Science.gov

Sample records for personal information protection

  1. Protecting Personal Information on Social Networking Sites

    ERIC Educational Resources Information Center

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  2. Protecting Your Child's Personal Information at School

    ERIC Educational Resources Information Center

    Federal Trade Commission, 2012

    2012-01-01

    Back to school--an annual ritual that includes buying new notebooks, packing lunches, coordinating transportation, and filling out forms: registration forms, health forms, permission slips, and emergency contact forms, to name a few. Many school forms require personal and, sometimes, sensitive information. In the wrong hands, this information can…

  3. Information processing capacity while wearing personal protective eyewear.

    PubMed

    Wade, Chip; Davis, Jerry; Marzilli, Thomas S; Weimar, Wendi H

    2006-08-15

    It is difficult to overemphasize the function vision plays in information processing, specifically in maintaining postural control. Vision appears to be an immediate, effortless event; suggesting that eyes need only to be open to employ the visual information provided by the environment. This study is focused on investigating the effect of Occupational Safety and Health Administration regulated personal protective eyewear (29 CFR 1910.133) on physiological and cognitive factors associated with information processing capabilities. Twenty-one college students between the ages of 19 and 25 years were randomly tested in each of three eyewear conditions (control, new and artificially aged) on an inclined and horizontal support surface for auditory and visual stimulus reaction time. Data collection trials consisted of 50 randomly selected (25 auditory, 25 visual) stimuli over a 10-min surface-eyewear condition trial. Auditory stimulus reaction time was significantly affected by the surface by eyewear interaction (F2,40 = 7.4; p < 0.05). Similarly, analysis revealed a significant surface by eyewear interaction in reaction time following the visual stimulus (F2,40 = 21.7; p < 0.05). The current findings do not trivialize the importance of personal protective eyewear usage in an occupational setting; rather, they suggest the value of future research focused on the effect that personal protective eyewear has on the physiological, cognitive and biomechanical contributions to postural control. These findings suggest that while personal protective eyewear may serve to protect an individual from eye injury, an individual's use of such personal protective eyewear may have deleterious effects on sensory information associated with information processing and postural control.

  4. 34 CFR 5.71 - Protection of personal privacy and proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Protection of personal privacy and proprietary....71 Protection of personal privacy and proprietary information. As set forth with more particularity... where disclosure would be inconsistent with individual rights of personal privacy or would...

  5. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... not compromised. (2) Conduct and document privacy awareness training for activity personnel (e.g...” awareness briefing; memo to staff; formal training; circulation of brief sheet on Best Practices, etc. (3.../BlackBerrys, who telecommute, work from home, or take work home, etc., to ensure information is...

  6. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... not compromised. (2) Conduct and document privacy awareness training for activity personnel (e.g...” awareness briefing; memo to staff; formal training; circulation of brief sheet on Best Practices, etc. (3.../BlackBerrys, who telecommute, work from home, or take work home, etc., to ensure information is...

  7. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... not compromised. (2) Conduct and document privacy awareness training for activity personnel (e.g...” awareness briefing; memo to staff; formal training; circulation of brief sheet on Best Practices, etc. (3.../BlackBerrys, who telecommute, work from home, or take work home, etc., to ensure information is...

  8. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... not compromised. (2) Conduct and document privacy awareness training for activity personnel (e.g...” awareness briefing; memo to staff; formal training; circulation of brief sheet on Best Practices, etc. (3.../BlackBerrys, who telecommute, work from home, or take work home, etc., to ensure information is...

  9. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... not compromised. (2) Conduct and document privacy awareness training for activity personnel (e.g...” awareness briefing; memo to staff; formal training; circulation of brief sheet on Best Practices, etc. (3.../BlackBerrys, who telecommute, work from home, or take work home, etc., to ensure information is...

  10. BC: campaign launched to protect personal health information.

    PubMed

    Garmaise, David

    2004-12-01

    A diverse group of rights, health, union, and HIV/AIDS organizations has launched a province-wide campaign to demand that the British Columbia government cease contracting out the administration of its medical plans to a private US company. The Right to Privacy Campaign (RPC) believes that the government's contract with Maximus Inc. places British Columbians' confidential health and related information within easy reach of US government agencies as a result of provisions in the USA PATRIOT Act and other US legislation.

  11. Personal information protection - exceptional challenges of integrated systems of eHealth.

    PubMed

    Bolka, Anka; Zadel, Blaž; Zorko, Martina

    2011-01-01

    Informatization has been bringing important, quick and extensive changes into the healthcare environment for years. Individual systems still represent isolated information islands; however, the need for interconnectivity and mutual accessibility has become more pronounced. On the one hand, integration of systems brings numerous, financially measurable advantages, and on the other hand, personal information in such systems becomes more vulnerable. Providing personal information protection is therefore the permanent task of informatisation and, with elimination of national borders and integration of national systems, it is becoming a challenge from the legal, organisational, technical and financial standpoints. PMID:21685589

  12. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... rehabilitation program or for purposes that would significantly improve the quality of life for applicants and... 34 Education 2 2014-07-01 2013-07-01 true Protection, use, and release of personal information. 361.38 Section 361.38 Education Regulations of the Offices of the Department of Education...

  13. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... rehabilitation program or for purposes that would significantly improve the quality of life for applicants and... 34 Education 2 2011-07-01 2010-07-01 true Protection, use, and release of personal information. 361.38 Section 361.38 Education Regulations of the Offices of the Department of Education...

  14. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... rehabilitation program or for purposes that would significantly improve the quality of life for applicants and... 34 Education 2 2012-07-01 2012-07-01 false Protection, use, and release of personal information. 361.38 Section 361.38 Education Regulations of the Offices of the Department of Education...

  15. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... rehabilitation program or for purposes that would significantly improve the quality of life for applicants and... 34 Education 2 2013-07-01 2013-07-01 false Protection, use, and release of personal information. 361.38 Section 361.38 Education Regulations of the Offices of the Department of Education...

  16. 34 CFR 361.38 - Protection, use, and release of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... rehabilitation program or for purposes that would significantly improve the quality of life for applicants and... 34 Education 2 2010-07-01 2010-07-01 false Protection, use, and release of personal information. 361.38 Section 361.38 Education Regulations of the Offices of the Department of Education...

  17. How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?

    PubMed Central

    Moreau, Katherine; Jonker, Elizabeth

    2011-01-01

    Background Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices. PMID:21317106

  18. Personal protective equipment

    MedlinePlus

    ... protective equipment. Available at: www.cdc.gov/niosh/ppe . Accessed October 27, 2015. Holland MG, Cawthon D. Personal protective equipment and decontamination of adults and children. Emerg Med Clin N ...

  19. Pesticide personal protective clothing.

    PubMed

    Branson, D H; Sweeney, M

    1991-01-01

    A fairly large established data base provides information on clothing worn by U.S. and Canadian farmers to work with pesticides, their attitudes and beliefs about pesticide risk, and clothing as a dermal barrier. Very limited similar data are available for farmers in less developed countries. Clearly, farmers perceive the benefits of pesticides to far exceed any risks. While few report poisoning symptoms, most believe that their usual work clothing offers a sufficient pesticide barrier, and few wear special-purpose protective clothing. Gloves of various materials, including cotton and leather, appear to be the major protective clothing item. Although farmers feel that their usual work clothing provides excellent protection, fabric penetration research does not support this. Shirting-weight fabrics offer some limited protection against light spray of field-strenght pesticides. Heavier-weight fabrics, such as denim and twill, are better barriers. With a heavier spray or a spill, usual work clothing does not give sufficient protection. Greater protection can usually be achieved with the use of a fluorocarbon finished fabric, such as Scotchgard or Zepel. Scotchgard can readily be applied at home. A durable-press finish does not appear to improve fabric's pesticide-barrier resistance and some data suggest that it may decrease barrier properties. A second alternative for increased protection is the use of a special-purpose fabric, such as a coated nonwoven or possibly Gore-Tex. Numerous other new "waterproof breathable" fabrics have recently come to the market. Many of these are finished or coated fabrics and one would expect them to be at least somewhat resistant to pesticides. However, they have not been tested. Wearing an additional layer also appears to be another clothing strategy to minimize exposure. Fabric penetration research also shows that pesticide formulation, volume or spray regime, concentration, and active ingredients influence the barrier properties of

  20. Pesticide personal protective clothing.

    PubMed

    Branson, D H; Sweeney, M

    1991-01-01

    A fairly large established data base provides information on clothing worn by U.S. and Canadian farmers to work with pesticides, their attitudes and beliefs about pesticide risk, and clothing as a dermal barrier. Very limited similar data are available for farmers in less developed countries. Clearly, farmers perceive the benefits of pesticides to far exceed any risks. While few report poisoning symptoms, most believe that their usual work clothing offers a sufficient pesticide barrier, and few wear special-purpose protective clothing. Gloves of various materials, including cotton and leather, appear to be the major protective clothing item. Although farmers feel that their usual work clothing provides excellent protection, fabric penetration research does not support this. Shirting-weight fabrics offer some limited protection against light spray of field-strenght pesticides. Heavier-weight fabrics, such as denim and twill, are better barriers. With a heavier spray or a spill, usual work clothing does not give sufficient protection. Greater protection can usually be achieved with the use of a fluorocarbon finished fabric, such as Scotchgard or Zepel. Scotchgard can readily be applied at home. A durable-press finish does not appear to improve fabric's pesticide-barrier resistance and some data suggest that it may decrease barrier properties. A second alternative for increased protection is the use of a special-purpose fabric, such as a coated nonwoven or possibly Gore-Tex. Numerous other new "waterproof breathable" fabrics have recently come to the market. Many of these are finished or coated fabrics and one would expect them to be at least somewhat resistant to pesticides. However, they have not been tested. Wearing an additional layer also appears to be another clothing strategy to minimize exposure. Fabric penetration research also shows that pesticide formulation, volume or spray regime, concentration, and active ingredients influence the barrier properties of

  1. PERSONAL LEADERSHIP PROTECTS RESEARCH SUBJECTS

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Personal leadership promotes the ethical conduct of human research activities. Leadership entails application of one’s cognitive abilities, technical skills, and emotional intelligence during the conduct of research activities, Personal leadership assures human research subject protection....

  2. Personal Radiation Protection System

    NASA Technical Reports Server (NTRS)

    McDonald, Mark; Vinci, Victoria

    2004-01-01

    A report describes the personal radiation protection system (PRPS), which has been invented for use on the International Space Station and other spacecraft. The PRPS comprises walls that can be erected inside spacecraft, where and when needed, to reduce the amount of radiation to which personnel are exposed. The basic structural modules of the PRPS are pairs of 1-in. (2.54-cm)-thick plates of high-density polyethylene equipped with fasteners. The plates of each module are assembled with a lap joint. The modules are denoted bricks because they are designed to be stacked with overlaps, in a manner reminiscent of bricks, to build 2-in. (5.08-cm)-thick walls of various lengths and widths. The bricks are of two varieties: one for flat wall areas and one for corners. The corner bricks are specialized adaptations of the flat-area bricks that make it possible to join walls perpendicular to each other. Bricks are attached to spacecraft structures and to each other by use of straps that can be tightened to increase the strengths and stiffnesses of joints.

  3. Developing registries of volunteers: key principles to manage issues regarding personal information protection.

    PubMed

    Lévesque, Emmanuelle; Leclerc, Dominic; Puymirat, Jack; Knoppers, Bartha Maria

    2010-11-01

    Much biomedical research cannot be performed without recruiting human subjects. Increasingly, volunteer registries are being developed to assist researchers with this challenging task. Yet, volunteer registries raise confidentiality issues. Having recently developed a registry of volunteers, the authors searched for normative guidance on how to implement the principle of confidentiality. The authors found that the protection of confidentiality in registries are based on the 10 key elements which are elaborated in detail in the Canadian Standards Association Model Code. This paper describes how these 10 detailed key principles can be used during the developmental stages of volunteer registries.

  4. 77 FR 59581 - Personal Identity Verification, Release and Handling of Restricted Information, Protection of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-28

    ... Register at 73 FR 45679-45680. The second cancelled proposed rule is identified by RIN 2700-AD43, Release and Handling of Restricted Information. It was published in the Federal Register at 75 FR 9860- 9864... Federal Register at 73 FR 63420-63421. William P. McNally, Assistant Administrator for...

  5. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF EDUCATION PROTECTION AND ADVOCACY OF INDIVIDUAL RIGHTS What Conditions Must Be Met After an... purposes directly connected with the protection and advocacy program, including program evaluation... and advocacy program, unless the consent of the individual to whom the information applies, or his...

  6. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF EDUCATION PROTECTION AND ADVOCACY OF INDIVIDUAL RIGHTS What Conditions Must Be Met After an... purposes directly connected with the protection and advocacy program, including program evaluation... and advocacy program, unless the consent of the individual to whom the information applies, or his...

  7. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF EDUCATION PROTECTION AND ADVOCACY OF INDIVIDUAL RIGHTS What Conditions Must Be Met After an... purposes directly connected with the protection and advocacy program, including program evaluation... and advocacy program, unless the consent of the individual to whom the information applies, or his...

  8. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  9. Problems experienced by nurses in relation to disclosure of patient data immediately after enforcement of the personal information protection law in Japan.

    PubMed

    Asanuma, Yuko; Yamanouchi, Kazushi; Sasaki, Noriko; Hosogoe, Sachiko

    2006-01-01

    An extension course for nurses providing details about the Act on the Protection of Personal Information was offered using a remote conferencing system. Experiences or problems related to disclosure of patient data were collected from the participants using a questionnaire. Most of the problems were placed in the category of disclosure of personal data to a third party, followed by those related to security safeguards and administration of employees. It is necessary for the JMHLW to gather more cases in order to expand the number of items in the Casebook by JMHLW. Also, systematic on-the-job education will be needed for nurses.

  10. Information Technology and Personal Responsibility.

    ERIC Educational Resources Information Center

    Klempner, Irving M.

    1981-01-01

    Discusses the societal implications of advanced information technology, focusing on ethical questions and the personal responsibility of the information professional in designing information systems. (FM)

  11. [Protective management for genetic information].

    PubMed

    Niikawa, Norio

    2005-03-01

    With advances in genomic and genetic medicine, genomic information is being used for the management of disorders. In addition, personalized medicine will be in practice in the near future. Because genetic information, i.e., disease diagnosis, gene mutations, and/or nucleotide sequences, remains unchanged through an individual's life, there are important issues for discussion, such as informed consent at sampling, protection of an individual's genetic information from any social discrimination, handling of samples, and genetic counseling. In this review, how to protect and manage the genetic information at researching and at medical practice, together with several bioethical guidelines regarding such issues, are described. A triangle system in which sample donators, directing physicians/researchers and genetic counselors participate, to manage genetic information appropriately, is also proposed.

  12. Personal protection against biting insects and ticks

    PubMed Central

    2011-01-01

    Recent events with the first cases of local transmission of chikungunya and dengue fever virus in southern France by Aedes albopictus, adding to the nuisance and potential vectors that can be encountered when traveling in tropical or sub-tropical countries, has shown the value of a reflection on the Personal protection against vectors (PPAV). It is seen during an outbreak of vector-borne disease, or simply because of nuisance arthropods, that our fellow citizens try to protect themselves individually by using an arsenal of resources available on the market. Yet most of these means have been neither checked for effectiveness or safety tests, however, essential. Travellers, staff on mission or assignment, are looking for specific information on how to protect themselves or their families. Health workers had at their disposal so far indications that vary widely from one source to another. Therefore it seemed important to the Society of Travel Medicine (SMV) and the French Society of Parasitology (SFP) to initiate a reflection on this theme. This reflection took the form of recommendations for good practice, following the outline established by the French High Health Authority (HAS). The aim was to gather all relevant information, verified and validated and the format to be used not only by health personnel (doctors, pharmacists, nurses), but also by travel agents and individuals. This document highlights the need to take into account the risk of vector-borne diseases, some deadly, and the benefit of various methods of personal protection. The choice of methods is clearly oriented towards those whose effectiveness has been proven and potential risks assessed. The paper finally proposes two decision trees based on the transmission type (day or night) and kind of stay (short or roaming, long and steady). It concerns travellers, but also expatriates, residents and nomads. PMID:21395212

  13. Coming soon to a health sector near you: an advance look at the new Ontario Personal Health Information Protection Act (PHIPA): part II.

    PubMed

    Beardwood, John P; Kerr, J Alexis

    2005-01-01

    This is Part II of a two-part article that provides a broad overview and comparative study of the new Ontario health sector-specific privacy legislation. In Part I, which appeared in the previous issue of Healthcare Quarterly, we discussed the objectives, structure and scope of, as well as the substantive rights and obligations created by, the new Ontario Act. In Part II, we discuss the administrative obligations created by the Ontario Act, as well as the provisions relating to the enforcement of, and remedies available under, the Act. We also contrast the Ontario Act with the various approaches to the protection of personal health information that has already been adopted by other provinces, including Alberta, Saskatchewan and Manitoba. PMID:15715338

  14. About Personal Protective Equipment (PPE)

    MedlinePlus

    ... evaluation or testing against specific viruses, such as Ebola or flu. If performance data has met FDA ... about the Flu What You Should Know about Ebola Q3. Should caregivers use PPE to help protect ...

  15. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... information pursuant to paragraph (c) of this section is governed by the principles of common law as interpreted by the courts of the United States, except that, for purposes of any periodic audit, report, or... requesting assistance under the PAIR program, in accordance with the principles of common law as...

  16. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... information pursuant to paragraph (c) of this section is governed by the principles of common law as interpreted by the courts of the United States, except that, for purposes of any periodic audit, report, or... requesting assistance under the PAIR program, in accordance with the principles of common law as...

  17. Statistical Methods for Protecting Personally Identifiable Information in Aggregate Reporting. SLDS Technical Brief 3. NCES 2011-603

    ERIC Educational Resources Information Center

    National Center for Education Statistics, 2010

    2010-01-01

    Over the last decade, increased attention on education has led to an expansion in the amount of information on students and their schools and school districts reported to parents and the general public (20 U.S.C. Section 6311). States now report student outcomes based on assessments of student achievement in specific subjects and grade levels for…

  18. Economics of Personal Data Management: Fair Personal Information Trades

    NASA Astrophysics Data System (ADS)

    Tasidou, A.; Efraimidis, P. S.; Katos, V.

    Individuals today have no control over the way their personal information is being used even though they are the ones to suffer the consequences of any unwanted uses of their information. We propose addressing this externality through the creation of a market for personal information, where licenses to access individuals' personal information will be voluntarily traded. Through this market, satisfactory compensation to the information owner is provided, whilst personal information remains under the owner's control. Using cryptographic tools and micropayments we propose and develop a prototype for personal information trades where the above principles are implemented and tested.

  19. Insertion Loss of Personal Protective Clothing

    SciTech Connect

    Shull D.J.; Biesel, V.B.; Cunefare, K.A.

    1999-05-13

    'The use of personal protective clothing that covers the head is a common practice in many industries. Such personal protective clothing will impact the sound pressure level and the frequency content of sounds to which the wearer will be exposed. The use of such clothing, then, may impact speech and alarm audibility. A measure of the impact of such clothing is its insertion loss. Insertion loss measurements were performed on four types of personal protective clothing in use by Westinghouse Savannah River Company personnel which utilize cloth and plastic hood configurations to protect the head. All clothing configurations tested at least partially cover the ears. The measurements revealed that insertion loss of the items tested was notable at frequencies above 1000 Hz only and was a function of material stiffness and acoustic flanking paths to the ear. Further, an estimate of the clothing''s noise reduction rating reveals poor performance in that regard, even though the insertion loss of the test articles was significant at frequencies at and above 1000 Hz.'

  20. Electronic Health Record in Italy and Personal Data Protection.

    PubMed

    Bologna, Silvio; Bellavista, Alessandro; Corso, Pietro Paolo; Zangara, Gianluca

    2016-06-01

    The present article deals with the Italian Electronic Health Record (hereinafter EHR), recently introduced by Act 221/2012, with a specific focus on personal data protection. Privacy issues--e.g., informed consent, data processing, patients' rights and minors' will--are discussed within the framework of recent e-Health legislation, national Data Protection Code, the related Data Protection Authority pronouncements and EU law. The paper is aimed at discussing the problems arising from a complex, fragmentary and sometimes uncertain legal framework on e-Health.

  1. Electronic Health Record in Italy and Personal Data Protection.

    PubMed

    Bologna, Silvio; Bellavista, Alessandro; Corso, Pietro Paolo; Zangara, Gianluca

    2016-06-01

    The present article deals with the Italian Electronic Health Record (hereinafter EHR), recently introduced by Act 221/2012, with a specific focus on personal data protection. Privacy issues--e.g., informed consent, data processing, patients' rights and minors' will--are discussed within the framework of recent e-Health legislation, national Data Protection Code, the related Data Protection Authority pronouncements and EU law. The paper is aimed at discussing the problems arising from a complex, fragmentary and sometimes uncertain legal framework on e-Health. PMID:27491249

  2. [Concept of personal data relating to health in the law of personal data protection].

    PubMed

    Navarrete, Jesús Rubí

    2006-01-01

    The Law on the Protection of Data states that health data are sensible data and therefore subject to a strengthened system of guarantees. In order to apply this, the information must make reference to physical persons and must be susceptible of being included within the concept of health data. The resolutions of the Spanish Agency for Data Protection and the rulings of the Courts provide very valuable elements to clarify both concepts.

  3. Personal Privacy in an Information Society. Final Report.

    ERIC Educational Resources Information Center

    Privacy Protection Study Commission, Washington, DC.

    This report of the Privacy Protection Study Commission was prepared in response to a Congressional mandate to study data banks, automatic data processing programs, and information systems of governmental, regional and private organizations to determine standards and procedures in force for the protection of personal information. Recommendations…

  4. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... equipment. 50-204.7 Section 50-204.7 Public Contracts and Property Management Other Provisions Relating to... CONTRACTS General Safety and Health Standards § 50-204.7 Personal protective equipment. Protective equipment, including personal protective equipment for eyes, face, head, and extremities, protective...

