase or container exception, the hot pursuit or emergency exception, the stop and frisk exception, the plain view exception, and consent to be searched.

  7. Search and seizure law; practical advice and interpretation for nuclear protective force persons

    SciTech Connect

    Cadwell, J.J.

    1983-07-06

    Recent Supreme Court decisions, which interpret the 200-year-old Fourth Amendment of the US Constitution, are used to provide a brief overview of some search and seizure subjects important to management and officers responsible for physical protection of nuclear facilities. The overview is framed in practical terms in order to make the comments applicable to the everyday activity of nuclear-protective-force persons. The Supreme Court has described several exceptions where searches and seizures (arrests) are permitted without a warrant, despite the Fourth Amendment which states that warrants are always required. The seven exceptions briefly discussed are search incidents to a lawful arrest, the automobile-search exception, the suitcase or container exception, the hot-pursuit or emergency exception, the stop-and-frisk exception, the plain-view exception, and consent to be searched.

  8. Culturally Competent Informed-Consent Process to Evaluate a Social Policy for Older Persons With Low Literacy: The Mexican Case.

    PubMed

    Aguila, Emma; Weidmer, Beverly A; Illingworth, Alfonso Rivera; Martinez, Homero

    2016-01-01

    The informed-consent process seeks to provide complete information to participants about a research project and to protect personal information they may disclose. In this article, we present an informed-consent process that we piloted and improved to obtain consent from older adults in Yucatan, Mexico. Respondents had limited fluency in Spanish, spoke the local Mayan language, and had some physical limitations due to their age. We describe how we adapted the informed-consent process to comply with U.S. and Mexican regulations, while simplifying the forms and providing them in Spanish and Mayan. We present the challenges and lessons learned when dealing with low-literacy older populations, some with diminished autonomy, in a bilingual context and a binational approach to the legal framework.

  9. Money makes you reveal more: consequences of monetary cues on preferential disclosure of personal information.

    PubMed

    Mukherjee, Sumitava; Manjaly, Jaison A; Nargundkar, Maithilee

    2013-01-01

    With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure.

  10. Money makes you reveal more: consequences of monetary cues on preferential disclosure of personal information

    PubMed Central

    Mukherjee, Sumitava; Manjaly, Jaison A.; Nargundkar, Maithilee

    2013-01-01

    With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure. PMID:24273524

  11. Factors Surgical Team Members Perceive Influence Choices of Wearing or Not Wearing Personal Protective Equipment during Operative/Invasive Procedures

    ERIC Educational Resources Information Center

    Cuming, Richard G.

    2009-01-01

    Exposure to certain bloodborne pathogens can prematurely end a person's life. Healthcare workers (HCWs), especially those who are members of surgical teams, are at increased risk of exposure to these pathogens. The proper use of personal protective equipment (PPE) during operative/invasive procedures reduces that risk. Despite this, some HCWs fail…

  12. Factors Surgical Team Members Perceive Influence Choices of Wearing or Not Wearing Personal Protective Equipment during Operative/Invasive Procedures

    ERIC Educational Resources Information Center

    Cuming, Richard G.

    2009-01-01

    Exposure to certain bloodborne pathogens can prematurely end a person's life. Healthcare workers (HCWs), especially those who are members of surgical teams, are at increased risk of exposure to these pathogens. The proper use of personal protective equipment (PPE) during operative/invasive procedures reduces that risk. Despite this, some HCWs fail…

  13. Information Policy in the European Community: Balancing Protection and Competition.

    ERIC Educational Resources Information Center

    Sillince, J. A. A.

    1994-01-01

    Discusses European Community policy relating to information technology and the information industry. Topics addressed include the information services industry; transborder information flow, including electronic mail, data owner responsibility, and software piracy; digital data networks; electronic data interchange; telecommunications; information…

  14. Information Policy in the European Community: Balancing Protection and Competition.

    ERIC Educational Resources Information Center

    Sillince, J. A. A.

    1994-01-01

    Discusses European Community policy relating to information technology and the information industry. Topics addressed include the information services industry; transborder information flow, including electronic mail, data owner responsibility, and software piracy; digital data networks; electronic data interchange; telecommunications; information…

  15. [Evaluation of the capacity of personal protection on poison emergency items in Chinese disease control and prevention institutes].

    PubMed

    Xie, Li-jing; Zhou, Jing; Meng, Cong-shen; Zhang, Shou-lin; Zhang, Hong-shun; Jiang, Shao-feng; Wang, Ming-liang; Sun, Cheng-ye