  5. Personal information in searching for faces.

    PubMed

    Dunwoody, Philip T; Corl, Kelli N; Drews, David R; Widman, David R

    2005-04-01

    Participants searched for a target on a television monitor either after they viewed pictures and received physical information about the target or received that information augmented by personal information. Based on a levels of processing perspective we predicted that the addition of personal information would stimulate deeper processing and result in better identification performance. Personal information did increase identification accuracy, as anticipated. Personal information also increased the duration of time spent on the search task relative to a distractor task, suggesting that personal information may have done more than deepen the processing at the time of encoding. In the current climate of terrorism, this increase in identification performance via a surveillance camera has clear applied significance. PMID:15941097

  6. How Do Students Organize Personal Information Spaces?

    ERIC Educational Resources Information Center

    Hardof-Jaffe, Sharon; Hershkovitz, Arnon; Abu-Kishk, Hama; Bergman, Ofer; Nachmias, Rafi

    2009-01-01

    The purpose of this study is to empirically reveal strategies of students' organization of learning-related digital materials within an online personal information archive. Research population included 518 students who utilized the personal Web space allocated to them on the university servers for archiving information items, and data describing…

  7. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 8 2013-07-01 2013-07-01 false Criteria for personal protective equipment. 1926.95 Section 1926.95 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Personal Protective and Life Saving Equipment § 1926.95...

  8. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  9. Disclosing personal health information relating to adults who lack capacity.

    PubMed

    Griffith, Richard

    2014-03-01

    The need to share information about patients is vital to effective care and protection, especially where it relates to adults who lack decision-making capacity but it has to be balanced against the right to confidentiality. Like other health professionals, district nurses have a duty to maintain the confidentiality of patient information, and incapable adults have the right to expect their personal health information to be kept private. This right is guaranteed by the common-law duty of confidence, the Data Protection Act 1998 and the NHS Care Record Guarantee and confidentiality policy. This article discusses the district nurse's legal obligations when considering sharing information in relation to an incapable adult

  10. Adaptive Visualization for Focused Personalized Information Retrieval

    ERIC Educational Resources Information Center

    Ahn, Jae-wook

    2010-01-01

    The new trend on the Web has totally changed today's information access environment. The traditional information overload problem has evolved into the qualitative level beyond the quantitative growth. The mode of producing and consuming information is changing and we need a new paradigm for accessing information. Personalized search is one of…

  11. [Management of Personal Information in Clinical Laboratory Medicine:--Chairmen's Introductory Remarks].

    PubMed

    Yoshida, Hiroshi; Shimetani, Naoto

    2014-11-01

    The Japanese Society of Laboratory Medicine has been running its own Medical Safety Committee, and holding a symposium on medical safety during the annual meeting. The medical world is filled with a considerable amount of personal information, including genetic information, the ultimate personal information. We, as medical staff, have to manage such personal information not only in times of peace but also during disasters or emergency situations. In Japan, the Act on the Protection of Personal Information is currently being implemented, but a number of problems remain. Human beings have entered the information technology era, including electrical medical record systems, which is useful for research and education besides medical practice. This is why personal information must be more effectively protected from leakage, misconception, and abuse. We should create a sound system to manage personal information, with the spirit of protecting patient information that originated from the Oath of Hippocrates.

  12. [Management of Personal Information in Clinical Laboratory Medicine:--Chairmen's Introductory Remarks].

    PubMed

    Yoshida, Hiroshi; Shimetani, Naoto

    2014-11-01

    The Japanese Society of Laboratory Medicine has been running its own Medical Safety Committee, and holding a symposium on medical safety during the annual meeting. The medical world is filled with a considerable amount of personal information, including genetic information, the ultimate personal information. We, as medical staff, have to manage such personal information not only in times of peace but also during disasters or emergency situations. In Japan, the Act on the Protection of Personal Information is currently being implemented, but a number of problems remain. Human beings have entered the information technology era, including electrical medical record systems, which is useful for research and education besides medical practice. This is why personal information must be more effectively protected from leakage, misconception, and abuse. We should create a sound system to manage personal information, with the spirit of protecting patient information that originated from the Oath of Hippocrates. PMID:27509731

  13. Don't Take It Personal: European Union Legal Aspects of Procuring and Protecting Environmental Exposure Data in Population Biobanks Through the Use of a Geo-Information-Systems Toolkit.

    PubMed

    Bovenberg, Jasper Adriaan; de Hoogh, Kees; Knoppers, Bartha Maria; Hveem, Kristian; Hansell, Anna L

    2016-06-01

    Under European Union (EU) law, population-based cohort studies have the right to collect environmental data and to access geospatial data, at street level, on the web, from a host of public sources. As to geospatial information, they should be able to avail themselves of Member States' networks of services for geospatial data sets and services (discovery, viewing, downloading) via the Internet. On the other hand, linkage of health data of biobank participants to environmental data, using geospatial data, is limited, as it must satisfy the provisions of the EU Directive on the Protection of Personal Data, pursuant to which geospatial data regarding biobank participants are likely to qualify as personal data. Hence, we submit that the consents of biobank participants be reviewed to assess whether they cover the generation and linkage of geospatial data. We also submit that biobanks must have measures in place to prevent the re-identification of participants by use of their geospatial data. We present a model Geographic-Information-Systems (GIS) Toolkit, as an example of what measures could be taken to that effect.

  14. Don't Take It Personal: European Union Legal Aspects of Procuring and Protecting Environmental Exposure Data in Population Biobanks Through the Use of a Geo-Information-Systems Toolkit.

    PubMed

    Bovenberg, Jasper Adriaan; de Hoogh, Kees; Knoppers, Bartha Maria; Hveem, Kristian; Hansell, Anna L

    2016-06-01

    Under European Union (EU) law, population-based cohort studies have the right to collect environmental data and to access geospatial data, at street level, on the web, from a host of public sources. As to geospatial information, they should be able to avail themselves of Member States' networks of services for geospatial data sets and services (discovery, viewing, downloading) via the Internet. On the other hand, linkage of health data of biobank participants to environmental data, using geospatial data, is limited, as it must satisfy the provisions of the EU Directive on the Protection of Personal Data, pursuant to which geospatial data regarding biobank participants are likely to qualify as personal data. Hence, we submit that the consents of biobank participants be reviewed to assess whether they cover the generation and linkage of geospatial data. We also submit that biobanks must have measures in place to prevent the re-identification of participants by use of their geospatial data. We present a model Geographic-Information-Systems (GIS) Toolkit, as an example of what measures could be taken to that effect. PMID:27187500

  15. Incidence of ADL Disability in Older Persons, Physical Activities as a Protective Factor and the Need for Informal and Formal Care – Results from the SNAC-N Project

    PubMed Central

    Sjölund, Britt-Marie; Wimo, Anders; Engström, Maria; von Strauss, Eva

    2015-01-01

    Background The aim of the study was to examine 1) the incidence of disability in Activities of Daily Living (ADL), in persons 78 years and older 2) explore whether being physical active earlier is a significant predictor of being disability free at follow-up and 3) describe the amount of informal and formal care in relation to ADL-disability. Methods Data were used from a longitudinal community-based study in Nordanstig (SNAC-N), a part of the Swedish National Study on Aging and Care (SNAC). To study objectives 1) and 2) all ADL-independent participants at baseline (N = 307) were included; for objective 3) all participants 78 years and older were included (N = 316). Data were collected at baseline and at 3- and 6-year follow-ups. ADL-disability was defined as a need for assistance in one or more activities. Informal and formal care were measured using the Resource utilization in Dementia (RUD)-instrument. Results The incidence rates for men were similar in the age groups 78-81and 84 years and older, 42.3 vs. 42.5/1000 person-years. For women the incidence rate for ADL-disability increased significantly from the age group 78–81 to the age group 84 years and older, 20.8 vs.118.3/1000 person-years. In the age group 78–81 years, being physically active earlier (aOR 6.2) and during the past 12 month (aOR 2.9) were both significant preventive factors for ADL-disability. Both informal and formal care increased with ADL-disability and the amount of informal care was greater than formal care. The incidence rate for ADL-disability increases with age for women and being physically active is a protective factor for ADL-disability. Conclusion The incidence rate for ADL-disability increases with age for women, and being physical active is a protective factor for ADL-disability. PMID:26407207

  16. Protection of personal data--the European view.

    PubMed

    Mathews, S

    1998-03-01

    A new series of laws are being passed to control the processing of personal information--including medical information--inside the European Commonwealth. The author gives an overview of the European view of personal information and examines the implications for healthcare professionals both here and abroad.

  17. Toward a biologically informed psychology of personality.

    PubMed

    Buss, D M

    1990-03-01

    This article describes nine ways in which biological approaches can inform issues of central and long-standing concern to personality psychologists. These include: (a) developing an adequate description of human nature, (b) providing several solutions to the puzzle of within-species genetic variability, (c) identifying the most important ways in which individuals differ, (d) giving precision to the concepts of adaptation and adjustment, (e) identifying the origins of personality dispositions, (f) providing insight into personality development and the life course, (g) providing conceptual and evidential standards for invoking personality types as opposed to personality dimensions, (h) addressing the psychophysiology of personality, and (i) focusing attention on psychological mechanisms as evolved dispositional strategies.

  18. 49 CFR 238.117 - Protection against personal injury.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Requirements § 238.117 Protection against personal injury. On or after November 8, 1999, all moving parts, high voltage equipment, electrical conductors and switches, and pipes carrying hot fluids or gases on...

  19. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  20. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  1. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  2. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  3. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  4. 49 CFR 238.117 - Protection against personal injury.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Requirements § 238.117 Protection against personal injury. On or after November 8, 1999, all moving parts, high voltage equipment, electrical conductors and switches, and pipes carrying hot fluids or gases on...

  5. Personal medical information system using laser card

    NASA Astrophysics Data System (ADS)

    Cho, Seong H.; Kim, Keun Ho; Choi, Hyung-Sik; Park, Hyun Wook

    1996-04-01

    The well-known hospital information system (HIS) and the picture archiving and communication system (PACS) are typical applications of multimedia to medical area. This paper proposes a personal medical information save-and-carry system using a laser card. This laser card is very useful, especially in emergency situations, because the medical information in the laser card can be read at anytime and anywhere if there exists a laser card reader/writer. The contents of the laser card include the clinical histories of a patient such as clinical chart, exam result, diagnostic reports, images, and so on. The purpose of this system is not a primary diagnosis, but emergency reference of clinical history of the patient. This personal medical information system consists of a personal computer integrated with laser card reader/writer, color frame grabber, color CCD camera and a high resolution image scanner optionally. Window-based graphical user interface was designed for easy use. The laser card has relatively sufficient capacity to store the personal medical information, and has fast access speed to restore and load the data with a portable size as compact as a credit card. Database items of laser card provide the doctors with medical data such as laser card information, patient information, clinical information, and diagnostic result information.

  6. Thermal Materials Protect Priceless, Personal Keepsakes

    NASA Technical Reports Server (NTRS)

    2014-01-01

    NASA astronaut Scott Parazynski led the development of materials and techniques for the inspection and repair of the shuttle’s thermal protection system. Parazynski later met Chris Shiver of Houston-based DreamSaver Enterprises LLC and used concepts from his work at Johnson Space Center to develop an enclosure that can withstand 98 percent of residential fires.

  7. The Personal Construction of Information Space.

    ERIC Educational Resources Information Center

    McKnight, Cliff

    2000-01-01

    Describes the use of Repertory Grid methodology as a means of externalizing an individual's view of information space. Discusses personal construct theory (PCT), describes the Grid method with a single participant, and proposes future work which will investigate the extent to which individuals share perceptions of information space. (Author/LRW)

  8. Personal protective equipment with integrated POF sensors

    NASA Astrophysics Data System (ADS)

    Witt, J.; Schukar, M.; Krebber, K.; Pažoutová, H.; Demuth, J.; Santostefano, N.; Mäkinen, H.; Pietrowski, P.

    2013-05-01

    Within the EU project i-Protect fibre optic sensors for measuring heart rate, respiratory rate and skin temperature are being developed. The plastic optical fibre (POF) sensors are based on macrobending effects, photoplethysmography and fluorescence thermometry. The sensors and monitoring units are integrated into underwear and are communicating wireless via body area network and communication unit with the rescue command centre. All sensors can be removed from the underwear to allow washing the textile. First prototypes of the fibre optic sensors were tested in comparison to commercial reference sensors.

  9. [Adequacy of personal hearing protection devices].

    PubMed

    Peretti, A; Pedrielli, F; di Bisceglie, A Pasqua; Bonomini, F

    2010-01-01

    At present, attenuation values reported on the hearing protection device (HPD) label are strongly overestimated due to an evaluation method inappropriate for the environments in which they have to be used: the workplaces. An alternative test protocol was validated and published as standard. It should be transposed in the regulatory and legislative scenario and then adopted by manufacturers. Meanwhile, derating schemes proposed by NIOSH may be applied for reducing the labelled attenuation data, in spite of their roughness. Moreover, attenuation values differ from subject to subject. Especially when exposure levels are high or hearing loss is worsening, it could thus be necessary to evaluate the attenuation provided by the hearing protector on each worker. To overcome this problem, the assessment of the hearing threshold levels on a subject with and without the HPD could be integrated into the annual audiometry program.

  10. Divulging Personal Information within Learning Analytics Systems

    ERIC Educational Resources Information Center

    Ifenthaler, Dirk; Schumacher, Clara

    2015-01-01

    The purpose of this study was to investigate if students are prepared to release any personal data in order to inform learning analytics systems. Besides the well-documented benefits of learning analytics, serious concerns and challenges are associated with the application of these data driven systems. Most notably, empirical evidence regarding…

  11. 20 CFR 636.2 - Protection of informants.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Protection of informants. 636.2 Section 636.2 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR COMPLAINTS, INVESTIGATIONS... benefit to which that person is entitled under the provisions of the Act or the regulations because...

  12. Disclosing personal health information relating to adults who lack capacity.

    PubMed

    Griffith, Richard

    2014-03-01

    The need to share information about patients is vital to effective care and protection, especially where it relates to adults who lack decision-making capacity but it has to be balanced against the right to confidentiality. Like other health professionals, district nurses have a duty to maintain the confidentiality of patient information, and incapable adults have the right to expect their personal health information to be kept private. This right is guaranteed by the common-law duty of confidence, the Data Protection Act 1998 and the NHS Care Record Guarantee and confidentiality policy. This article discusses the district nurse's legal obligations when considering sharing information in relation to an incapable adult PMID:24897837

  13. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  14. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  15. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  16. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  17. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  18. Patient information, consents and privacy protection scheme for an information system dedicated to pervasive developmental disorders.

    PubMed

    Ben Said, Mohamed; Robel, Laurence; Messiaen, Claude; Craus, Yann; Jais, Jean Philippe; Golse, Bernard; Landais, Paul

    2014-01-01

    Patients explicit and unambiguous information, patients consents and privacy protection are reviewed in this article, in the frame of the deployment of the information system TEDIS dedicated to autism spectrum disorders. The role of the Delegate to the Protection of Data is essential at this stage. We developed a privacy protection scheme based on storing encrypted patients personal data on the server database and decrypting it on the Web browser. It tries to respond to the end-users request to manage nominative data in a human readable form and to meet with privacy protection framework.

  19. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Right of parent to review personal information provided by a child. 312.6 Section 312.6 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.6 Right of parent to review personal information provided by a...

  20. Chlorobenzylidenemalonitrile Gas Exposure from A Novelty Personal-Protection Gun

    PubMed Central

    Dong, Christopher; de la Garza, Albert

    2007-01-01

    We present an unusual case of chlorobenzylidenemalonitrile (CS) tear-gas exposure from the unwitting discharge of a personal-protection handgun loaded with CS gas. The gun was in a bag of toys purchased from a local thrift store and was discharged by a child. The responding paramedic presumptively identified the substance as CS based solely on personal experience. This recognition led to suboptimal field management of the incident with the paramedic failing to follow the standard operating procedures for an unknown chemical exposure. As this was a benign agent, there were no serious consequences. This case highlights the pre-hospital and emergency department challenges associated with the management of an unknown chemical exposure and the potential consequences if the chemical is a toxic substance. A methodical approach following established protocols can reduce the potential for negative outcomes. Review of the literature found no other report of CS gas exposure from such a personal-protection weapon. PMID:20440402

  1. Effect of personal protective eyewear on postural stability.

    PubMed

    Wade, Lloyd R; Weimar, Wendi H; Davis, Jerry

    2004-12-01

    Vision is a significant factor in postural stability; this study is the first to report on the effect of OSHA regulated personal protective eyewear on physiological factors associated with postural stability. Twenty college students between the ages of 19 and 25 were randomly tested in each of three eyewear conditions (control, new, and artificially aged) using a NeuroCom Balance Master System and the mCTSIB protocol. Subjects were pre-tested with no eyewear (control) on each day followed by a 5-min assembly task with random eyewear assignment. Subjects were then post-tested following the same protocol while wearing the eyewear. Data were evaluated using a two (pre/post) x three (eyewear) repeated measures analysis of variance (ANOVA). There was a significant main effect for both the eyes open/firm flat surface, and eyes open/foam flat surface conditions (p personal protective eyewear may serve to protect an individual from eye injury, an individual's use of such personal protective eyewear may have deleterious effects on sensory input from the visual system and compensatory strategies to maintaining or regaining postural stability. Individuals who employ protective eyewear on a daily basis need to be aware of the effect of altered visual input resulting from eyewear on their postural stability, especially during sensory-challenging tasks, such as navigating ladders, scaffolding and elevated surfaces, typically found in construction environments.

  2. The Personal Protective Behaviors of College Student Drinkers: Evidence of Indigenous Protective Norms

    ERIC Educational Resources Information Center

    Haines, Michael P.; Barker, Gregory; Rice, Richard M.

    2006-01-01

    Given the prevalence of alcohol consumption and the relative infrequency of harm among college students, the authors sought to determine how most college students protect themselves from alcohol-related harm. An analysis of the aggregate National College Health Assessment data identified a cluster of personal protective behaviors that correlated…

  3. Hazard Assessment of Personal Protective Clothing for Hydrogen Peroxide Service

    NASA Technical Reports Server (NTRS)

    Greene, Ben; McClure, Mark B.; Johnson, Harry T.

    2004-01-01

    Selection of personal protective equipment (PPE) for hydrogen peroxide service is an important part of the hazard assessment process. But because drip testing of chemical protective clothing for hydrogen peroxide service has not been reported for about 40 years, it is of great interest to test new protective clothing materials with new, high-concentration hydrogen peroxide following similar procedures. The suitability of PPE for hydrogen peroxide service is in part determined by observations made when hydrogen peroxide is dripped onto swatches of protective clothing material. Protective clothing material was tested as received, in soiled condition, and in grossly soiled condition. Materials were soiled by pretreating the material with potassium permanganate (KMnO4) solution then drying to promote a reaction. Materials were grossly soiled with solid KMnO4 to greatly promote reaction. Observations of results including visual changes to the hydrogen peroxide and materials, times to ignition, and self-extinguishing characteristics of the materials are reported.

  4. Adaptive interface for personalizing information seeking.

    PubMed

    Narayanan, S; Koppaka, Lavanya; Edala, Narasimha; Loritz, Don; Daley, Raymond

    2004-12-01

    An adaptive interface autonomously adjusts its display and available actions to current goals and abilities of the user by assessing user status, system task, and the context. Knowledge content adaptability is needed for knowledge acquisition and refinement tasks. In the case of knowledge content adaptability, the requirements of interface design focus on the elicitation of information from the user and the refinement of information based on patterns of interaction. In such cases, the emphasis on adaptability is on facilitating information search and knowledge discovery. In this article, we present research on adaptive interfaces that facilitates personalized information seeking from a large data warehouse. The resulting proof-of-concept system, called source recommendation system (SRS), assists users in locating and navigating data sources in the repository. Based on the initial user query and an analysis of the content of the search results, the SRS system generates a profile of the user tailored to the individual's context during information seeking. The user profiles are refined successively and are used in progressively guiding the user to the appropriate set of sources within the knowledge base. The SRS system is implemented as an Internet browser plug-in to provide a seamless and unobtrusive, personalized experience to the users during the information search process. The rationale behind our approach, system design, empirical evaluation, and implications for research on adaptive interfaces are described in this paper.

  5. Protecting Privacy in Computerized Medical Information.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Office of Technology Assessment.

    This report analyzes the implications of computerized medical information and the challenges it brings to individual privacy. The report examines the nature of the privacy interest in health care information and the current state of the law protecting that information; the nature of proposals to computerize health care information and the…

  6. Personal protective equipment and decontamination of adults and children.

    PubMed

    Holland, Michael G; Cawthon, David

    2015-02-01

    Accurate identification of the hazardous material is essential for proper care. Efficient hospital security and triage must prevent contaminated victims from entering the emergency department (ED) and causing secondary contamination. The decontamination area should be located outside the ambulance entrance. Decontamination priorities are protection of the health care worker, utilization of Level C personal protective equipment, and proper decontamination of the exposed patient. Decontamination proceeds in a head-to-toe sequence. Run-off water is a hazardous waste. Hospital and Community Management Planning for these emergencies is essential for proper preparation and effective response to the hazardous materials incident.

  7. Personal protective equipment and decontamination of adults and children.

    PubMed

    Holland, Michael G; Cawthon, David

    2015-02-01

    Accurate identification of the hazardous material is essential for proper care. Efficient hospital security and triage must prevent contaminated victims from entering the emergency department (ED) and causing secondary contamination. The decontamination area should be located outside the ambulance entrance. Decontamination priorities are protection of the health care worker, utilization of Level C personal protective equipment, and proper decontamination of the exposed patient. Decontamination proceeds in a head-to-toe sequence. Run-off water is a hazardous waste. Hospital and Community Management Planning for these emergencies is essential for proper preparation and effective response to the hazardous materials incident. PMID:25455662

  8. Government Doublethink: Protection or Suppression in Information.

    ERIC Educational Resources Information Center

    Drake, Miriam A.

    2003-01-01

    Discusses regulations and actions related to government withholding, suppressing, and altering information since September 11, 2001. Topics include conflicting goals of an informed citizenry versus national security, science and technology progress versus protection of sensitive information, and public health versus ideology; political pressure;…

  9. Responding to and managing casualties: detection, personal protection, and decontamination.

    PubMed

    Lepler, Lawrence; Lucci, Edward

    2004-03-01

    Unfortunately, a mass casualty caused by chemical or biologic terrorism has become a real threat to the United States. A well-considered preparedness plan is needed to minimize tOe impact of a chemical or biologic attack on civilians and responders. This article describes some of the key elements in a preparedness plan, specifically issues regarding early detection, decontamination. and personal protection. Although chemical and biologic terrorism is often considered as a single entity, there are important distinctions in detection, decontamination, and personal protection procedures that effect preparedness planning. Therefore, any preparedness plan needs to be flexible enough to deal with both biologic and chemical terrorism. Preparedness plans also need to be thorough enough to deal with the differences in response to a variety of specific chemical or biologic agents. PMID:15062224

  10. Self-informant Agreement for Personality and Evaluative Person Descriptors: Comparing Methods for Creating Informant Measures

    PubMed Central

    Simms, Leonard J.; Zelazny, Kerry; Yam, Wern How; Gros, Daniel F.

    2011-01-01

    Little attention typically is paid to the way self-report measures are translated for use in self-informant agreement studies. We studied two possible methods for creating informant measures: (a) the traditional method in which self-report items were translated from the first- to the third-person and (b) an alternative meta-perceptual method in which informants were directed to rate their perception of the targets’ self-perception. We hypothesized that the latter method would yield stronger self-informant agreement for evaluative personality dimensions measured by indirect item markers. We studied these methods in a sample of 303 undergraduate friendship dyads. Results revealed mean-level differences between methods, similar self-informant agreement across methods, stronger agreement for Big Five dimensions than for evaluative dimensions, and incremental validity for meta-perceptual informant rating methods. Limited power reduced the interpretability of several sparse acquaintanceship effects. We conclude that traditional informant methods are appropriate for most personality traits, but meta-perceptual methods may be more appropriate when personality questionnaire items reflect indirect indicators of the trait being measured, which is particularly likely for evaluative traits. PMID:21541262

  11. Personal protective grounding: Facilities instructions, standards, and techniques. Volume 5-1

    SciTech Connect

    Watson, H.E.

    1993-01-01

    The volume is intended to provide information on grounding equipment and application procedures to enable workers to perform their duties with maximum confidence and safety. The primary purpose of personal protective grounds is to provide maximum safety for personnel while they are working on deenergized lines or equipment by limiting voltage rise to a safe value in case the lines or equipment are accidentally energized from any source by shunting the fault current until circuit breakers, and/or fuses disconnect the equipment being worked on within a given time/current relationship. Secondary functions of personal grounds are to protect against induced voltages from adjacent parallel energized circuits and to protect against static voltages. This volume has been revised to take into account effects of induced voltage, information gained from staged-fault testing, in-service evaluation of grounds, and exclusive use of threaded-stud compression ferrules.

  12. Rights to information access under the Data Protection Act.

    PubMed

    Dimond, Bridgit

    A patient has a legal right to access personal information held by health professionals on the basis of statutory provisions, such as the Data Protection Act 1998 and the regulations made under that Act, the Access to Health Reports Act 1988 (which is considered in a later article), and also on the basis of the common law, i.e. judge made or case law. Neither legal rights, however, give the patient an absolute right, but are qualified.

  13. 40 CFR 370.60 - How does a person obtain MSDS information about a specific facility?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 28 2014-07-01 2014-07-01 false How does a person obtain MSDS... obtain MSDS information about a specific facility? Any person may obtain an MSDS for a specific facility by writing to the LEPC and asking for it. (a) If the LEPC has the MSDS, it must provide it to...

  14. 40 CFR 370.60 - How does a person obtain MSDS information about a specific facility?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 28 2011-07-01 2011-07-01 false How does a person obtain MSDS... obtain MSDS information about a specific facility? Any person may obtain an MSDS for a specific facility by writing to the LEPC and asking for it. (a) If the LEPC has the MSDS, it must provide it to...

  15. 40 CFR 370.60 - How does a person obtain MSDS information about a specific facility?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false How does a person obtain MSDS... obtain MSDS information about a specific facility? Any person may obtain an MSDS for a specific facility by writing to the LEPC and asking for it. (a) If the LEPC has the MSDS, it must provide it to...

  16. 40 CFR 370.60 - How does a person obtain MSDS information about a specific facility?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 29 2012-07-01 2012-07-01 false How does a person obtain MSDS... obtain MSDS information about a specific facility? Any person may obtain an MSDS for a specific facility by writing to the LEPC and asking for it. (a) If the LEPC has the MSDS, it must provide it to...

  17. 40 CFR 370.60 - How does a person obtain MSDS information about a specific facility?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 29 2013-07-01 2013-07-01 false How does a person obtain MSDS... obtain MSDS information about a specific facility? Any person may obtain an MSDS for a specific facility by writing to the LEPC and asking for it. (a) If the LEPC has the MSDS, it must provide it to...

  18. Insect repellents and associated personal protection for a reduction in human disease

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Personal protection measures against biting arthropods include topical insect repellents, area repellents, insecticide-treated bednets and treated clothing. The literature on the effectiveness of personal protection products against arthropods is mainly limited to studies of prevention of bites, rat...

  19. 78 FR 5116 - NASA Information Security Protection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-24

    ... Executive Order of 13132 E.O. 13132, ``Federalism,'' 64 FR 43255 (August 4, 1999) requires regulations be... SPACE ADMINISTRATION 14 CFR Part 1203 RIN 2700-AD61 NASA Information Security Protection AGENCY..., Classified National Security Information, and appropriately to correspond with NASA's internal...

  20. [Management System of Personal Data Protection in the Health Care Field].

    PubMed

    Yamamoto, Ryuichi

    2014-11-01

    In Japan, the law on personal data protection was enacted in 2005. Privacy is a human right, including the 1981 right to be let alone. The need for confidentiality in the health care field has been accepted since the ancient Greek era, and privacy in the 19th century was developed in this field. However, the concept of privacy has gradually altered, especially due to the development of information technology. The author suggests that the guideline for the security of heath information systems of the Ministry of Health, Labour, and Welfare is very important and information security management with PDCA cycles is essential for personal data protection in the health care field. In recent years, gathering a large amount of life logging or health-related data and analyzing such data for academic and/or industrial applications has become common. Revising privacy protection legislation has become an urgent political issue in many countries. The Japanese Government published their policy to personal data protection act in Dec. 2013. Balancing public benefit and privacy is a major task of future legislation. The author recommends that health care professionals pay attention to, participate in the discussion of, and make suggestions regarding this act.

  1. The personal protective behaviors of college student drinkers: evidence of indigenous protective norms.

    PubMed

    Haines, Michael P; Barker, Gregory; Rice, Richard M

    2006-01-01

    Given the prevalence of alcohol consumption and the relative infrequency of harm among college students, the authors sought to determine how most college students protect themselves from alcohol-related harm. An analysis of the aggregate National College Health Assessment data identified a cluster of personal protective behaviors that correlated with reduced risk when drinking. Further analysis revealed that nearly three-quarters of student drinkers regularly employ at least 1 protective behavior, and well over half of the students who use protective behaviors routinely employ 2 or more. In addition, the data reveal that student drinkers employ situational abstinence, with nearly 7 out of 10 students reporting that they sometimes or usually refrain from drinking alcohol when they socialize. The use of these protective behaviors is a strong predictor of safety and harm for college-student drinkers.

  2. Hiding personal information reveals the worst

    PubMed Central

    John, Leslie K.; Barasz, Kate; Norton, Michael I.

    2016-01-01

    Seven experiments explore people’s decisions to share or withhold personal information, and the wisdom of such decisions. When people choose not to reveal information—to be “hiders”—they are judged negatively by others (experiment 1). These negative judgments emerge when hiding is volitional (experiments 2A and 2B) and are driven by decreases in trustworthiness engendered by decisions to hide (experiments 3A and 3B). Moreover, hiders do not intuit these negative consequences: given the choice to withhold or reveal unsavory information, people often choose to withhold, but observers rate those who reveal even questionable behavior more positively (experiments 4A and 4B). The negative impact of hiding holds whether opting not to disclose unflattering (drug use, poor grades, and sexually transmitted diseases) or flattering (blood donations) information, and across decisions ranging from whom to date to whom to hire. When faced with decisions about disclosure, decision-makers should be aware not just of the risk of revealing, but of what hiding reveals. PMID:26755591

  3. Personal Health Information in Canada: A Comparison of Citizen Expectations and Legislation

    ERIC Educational Resources Information Center

    Peekhaus, Wilhelm

    2008-01-01

    This paper explores whether the Canadian legislative protections in place to safeguard medical privacy meet the expectations of Canadians. An overview of current governance systems designed to protect the privacy of personal health information at both the federal and provincial levels is first presented. This is followed by an empirical analysis…

  4. Separation of personal data in a biobank information system.

    PubMed

    Müller, Thomas H; Thasler, Reinhard

    2014-01-01

    Separation of different types of personal data has been introduced as an effective measure to improve data protection in the context of medical research. In particular, research associated with human biomaterials requires not only secure technologies but also trustworthy processing of personal data on a need-to-know basis. Web-based information systems make use of a technological infrastructure that is well suited to distributed data repositories and remote processing systems. This approach was successfully applied to develop an information system supporting acquisition, processing and storage of remnant biomaterial from surgical treatment, as well as its allocation to research projects. In order to enhance data protection, the contents of the originally unified database were divided into identification data and medical data. A web application was created for each part and appropriate functionality to maintain and access corresponding data was developed. It is concluded that a distribution of biobanking data across separate databases can be achieved if workflows and staff roles are redesigned accordingly.

  5. Evaluation of commercial products for personal protection against mosquitoes.

    PubMed

    Revay, Edita E; Junnila, Amy; Xue, Rui-De; Kline, Daniel L; Bernier, Ulrich R; Kravchenko, Vasiliy D; Qualls, Whitney A; Ghattas, Nina; Müller, Günter C

    2013-02-01

    Human landing catch studies were conducted in a semi-field setting to determine the efficacy of seven commercial products used for personal protection against mosquitoes. Experiments were conducted in two empty, insecticide free, mesh-enclosed greenhouses, in Israel, with either 1500 Aedes albopictus or 1500 Culex pipiens released on consecutive study nights. The products tested in this study were the OFF!(®) Clip-On™ Mosquito Repellent (Metofluthrin 31.2%) and the Terminix(®) ALLCLEAR(®) Sidekick Mosquito Repeller (Cinnamon oil 10.5%; Eugenol 13%; Geranium oil 21%; Peppermint 5.3%; Lemongrass oil 2.6%), which are personal diffusers; Super Band™ Wristband (22% Citronella oil) and the PIC(®) Citronella Plus Wristband (Geraniol 15%; Lemongrass oil 5%, Citronella oil 1%); the Sonic Insect Repeller Keychain; the Mosquito Guard Patch (Oil of Lemon Eucalyptus 80mg), an adhesive-backed sticker for use on textiles; and the Mosquito Patch (vitamin B1 300mg), a transdermal patch. It was determined that the sticker, transdermal patch, wristbands and sonic device did not provide significant protection to volunteers compared with the mosquito attack rate on control volunteers who were not wearing a repellent device. The personal diffusers: - OFF!(®) Clip-On™ and Terminix(®) ALLCLEAR(®) Sidekick - provided superior protection compared with all other devices in this study. These diffusers reduced biting on the arms of volunteers by 96.28% and 95.26% respectively, for Ae. albopictus, and by 94.94% and 92.15% respectively, for Cx. pipiens. In a second trial conducted to compare these devices directly, biting was reduced by the OFF!(®) Clip-On™ and the Terminix(®) ALLCLEAR(®) by 87.55% and 92.83%, respectively, for Ae. albopictus, and by 97.22% and 94.14%, respectively, for Cx. pipiens. There was no significant difference between the performances of the two diffusers for each species. PMID:23092689

  6. 75 FR 9860 - Release, Handling, and Protection of Restricted Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-04

    ... Data and Copyrights, NASA's policy on release and protection and handling of such information. This...-73, Handling and Protection of Restricted Information. The Contractor's limited rights data and... Protection of Restricted Information AGENCY: National Aeronautics and Space Administration. ACTION:...

  7. [Research and protection of personal data in Primary Care].

    PubMed

    Garrido Elustondo, Sofía; Cabello Ballesteros, Luisa; Galende Domínguez, Inés; Riesgo Fuertes, Rosario; Rodríguez Barrientos, Ricardo; Polentinos Castro, Elena

    2012-03-01

    Research is one of the fundamental functions that have to be carried out in Primary Care. The clinical information stored in different records arising from medical care is a basic tool for this activity. The use of personal data for the purposes of research is legitimate according to our laws; however, this information must be treated confidentially at all times. Two alternatives are available for this. One is to obtain the informed consent of the patient, and the other is to dissociate the handling of the information. But in some situations, the compliance to legal demands when obtaining data for research is not easy, there being a series of obstacles which in many cases makes it impossible to carry out research. In this article, we will give guidance on how to access the information contained in records while respecting the rights of the patient and the current legislation.

  8. Interoperability design of personal health information import service.

    PubMed

    Tuomainen, Mika; Mykkänen, Juha

    2012-01-01

    Availability of personal health information for individual use from professional patient records is an important success factor for personal health information management (PHIM) solutions such as personal health records. In this paper we focus on this crucial part of personal wellbeing information management splutions and report the interoperability design of personal information import service. Key requirements as well as design factors for interfaces between PHRs and EPRs are discussed. Open standards, low implementation threshold and the acknowledgement of local market and conventions are emphasized in the design.

  9. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national...

  10. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data...

  11. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data...

  12. A patient privacy protection scheme for medical information system.

    PubMed

    Lu, Chenglang; Wu, Zongda; Liu, Mingyong; Chen, Wei; Guo, Junfang

    2013-12-01

    In medical information systems, there are a lot of confidential information about patient privacy. It is therefore an important problem how to prevent patient's personal privacy information from being disclosed. Although traditional security protection strategies (such as identity authentication and authorization access control) can well ensure data integrity, they cannot prevent system's internal staff (such as administrators) from accessing and disclosing patient privacy information. In this paper, we present an effective scheme to protect patients' personal privacy for a medical information system. In the scheme, privacy data before being stored in the database of the server of a medical information system would be encrypted using traditional encryption algorithms, so that the data even if being disclosed are also difficult to be decrypted and understood. However, to execute various kinds of query operations over the encrypted data efficiently, we would also augment the encrypted data with additional index, so as to process as much of the query as possible at the server side, without the need to decrypt the data. Thus, in this paper, we mainly explore how the index of privacy data is constructed, and how a query operation over privacy data is translated into a new query over the corresponding index so that it can be executed at the server side immediately. Finally, both theoretical analysis and experimental evaluation validate the practicality and effectiveness of our proposed scheme.

  13. A patient privacy protection scheme for medical information system.

    PubMed

    Lu, Chenglang; Wu, Zongda; Liu, Mingyong; Chen, Wei; Guo, Junfang

    2013-12-01

    In medical information systems, there are a lot of confidential information about patient privacy. It is therefore an important problem how to prevent patient's personal privacy information from being disclosed. Although traditional security protection strategies (such as identity authentication and authorization access control) can well ensure data integrity, they cannot prevent system's internal staff (such as administrators) from accessing and disclosing patient privacy information. In this paper, we present an effective scheme to protect patients' personal privacy for a medical information system. In the scheme, privacy data before being stored in the database of the server of a medical information system would be encrypted using traditional encryption algorithms, so that the data even if being disclosed are also difficult to be decrypted and understood. However, to execute various kinds of query operations over the encrypted data efficiently, we would also augment the encrypted data with additional index, so as to process as much of the query as possible at the server side, without the need to decrypt the data. Thus, in this paper, we mainly explore how the index of privacy data is constructed, and how a query operation over privacy data is translated into a new query over the corresponding index so that it can be executed at the server side immediately. Finally, both theoretical analysis and experimental evaluation validate the practicality and effectiveness of our proposed scheme. PMID:24166018

  14. [Protection of genetic data in Spain. Analysis based on the general principles of personal data protection].

    PubMed

    García Amez, Javier

    2006-01-01

    The genetic data is Spain is not regulated specifically, rather, we must look at the regulation on the protection of data of a personal nature. This is turn, establishes a series of general principles to apply to any type of data. Analysing this with other regulations that are dispersed both in the national and international regulations, we can deduce the rights and obligations in this field. This highlights the fact that one can't dispose of the genetic data in the same manner as the personal data.

  15. [Personal protection measures against blood-sucking insects and ticks].

    PubMed

    Orshan, Laor; Wilamowski, Amos; Pener, Hedva

    2010-09-01

    Blood-sucking arthropods are major vectors of various pathogens like viruses, bacteria, protozoa and nematodes. Preventing exposure to the vector is imperative especially when vaccine and prophylactic treatments are not available. Personal protection measures (PPM) are essential and often the only means available when dealing with blood-sucking disease transmitting arthropods. Awareness of the risk in the specific areas of travel is the first step to be taken before and while traveling. PPM include preventive personal behavior, suitable clothing, application of insect repellents to the skin, the use of space repellents, impregnation of clothing, camping gear and bed nets and, when necessary, ground spraying of insecticides. The registered and recommended active ingredients for skin application are Deet, picaridin (icaridin), p-menthane-3,8-diol (PMD) and IR3535. Volatile pyrethrins are used as space repellents while pyrethroids, especially permethrin, are employed for impregnation and for ground spraying. It is recommended to purchase only products registered in Israel or other developed countries. These products should have a detailed label specifying the concentration of the active ingredient, application instructions and the duration of protection.

  16. A guide to unclassified sensitive information protection

    SciTech Connect

    Donahue, S.C.

    1996-11-14

    This document is a reference guide for CIC-Division employees who lead or participate in projects that use and/or produce unclassified sensitive information. It is intended for use on a case by case basis to develop project specific sensitive information handling procedures and standards. It contains criteria for identifying sensitive information and determining levels of sensitivity, and describes cost effective measures for protecting various levels of sensitive information. The goal of this document is to help establish good business practices that benefit both the Laboratory and its customers. Division personnel are encouraged to apply these guidelines.

  17. Contamination during doffing of personal protective equipment by healthcare providers

    PubMed Central

    Lim, Seong Mi; Cha, Won Chul; Chae, Minjung Kathy; Jo, Ik Joon

    2015-01-01

    Objective In this study, we aimed to describe the processes of both the donning and the doffing of personal protective equipment for Ebola and evaluate contamination during the doffing process. Methods We recruited study participants among physicians and nurses of the emergency department of Samsung Medical Center in Seoul, Korea. Participants were asked to carry out doffing and donning procedures with a helper after a 50-minute brief training and demonstration based on the 2014 Centers for Disease Control and Prevention protocol. Two separate cameras with high-density capability were set up, and the donning and doffing processes were video-taped. A trained examiner inspected all video recordings and coded for intervals, errors, and contaminations defined as the outside of the equipment touching the clinician’s body surface. Results Overall, 29 participants were enrolled. Twenty (68.9%) were female, and the mean age was 29.2 years. For the donning process, the average interval until the end was 234.2 seconds (standard deviation [SD], 65.7), and the most frequent errors occurred when putting on the outer gloves (27.5%), respirator (20.6%), and hood (20.6%). For the doffing process, the average interval until the end was 183.7 seconds (SD, 38.4), and the most frequent errors occurred during disinfecting the feet (37.9%), discarding the scrubs (17.2%), and putting on gloves (13.7%), respectively. During the doffing process, 65 incidences of contamination occurred (2.2 incidents/person). The most vulnerable processes were removing respirators (79.2%), removing the shoe covers (65.5%), and removal of the hood (41.3%). Conclusion A significant number of contaminations occur during the doffing process of personal protective equipment. PMID:27752591

  18. Contamination: a comparison of 2 personal protective systems

    PubMed Central

    Zamora, Jorge E.; Murdoch, John; Simchison, Brian; Day, Andrew G.

    2006-01-01

    Background The purpose of this study was to examine the difference in self-contamination rates and levels of contact and droplet protection associated with enhanced respiratory and contact precautions (E-RCP) and a personal protective system that included a full body suit, personal protective equipment and a powered air-purifying respirator (PAPR). Methods In this prospective, randomized, controlled crossover study, 50 participants donned and removed E-RCP and PAPR in random order. Surrogate contamination consisted of fluorescein solution and ultraviolet (UV) light–detectable paste, which was applied after each ensemble was donned. A blinded evaluator inspected participants for contamination using a UV lamp after removal of each ensemble. Areas of contamination were counted and measured in square centimetres. Donning and removal violations were recorded. The primary end point was the presence of any contamination on the skin or base clothing layer. Results Participants wearing E-RCP were more likely to experience skin and base-clothing contamination; their contamination episodes measuring ≥ 1 cm2 were more frequent, and they had larger total areas of contamination (all p < 0.0001). The anterior neck, forearms, wrists and hands were the likeliest zones for contamination. Participants donning PAPR committed more donning procedure violations (p = 0.0034). Donning and removing the PAPR system took longer than donning and removing E-RCP garments (p < 0.0001). Interpretation Participants wearing E-RCP were more likely to experience contamination of their skin and base clothing layer. Those wearing PAPR required significantly more time to don and remove the ensemble and violated donning procedures more frequently. PMID:16880444

  19. DEVELOPMENT OF PERSONAL PROTECTIVE EQUIPMENT FOR DECONTAMINATION AND DECOMMISSIONING

    SciTech Connect

    M.A. Ebadian, Ph.D.

    1999-01-01

    The purpose of this one-year investigation is to perform a technology integration/search, thereby ensuring that the safest and most cost-effective options are developed and subsequently used during the deactivation and decommissioning (D&D) of U.S. Department of Energy Environmental Management (DOE-EM) sites. Issues of worker health and safety are the main concern, followed by cost. Two lines of action were explored: innovative Personal Cooling Systems (PCS) and Personal Monitoring Equipment (PME). PME refers to sensors affixed to the worker that warn of an approaching heat stress condition, thereby preventing it. Three types of cooling systems were investigated: Pre-Chilled or Forced-Air System (PCFA), Umbilical Fluid-Chilled System (UFCS), and Passive Vest System (PVS). Of these, the UFCS leads the way. The PVS or Gel pack vest lagged due to a limited cooling duration. And the PCFA or chilled liquid air supply was cumbersome and required an expensive and complex recharge system. The UFCS in the form of the Personal Ice Cooling System (PICS) performed exceptionally. The technology uses a chilled liquid circulating undergarment and a Personal Protective Equipment (PPE) external pump and ice reservoir. The system is moderately expensive, but the recharge is low-tech and inexpensive enough to offset the cost. There are commercially available PME that can be augmented to meet the DOE's heat stress alleviation need. The technology is costly, in excess of $4,000 per unit. Workers easily ignore the alarm. The benefit to health & safety is indirect so can be overlooked. A PCS is a more justifiable expenditure.

  20. Permeation Resistance of Personal Protective Equipment Materials to Monomethyhydrazine

    NASA Technical Reports Server (NTRS)

    Waller, J. M.; Williams, J. H.