    2009-02-01

    To analyze the capacity of personal protection on poison emergency items in Chinese disease control and prevention institutes. Evaluation analysis based on data obtained from investigating personal protection equipments and professional knowledge quizzing about personal protection in poisoning control of 57 different level centers for disease control and prevention selected from China by a multi-stage stratified sampling. All 80.70% of the institutes possessed the protection equipments, provincial, municipal, county level institutes were 100.00%, 95.24%, 66.67%, respectively, with significant statistical difference (H = 7.94, P < 0.05). The average level of the type of individual protective equipments in disease control and prevention institutes was (5.42 +/- 4.00) kinds, the average points in category of provincial, municipal, county level institutes were (11.33 +/- 3.67), (6.52 +/- 3.16), (3.47 +/- 3.10) kinds, being statistically significant (F = 17.30, P < 0.05); type difference counts of disease control and prevention institutes in economic development, secondary, less-developed regions were (6.41 +/- 4.03), (3.55 +/- 3.35), (6.45 +/- 4.07) kinds, with statistical significance (F = 3.70, P < 0.05). Protection equipments chiefly possessed were latex gloves, gauze masks and C-protective clothing. Protective clothing and respiratory protective equipments were insufficient evidently. The average points in testing personal protection basic knowledge were (71.39 +/- 12.52) points; there were no differences between different institutes with different economic regions, levels, technical posts and title degrees. Certain advances have been achieved in recent years in personal protection capacity of institutes for disease control and prevention, but far from the actual demands, and maybe no enough effective response on emergency occurred.

  16. The use of stereotypes and individuating information in political person perception.

    PubMed

    Crawford, Jarret T; Jussim, Lee; Madon, Stephanie; Cain, Thomas R; Stevens, Sean T

    2011-04-01

    This article introduces the political person perception model, which identifies conditions under which perceivers rely on stereotypes (party membership), individuating information (issue position), or both in political person perception. Three studies supported the model's predictions. Study 1 showed that perceivers gave primacy to target information that was narrowly relevant to a judgment, whether that information was stereotypic or individuating. Study 2 found that perceivers relied exclusively on individuating information when it was narrowly relevant to the judgment and relied on both stereotype and individuating information when individuating information was not narrowly relevant to the judgment but did imply a political ideology. Study 3 replicated these findings in a more ecologically valid context and showed that people relied on party information in the absence of narrowly relevant policy positions and when individuating information did not imply a political ideology. Implications for political person perception and theories of stereotyping are discussed.

  17. Measuring the "Information Market(s)": A Personal Experience.

    ERIC Educational Resources Information Center

    Schwuchow, Werner

    1995-01-01

    Investigates whether information services markets are measurable so that results are comparable between countries and over different periods of time. Topics include definitions of information services; statistical criteria for data collection; survey methodologies; guidelines for data analyses; and disseminating survey results. (LRW)

  18. Modern Methods of Real-Time Gamma Radiation Monitoring for General Personal Protection

    NASA Astrophysics Data System (ADS)

    Korostynska, O.; Arshak, K.; Arshak, A.; Vaseashta, Ashok

    Real-time radiation detectors become an essential part of emergency personnel who may have to respond to unknown accidents, incidents or terrorist attacks, which could involve radioactive material. More and more ordinary citizens are interested in personal radiation protection as well. Reasons include lost sources, nuclear industrial accidents, nuclear or radiological terrorism and the possibility of nuclear weapons being used in a war. People want to have the ability to measure it for themselves and they want to be notified when the radiation levels are increased. To meet this demand, considerable research into new sensors is underway, including efforts to enhance the sensor performance through both the material properties and manufacturing technologies. Deep understanding of physical properties of the materials under the influence of radiation exposure is vital for the effective design of dosimeter devices. Detection of radiation is based on the fact that both the electrical and the optical properties of the materials undergo changes upon the exposure to ionizing radiation. It is believed that radiation causes structural defects. The influence of radiation depends on both the dose and the parameters of the films including their thickness: the degradation is more severe for the higher dose and the thinner films. This paper presents overview of modern methods of real-time gamma radiation monitoring for personal protection of radiation workers and general public and suggests further developments in this area.

  19. Foraging Bumble Bees Weigh the Reliability of Personal and Social Information.

    PubMed

    Dunlap, Aimee S; Nielsen, Matthew E; Dornhaus, Anna; Papaj, Daniel R

    2016-05-09

    Many animals, including insects, make decisions using both personally gathered information and social information derived from the behavior of other, usually conspecific, individuals [1]. Moreover, animals adjust use of social versus personal information appropriately under a variety of experimental conditions [2-5]. An important factor in how information is used is the information's reliability, that is, how consistently the information is correlated with something of relevance in the environment [6]. The reliability of information determines which signals should be attended to during communication [6-9], which types of stimuli animals should learn about, and even whether learning should evolve [10, 11]. Here, we show that bumble bees (Bombus impatiens) account for the reliability of personally acquired information (which flower color was previously associated with reward) and social information (which flowers are chosen by other bees) in making foraging decisions; however, the two types of information are not treated equally. Bees prefer to use social information if it predicts a reward at all, but if social information becomes entirely unreliable, flower color will be used instead. This greater sensitivity to the reliability of social information, and avoidance of conspecifics in some cases, may reflect the specific ecological circumstances of bee foraging. Overall, the bees' ability to make decisions based on both personally acquired and socially derived information, and the relative reliability of both, demonstrates a new level of sophistication and flexibility in animal, particularly insect, decision-making.

  20. 77 FR 35700 - Protected Critical Infrastructure Information (PCII) Program Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND...), National Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP... DHS/NPPD/IP/IICD, 245 Murray Lane, SW., Mailstop 0602, Arlington, VA 20598-0602. Email requests should...