    1997-01-01

    Permeation resistance was determined by measuring the breakthrough time and time-averaged vapor transmission rate of monomethylhydrazine (MMH) through two types of personal protective equipment (PPE). The two types of PPE evaluated were the totally encapsulating ILC Dover Chemturion Model 1212 chemical protective suit with accessories, and the FabOhio polyvinyl chloride (PVC) splash garment. Two exposure scenarios were simulated: (1) a saturated vapor exposure for 2 hours (h), and (2) a brief MMH 'splash' followed by a 2-h saturated vapor exposure. Time-averaged MMH concentrations inside the totally-encapsulating suit were calculated by summation of the area-weighted contributions made by each suit component. Results show that the totally encapsulating suit provides adequate protection at the new 10 ppb Threshold Limit Value Time-Weighted Average (TLV-TWA). The permeation resistance of the PVC splash garment to MMH was poorer than any of the totally encapsulating suit materials tested. Breakthrough occurred soon after initial vapor or 'splash' exposure.

  1. Influences of Information Availability on Cognitive Processes in Person Perception.

    ERIC Educational Resources Information Center

    Lingle, John H.; Ostrom, Thomas M.

    Three experiments were conducted investigating information processing in a person perception task. A sequential judgement paradigm was employed in which subjects judged the suitability of stimulus persons for two different occupations. Traits describing each person were present for subjects' first judgements but not their second. Second decision…

  2. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... personal notes of individuals used as memory aids. These documents are not Privacy Act records and are not...'s personal convenience and the notes are restricted to that of memory aids; (iii) Not the result of... carelessness, removes the information from the category of memory aids and the personal notes then...

  3. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... personal notes of individuals used as memory aids. These documents are not Privacy Act records and are not...'s personal convenience and the notes are restricted to that of memory aids; (iii) Not the result of... carelessness, removes the information from the category of memory aids and the personal notes then...

  4. Ethical Considerations Regarding Classroom Use of Personal Genomic Information

    PubMed Central

    Parker, Lisa S.; Grubs, Robin

    2014-01-01

    Rapidly decreasing costs of genetic technologies—especially next-generation sequencing—and intensifying need for a clinical workforce trained in genomic medicine have increased interest in having students use personal genomic information to motivate and enhance genomics education. Numerous ethical issues attend classroom/pedagogical use of students’ personal genomic information, including their informed decision to participate, pressures to participate, privacy concerns, and psychosocial sequelae of learning genomic information. This paper addresses these issues, advocates explicit discussion of these issues to cultivate students’ ethical reasoning skills, suggests ways to mitigate potential harms, and recommends collection of ethically relevant data regarding pedagogical use of personal genomic information. PMID:25574277

  5. Farmers' use of personal protective equipment during handling of plant protection products: Determinants of implementation.

    PubMed

    Damalas, Christos A; Abdollahzadeh, Gholamhossein

    2016-11-15

    Understanding factors affecting the use of personal protective equipment (PPE) during handling of plant protection products (PPPs) is of major importance for the design of tailored interventions to minimize exposure among farmers. However, data regarding this issue are highly limited. Factors related to the use of PPE during handling of PPPs were explored in a survey of cotton farmers in northern Greece. Data were collected through face-to-face interviews with the farmers based on a questionnaire with structured items on the frequency of use of various personal protective devices during handling of PPPs. New evidence on patterns of PPE use and potential exposure of farmers to PPPs is provided. Most farmers (49.3%) showed potentially unsafe behaviour with respect to PPE use. Hat and boots were the most commonly used protective items during PPPs use, but most of the farmers surveyed reported low frequency of use for gloves, goggles, face mask, coveralls, and respirator. Especially the respirator was reported to be the least used PPE item amongst farmers. Farmers who perceived PPPs as harmful substances or those who had an episode of intoxication in the past reported more frequent use of several PPE items. Stepwise multiple regression analysis revealed that the variable episode of intoxication in the past exerted the strongest positive influence on PPE use, followed by the perception of PPPs being hazardous substances, upper secondary education, previous training on PPPs (i.e., spraying equipment, application parameters, risks to human health and environment, safety issues) and farm size under cultivation. Old age exerted a significant negative influence on PPE use, namely, elderly farmers tended not to use PPE. Strategies to maximize the protection of applicators of PPPs from hazardous exposures still require innovation to achieve increased effectiveness. Emphasis on lifelong training and education of farmers about hazards and risks of PPPs is crucial for changing

  6. Farmers' use of personal protective equipment during handling of plant protection products: Determinants of implementation.

    PubMed

    Damalas, Christos A; Abdollahzadeh, Gholamhossein

    2016-11-15

    Understanding factors affecting the use of personal protective equipment (PPE) during handling of plant protection products (PPPs) is of major importance for the design of tailored interventions to minimize exposure among farmers. However, data regarding this issue are highly limited. Factors related to the use of PPE during handling of PPPs were explored in a survey of cotton farmers in northern Greece. Data were collected through face-to-face interviews with the farmers based on a questionnaire with structured items on the frequency of use of various personal protective devices during handling of PPPs. New evidence on patterns of PPE use and potential exposure of farmers to PPPs is provided. Most farmers (49.3%) showed potentially unsafe behaviour with respect to PPE use. Hat and boots were the most commonly used protective items during PPPs use, but most of the farmers surveyed reported low frequency of use for gloves, goggles, face mask, coveralls, and respirator. Especially the respirator was reported to be the least used PPE item amongst farmers. Farmers who perceived PPPs as harmful substances or those who had an episode of intoxication in the past reported more frequent use of several PPE items. Stepwise multiple regression analysis revealed that the variable episode of intoxication in the past exerted the strongest positive influence on PPE use, followed by the perception of PPPs being hazardous substances, upper secondary education, previous training on PPPs (i.e., spraying equipment, application parameters, risks to human health and environment, safety issues) and farm size under cultivation. Old age exerted a significant negative influence on PPE use, namely, elderly farmers tended not to use PPE. Strategies to maximize the protection of applicators of PPPs from hazardous exposures still require innovation to achieve increased effectiveness. Emphasis on lifelong training and education of farmers about hazards and risks of PPPs is crucial for changing

  7. 76 FR 50487 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-15

    ... SECURITY Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National... soliciting comments concerning New Information Collection Request, Protected Critical Infrastructure... created by Congress under the Critical Infrastructure Information Act of 2002 (CII Act), Sections...

  8. Continuum Thinking and the Contexts of Personal Information Management

    ERIC Educational Resources Information Center

    Huvila, Isto; Eriksen, Jon; Häusner, Eva-Maria; Jansson, Ina-Maria

    2014-01-01

    Introduction: Recent personal information management literature has underlined the significance of the contextuality of personal information and its use. The present article discusses the applicability of the records continuum model and its generalisation, continuum thinking, as a theoretical framework for explicating the overlap and evolution of…

  9. Are Norms of Disclosure of Online and Offline Personal Information Associated with the Disclosure of Personal Information Online?

    ERIC Educational Resources Information Center

    Mesch, Gustavo S.; Beker, Guy

    2010-01-01

    This study investigated whether norms of self-disclosure of one's online and offline identity are linked to online disclosure of personal and intimate information. We expected online disclosure of personal and intimate information to be associated with norms of online disclosure. Secondary analysis of the 2006 Pew and American Life Survey of…

  10. Psychometric Comparison of Self- and Informant-Reports of Personality.

    PubMed

    Olino, Thomas M; Klein, Daniel N

    2015-12-01

    Self-reports are the most relied on assessment method in psychology. In the area of personality, informant-reports are a reasonable alternative assessment strategy. However, agreement between self- and informant-reports of personality is only moderately good. A portion of the observed discrepancies between self- and informant-reports of personality may come from differences in psychometric measurement across raters. That is, it is unknown whether the constructs assessed via self- and informant-reports are psychometrically identical. We examined four key personality scales--Well-Being, Social Closeness, Stress Reaction, and Harm Avoidance--in male and female dyads who provided self- and informant-reports for their partner. Similarities in self- and informant-reports of personality were evaluated by testing measurement invariance. Overall, models supported configural, metric, and scalar invariance for each of the four personality dimensions. These results suggest that the same psychometric constructs are assessed via self- and informant-reports of these personality dimensions. Informant-reports can be used in studies to avoid biases from relying solely on self-reports.

  11. Managing Personal and Group Collections of Information

    NASA Technical Reports Server (NTRS)

    Wolfe, Shawn R.; Wragg, Stephen D.; Chen, James R.; Koga, Dennis (Technical Monitor)

    1999-01-01

    The internet revolution has dramatically increased the amount of information available to users. Various tools such as search engines have been developed to help users find the information they need from this vast repository. Users often also need tools to help manipulate the growing amount of useful information they have discovered. Current tools available for this purpose are typically local components of web browsers designed to manage URL bookmarks. They provide limited functionalities to handle high information complexities. To tackle this have created DIAMS, an agent-based tool to help users or groups manage their information collections and share their collections with other. the main features of DIAMS are described here.

  12. River Protection Project information systems assessment

    SciTech Connect

    JOHNSON, A.L.

    1999-07-28

    The Information Systems Assessment Report documents the results from assessing the Project Hanford Management Contract (PHMC) Hanford Data Integrator 2000 (HANDI 2000) system, Business Management System (BMS) and Work Management System phases (WMS), with respect to the System Engineering Capability Assessment Model (CAM). The assessment was performed in accordance with the expectations stated in the fiscal year (FY) 1999 Performance Agreement 7.1.1, item (2) which reads, ''Provide an assessment report on the selected Integrated Information System by July 31, 1999.'' This report assesses the BMS and WMS as implemented and planned for the River Protection Project (RPP). The systems implementation is being performed under the PHMC HANDI 2000 information system project. The project began in FY 1998 with the BMS, proceeded in FY 1999 with the Master Equipment List portion of the WMS, and will continue the WMS implementation as funding provides. This report constitutes an interim quality assessment providing information necessary for planning RPP's information systems activities. To avoid confusion, HANDI 2000 will be used when referring to the entire system, encompassing both the BMS and WMS. A graphical depiction of the system is shown in Figure 2-1 of this report.

  13. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of personal information collected from children. 312.8 Section 312.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE §...

  14. 16 CFR 312.7 - Prohibition against conditioning a child's participation on collection of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Prohibition against conditioning a child's participation on collection of personal information. 312.7 Section 312.7 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE §...

  15. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Right of parent to review personal information provided by a child. 312.6 Section 312.6 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.6 Right of parent...

  16. 34 CFR 364.56 - What are the special requirements pertaining to the protection, use, and release of personal...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... administration of an IL program, or for purposes that would significantly improve the quality of life for... protection, use, and release of personal information? 364.56 Section 364.56 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE...

  17. 34 CFR 364.56 - What are the special requirements pertaining to the protection, use, and release of personal...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... administration of an IL program, or for purposes that would significantly improve the quality of life for... protection, use, and release of personal information? 364.56 Section 364.56 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE...

  18. 34 CFR 364.56 - What are the special requirements pertaining to the protection, use, and release of personal...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... administration of an IL program, or for purposes that would significantly improve the quality of life for... protection, use, and release of personal information? 364.56 Section 364.56 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE...

  19. 34 CFR 364.56 - What are the special requirements pertaining to the protection, use, and release of personal...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... administration of an IL program, or for purposes that would significantly improve the quality of life for... protection, use, and release of personal information? 364.56 Section 364.56 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE...

  20. 34 CFR 364.56 - What are the special requirements pertaining to the protection, use, and release of personal...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... administration of an IL program, or for purposes that would significantly improve the quality of life for... protection, use, and release of personal information? 364.56 Section 364.56 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE...

  1. Are Informant Reports of Personality More Internally Consistent Than Self Reports of Personality?

    PubMed

    Balsis, Steve; Cooper, Luke D; Oltmanns, Thomas F

    2015-08-01

    The present study examined whether informant-reported personality was more or less internally consistent than self-reported personality in an epidemiological community sample (n = 1,449). Results indicated that across the 5 NEO (Neuroticism-Extraversion-Openness) personality factors and the 10 personality disorder trait dimensions, informant reports tended to be more internally consistent than self reports, as indicated by equal or higher Cronbach's alpha scores and higher average interitem correlations. In addition, the informant reports collectively outperformed the self reports for predicting responses on a global measure of health, indicating that the informant reports are not only more reliable than self reports, but they can also be useful in predicting an external criterion. Collectively these findings indicate that informant reports tend to have greater internal consistency than self reports.

  2. Trust-based information system architecture for personal wellness.

    PubMed

    Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd

    2014-01-01

    Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed.

  3. An Information Architecture To Support the Visualization of Personal Histories.

    ERIC Educational Resources Information Center

    Plaisant, Catherine; Shneiderman, Ben; Mushlin, Rich

    1998-01-01

    Proposes an information architecture for personal-history data and describes how the data model can be extended to a runtime model for a compact visualization using graphical timelines. The model groups personal-history events into aggregates that are contained in facets, crosslinks are made, and data attributes are mapped. (Author/LRW)

  4. 78 FR 49524 - National Institute for Occupational Safety and Health Personal Protective Technology Program and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-14

    ... ``search.'' Stakeholder Meeting Time and Date: 8:00 a.m. to 12:00 p.m. EDT, September 17, 2013. Place... NIOSH Personal Protective Technology (PPT) Conformity Assessment Working Group 2) provide an overview of... review, the NIOSH Personal Protective Technology Conformity Assessment Working Group was established...

  5. Personal property at the Oak Ridge Operations Office and the Office of Scientific and Technical Information

    SciTech Connect

    1998-04-01

    The Oak Ridge Operations Office (Operations Office) and the Office of Scientific and Technical Information (OSTI) are responsible for safeguarding and controlling personal property in their possession and in the possession of their contractors. Categories of personal property include vehicles, heavy mobile equipment, computers and software, office furniture and equipment, laboratory equipment, security and protection equipment, and shop equipment. The objective of this audit was to determine whether the Operations Office and OSTI adequately safeguarded and properly accounted for personal property in their possession and in the possession of their non-integrated contractors.

  6. Chest Compression With Personal Protective Equipment During Cardiopulmonary Resuscitation

    PubMed Central

    Chen, Jie; Lu, Kai-Zhi; Yi, Bin; Chen, Yan

    2016-01-01

    Abstract Following a chemical, biological, radiation, and nuclear incident, prompt cardiopulmonary resuscitation (CPR) procedure is essential for patients who suffer cardiac arrest. But CPR when wearing personal protection equipment (PPE) before decontamination becomes a challenge for healthcare workers (HCW). Although previous studies have assessed the impact of PPE on airway management, there is little research available regarding the quality of chest compression (CC) when wearing PPE. A present randomized cross-over simulation study was designed to evaluate the effect of PPE on CC performance using mannequins. The study was set in one university medical center in the China. Forty anesthesia residents participated in this randomized cross-over study. Each participant performed 2 min of CC on a manikin with and without PPE, respectively. Participants were randomized into 2 groups that either performed CC with PPE first, followed by a trial without PPE after a 180-min rest, or vice versa. CPR recording technology was used to objectively quantify the quality of CC. Additionally, participants’ physiological parameters and subjective fatigue score values were recorded. With the use of PPE, a significant decrease of the percentage of effective compressions (41.3 ± 17.1% with PPE vs 67.5 ± 15.6% without PPE, P < 0.001) and the percentage of adequate compressions (67.7 ± 18.9% with PPE vs 80.7 ± 15.5% without PPE, P < 0.001) were observed. Furthermore, the increases in heart rate, mean arterial pressure, and subjective fatigue score values were more obvious with the use of PPE (all P < 0.01). We found significant deterioration of CC performance in HCW with the use of a level-C PPE, which may be a disadvantage for enhancing survival of cardiac arrest. PMID:27057878

  7. Critical Connections: Personal Learning Environments and Information Literacy

    ERIC Educational Resources Information Center

    Hicks, Alison; Sinkinson, Caroline

    2015-01-01

    Personal learning environments (PLEs) and critical information literacies (CILs) are two concepts that have been presented as responses to the challenges of the rich and complex information landscape. While both approaches support learners' critical engagement with new information environments, each was developed within a different field. This…

  8. The psychology of personal information management.

    PubMed

    Lansdale, M W

    1988-03-01

    A requirement of 'The Office of the Future' is that it provides us with an effective way of storing and retrieving information. But existing IT products go nowhere near supporting the variety of activities which can be observed in paper-based offices, and it is not surprising that concepts of the 'paperless office' are as far off as they were when the idea was first mooted. This paper illustrates how many of the issues involved in the automation of information management are essentially psychological in nature. These principally devolve upon the processes of recall, recognition and categorisation. Examples of existing information management techniques show how there is a trend to automate with a view to simulating office practices, or to develop according to the availability of technological solutions. Both of these are inefficient with respect to the user's psychological needs. A framework for developing user-oriented information management systems is discussed and relevant research issues presented.

  9. Personal Genomic Information Management and Personalized Medicine: Challenges, Current Solutions, and Roles of HIM Professionals

    PubMed Central

    Alzu'bi, Amal; Zhou, Leming; Watzlaf, Valerie

    2014-01-01

    In recent years, the term personalized medicine has received more and more attention in the field of healthcare. The increasing use of this term is closely related to the astonishing advancement in DNA sequencing technologies and other high-throughput biotechnologies. A large amount of personal genomic data can be generated by these technologies in a short time. Consequently, the needs for managing, analyzing, and interpreting these personal genomic data to facilitate personalized care are escalated. In this article, we discuss the challenges for implementing genomics-based personalized medicine in healthcare, current solutions to these challenges, and the roles of health information management (HIM) professionals in genomics-based personalized medicine. PMID:24808804

  10. Information gating: an evolutionary model of personality function and dysfunction.

    PubMed

    Nash, W P

    1998-01-01

    Utilizing principles of evolutionary biology, a model is developed which defines the essential adaptive functions of personality as a whole, and describes how failure in those functions produces the maladaptations characteristic of personality disorders. In this model, personality is hypothesized to have evolved specifically to make human culture possible by managing the flow of information within the culture, especially by mediating teaching and learning, competition and cooperation, and leading and following. These essential culture-forming capacities of personality have at their root the more basic function of information gating, which is defined here as the continuous regulation by personality of its openness for the bidirectional flow of sensory, cognitive, emotional, and motor information between internal self and external social systems, to best meet the needs of both in various situations. The maladaptations characteristic of personality disorders are postulated to be due to their being chronically and frequently too open or too closed for expressing or assimilating social information, given their circumstances. The relationship of this model to other evolutionary models of personality is discussed, as are its clinical and research implications.

  11. Implementing personalized medicine with asymmetric information on prevalence rates.

    PubMed

    Antoñanzas, Fernando; Juárez-Castelló, Carmelo A; Rodríguez-Ibeas, Roberto

    2016-12-01

    Although personalized medicine is becoming the new paradigm to manage some diseases, the economics of personalized medicine have only focused on assessing the efficiency of specific treatments, lacking a theoretical framework analyzing the interactions between pharmaceutical firms and healthcare systems leading to the implementation of personalized treatments. We model the interaction between the hospitals and the manufacturer of a new treatment as an adverse selection problem where the firm does not have perfect information on the prevalence across hospitals of the genetic characteristics of the patients making them eligible to receive a new treatment. As a result of the model, hospitals with high prevalence rates benefit from the information asymmetry only when the standard treatment is inefficient when applied to the patients eligible to receive the new treatment. Otherwise, information asymmetry has no value. Personalized medicine may be fully or partially implemented depending on the proportion of high prevalence hospitals. PMID:27539222

  12. RFID Based Context Information Security System Architecture for Securing Personal Information under Ubiquitous Environment

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Park, Gil-Cheol; Kim, Seoksoo

    2007-12-01

    In this study, framework for securing personal information among various contexts collected and utilized under ubiquitous environment is proposed. The proposed framework will analyze relativity among information used to determine the exposure of personal information according to circumstances where personal information is used. In addition, the study will define the definition of role-based structure and propose a structure applying password security system according to access level. Furthermore, the study will propose a method for building information security system using RFID tag information which generates context information.

  13. Attitudes regarding privacy of genomic information in personalized cancer therapy

    PubMed Central

    Rogith, Deevakar; Yusuf, Rafeek A; Hovick, Shelley R; Peterson, Susan K; Burton-Chase, Allison M; Li, Yisheng; Meric-Bernstam, Funda; Bernstam, Elmer V

    2014-01-01

    Objective To evaluate attitudes regarding privacy of genomic data in a sample of patients with breast cancer. Methods Female patients with breast cancer (n=100) completed a questionnaire assessing attitudes regarding concerns about privacy of genomic data. Results Most patients (83%) indicated that genomic data should be protected. However, only 13% had significant concerns regarding privacy of such data. Patients expressed more concern about insurance discrimination than employment discrimination (43% vs 28%, p<0.001). They expressed less concern about research institutions protecting the security of their molecular data than government agencies or drug companies (20% vs 38% vs 44%; p<0.001). Most did not express concern regarding the association of their genomic data with their name and personal identity (49% concerned), billing and insurance information (44% concerned), or clinical data (27% concerned). Significantly fewer patients were concerned about the association with clinical data than other data types (p<0.001). In the absence of direct benefit, patients were more willing to consent to sharing of deidentified than identified data with researchers not involved in their care (76% vs 60%; p<0.001). Most (85%) patients were willing to consent to DNA banking. Discussion While patients are opposed to indiscriminate release of genomic data, privacy does not appear to be their primary concern. Furthermore, we did not find any specific predictors of privacy concerns. Conclusions Patients generally expressed low levels of concern regarding privacy of genomic data, and many expressed willingness to consent to sharing their genomic data with researchers. PMID:24737606

  14. Personality and information gathering in free-ranging great tits.

    PubMed

    van Overveld, Thijs; Matthysen, Erik

    2013-01-01

    One aspect of animal personality that has been well described in captivity, but received only little attention in studies in the wild, is that personality types may vary in their behavioural flexibility towards environmental changes. A fundamental factor underlying such differences is believed to be the degree to which individual behavior is guided by environmental stimuli. We tested this hypothesis in the wild using free-ranging great tits. Personality variation was quantified using exploratory behaviour in a novel environment, which has previously been shown to be repeatable and correlated with other behaviours in this and other populations of the same species. By temporarily removing food at feeding stations we examined whether birds with different personality differed in returning to visit empty feeders as this may provide information on how birds continue to sample their environment after a sudden change in conditions. In two summer experiments, we found that fast-exploring juveniles visited empty feeders less often compared to slow-exploring juveniles. In winter, sampling behaviour was sex dependent but not related to personality. In both seasons, we found that birds who sampled empty feeders more often were more likely to rediscover food after we again re-baited the feeding stations, but there was no effect of personality. Our results show that personality types may indeed differ in ways of collecting environmental information, which is consistent with the view of personalities as different styles of coping with environmental changes. The adaptive value of these alternative behavioural tactics, however, needs to be further explored.

  15. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    PubMed

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user.

  16. Attributions, Attention, and Person Memory: Processing Congruent and Incongruent Information.

    ERIC Educational Resources Information Center

    Crocker, Jennifer; Vitkus, John

    Impressions of people are resistant to change. Information contradictory to an initial impression has relatively little impact on the impression and is particularly likely to be recalled. Possible resolutions on this paradox include: (1) the recalled information and the impression of the person are independent of each other; (2) people may link…

  17. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .... (b) Minimum standards. (1) Tailor system safeguards to conform to the type of records in the system, the sensitivity of the personal information stored, the storage medium used and, to a degree, the..., subpart C of 32 CFR part 286 (“DoD Freedom of Information Act Program”) as “For Official Use Only,”...

  18. A Study of Personal Information Management Strategies for Online Faculty

    ERIC Educational Resources Information Center

    Kearns, Lorna R.; Frey, Barbara A.; Tomer, Christinger; Alman, Susan

    2014-01-01

    The literature suggests that personal information management is a serious challenge for many computer users. Online faculty are especially challenged because of the large number of electronic files necessitated by teaching online. Those who have experience in this environment may offer valuable insights regarding information management challenges…

  19. 32 CFR 806b.10 - How to collect personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false How to collect personal information. 806b.10 Section 806b.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... parties when: (a) You must verify information. (b) You want opinions or evaluations. (c) You can't...

  20. Information Centers for Newly Blind Persons in Israel.

    ERIC Educational Resources Information Center

    Dickstein, N.; Gozovsky, M.

    1994-01-01

    This article describes the development and implementation of an innovative program of information centers in Israel that is designed to identify newly blind persons and to give them first-hand information about available services, as well as to stimulate an awareness of rehabilitation services among medical personnel. (Author/DB)

  1. The User-Subjective Approach to Personal Information Management Systems.

    ERIC Educational Resources Information Center

    Bergman, Ofer; Beyth-Marom, Ruth; Nachmias, Rafi

    2003-01-01

    Explains personal information management (PIM) systems and suggests a user-subjective approach to PIM system design. Advocates that PIM systems relate to the subjective value-added attributes that the user gives the stored data so that the user can find information again, recall it when needed, and use it effectively in the next interaction.…

  2. Solving the software protection problem with intrinsic personal physical unclonable functions.

    SciTech Connect

    Nithyanand, Rishab; Sion, Radu

    2011-09-01

    Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure (within reasonable error bounds) but hard to clone. The unclonability property comes from the accepted hardness of replicating the multitude of characteristics introduced during the manufacturing process. This makes PUFs useful for solving problems such as device authentication, software protection, licensing, and certified execution. In this paper, we focus on the effectiveness of PUFs for software protection in offline settings. We first argue that traditional (black-box) PUFs are not useful for protecting software in settings where communication with a vendor's server or third party network device is infeasible or impossible. Instead, we argue that Intrinsic PUFs are needed to solve the above mentioned problems because they are intrinsically involved in processing the information that is to be protected. Finally, we describe how sources of randomness in any computing device can be used for creating intrinsic-personal-PUFs (IP-PUF) and present experimental results in using standard off-the-shelf computers as IP-PUFs.

  3. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... the area, as described in § 51.369(b)(1) of this subpart. Motorists that fail the I/M test shall also... protection. 51.368 Section 51.368 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR.../Maintenance Program Requirements § 51.368 Public information and consumer protection. (a) Public...

  4. 48 CFR 3.104-4 - Disclosure, protection, and marking of contractor bid or proposal information and source...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 3.104-4 Disclosure, protection, and... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Disclosure, protection, and marking of contractor bid or proposal information and source selection information....

  5. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SAFETY TEAMS NATIONAL CONSTRUCTION SAFETY TEAMS Collection and Preservation of Evidence; Information... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  6. An Inter-Personal Information Sharing Model Based on Personalized Recommendations

    NASA Astrophysics Data System (ADS)

    Kamei, Koji; Funakoshi, Kaname; Akahani, Jun-Ichi; Satoh, Tetsuji

    In this paper, we propose an inter-personal information sharing model among individuals based on personalized recommendations. In the proposed model, we define an information resource as shared between people when both of them consider it important --- not merely when they both possess it. In other words, the model defines the importance of information resources based on personalized recommendations from identifiable acquaintances. The proposed method is based on a collaborative filtering system that focuses on evaluations from identifiable acquaintances. It utilizes both user evaluations for documents and their contents. In other words, each user profile is represented as a matrix of credibility to the other users' evaluations on each domain of interests. We extended the content-based collaborative filtering method to distinguish other users to whom the documents should be recommended. We also applied a concept-based vector space model to represent the domain of interests instead of the previous method which represented them by a term-based vector space model. We introduce a personalized concept-base compiled from each user's information repository to improve the information retrieval in the user's environment. Furthermore, the concept-spaces change from user to user since they reflect the personalities of the users. Because of different concept-spaces, the similarity between a document and a user's interest varies for each user. As a result, a user receives recommendations from other users who have different view points, achieving inter-personal information sharing based on personalized recommendations. This paper also describes an experimental simulation of our information sharing model. In our laboratory, five participants accumulated a personal repository of e-mails and web pages from which they built their own concept-base. Then we estimated the user profiles according to personalized concept-bases and sets of documents which others evaluated. We simulated

  7. [Malaria and travelers: protection and information].

    PubMed

    Baudon, D; Martet, G

    1997-01-01

    With the increasing drug resistance of Plasmodium falciparum especially to agents used for chemoprophylaxis, every precaution must be taken to protect travelers from contracting malaria. Prevention of mosquito bites is a fundamental goal that can be achieved by a variety of means including pyrethrinoid-impregnated bed nets, insecticide strips, liquid vaporizers, repellents, insecticide-impregnated garments, and air-conditioning. There are no contraindications for vector control. Chemoprophylaxis depends of individual criteria as determined by clinical and laboratory examinations and on travel conditions (destination, season, duration of stay, and local living conditions). Stand-by medication should be prescribed for self-treatment of fever in areas where medical care is not readily available. Chemoprophylaxis must be continued after the traveler returns and medical attention should be sought if symptoms occur. To ensure proper compliance with preventive measures, pre-travel counseling is a mandatory and integral part of prevention. Information provided to travelers must be clear, reliable, and up-to-date.

  8. Personal Protection Measures Against Mosquitoes, Ticks, and Other Arthropods.

    PubMed

    Alpern, Jonathan D; Dunlop, Stephen J; Dolan, Benjamin J; Stauffer, William M; Boulware, David R

    2016-03-01

    Arthropod-associated diseases are a major cause of morbidity among travelers. Obtaining a detailed travel itinerary and understanding traveler-specific and destination-specific risk factors can help mitigate the risk of vector-borne diseases. DEET, picaridin, PMD, and IR3535 are insect repellents that offer sufficient protection against arthropod bites. IR3535 does not provide adequate protection against Anopheles mosquitoes, and should be avoided in malaria-endemic regions. General protective measures, such as bite avoidance, protective clothing, insecticide-treated bed nets, and insecticide-treated clothing, should be recommended, especially in malaria-endemic areas. Spatial repellents may prevent nuisance biting, but have not been shown to prevent against vector-borne disease.

  9. Personal Protection Measures Against Mosquitoes, Ticks, and Other Arthropods.

    PubMed

    Alpern, Jonathan D; Dunlop, Stephen J; Dolan, Benjamin J; Stauffer, William M; Boulware, David R

    2016-03-01

    Arthropod-associated diseases are a major cause of morbidity among travelers. Obtaining a detailed travel itinerary and understanding traveler-specific and destination-specific risk factors can help mitigate the risk of vector-borne diseases. DEET, picaridin, PMD, and IR3535 are insect repellents that offer sufficient protection against arthropod bites. IR3535 does not provide adequate protection against Anopheles mosquitoes, and should be avoided in malaria-endemic regions. General protective measures, such as bite avoidance, protective clothing, insecticide-treated bed nets, and insecticide-treated clothing, should be recommended, especially in malaria-endemic areas. Spatial repellents may prevent nuisance biting, but have not been shown to prevent against vector-borne disease. PMID:26900115

  10. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... construction for the work to be performed. (d) Payment for protective equipment. (1) Except as provided by... shoes, and normal work boots; or (ii) Ordinary clothing, skin creams, or other items, used solely...

  11. Considerations for selecting personal protective equipment for hazardous materials decontamination.

    PubMed

    Lehmann, Jeff

    2002-09-01

    PPE is necessary to protect staff and to deliver rapid and efficient care to patients contaminated with HAZMAT chemicals. Planning for HAZMAT cases includes learning about the common chemicals in the area, what resources are available to care for victims, identifying a decontamination area, and providing PPE to protect employees and other patients. A customized service can be used to meet OSHA standards and reduce costs. Ongoing training will be an important part of any HAZMAT program.

  12. Considerations for selecting personal protective equipment for hazardous materials decontamination.

    PubMed

    Lehmann, Jeff

    2002-09-01

    PPE is necessary to protect staff and to deliver rapid and efficient care to patients contaminated with HAZMAT chemicals. Planning for HAZMAT cases includes learning about the common chemicals in the area, what resources are available to care for victims, identifying a decontamination area, and providing PPE to protect employees and other patients. A customized service can be used to meet OSHA standards and reduce costs. Ongoing training will be an important part of any HAZMAT program. PMID:12685463

  13. Management Guide to the Protection of Information Resources.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…

  14. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Protection of foreign government information... SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Foreign Government Information § 2400.38 Protection of foreign...

  15. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Protection of foreign government information... SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Foreign Government Information § 2400.38 Protection of foreign...

  16. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED TECHNOLOGY PROGRAM General § 295.9 Protection of confidential information. As required by section...

  17. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED TECHNOLOGY PROGRAM General § 295.9 Protection of confidential information. As required by section...

  18. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED TECHNOLOGY PROGRAM General § 295.9 Protection of confidential information. As required by section...

  19. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED TECHNOLOGY PROGRAM General § 295.9 Protection of confidential information. As required by section...

  20. Cognitive, personality, and social factors associated with adolescents' online personal information disclosure.

    PubMed

    Liu, Cong; Ang, Rebecca P; Lwin, May O

    2013-08-01

    The current study aims to understand the factors that influence adolescents' disclosure of personally identifiable information (PII) on social networking sites (SNSs). A survey was conducted among 780 adolescent participants (between 13 and 18) who were Facebook users. Structural equation modeling was used for analyzing the data and obtaining an overarching model that include cognitive, personality, and social factors that influence adolescents' PII disclosure. Results showed privacy concern as the cognitive factor reduces adolescents' PII disclosure and it serves as a potential mediator for personality and social factors. Amongst personality factors, narcissism was found to directly increase PII disclosure, and social anxiety indirectly decreases PII disclosure by increasing privacy concern. Amongst social factors, active parental mediation decreases PII disclosure directly and indirectly by increasing privacy concern. Restrictive parental mediation decreases PII disclosure only indirectly by increasing privacy concern. Implications of the findings to parents, educators, and policy makers were discussed. PMID:23849657

  1. Managing personal health information in distributed research network environments

    PubMed Central

    2013-01-01

    Background Studying rare outcomes, new interventions and diverse populations often requires collaborations across multiple health research partners. However, transferring healthcare research data from one institution to another can increase the risk of data privacy and security breaches. Methods A working group of multi-site research programmers evaluated the need for tools to support data security and data privacy. The group determined that data privacy support tools should: 1) allow for a range of allowable Protected Health Information (PHI); 2) clearly identify what type of data should be protected under the Health Insurance Portability and Accountability Act (HIPAA); and 3) help analysts identify which protected health information data elements are allowable in a given project and how they should be protected during data transfer. Based on these requirements we developed two performance support tools to support data programmers and site analysts in exchanging research data. Results The first tool, a workplan template, guides the lead programmer through effectively communicating the details of multi-site programming, including how to run the program, what output the program will create, and whether the output is expected to contain protected health information. The second performance support tool is a checklist that site analysts can use to ensure that multi-site program output conforms to expectations and does not contain protected health information beyond what is allowed under the multi-site research agreements. Conclusions Together the two tools create a formal multi-site programming workflow designed to reduce the chance of accidental PHI disclosure. PMID:24099117

  2. Wave-front analysis of personal eye protection.

    PubMed

    Eppig, Timo; Zoric, Katja; Speck, Alexis; Zelzer, Benedikt; Götzelmann, Jens; Nagengast, Dieter; Langenbucher, Achim

    2012-07-30

    Shack-Hartmann wave-front sensing has been successfully applied to many fields of optical testing including the human eye itself. We propose wave-front measurement for testing protective eye wear for production control and investigation of aberrations. Refractive power data is derived from the wave-front data and compared to a subjective measurement technique based on a focimeter. Additional image quality classification was performed with a multivariate model using objective parameters to resample a subjectively determined visual quality. Wave-front measurement advances optical testing of protective eye wear and may be used for objective quality control.

  3. Personality and information gathering in free-ranging great tits.

    PubMed

    van Overveld, Thijs; Matthysen, Erik

    2013-01-01

    One aspect of animal personality that has been well described in captivity, but received only little attention in studies in the wild, is that personality types may vary in their behavioural flexibility towards environmental changes. A fundamental factor underlying such differences is believed to be the degree to which individual behavior is guided by environmental stimuli. We tested this hypothesis in the wild using free-ranging great tits. Personality variation was quantified using exploratory behaviour in a novel environment, which has previously been shown to be repeatable and correlated with other behaviours in this and other populations of the same species. By temporarily removing food at feeding stations we examined whether birds with different personality differed in returning to visit empty feeders as this may provide information on how birds continue to sample their environment after a sudden change in conditions. In two summer experiments, we found that fast-exploring juveniles visited empty feeders less often compared to slow-exploring juveniles. In winter, sampling behaviour was sex dependent but not related to personality. In both seasons, we found that birds who sampled empty feeders more often were more likely to rediscover food after we again re-baited the feeding stations, but there was no effect of personality. Our results show that personality types may indeed differ in ways of collecting environmental information, which is consistent with the view of personalities as different styles of coping with environmental changes. The adaptive value of these alternative behavioural tactics, however, needs to be further explored. PMID:23383299

  4. ["Medical research confidentiality" could promote research and protect personal rights--conquering data protection related research deficits in Germany].

    PubMed

    Bochnik, H J

    1995-10-01

    The workgroup of the German Medical Societies (AWMF) has asked for the introduction of a law ruling "Medical Research Secrets". The aim is to reduce the obstacles put on important medical research, especially in epidemiology, mainly caused by the legal protection of privacy of personal data. This aim could be reached by a legal protection of medical research data in adjunction to the legal status of the professional secrecy at present effective for physicians. The realization of the legal protection of specific research projects could be approved by local ethic-committees, they would bind the individual researchers to a closely protected secrecy and so enable the transfer of personal data from different sources without the obstacles of the present legal protection of privacy data and the legal professional secrecy effective for physicians. This is of importance for the combination of research support for the gain of future patients and protection of personal privacy for patients of today and would mean a correction of an erroneous German development of a legally perfectionized mistrust of physicians involved in research. It will be shown, that cancer registers are necessary, but that present laws ruling cancer registers are hostile to research and will depreciate the research location Germany.

  5. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... steel-toe shoes or steel-toe boots) and non-specialty prescription safety eyewear, provided that the... and allows the employee, at his or her request, to use shoes or boots with built-in metatarsal protection, the employer is not required to reimburse the employee for the shoes or boots. (4) The...

  6. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... steel-toe shoes or steel-toe boots) and non-specialty prescription safety eyewear, provided that the... and allows the employee, at his or her request, to use shoes or boots with built-in metatarsal protection, the employer is not required to reimburse the employee for the shoes or boots. (4) The...

  7. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...: (body protection statement); (glove statement, if applicable); (footwear statement, if applicable... shall be based on the more toxic (lower numbered) category. 2 For labeling language for chemical-resistant gloves, see paragraph (f) of this section. 3 For labeling language for respiratory...

  8. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...: (body protection statement); (glove statement, if applicable); (footwear statement, if applicable... shall be based on the more toxic (lower numbered) category. 2 For labeling language for chemical-resistant gloves, see paragraph (f) of this section. 3 For labeling language for respiratory...

  9. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...: (body protection statement); (glove statement, if applicable); (footwear statement, if applicable... shall be based on the more toxic (lower numbered) category. 2 For labeling language for chemical-resistant gloves, see paragraph (f) of this section. 3 For labeling language for respiratory...

  10. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... and they shall not be worn for any other use. (4) Closed systems. If handling tasks are performed using properly functioning systems that enclose the pesticide to prevent it from contacting handlers...

  11. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... and they shall not be worn for any other use. (4) Closed systems. If handling tasks are performed using properly functioning systems that enclose the pesticide to prevent it from contacting handlers...

  12. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... and they shall not be worn for any other use. (4) Closed systems. If handling tasks are performed using properly functioning systems that enclose the pesticide to prevent it from contacting handlers...

  13. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... and they shall not be worn for any other use. (4) Closed systems. If handling tasks are performed using properly functioning systems that enclose the pesticide to prevent it from contacting handlers...

  14. Review of chamber design requirements for testing of personal protective clothing ensembles.

    PubMed

    Gao, Pengfei; King, William P; Shaffer, Ronald

    2007-08-01

    This review focuses on the physical requirements for conducting ensemble testing and describes the salient issues that organizations involved in the design, test, or certification of personal protective equipment (PPE) and protective clothing ensembles need to consider for strategic planning. Several current and proposed PPE ensemble test practices and standards were identified. The man-in-simulant test (MIST) is the primary procedure used by the military to evaluate clothing ensembles for protection against chemical and biological warfare agents. MIST has been incorporated into the current editions of protective clothing and equipment standards promulgated by the National Fire Protection Association (NFPA). ASTM has recently developed a new test method (ASTM F 2588-06) for MIST evaluation of protective ensembles. Other relevant test methods include those described in International Organization for Standardization (ISO) standards. The primary differences among the test methods were the choice of test challenge material (e.g., sulfur hexafluoride, methyl salicylate, sodium chloride particles, corn oil, fluorophore-impregnated silica) and the exercise protocol for the subject(s). Although ensemble test methods and standards provide detailed descriptions of the test procedures, none give specific requirements for chamber design. A literature survey identified 28 whole-body exposure chambers that have been or could potentially be used for testing protective clothing ensembles using human test subjects. Median chamber size, median floor space, and median volume per subject were calculated from 15 chambers (involving human test subjects), where size information is available. Based on the literature survey of existing chambers and the review of the current and proposed standards and test methods, chamber design requirements will be dictated by the test methods selected. Due to widely different test conditions for aerosol/particulate and vapor ensemble testing, it is

  15. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (32 CFR part 286). If the system of records is exempt from the access provisions of this part, and if... for use by individuals who seek access to records about themselves that are maintained in a system of... personal information contained in the system of records except where access may be denied pursuant to...

  16. Exploring Healthcare Consumer Acceptance of Personal Health Information Management Technology through Personal Health Record Systems

    ERIC Educational Resources Information Center

    Wu, Huijuan

    2013-01-01

    Healthcare technologies are evolving from a practitioner-centric model to a patient-centric model due to the increasing need for technology that directly serves healthcare consumers, including healthy people and patients. Personal health information management (PHIM) technology is one of the technologies designed to enhance an individual's ability…

  17. Informed consent in direct-to-consumer personal genome testing: the outline of a model between specific and generic consent.

    PubMed

    Bunnik, Eline M; Janssens, A Cecile J W; Schermer, Maartje H N

    2014-09-01

    Broad genome-wide testing is increasingly finding its way to the public through the online direct-to-consumer marketing of so-called personal genome tests. Personal genome tests estimate genetic susceptibilities to multiple diseases and other phenotypic traits simultaneously. Providers commonly make use of Terms of Service agreements rather than informed consent procedures. However, to protect consumers from the potential physical, psychological and social harms associated with personal genome testing and to promote autonomous decision-making with regard to the testing offer, we argue that current practices of information provision are insufficient and that there is a place--and a need--for informed consent in personal genome testing, also when it is offered commercially. The increasing quantity, complexity and diversity of most testing offers, however, pose challenges for information provision and informed consent. Both specific and generic models for informed consent fail to meet its moral aims when applied to personal genome testing. Consumers should be enabled to know the limitations, risks and implications of personal genome testing and should be given control over the genetic information they do or do not wish to obtain. We present the outline of a new model for informed consent which can meet both the norm of providing sufficient information and the norm of providing understandable information. The model can be used for personal genome testing, but will also be applicable to other, future forms of broad genetic testing or screening in commercial and clinical settings.

  18. Shared Expectations for Protection of Identifiable Health Care Information

    PubMed Central

    Wynia, Matthew K; Coughlin, Steven S; Alpert, Sheri; Cummins, Deborah S; Emanuel, Linda L

    2001-01-01

    ongoing data quality, limitations on how identifiable information may be used, and provisions for meaningful accountability. CONCLUSIONS This process established consensus on 34 measurable ethical expectations for the protection of privacy and confidentiality in health care. These expectations should apply to any organization with access to personally identifiable health information, including managed care organizations, physician groups, hospitals, other provider organizations, and purchasers. Performance measurement on these expectations may improve accountability across the health care system. PMID:11251761

  19. Insect repellents and associated personal protection for a reduction in human disease.

    PubMed

    Debboun, M; Strickman, D

    2013-03-01

    Personal protection measures against biting arthropods include topical insect repellents, area repellents, insecticide-treated bednets and treated clothing. The literature on the effectiveness of personal protection products against arthropods is mainly limited to studies of prevention of bites, rather than prevention of disease. Tungiasis was successfully controlled by application of topical repellents and scrub typhus was reduced through the use of treated clothing. Successful reduction of leishmaniasis was achieved through the use of topical repellents, treated bednets and treated clothing in individual studies. Malaria has been reduced by the use of insecticide-treated bednets (ITN), certain campaigns involving topical repellents, and the combination of treated bednets and topical repellents. Although area repellents such as mosquito coils are used extensively, their ability to protect humans from vector-transmitted pathogens has not been proven. Taken together, the literature indicates that personal protection measures must be used correctly to be effective. A study that showed successful control of malaria by combining treated bednets and topical repellents suggests that combinations of personal protection measures are likely to be more effective than single methods. Implementation of successful programmes based on personal protection will require a level of cooperation commonly associated with other basic societal functions, such as education and food safety. PMID:22624654

  20. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Amendment of protected health information. 164.526 Section 164.526 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.526 Amendment of protected...

  1. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Environmental protection information. 673.4 Section 673.4 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a)...

  2. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Environmental protection information. 673.4 Section 673.4 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a)...

  3. 12 CFR 568.5 - Protection of customer information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Protection of customer information. 568.5 Section 568.5 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.5 Protection of customer information. Savings associations and their subsidiaries...

  4. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Protection of voluntarily submitted information. 270.351 Section 270.351 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team,...

  5. [Use of personal protective equipment for motorcycle taxi drivers: perception of risks and associated factors].

    PubMed

    Teixeira, Jules Ramon Brito; Santos, Ninalva de Andrade; Sales, Zenilda Nogueira; Moreira, Ramon Missias; Boery, Rita Narriman Silva de Oliveira; Boery, Eduardo Nagib; Santos, Ramon Araújo dos; Mota, Tilson Nunes

    2014-04-01

    This study aimed to examine the practices and perceptions of motorcycle taxi drivers concerning the use of personal protective equipment (PPE), based on field research and an exploratory and descriptive qualitative approach. Thirty motorcycle taxi drivers from Jequié, Bahia State, Brazil, were interviewed. Data collection used a semi-structured interview and questionnaire. Data were analyzed using thematic content analysis. The results showed: Category 1 - risk perception, subcategory conditioning/determinant factors for the use of PPE; Category 2 - adherence, subcategory adherence to the use of personal protective equipment; Category 3 - PPE as a protective factor against traffic accidents, subcategories 1 - work-related accidents, 2 - use of PPE at the time of the accident, 3 - non-use of PPE at the time of the accident. Finally, motorcycle taxi drivers clearly have some knowledge of personal protective equipment and even acknowledge the importance of its use, despite not always using it properly. PMID:24896065

  6. PCASSO: a design for secure communication of personal health information via the internet.

    PubMed

    Baker, D B; Masys, D R

    1999-05-01

    The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet. PMID:10219949

  7. PCASSO: a design for secure communication of personal health information via the internet.

    PubMed

    Baker, D B; Masys, D R

    1999-05-01

    The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.

  8. Public versus personal information for mate copying in an invertebrate.

    PubMed

    Mery, Frédéric; Varela, Susana A M; Danchin, Etienne; Blanchet, Simon; Parejo, Deseada; Coolen, Isabelle; Wagner, Richard H

    2009-05-12

    Organisms require information to make decisions about fitness-affecting resources, such as mates. Animals may extract "personal information" about potential mates by observing their physical characteristics or extract additional "public information" by observing their mating performance [1]. Mate copying by females [2-6] is a form of public information use that may reduce uncertainty about male quality, allowing more adaptive choices [2]. Experimental studies have produced evidence that female mate copying occurs in several species of fish [3], birds [5-7], and mammals [8], including humans [9]. We report the first evidence that a female invertebrate can exploit public information to select mates. In a first experiment, Drosophila melanogaster female prospectors increased their time in the attraction zones of poor-condition males, but not of good-condition males, after having observed them with a model female. This suggests that females appraised prospective mates by exploiting public information and did so mainly when it contrasted with personal information. In a second experiment, prospector females preferably mated with males of the color type they had previously observed copulating over males of the rejected color type, suggesting that female Drosophila can generalize socially learned information. The complexity of Drosophila decision-making suggests an unprecedented level of cognition in invertebrates. Our findings have implications for evolution given that socially learned mate preferences may lead to reproductive isolation, setting the stage for speciation [10]. PMID:19361993

  9. Sharing sensitive personal health information through Facebook: the unintended consequences.

    PubMed

    Househ, Mowafa

    2011-01-01

    The purpose of this paper was to explore the types of sensitive health information posted by individuals through social network media sites such as Facebook. The researcher found several instances in which individuals, who could be identified by their user profiles, posted personal and sensitive health information related to mental and genetic disorders and sexually transmitted diseases. The data suggest that Facebook users should be made aware of the potential harm that may occur when sharing sensitive health information publicly through Facebook. Ethical considerations in undertaking such research are also examined. PMID:21893822

  10. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Rights to request privacy protection for protected health information. 164.522 Section 164.522 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522...

  11. Fluorescence-based optical chemical sensors for personal protection

    NASA Astrophysics Data System (ADS)

    Korent Urek, Špela; Lobnik, Aleksandra; Turel, Matejka

    2010-04-01

    The World Health Organization has reported that each year approximately 3 million people are poised by organophosphate substances (pesticides and nerve agents) resulting in 220,000 deaths. Organophosphates (OP) are toxic compounds which cause rapid and severe inhibition of serine proteases, most markedly acetylcholinesterase, which is vital to nerve function. This inhibition is often fatal. OP nerve agents are generally stable, easy to disperse, and highly toxic. They can be absorbed through the skin, by ingestion, or by respiration. A release of a nerve agent has the potential to rapidly affect a large number of people. The ease of manufacturing and dispensability of nerve agents, as well as available, inexpensive starting materials make these agents a weapon of choice for criminal terrorist attacks. One of the major steps toward protection against dangerous substances is to develop sensor devices that can act as an early warning system to the endangered people.

  12. 77 FR 25499 - Notice of Proposed Information Collection: Comment Request; Personal Financial and Credit Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... URBAN DEVELOPMENT Notice of Proposed Information Collection: Comment Request; Personal Financial and... also lists the following information: Title of Proposal: Personal Financial and Credit Statement. OMB... proposed information collection requirement described below will be submitted to the Office of...

  13. Personal Protective Equipment for Filovirus Epidemics: A Call for Better Evidence

    PubMed Central

    Sprecher, Armand G.; Caluwaerts, An; Draper, Mike; Feldmann, Heinz; Frey, Clifford P.; Funk, Renée H.; Kobinger, Gary; Le Duc, James W.; Spiropoulou, Christina; Williams, Warren Jon

    2015-01-01

    Personal protective equipment (PPE) is an important part of worker protection during filovirus outbreaks. The need to protect against a highly virulent fluid-borne pathogen in the tropical environment imposes a heat stress on the wearer that is itself a safety risk. No evidence supports the choice of PPE employed in recent outbreaks, and standard testing procedures employed by the protective garment industry do not well simulate filovirus exposure. Further research is needed to determine the appropriate PPE for filoviruses and the heat stress that it imposes. PMID:25821225

  14. Personal Protective Equipment for Filovirus Epidemics: A Call for Better Evidence.

    PubMed

    Sprecher, Armand G; Caluwaerts, An; Draper, Mike; Feldmann, Heinz; Frey, Clifford P; Funk, Renée H; Kobinger, Gary; Le Duc, James W; Spiropoulou, Christina; Williams, Warren Jon

    2015-10-01

    Personal protective equipment (PPE) is an important part of worker protection during filovirus outbreaks. The need to protect against a highly virulent fluid-borne pathogen in the tropical environment imposes a heat stress on the wearer that is itself a safety risk. No evidence supports the choice of PPE employed in recent outbreaks, and standard testing procedures employed by the protective garment industry do not well simulate filovirus exposure. Further research is needed to determine the appropriate PPE for filoviruses and the heat stress that it imposes.

  15. Using personal digital assistants to access drug information.

    PubMed

    McCreadie, Scott R; Stevenson, James G; Sweet, Burgunda V; Kramer, Mike

    2002-07-15

    The use of personal digital assistants (PDAs) to access drug information in a health system is described. Given the widespread use of PDAs at an 872-bed university health system, an opportunity existed to provide current drug information to physicians via these devices. As part of the health system's intranet, extensive online content had been made available through a browser; extension to PDAs was a natural next step. There were two primary requirements: the ability to synchronize information with the database server when a PDA was used and the development of content and applications by using existing staff. Mobile enterprise software was chosen that supports multiple PDA platforms, is easy to use, and does not require programming skills. The software works through customized "channels," or collections of information from a content provider. The customized channel service works over the Internet. Two channels of content were created, an ambulatory care channel and an inpatient care channel. The ambulatory care channel contains a list of preferred ambulatory care agents, poison control information, the locations of outpatient pharmacies, drug information, and safety tips for prescribing. The inpatient channel contains the inpatient formulary, current news and events, information on currrent drug shortages and recalls, pharmacy contact information, and medication safety tips. When a user synchronizes his or her PDA, the software contacts the department's intranet servers and processes the request. The data are compressed and downloaded to the user's PDA. A university health system successfully used PDAs to access drug and other information. PMID:12132560

  16. What Your Can Do to Protect Your Health Information

    MedlinePlus

    ... don't want made public. Your doctor uses tools to protect and secure your health information at his or her office. You can do the same at home. If you have health information stored on your home computer or mobile device — ... email — simple tools like passwords can help keep your health information ...

  17. Colloquium: Protecting quantum information against environmental noise

    NASA Astrophysics Data System (ADS)

    Suter, Dieter; Álvarez, Gonzalo A.

    2016-10-01

    Quantum technologies represent a rapidly evolving field in which the specific properties of quantum mechanical systems are exploited to enhance the performance of various applications such as sensing, transmission, and processing of information. Such devices can be useful only if the quantum systems also interact with their environment. However, the interactions with the environment can degrade the specific quantum properties of these systems, such as coherence and entanglement. It is therefore essential that the interaction between a quantum system and the environment is controlled in such a way that the unwanted effects of the environment are suppressed while the necessary interactions are retained. This Colloquium gives an overview, aimed at newcomers to this field, of some of the challenges that need to be overcome to achieve this goal. A number of techniques have been developed for this purpose in different areas of physics including magnetic resonance, optics, and quantum information. They include the application of static or time-dependent fields to the quantum system, which are designed to average the effect of the environmental interactions to zero. Quantum error correction schemes were developed to detect and eliminate certain errors that occur during the storage and processing of quantum information. In many physical systems, it is useful to use specific quantum states that are intrinsically less susceptible to environmental noise for encoding the quantum information. The dominant contribution to the loss of information is pure dephasing, i.e., through the loss of coherence in quantum mechanical superposition states. Accordingly, most schemes for reducing loss of information focus on dephasing processes. This is also the focus of this Colloquium.

  18. Evaluation of the effectiveness of personal protective equipment against occupational exposure to N,N-dimethylformamide.

    PubMed

    Wang, S-M; Shih, T-S; Huang, Y-S; Chueh, M-R; Chou, J-S; Chang, H-Y

    2006-12-01

    The objectives of this study were to evaluate the protective effectiveness of various personal protective equipment and the respective exposure contributions from respiratory and skin exposures of N,N-dimethylformamide (DMF) with a self-comparison study design. Two high-, four intermediate- and four low-DMF exposure workers from a synthetic leather factory were monitored in airborne DMF concentrations and N-methylformamide (NMF) concentrations in urine across four consecutive days. The workers were designated to wear no personal protective equipment on the first day. The barrier cream, rubber gloves and rubber gloves plus respirator were used on the second, third and fourth days, respectively. Person-to-personal observation was performed in the field to record all high and low exposure tasks during work for each subject. Protective effectiveness index (PEI) was used to evaluate different glove effectiveness. We concluded that the direct skin contact to the strong skin penetrates like DMF could be a more significant exposure source than the respiratory exposure in the actual occupational environment. The provision of protective equipment from skin exposure could be more important than that from respiratory exposure. The application of barrier cream could be as effective as wearing impermeable rubber gloves in the prevention from the skin penetrate in the occupational settings. PMID:16846682

  19. Informed consent for research participation in frail older persons.

    PubMed

    Barron, Jeremy S; Duffey, Patricia L; Byrd, Linda Jo; Campbell, Robin; Ferrucci, Luigi

    2004-02-01

    Informed consent has been the most scrutinized and controversial aspect of clinical research ethics. Institutional review boards (IRBs), government regulatory agencies, and the threat of litigation have all contributed to increasingly detailed consent documents that hope to ensure that subjects are not misled or coerced. Unfortunately, the growing regulatory burden on researchers has not succeeded in protecting subjects, but has rather made the consent process less effective and has discouraged research on vulnerable populations. As a matter of fact, investigators and ethicists continue to identify failures of the consenting process, particularly concerning participation in research of older individuals. The challenges involved in ensuring appropriate consent from the elderly include physical frailty, reduced autonomy and privacy, and impaired decision-making capacity due to dementia, delirium, or other neuropsychiatric illnesses. Ageism among investigators also contributes to failure of informed consent. The evaluation and continuing re-evaluation of an individual's decision-making capacity is critical but difficult. In the most extreme cases, the older adult's ability to participate in the consent process is clearly impaired. However, in many instances, the decision-making capacity is only partially impaired but declines during the course of a research project. Implementing methods of effective communication may enable many frail elderly individuals to make informed decisions. Special challenges are posed by research on end-of-life care, which typically involves frail, older subjects who are uniquely vulnerable, and research is conducted in institutional settings where subtle violations of autonomy are routine. Clearly, the frail elderly represent a vulnerable population that deserves special attention when developing and evaluating an informed consent process. Two important ethical conflicts should be kept in mind. First, although vulnerable older patients must

  20. Informed consent for research participation in frail older persons.

    PubMed

    Barron, Jeremy S; Duffey, Patricia L; Byrd, Linda Jo; Campbell, Robin; Ferrucci, Luigi

    2004-02-01

    Informed consent has been the most scrutinized and controversial aspect of clinical research ethics. Institutional review boards (IRBs), government regulatory agencies, and the threat of litigation have all contributed to increasingly detailed consent documents that hope to ensure that subjects are not misled or coerced. Unfortunately, the growing regulatory burden on researchers has not succeeded in protecting subjects, but has rather made the consent process less effective and has discouraged research on vulnerable populations. As a matter of fact, investigators and ethicists continue to identify failures of the consenting process, particularly concerning participation in research of older individuals. The challenges involved in ensuring appropriate consent from the elderly include physical frailty, reduced autonomy and privacy, and impaired decision-making capacity due to dementia, delirium, or other neuropsychiatric illnesses. Ageism among investigators also contributes to failure of informed consent. The evaluation and continuing re-evaluation of an individual's decision-making capacity is critical but difficult. In the most extreme cases, the older adult's ability to participate in the consent process is clearly impaired. However, in many instances, the decision-making capacity is only partially impaired but declines during the course of a research project. Implementing methods of effective communication may enable many frail elderly individuals to make informed decisions. Special challenges are posed by research on end-of-life care, which typically involves frail, older subjects who are uniquely vulnerable, and research is conducted in institutional settings where subtle violations of autonomy are routine. Clearly, the frail elderly represent a vulnerable population that deserves special attention when developing and evaluating an informed consent process. Two important ethical conflicts should be kept in mind. First, although vulnerable older patients must

  1. 75 FR 61412 - Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property (FFP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-05

    ... Forest Service Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property... Personal Property (FEPP) and Firefighter Property (FFP) program Cooperative Agreements. DATES: Comments... Personal Property (FEPP) and Firefighter Property (FFP) Cooperative Agreements. OMB Number: 0596-NEW....

  2. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to ensure it is adequately safeguarded. Some information may be so sensitive and personal that e-mail may not be the proper way to transmit it. When sending personal information over e-mail within DoD,...

  3. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... sensitive units. (i) Office and unit address and duty phone for overseas or for routinely deployable or... employment). (d) School and year of graduation. (e) Home of record. (f) Home address and phone. (g) Age...

  4. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... sensitive units. (i) Office and unit address and duty phone for overseas or for routinely deployable or... employment). (d) School and year of graduation. (e) Home of record. (f) Home address and phone. (g) Age...

  5. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... employment). (d) School and year of graduation. (e) Home of record. (f) Home address and phone. (g) Age and... sensitive units. (i) Office and unit address and duty phone for overseas or for routinely deployable...

  6. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... employment). (d) School and year of graduation. (e) Home of record. (f) Home address and phone. (g) Age and... sensitive units. (i) Office and unit address and duty phone for overseas or for routinely deployable...

  7. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... employment). (d) School and year of graduation. (e) Home of record. (f) Home address and phone. (g) Age and... sensitive units. (i) Office and unit address and duty phone for overseas or for routinely deployable...

  8. 48 CFR 1403.104-4 - Disclosure, protection, and marking of contractor bid or proposal information and source...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Disclosure, protection, and marking of contractor bid or proposal information and source selection information. 1403.104-4 Section 1403.104-4 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS...

  9. 78 FR 48683 - National Institute for Occupational Safety and Health (NIOSH) Personal Protective Technology (PPT...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-09

    ... HUMAN SERVICES Centers for Disease Control and Prevention National Institute for Occupational Safety and... Occupational Safety and Health (NIOSH) of the Centers for Disease Control and Prevention (CDC) announces the... Personal Protective Equipment Action Plan AGENCY: The National Institute for Occupational Safety and...

  10. Risk and Protective Factors Associated with Personal Mastery Among Sexual Minority African American Female Sex Workers

    PubMed Central

    Buttram, Mance E.; Surratt, Hilary L.; Kurtz, Steven P.

    2014-01-01

    Research among sexual minorities has traditionally examined problems such as substance use, HIV risk, mental health problems, and victimization. Among sexual minority street-based female sex workers, these vulnerabilities can be magnified. Grounded in theories of resilience, this study examines risk and protective factors associated with a high level of personal mastery among a vulnerable population of women. Data are drawn from baseline interviews from street-based African American female sex workers enrolled in a randomized intervention trial in Miami, Florida. We compare sexual minority (N=197) and heterosexual (N=365) women on measures of risk and protective factors; among sexual minority women we present logistic regression analyses which reveal that severe mental distress and HIV transmission risk are associated with low levels of personal mastery, while protective factors of transportation access and social support are associated with high levels of personal mastery. These findings suggest that these protective factors may potentially facilitate the development of personal mastery and represent beneficial avenues for intervention efforts. PMID:25530691

  11. 29 CFR 1977.5 - Persons protected by section 11(c).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 9 2014-07-01 2014-07-01 false Persons protected by section 11(c). 1977.5 Section 1977.5 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) DISCRIMINATION AGAINST EMPLOYEES EXERCISING RIGHTS UNDER THE...

  12. 29 CFR 1977.5 - Persons protected by section 11(c).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 9 2012-07-01 2012-07-01 false Persons protected by section 11(c). 1977.5 Section 1977.5 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) DISCRIMINATION AGAINST EMPLOYEES EXERCISING RIGHTS UNDER THE...

  13. 29 CFR 1977.5 - Persons protected by section 11(c).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 9 2011-07-01 2011-07-01 false Persons protected by section 11(c). 1977.5 Section 1977.5 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) DISCRIMINATION AGAINST EMPLOYEES EXERCISING RIGHTS UNDER THE...

  14. 29 CFR 1977.5 - Persons protected by section 11(c).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Persons protected by section 11(c). 1977.5 Section 1977.5 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) DISCRIMINATION AGAINST EMPLOYEES EXERCISING RIGHTS UNDER THE...

  15. Audit Report on "Protection of the Department of Energy's Unclassified Sensitive Electronic Information"

    SciTech Connect

    2009-08-01

    The Department of Energy and its contractors store and process massive quantities of sensitive information to accomplish national security, energy, science, and environmental missions. Sensitive unclassified data, such as personally identifiable information (PII), official use only, and unclassified controlled nuclear information require special handling and protection to prevent misuse of the information for inappropriate purposes. Industry experts have reported that more than 203 million personal privacy records have been lost or stolen over the past three years, including information maintained by corporations, educational institutions, and Federal agencies. The loss of personal and other sensitive information can result in substantial financial harm, embarrassment, and inconvenience to individuals and organizations. Therefore, strong protective measures, including data encryption, help protect against the unauthorized disclosure of sensitive information. Prior reports involving the loss of sensitive information have highlighted weaknesses in the Department's ability to protect sensitive data. Our report on Security Over Personally Identifiable Information (DOE/IG-0771, July 2007) disclosed that the Department had not fully implemented all measures recommended by the Office of Management and Budget (OMB) and required by the National Institute of Standards and Technology (NIST) to protect PII, including failures to identify and encrypt PII maintained on information systems. Similarly, the Government Accountability Office recently reported that the Department had not yet installed encryption technology to protect sensitive data on the vast majority of laptop computers and handheld devices. Because of the potential for harm, we initiated this audit to determine whether the Department and its contractors adequately safeguarded sensitive electronic information. The Department had taken a number of steps to improve protection of PII. Our review, however, identified

  16. Government registries containing sensitive health data and the implementation of EU directive on the protection of personal data in Finland.

    PubMed

    Lehtonen, Lasse A

    2002-01-01

    Legislation on the protection of personal data was first enacted in Finland in 1987 (Act 471/1987) and revised in 1999 (Act 523/1999). The Personal Registries Act of 1987 established a special authority, the "data protection ombudsman" to ensure that a citizen's right to privacy would be maintained despite increased usage of computerised registries containing sensitive data. Health care and medical research, however, have been largely outside the scope of effective scrutiny due to special legislation that gives health care authorities the right to gather and register information on the medical history of an individual citizen. In Finland, the National Research and Development Centre for Welfare and Health (STAKES)--which works in close co-operation with the Ministry of Social Affairs and Health--maintains or supervises several centralised registries containing sensitive data. These registries which are based on an exemption (Act 556/1989) from the general data protection legislation, contain in practice a complete database on all Finnish citizens that have used public health care services. Furthrmore, additional personal information is added into these databases. For example, the central registry on abortions contains not only the identification data of a subject who has had an abortion but also information on the reason for abortion and on the methods of contraception she used. It is noteworthy that these registers are not accessible to the physicians who treat the patient whose data is registered, but are used by the governmental authorities only. At the moment it is unclear whether the recent implementation of an EU directive into the Finnish legislation and the constitutional right to privacy in the revised Finnish constitution (effective from March 1, 2000 onwards) will have any impact on the content or usage of these centralised registers.

  17. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  18. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  19. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  20. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Amendment of protected health information. 164.526 Section 164.526 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information §...

  1. Theft of information in the take-grant protection model

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    Using the information transfer extensions to the Take-Grant Protection Model, the concept of theft of information is defined and necessary and sufficient conditions for such theft to occur are presented, as well as bounds on the number of actors involved in such theft. Finally, the application of these results to reference monitors are explored.

  2. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  3. Personal Protective Equipment for Infectious Disease Preparedness: A Human Factors Evaluation.

    PubMed

    Herlihey, Tracey A; Gelmi, Stefano; Flewwelling, Christopher J; Hall, Trevor N T; Bañez, Carleene; Morita, Plinio P; Beverley, Paul; Cafazzo, Joseph A; Hota, Susy

    2016-09-01

    OBJECTIVE To identify issues during donning and doffing of personal protective equipment (PPE) for infectious diseases and to inform PPE procurement criteria and design. DESIGN A mixed methods approach was used. Usability testing assessed the appropriateness, potential for errors, and ease of use of various combinations of PPE. A qualitative constructivist approach was used to analyze participant feedback. SETTING Four academic health sciences centers: 2 adult hospitals, 1 trauma center, and 1 pediatric hospital, in Toronto, Canada. PARTICIPANTS Participants (n=82) were representative of the potential users of PPE within Western healthcare institutions. RESULTS None of the tested combinations provided a complete solution for PPE. Environmental factors, such as anteroom layout, and the design of protocols and instructional material were also found to impact safety. The study identified the need to design PPE as a complete system, rather than mixing and matching components. CONCLUSIONS Healthcare institutions are encouraged to use human factors methods to identify risk and failure points with the usage of their selected PPE, and to modify on the basis of iterative evaluations with representative end users. Manufacturers of PPE should consider usability when designing the next generation of PPE. Infect Control Hosp Epidemiol 2016;37:1022-1028. PMID:27291787

  4. 29 CFR 2400.4 - Collection and disclosure of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Collection and disclosure of personal information. 2400.4... COMMISSION REGULATIONS IMPLEMENTING THE PRIVACY ACT § 2400.4 Collection and disclosure of personal information. (a) The following rules govern the collection of personal information throughout OSHRC...

  5. An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives

    PubMed Central

    Neri, Emilio; Jonker, Elizabeth

    2007-01-01

    Background The public is concerned about the privacy of their health information, especially as more of it is collected, stored, and exchanged electronically. But we do not know the extent of leakage of personal health information (PHI) from data custodians. One form of data leakage is through computer equipment that is sold, donated, lost, or stolen from health care facilities or individuals who work at these facilities. Previous studies have shown that it is possible to get sensitive personal information (PI) from second-hand disk drives. However, there have been no studies investigating the leakage of PHI in this way. Objectives The aim of the study was to determine the extent to which PHI can be obtained from second-hand computer disk drives. Methods A list of Canadian vendors selling second-hand computer equipment was constructed, and we systematically went through the shuffled list and attempted to purchase used disk drives from the vendors. Sixty functional disk drives were purchased and analyzed for data remnants containing PHI using computer forensic tools. Results It was possible to recover PI from 65% (95% CI: 52%-76%) of the drives. In total, 10% (95% CI: 5%-20%) had PHI on people other than the owner(s) of the drive, and 8% (95% CI: 7%-24%) had PHI on the owner(s) of the drive. Some of the PHI included very sensitive mental health information on a large number of people. Conclusions There is a strong need for health care data custodians to either encrypt all computers that can hold PHI on their clients or patients, including those used by employees and subcontractors in their homes, or to ensure that their computers are destroyed rather than finding a second life in the used computer market. PMID:17942386

  6. 32 CFR 1700.11 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... THE DIRECTOR OF NATIONAL INTELLIGENCE PROCEDURES FOR DISCLOSURE OF RECORDS PURSUANT TO THE FREEDOM OF..., the following definitions apply: (1) Personal information means any information about an...

  7. Open consent, biobanking and data protection law: can open consent be 'informed' under the forthcoming data protection regulation?

    PubMed

    Hallinan, Dara; Friedewald, Michael

    2015-01-01

    This article focuses on whether a certain form of consent used by biobanks--open consent--is compatible with the Proposed Data Protection Regulation. In an open consent procedure, the biobank requests consent once from the data subject for all future research uses of genetic material and data. However, as biobanks process personal data, they must comply with data protection law. Data protection law is currently undergoing reform. The Proposed Data Protection Regulation is the culmination of this reform and, if voted into law, will constitute a new legal framework for biobanking. The Regulation puts strict conditions on consent--in particular relating to information which must be given to the data subject. It seems clear that open consent cannot meet these requirements. 4 categories of information cannot be provided with adequate specificity: purpose, recipient, possible third country transfers, data collected. However, whilst open consent cannot meet the formal requirements laid out by the Regulation, this is not to say that these requirements are substantially undebateable. Two arguments could be put forward suggesting the applicable consent requirements should be rethought. First, from policy documents regarding the drafting process, it seems that the informational requirements in the Regulation are so strict in order to protect the data subject from risks inherent in the use of the consent mechanism in a certain context--exemplified by the online context. There are substantial differences between this context and the biobanking context. Arguably, a consent transaction in the biobanking does not present the same type of risk to the data subject. If the risks are different, then perhaps there are also grounds for a reconsideration of consent requirements? Second, an argument can be made that the legislator drafted the Regulation based on certain assumptions as to the nature of 'data'. The authors argue that these assumptions are difficult to apply to genetic data

  8. Open consent, biobanking and data protection law: can open consent be 'informed' under the forthcoming data protection regulation?

    PubMed

    Hallinan, Dara; Friedewald, Michael

    2015-01-01

    This article focuses on whether a certain form of consent used by biobanks--open consent--is compatible with the Proposed Data Protection Regulation. In an open consent procedure, the biobank requests consent once from the data subject for all future research uses of genetic material and data. However, as biobanks process personal data, they must comply with data protection law. Data protection law is currently undergoing reform. The Proposed Data Protection Regulation is the culmination of this reform and, if voted into law, will constitute a new legal framework for biobanking. The Regulation puts strict conditions on consent--in particular relating to information which must be given to the data subject. It seems clear that open consent cannot meet these requirements. 4 categories of information cannot be provided with adequate specificity: purpose, recipient, possible third country transfers, data collected. However, whilst open consent cannot meet the formal requirements laid out by the Regulation, this is not to say that these requirements are substantially undebateable. Two arguments could be put forward suggesting the applicable consent requirements should be rethought. First, from policy documents regarding the drafting process, it seems that the informational requirements in the Regulation are so strict in order to protect the data subject from risks inherent in the use of the consent mechanism in a certain context--exemplified by the online context. There are substantial differences between this context and the biobanking context. Arguably, a consent transaction in the biobanking does not present the same type of risk to the data subject. If the risks are different, then perhaps there are also grounds for a reconsideration of consent requirements? Second, an argument can be made that the legislator drafted the Regulation based on certain assumptions as to the nature of 'data'. The authors argue that these assumptions are difficult to apply to genetic data

  9. The role of privacy protection in healthcare information systems adoption.

    PubMed

    Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui

    2013-10-01

    Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.

  10. 75 FR 69369 - Walking-Working Surfaces and Personal Protective Equipment (Fall Protection Systems)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-12

    ..., subparts D and I), published on May 24, 2010 (73 FR 28862). DATES: Informal public hearings: OSHA will hold... Equipment standard (73 FR 28862). OSHA invited written comments and requests for hearings on the proposed...), Secretary of Labor's Order 4- 2010 (75 FR 55355), and 29 CFR part 1911. ] Signed at Washington, DC,...

  11. The need for empirically derived permeation data for personal protective equipment: the death of Dr. Karen E. Wetterhahn.

    PubMed

    Blayney, M B

    2001-02-01

    Personal protective equipment (PPE) is an essential component in any occupational health and safety program. The appropriate selection and use of PPE can help prevent or limit exposure to hazardous materials. The inappropriate selection or use of PPE can lead to unnecessary exposure or --with extremely hazardous materials--serious harm including death. In 1997, Dr. Karen E. Wetterhahn died from mercury poisoning resulting from a single exposure to dimethylmercury almost a year before. Her death raised numerous questions as to how this tragedy occurred and what could be done to protect against a chemical as dangerous as dimethylmercury. This article provides a brief review of the case and discusses the glove permeation testing done during the course of the accident investigation. Using this case as an example, the author argues that all recommendations for PPE be based on empirical testing using accepted methods and that this information be readily available.

  12. Attenuation of X and Gamma Rays in Personal Radiation Shielding Protective Clothing.

    PubMed

    Kozlovska, Michaela; Cerny, Radek; Otahal, Petr

    2015-11-01

    A collection of personal radiation shielding protective clothing, suitable for use in case of accidents in nuclear facilities or radiological emergency situations involving radioactive agents, was gathered and tested at the Nuclear Protection Department of the National Institute for Nuclear, Chemical and Biological Protection, Czech Republic. Attenuating qualities of shielding layers in individual protective clothing were tested via spectra measurement of x and gamma rays, penetrating them. The rays originated from different radionuclide point sources, the gamma ray energies of which cover a broad energy range. The spectra were measured by handheld spectrometers, both scintillation and High Purity Germanium. Different narrow beam geometries were adjusted using a special testing bench and a set of various collimators. The main experimentally determined quantity for individual samples of personal radiation shielding protective clothing was x and gamma rays attenuation for significant energies of the spectra. The attenuation was assessed comparing net peak areas (after background subtraction) in spectra, where a tested sample was placed between the source and the detector, and corresponding net peak areas in spectra, measured without the sample. Mass attenuation coefficients, which describe attenuating qualities of shielding layers materials in individual samples, together with corresponding lead equivalents, were determined as well. Experimentally assessed mass attenuation coefficients of the samples were compared to the referred ones for individual heavy metals. PMID:26425983

  13. Attenuation of X and Gamma Rays in Personal Radiation Shielding Protective Clothing.

    PubMed

    Kozlovska, Michaela; Cerny, Radek; Otahal, Petr

    2015-11-01

    A collection of personal radiation shielding protective clothing, suitable for use in case of accidents in nuclear facilities or radiological emergency situations involving radioactive agents, was gathered and tested at the Nuclear Protection Department of the National Institute for Nuclear, Chemical and Biological Protection, Czech Republic. Attenuating qualities of shielding layers in individual protective clothing were tested via spectra measurement of x and gamma rays, penetrating them. The rays originated from different radionuclide point sources, the gamma ray energies of which cover a broad energy range. The spectra were measured by handheld spectrometers, both scintillation and High Purity Germanium. Different narrow beam geometries were adjusted using a special testing bench and a set of various collimators. The main experimentally determined quantity for individual samples of personal radiation shielding protective clothing was x and gamma rays attenuation for significant energies of the spectra. The attenuation was assessed comparing net peak areas (after background subtraction) in spectra, where a tested sample was placed between the source and the detector, and corresponding net peak areas in spectra, measured without the sample. Mass attenuation coefficients, which describe attenuating qualities of shielding layers materials in individual samples, together with corresponding lead equivalents, were determined as well. Experimentally assessed mass attenuation coefficients of the samples were compared to the referred ones for individual heavy metals.

  14. Seamless personal health information system in cloud computing.

    PubMed

    Chung, Wan-Young; Fong, Ee May

    2014-01-01

    Noncontact ECG measurement has gained popularity these days due to its noninvasive and conveniences to be applied on daily life. This approach does not require any direct contact between patient's skin and sensor for physiological signal measurement. The noncontact ECG measurement is integrated with mobile healthcare system for health status monitoring. Mobile phone acts as the personal health information system displaying health status and body mass index (BMI) tracking. Besides that, it plays an important role being the medical guidance providing medical knowledge database including symptom checker and health fitness guidance. At the same time, the system also features some unique medical functions that cater to the living demand of the patients or users, including regular medication reminders, alert alarm, medical guidance, appointment scheduling. Lastly, we demonstrate mobile healthcare system with web application for extended uses, thus health data are clouded into web server system and web database storage. This allows remote health status monitoring easily and so forth it promotes a cost effective personal healthcare system. PMID:25570784

  15. Review of Extracting Information From the Social Web for Health Personalization

    PubMed Central

    Karlsen, Randi; Bonander, Jason

    2011-01-01

    In recent years the Web has come into its own as a social platform where health consumers are actively creating and consuming Web content. Moreover, as the Web matures, consumers are gaining access to personalized applications adapted to their health needs and interests. The creation of personalized Web applications relies on extracted information about the users and the content to personalize. The Social Web itself provides many sources of information that can be used to extract information for personalization apart from traditional Web forms and questionnaires. This paper provides a review of different approaches for extracting information from the Social Web for health personalization. We reviewed research literature across different fields addressing the disclosure of health information in the Social Web, techniques to extract that information, and examples of personalized health applications. In addition, the paper includes a discussion of technical and socioethical challenges related to the extraction of information for health personalization. PMID:21278049

  16. Personalized Information Environments: Do Public Libraries Want a Slice of the PIE?

    ERIC Educational Resources Information Center

    Worcester, Lea

    2003-01-01

    Discussion of personalized information environments (PIEs) focuses on library personalized interfaces. Describes academic library PIEs and commercial sites, such as Amazon.com that use personalization; explores the Public Library of Charlotte and Mecklenburg's personalized interface; and discusses opportunities and challenges PIEs offer public…

  17. Heat strain imposed by personal protective ensembles: quantitative analysis using a thermoregulation model

    NASA Astrophysics Data System (ADS)

    Xu, Xiaojiang; Gonzalez, Julio A.; Santee, William R.; Blanchard, Laurie A.; Hoyt, Reed W.

    2016-07-01

    The objective of this paper is to study the effects of personal protective equipment (PPE) and specific PPE layers, defined as thermal/evaporative resistances and the mass, on heat strain during physical activity. A stepwise thermal manikin testing and modeling approach was used to analyze a PPE ensemble with four layers: uniform, ballistic protection, chemical protective clothing, and mask and gloves. The PPE was tested on a thermal manikin, starting with the uniform, then adding an additional layer in each step. Wearing PPE increases the metabolic rates (dot{M}) , thus dot{M} were adjusted according to the mass of each of four configurations. A human thermoregulatory model was used to predict endurance time for each configuration at fixed dot{M} and at its mass adjusted dot{M} . Reductions in endurance time due to resistances, and due to mass, were separately determined using predicted results. Fractional contributions of PPE's thermal/evaporative resistances by layer show that the ballistic protection and the chemical protective clothing layers contribute about 20 %, respectively. Wearing the ballistic protection over the uniform reduced endurance time from 146 to 75 min, with 31 min of the decrement due to the additional resistances of the ballistic protection, and 40 min due to increased dot{M} associated with the additional mass. Effects of mass on heat strain are of a similar magnitude relative to effects of increased resistances. Reducing resistances and mass can both significantly alleviate heat strain.

  18. 32 CFR 806b.34 - Protecting records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... contact with information in identifiable form. Protect information according to its sensitivity level. Consider the personal sensitivity of the information and the risk of disclosure, loss or alteration....

  19. 32 CFR 806b.34 - Protecting records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... contact with information in identifiable form. Protect information according to its sensitivity level. Consider the personal sensitivity of the information and the risk of disclosure, loss or alteration....

  20. 32 CFR 806b.34 - Protecting records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... contact with information in identifiable form. Protect information according to its sensitivity level. Consider the personal sensitivity of the information and the risk of disclosure, loss or alteration....

  1. 32 CFR 806b.34 - Protecting records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... contact with information in identifiable form. Protect information according to its sensitivity level. Consider the personal sensitivity of the information and the risk of disclosure, loss or alteration....

  2. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... trafficking in persons. 104.2 Section 104.2 Foreign Relations DEPARTMENT OF STATE ECONOMIC AND OTHER FUNCTIONS INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION § 104.2 Sharing of information regarding international trafficking in persons. Each Federal Department or...

  3. Balancing Good Intentions: Protecting the Privacy of Electronic Health Information

    ERIC Educational Resources Information Center

    McClanahan, Kitty

    2008-01-01

    Electronic information is a vital but complex component in the modern health care system, fueling ongoing efforts to develop a universal electronic health record infrastructure. This innovation creates a substantial tension between two desirable values: the increased quality and utility of patient medical records and the protection of the privacy…

  4. 17 CFR 201.322 - Evidence: Confidential information, protective orders.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Evidence: Confidential information, protective orders. 201.322 Section 201.322 Commodity and Securities Exchanges SECURITIES AND... documents are unavailable, the movant shall file for in camera inspection a sealed copy of the documents...

  5. 17 CFR 201.322 - Evidence: Confidential information, protective orders.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Evidence: Confidential information, protective orders. 201.322 Section 201.322 Commodity and Securities Exchanges SECURITIES AND... documents are unavailable, the movant shall file for in camera inspection a sealed copy of the documents...

  6. 17 CFR 201.322 - Evidence: Confidential information, protective orders.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Evidence: Confidential information, protective orders. 201.322 Section 201.322 Commodity and Securities Exchanges SECURITIES AND... documents are unavailable, the movant shall file for in camera inspection a sealed copy of the documents...

  7. 17 CFR 201.322 - Evidence: Confidential information, protective orders.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Evidence: Confidential information, protective orders. 201.322 Section 201.322 Commodity and Securities Exchanges SECURITIES AND... documents are unavailable, the movant shall file for in camera inspection a sealed copy of the documents...

  8. 17 CFR 201.322 - Evidence: Confidential information, protective orders.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Evidence: Confidential information, protective orders. 201.322 Section 201.322 Commodity and Securities Exchanges SECURITIES AND... documents are unavailable, the movant shall file for in camera inspection a sealed copy of the documents...

  9. Executive Guide to the Protection of Information Resources.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    The purpose of this guide is to help the policy maker address a series of questions regarding the protection and safety of computer systems and data processed within his/her agency. It introduces information systems security concerns, outlines the management issues that must be addressed by agency policies and programs, and describes the essential…

  10. 76 FR 17935 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... Programs Directorate (NPPD), Office of Infrastructure Protection (IP) will submit the following Information... DHS/NPPD/IP, Attn: Emily R. Hickey ( Emily.hickey@dhs.gov ). Written comments should reach the contact... laws, and civil litigation. The PCII Program is administered by IP's Infrastructure...

  11. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  12. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Conservation Act. (b) The National Science Foundation's Office of Polar Programs may prepare for publication... Section 673.4 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a)...

  13. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade... confidential basis in connection with the activities of any business or joint research and development...

  14. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  15. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  16. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  17. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  18. Tuberculosis Infection Control in Health-Care Facilities: Environmental Control and Personal Protection

    PubMed Central

    2016-01-01

    Transmission of tuberculosis (TB) is a recognized risk to patients and healthcare workers in healthcare settings. The literature review suggests that implementation of combination control measures reduces the risk of TB transmission. Guidelines suggest a three-level hierarchy of controls including administrative, environmental, and respiratory protection. Among environmental controls, installation of ventilation systems is a priority because ventilation reduces the number of infectious particles in the air. Natural ventilation is cost-effective but depends on climatic conditions. Supplemented intervention such as air-cleaning methods including high efficiency particulate air filtration and ultraviolet germicidal irradiation should be considered in areas where adequate ventilation is difficult to achieve. Personal protective equipment including particulate respirators provides additional benefit when administrative and environmental controls cannot assure protection. PMID:27790274

  19. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... possible threats or hazards, and permit access only to authorized persons. Automated systems will... that employees and contractors who have access to personal information in their system will have the... Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional...

  20. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... possible threats or hazards, and permit access only to authorized persons. Automated systems will... that employees and contractors who have access to personal information in their system will have the... Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional...

  1. 41 CFR 105-64.108 - How does GSA safeguard personal information?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... possible threats or hazards, and permit access only to authorized persons. Automated systems will... that employees and contractors who have access to personal information in their system will have the... Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional...

  2. 77 FR 72411 - The Standard on Personal Protective Equipment (PPE) for Shipyard Employment; Extension of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-05

    ...), hands and body (Sec. 1915.157), lifesaving equipment (Sec. 1915.158), personal fall arrest systems (Sec... Agency's functions, including whether the information is useful; The accuracy of OSHA's estimate of the.... Authority and Signature David Michaels, Ph.D., MPH, Assistant Secretary of Labor for Occupational Safety...

  3. A guide to the selection of personal protective equipment for use in responding to a release of chemical warfare agents

    SciTech Connect

    Foust, C.B.

    1997-10-01

    Recognition by the US Army that a potential threat to the public from continued storage was potentially as great a threat as from transportation and the final demilitarization of chemical agents gave rise to the Chemical Stockpile Emergency Preparedness Program (CSEPP). CSEPP is a civilian community emergency preparedness program complementing the Department of Defense`s initiative to destroy domestic stockpiles of aged chemical warface munitions. An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with any HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern the selection of personal protective equipment (PPE). PPE includes all clothing, respirators and detection equipment used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel. FEMA requested that ORNL create training materials for CSEPP participants. These training materials were to provide information on a variety of topics and answer questions that a typical CSEPP participant might ask, including the following: how did the Army select the CSEPP recommended ensemble (i.e., protective clothing, respiratory equipment, and detection equipment); how does the CSEPP participant know this ensemble is the right PPE for chemical warfare agents and will actually protect him; what are the concept of operations and work rules? Does one need to know what the CSEPP concept of operations and work rules include? This report describes the training document ORNL created.

  4. Information support systems for cultural heritage protection against flooding

    NASA Astrophysics Data System (ADS)

    Nedvedova, K.; Pergl, R.

    2015-08-01

    The goal of this paper is to present use of different kind of software applications to create complex support system for protection of cultural heritage against flooding. The project is very complex and it tries to cover the whole area of the problem from prevention to liquidation of aftermath effects. We used GIS for mapping the risk areas, ontology systems for vulnerability assessment application and the BORM method (Business Object Relation Modelling) for flood protection system planning guide. Those modern technologies helped us to gather a lot of information in one place and provide the knowledge to the broad audience.

  5. E-Data Privacy and the Personal Data Protection Bill of Malaysia

    NASA Astrophysics Data System (ADS)

    Jawahitha, Sarabdeen; Ishak, Mohamed; Mazahir, Mohamed

    Hi-tech development in information and communication technology or ICT enables the public to carry out various business activities. In the course of such businesses, all relevant individual information are saved in the computer system. However, keeping such information in computer is not at all secured due to the availability of technology that may circumvent or get access to the said information. This could be a threat to the privacy specially data privacy. Regulatory compliance and liability issues arising from the use of information technologies and possibility of privacy violation should be given important consideration as the evolution and progression of e-related activities is dependent upon and influenced by the rapidly changing advances in law. The Data Protection Bill 1998 was drafted setting provisions on data principles and rights to data subjects so that data privacy can considerably be protected. However, the introduction of Data Protection Bill 2001 is seen to have focused more on regulation of private sector than public sector whereby the level of protection for data held in public sector is very much reduced.

  6. Flame-retardant contamination of firefighter personal protective clothing - A potential health risk for firefighters.

    PubMed

    Alexander, Barbara M; Baxter, C Stuart

    2016-09-01

    There is a high incidence of cardiovascular disease and certain cancers in firefighters that may be related to their occupational exposure to hazardous substances. Exposure may result from contaminated personal protective gear, as well as from direct exposure at fire scenes. This study characterized flame-retardant contamination on firefighter personal protective clothing to assess exposure of firefighters to these chemicals. Samples from used and unused firefighter protective clothing, including gloves, hoods and a coat wristlet, were extracted with methylene chloride and analyzed by EPA method 8270D Specific Ion Method (SIM) for polybrominated diphenyl ethers (PBDEs). Until recently PBDEs were some of the most common flame-retardant chemicals used in the US. Fifteen of the seventeen PBDEs for which analysis was performed were found on at least one clothing swatch. Every clothing sample, including an unused hood and all three layers of an unused glove, held a detectable concentration of at least one PBDE. These findings, along with previous research, suggest that firefighters are exposed to PBDE flame retardants at levels much higher than the general public. PBDEs are found widely dispersed in the environment and still persist in existing domestic materials such as clothing and furnishings. Firefighter exposure to flame retardants therefore merits further study.

  7. Flame-retardant contamination of firefighter personal protective clothing - A potential health risk for firefighters.

    PubMed

    Alexander, Barbara M; Baxter, C Stuart

    2016-09-01

    There is a high incidence of cardiovascular disease and certain cancers in firefighters that may be related to their occupational exposure to hazardous substances. Exposure may result from contaminated personal protective gear, as well as from direct exposure at fire scenes. This study characterized flame-retardant contamination on firefighter personal protective clothing to assess exposure of firefighters to these chemicals. Samples from used and unused firefighter protective clothing, including gloves, hoods and a coat wristlet, were extracted with methylene chloride and analyzed by EPA method 8270D Specific Ion Method (SIM) for polybrominated diphenyl ethers (PBDEs). Until recently PBDEs were some of the most common flame-retardant chemicals used in the US. Fifteen of the seventeen PBDEs for which analysis was performed were found on at least one clothing swatch. Every clothing sample, including an unused hood and all three layers of an unused glove, held a detectable concentration of at least one PBDE. These findings, along with previous research, suggest that firefighters are exposed to PBDE flame retardants at levels much higher than the general public. PBDEs are found widely dispersed in the environment and still persist in existing domestic materials such as clothing and furnishings. Firefighter exposure to flame retardants therefore merits further study. PMID:27171467

  8. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to... 32 National Defense 6 2010-07-01 2010-07-01 false Sending personal information over electronic mail. 806b.29 Section 806b.29 National Defense Department of Defense (Continued) DEPARTMENT OF THE...

  9. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information? All NARA employees and contractors involved in the design, development, operation or maintenance of...

  10. How does national culture affect citizens' rights of access to personal health information and informed consent?

    PubMed

    Cockcroft, Sophie; Sandhu, Neelam; Norris, Anthony

    2009-09-01

    Two widely discussed and debated aspects of health law literature are 'informed' consent to medical treatment and the right of access to personal health information. Both are tied to the larger subject of patients' rights, including the right to privacy. This article looks at the issue of informed consent internationally, and goes further to explain some of the inequalities across the world with respect to informed consent and patients' rights legislation via an analysis of the take-up of key legislative attributes in patient consent. Specifically, the effect that national culture, as defined by the GLOBE variables, has on the rate and pattern of adoption of these consent elements is analysed using binary logistic regression to provide evidence of the existence or otherwise of a cultural predicate of the legislative approach. The article concludes by outlining the challenges presented by these differences.

  11. Respecting, protecting, persons, humans, and conceptual muddles in the bioethics convention.

    PubMed

    Delkeskamp-Hayes, C

    2000-04-01

    The Convention on Human Rights and Biomedicine confuses respect for a person's right to self-determination with concern about protecting human beings generally. In a legal document, this mixture of deontological with utilitarian considerations undermines what it should preserve: respect for human dignity as the foundation of modern rights-based democracies. Falling prey to the ambiguity of freedom, the Convention blurs the dividing line between morality and the law. The document should be remedied through distinguishing fundamental rights from social 'rights', persons as entitled to the right to self-determination from born humans as entitled to the right to life and from members of the human species as entitled to the morally responsible care of voting majorities. For the cultivating of the required responsibility, the conditions for an adequate public debate should be secured.

  12. Special article: personal protective equipment for care of pandemic influenza patients: a training workshop for the powered air purifying respirator.

    PubMed

    Tompkins, Bonnie M; Kerchberger, John P

    2010-10-01

    Virulent respiratory infectious diseases may present a life-threatening risk for health care professionals during aerosol-generating procedures, including endotracheal intubation. The 2009 Pandemic Influenza A (H1N1) brings this concern to the immediate forefront. The Centers for Disease Control and Prevention have stated that, when performing or participating in aerosol-generating procedures on patients with virulent contagious respiratory diseases, health care professionals must wear a minimum of the N95 respirator, and they may wish to consider using the powered air purifying respirator (PAPR). For influenza and other diseases transmitted by both respiratory and contact modes, protective respirators must be combined with contact precautions. The PAPR provides 2.5 to 100 times greater protection than the N95, when used within the context of an Occupational Safety and Health Administration-compliant respiratory protection program. The relative protective capability of a respirator is quantified using the assigned protection factor. The level of protection designated by the APF can only be achieved with appropriate training and correct use of the respirator. Face seal leakage limits the protective capability of the N95 respirator, and fit testing does not assure the ability to maintain a tight face seal. The protective capability of the PAPR will be defeated by improper handling of contaminated equipment, incorrect assembly and maintenance, and improper don (put on) and doff (take off) procedures. Stress, discomfort, and physical encumbrance may impair performance. Acclimatization through training will mitigate these effects. Training in the use of PAPRs in advance of their need is strongly advised. "Just in time" training is unlikely to provide adequate preparation for groups of practitioners requiring specialized personal protective equipment during a pandemic. Employee health departments in hospitals may not presently have a PAPR training program in place

  13. Human subjects protection in a study of caregivers of community-residing persons with dementia.

    PubMed

    Gerber, T; Toseland, R W; McCallion, P

    2000-11-01

    This article describes the processes and methods used to protect human subjects during a joint research project undertaken by a state health department and a university-based research team. The use of a statewide registry to obtain a sample of primary caregivers of persons with dementia provided a unique opportunity for the research team to interview a large and representative sample of caregivers. At the same time, it raised complex issues regarding the privacy of the primary caregivers and the confidentiality of the patient data that were drawn from the state-operated mandatory dementia registry. Guidelines for enabling access while ensuring the privacy and confidentiality of the study participants are presented.

  14. Privacy and Personal Information Held by Government: A Comparative Study, Japan and New Zealand

    NASA Astrophysics Data System (ADS)

    Cullen, Rowena

    This chapter reports on the concepts of information privacy and trust in government among citizens in Japan and New Zealand in a transnational, crosscultural study. Data from both countries are presented, and cultural and other factors are sought that might explain differences in attitudes shown. In both countries, citizens display a range of views, not related to age or gender. New Zealand citizens express concern about information privacy in relation to information held by government, but show a higher level of trust in government overall, and most attribute breaches of privacy to incompetence, rather than deliberate malfeasance. Japanese citizens interviewed also indicated that they had major concerns about information privacy, and had considerably less trust in government than New Zealand respondents showed. They were more inclined to attribute breaches of privacy to lax behavior in individuals than government systems. In both countries citizens showed an awareness of the tradeoffs necessary between personal privacy and the needs of the state to hold information for the benefit of all citizens, but knew little about the protection offered by privacy legislation, and expressed overall concern about privacy practices in the modern state. The study also provides evidence of cultural differences that can be related to Hofstede's dimensions of culture.

  15. Personal Record Keeping. The CIRcular: Consumer Information Report 21.

    ERIC Educational Resources Information Center

    Bank of America NT & SA, San Francisco, CA.

    This report explains the importance of keeping personal records, describes types of records to keep, and suggests places in which to keep them and ways to organize them. Guidelines are offered for keeping the following types of records: (1) personal documents (family records, wills, passports, diplomas, and social security cards); (2) property…

  16. 45 CFR 61.12 - Requesting information from the Healthcare Integrity and Protection Data Bank.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION... Integrity and Protection Data Bank § 61.12 Requesting information from the Healthcare Integrity and Protection Data Bank. (a) Who may request information and what information may be available. Information...

  17. Search and seizure law; practical advice and interpretation for nuclear protective force persons

    SciTech Connect

    Cadwell, J.J.

    1983-07-06

    Recent Supreme Court decisions, which interpret the 200-year-old Fourth Amendment of the US Constitution, are used to provide a brief overview of some search and seizure subjects important to management and officers responsible for physical protection of nuclear facilities. The overview is framed in practical terms in order to make the comments applicable to the everyday activity of nuclear-protective-force persons. The Supreme Court has described several exceptions where searches and seizures (arrests) are permitted without a warrant, despite the Fourth Amendment which states that warrants are always required. The seven exceptions briefly discussed are search incidents to a lawful arrest, the automobile-search exception, the suitcase or container exception, the hot-pursuit or emergency exception, the stop-and-frisk exception, the plain-view exception, and consent to be searched.

  18. Theft of information in the take-grant protection model

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    Questions of information flow are in many ways more important than questions of access control, because the goal of many security policies is to thwart the unauthorized release of information, not merely the illicit obtaining of access rights to that information. The Take-Grant Protection Model is a theoretical tool for examining such issues because conditions necessary and sufficient for information to flow between two objects, and for rights to objects to be obtained or stolen, are known. These results are extended by examining the question of information flow from an object the owner of which is unwilling to release that information. Necessary and sufficient conditions for such theft of information to occur are derived, and bounds on the number of subjects that must take action for the theft to occur are presented. To emphasize the usefulness of these results, the security policies of complete isolation, transfer of rights with the cooperation of an owner, and transfer of information (but not rights) with the cooperation of the owner are presented; the last is used to model a simple reference monitor guarding a resource.

  19. 76 FR 80966 - Agency Information Collection Activities; Proposed Collection: Age, Sex, and Race of Persons...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-27

    ... Federal Bureau of Investigation Agency Information Collection Activities; Proposed Collection: Age, Sex, and Race of Persons Arrested 18 Years of Age and Over; Age, Sex, and Race of Persons Arrested Under 18... the form/collection: Age, Sex, and Race of Persons Arrested 18 Years of Age and Over; Age, Sex,...

  20. The Structure of Informal Social Networks of Persons with Profound Intellectual and Multiple Disabilities

    ERIC Educational Resources Information Center

    Kamstra, A.; van der Putten, A. A. J.; Vlaskamp, C.

    2015-01-01

    Background: Persons with less severe disabilities are able to express their needs and show initiatives in social contacts, persons with profound intellectual and multiple disabilities (PIMD), however, depend on others for this. This study analysed the structure of informal networks of persons with PIMD. Materials and Methods: Data concerning the…

  1. 77 FR 10762 - Agency Information Collection Activities: Declaration of Person Who Performed Repairs

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-23

    ... Who Performed Repairs AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland... concerning the: Declaration of a Person Who Performed Repairs. This request for comment is being made... Person Who Performed Repairs. OMB Number: 1651-0048. Form Number: None. Abstract: The ``Declaration...

  2. Factors Surgical Team Members Perceive Influence Choices of Wearing or Not Wearing Personal Protective Equipment during Operative/Invasive Procedures

    ERIC Educational Resources Information Center

    Cuming, Richard G.

    2009-01-01

    Exposure to certain bloodborne pathogens can prematurely end a person's life. Healthcare workers (HCWs), especially those who are members of surgical teams, are at increased risk of exposure to these pathogens. The proper use of personal protective equipment (PPE) during operative/invasive procedures reduces that risk. Despite this, some HCWs fail…

  3. A few remarks on the rules about personal data protection when conducting clinical trials in Italy, also from abroad.

    PubMed

    Petrini, Carlo

    2009-01-01

    The Italian Authority for the Protection of Personal Data has definitively adopted the Guidelines for data processing within the framework of clinical drug trials. The Guidelines are addressed to sponsors and other subjects who intervene, also from abroad, in clinical trials. The document provides practical instructions for the processing of personal data of human subject participating in clinical trials.

  4. Modern Methods of Real-Time Gamma Radiation Monitoring for General Personal Protection

    NASA Astrophysics Data System (ADS)

    Korostynska, O.; Arshak, K.; Arshak, A.; Vaseashta, Ashok

    Real-time radiation detectors become an essential part of emergency personnel who may have to respond to unknown accidents, incidents or terrorist attacks, which could involve radioactive material. More and more ordinary citizens are interested in personal radiation protection as well. Reasons include lost sources, nuclear industrial accidents, nuclear or radiological terrorism and the possibility of nuclear weapons being used in a war. People want to have the ability to measure it for themselves and they want to be notified when the radiation levels are increased. To meet this demand, considerable research into new sensors is underway, including efforts to enhance the sensor performance through both the material properties and manufacturing technologies. Deep understanding of physical properties of the materials under the influence of radiation exposure is vital for the effective design of dosimeter devices. Detection of radiation is based on the fact that both the electrical and the optical properties of the materials undergo changes upon the exposure to ionizing radiation. It is believed that radiation causes structural defects. The influence of radiation depends on both the dose and the parameters of the films including their thickness: the degradation is more severe for the higher dose and the thinner films. This paper presents overview of modern methods of real-time gamma radiation monitoring for personal protection of radiation workers and general public and suggests further developments in this area.

  5. Quantitative Information Differences Between Object-Person Presentation Methods

    ERIC Educational Resources Information Center

    Boyd, J. Edwin; Perry, Raymond P.

    1972-01-01

    Subjects used significantly more adjectives, on an adjective checklist (ACL), in giving their impressions of an object-person; based on written and audiovisual presentations, more than audio presentations. (SD)

  6. Feasibility analysis of the privacy attributes of the personal wellness information model.

    PubMed

    Nykänen, Pirkko; Seppälä, Antto; Ruotsalainen, Pekka; Blobel, Bernd

    2013-01-01

    A feasibility analysis has been performed to study the applicability of privacy attributes with a developed wellness information model. Information privacy concerns specifically access to individually identifiable personal information and one's ability to control information about oneself. We carried out a user scenario walk-through of the privacy attributes related to the wellness components. The walk-through showed a need to relate self-regulating privacy policies to the pervasive context so that during various trust-building processes, a person is aware and can control the use, disclosure and even secondary use of his personal, private wellness information.

  7. [The state legal and expert identification aspects of protecting the right of the person for citizens of the Russian Federation].

    PubMed

    Bykov, I Iu; Kolkutin, V V; Tolmachev, I A; Dmitriev, E G

    2000-04-01

    The article deals with the questions concerning the problem of person identification, different extreme situations. This problem is closely connected with ensuring of national security of Russia. The authors give the definition of person's right in contact with constant threat to violate this right. Two categories of person's properties are analysed (material and not material) with the help of which it is possible to establish identity of man and his personality. It is noted that protection of person's rights is carried out in six forms. For the first time the possibilities to create organisational system of person identification in the form of Federal service are discussed that must be legislatively secured. Scientific investigation of this problem allowed the authors to submit concrete proposals concerning the question of organisation of state service for person identification.

  8. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 4 2014-10-01 2014-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  9. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 4 2013-10-01 2013-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  10. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  11. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  12. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 4 2012-10-01 2012-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  13. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  14. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  15. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  16. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  17. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  18. Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications

    ERIC Educational Resources Information Center

    Cox, Trissa

    2012-01-01

    Information privacy is a major concern for consumers adopting emerging technologies dependent on location-based services. This study sought to determine whether a relationship exists among factors of personalization, locatability, perceived playfulness, privacy concern and behavioral intention to disclose personal information for individuals using…

  19. The fear of other persons' laughter: Poor neuronal protection against social signals of anger and aggression.

    PubMed

    Papousek, Ilona; Schulter, Günter; Rominger, Christian; Fink, Andreas; Weiss, Elisabeth M

    2016-01-30

    The fear of other persons' laughter (gelotophobia) occurs in the context of several psychiatric conditions, particularly in the schizophrenia spectrum and social phobia. It entails severe personal and inter-personal problems including heightened aggression and possibly violence. Individuals with gelotophobia (n=30; 24 with social phobia or Cluster A diagnosis) and matched symptom-free controls (n=30) were drawn from a large screening sample (n=1440). EEG coherences were recorded during the confrontation with other people's affect expressions, to investigate the brain's modulatory control over the emotionally laden perceptual input. Gelotophobia was associated with more loose functional coupling of prefrontal and posterior cortex during the processing of expressions of anger and aggression, thus leaving the individual relatively unprotected from becoming affected by these social signals. The brain's response to social signals of anger/aggression and the accompanied heightened permeability for this kind of information explains the particular sensitivity to actual or supposed malicious aspects of laughter (and possibly of other ambiguous social signals) in individuals with gelotophobia, which represents the core feature of the condition. Heightened perception of stimuli that could be perceived as offensive, which is inherent in several psychiatric conditions, may be particularly evident in the fear of other persons' laughter.

  20. 10 CFR 73.21 - Protection of Safeguards Information: Performance requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... maintain an information protection system that includes the applicable measures for Safeguards Information... protection system that includes the applicable measures for Safeguards Information specified in § 73.23... PLANTS AND MATERIALS General Provisions § 73.21 Protection of Safeguards Information:...

  1. Personality information: does it influence attractiveness ratings of various body sizes?

    PubMed

    Fisak, Brian; Tantleff-Dunn, Stacey; Peterson, Rachel D

    2007-06-01

    In the present study, the influence of personality information on attractiveness ratings of different body sizes was examined. Specifically, participants were presented with either no personality information, negative information, or positive information about a hypothetical female target and asked to rate the smallest and largest figure that they would consider attractive for her using a figure rating scale. Consistent with the study hypotheses: (1) participants chose a wider range of figures as attractive for a female described to have a positive personality when compared to the range chosen when no personality information was provided; (2) females selected wider attractive ranges than males; and (3) other participant characteristics (i.e., physical appearance anxiety and body mass) were found to predict attractive ranges selected by participants. These findings may have implications for the treatment of body-image disturbance, as the findings suggest that personality, rather than appearance alone, may be a factor in perceptions of attractiveness of various body sizes.

  2. Comfort Assessment of Personal Protection Systems During Total Joint Arthroplasty Using a Novel Multidimensional Evaluation Tool

    PubMed Central

    Malik, MHA; Handford, Elizabeth; Staniford, Elaine; Gambhir, AK; Kay, PR

    2006-01-01

    INTRODUCTION A number of studies have assessed the usefulness of surgical gowns and exhaust suits with regards to barrier function and protection afforded to healthcare workers from blood strike-through, splashes and aerosols. PATIENTS AND METHODS We have performed a comfort assessment comparison between the Charnley exhaust suit, disposable gown plus visor and the Stryker Steri-Shield system using a newly developed objective multidimensional ergonomic tool designed to measure wearable comfort across the dimensions of emotion, attachment, harm, perceived change, movement and anxiety. RESULTS The total mean Comfort Rating Scale value for a disposable gown plus visor was 16.1 with a mean dimensional score of 2.7 (range, 0.2–8.4), for the Charnley system the values were 51.4 and 8.6 (range, 5.9–12.8), respectively, and for the Stryker Steri-Shield 15.4 and 2.6 (range, 0.8–5.6). CONCLUSIONS The Steri-Shield system provides the least variation in comfort and, as such, may offer the best combination of comfort, protective qualities and form or style of personal protection equipment for lower limb arthroplasty operations. PMID:17002852

  3. Toward a genetically-informed model of borderline personality disorder.

    PubMed

    Livesley, John

    2008-02-01

    This article describes a conceptual framework for describing borderline personality disorder (BPD) based on empirical studies of the phenotypic structure and genetic architecture of personality. The proposed phenotype has 2 components: (1) a description of core self and interpersonal pathology-the defining features of personality disorder-as these features are expressed in the disorder; and (2) a set of traits based on the anxious-dependent or emotional dysregulation factor of the four-factor model of PD. Four kinds of traits are described: emotional (anxiousness, emotional reactivity, emotional intensity, and pessimistic-anhedonia), interpersonal (submissiveness, insecure attachment, social apprehensiveness, and need for approval), cognitive (cognitive dysregulation), and self-harm (behaviors and ideas). Formulation of the phenotype was guided by the conceptualization of personality as a system of interrelated sub-systems. The psychopathology associated with BPD involves most components of the system. The trait structure of the disorder is assumed to reflect the genetic architecture of personality and individual traits are assumed to be based on adaptive mechanisms. It is suggested that borderline traits are organized around the trait of anxiousness and that an important feature of BPD is dysregulation of the threat management system leading to pervasive fearfulness and unstable emotions. The interpersonal traits are assumed to be heritable characteristics that evolved to deal with interpersonal threats that arose as a result of social living. The potential for unstable and conflicted interpersonal relationships that is inherent to the disorder is assumed to result from the interplay between the adaptive structure of personality and psychosocial adversity. The etiology of the disorder is discussed in terms of biological and environmental factors associated with each component of the phenotype.

  4. Exploring Information Literacy in Relationship: Intelligence and Personality as Factors

    ERIC Educational Resources Information Center

    Cooper, Timothy A.

    2012-01-01

    In the last three decades, the domain of Information Literacy (IL) has caught the attention of international college educators and information professionals. The explosion of information in education, government and business requires college students to have the skills necessary to enter an information-rich digital age. These skills include the…

  5. Border malaria in China: knowledge and use of personal protection by minority populations and implications for malaria control: a questionnaire-based survey

    PubMed Central

    Moore, Sarah J; Min, Xia; Hill, Nigel; Jones, Caroline; Zaixing, Zhang; Cameron, Mary M

    2008-01-01

    Background Malaria control in remote, forested areas of the Mekong region relies on personal protection from mosquito bites. Uptake of these methods may be limited by knowledge of the link between mosquitoes and malaria as well as social and economic aspects. Understanding barriers to uptake will inform malaria control programmes on targets for improvement of delivery. Methods A total 748 key respondents: health providers and village heads, from 187 villages and 25 different ethnic groups, were interviewed using structured questionnaires. Differences in use of personal protection, and knowledge of malaria between groups were analysed using chi-square; and binary logistic regression used for multivariate analysis. Results Malaria knowledge was poor with 19.4% of women and 37.5% of men linking mosquitoes with malaria, although 95.6% knew one or more methods of mosquito control. Virtually all respondents used personal protection at some time during the year; and understanding of malaria transmission was strongly associated with bednet use. Those working in forest agriculture were significantly more likely to know that mosquitoes transmit malaria but this did not translate into a significantly greater likelihood of using bednets. Furthermore, use of personal protection while woing outdoors was rare, and less than 3% of respondents knew about the insecticide impregnation of bednets. The use of bednets, synthetic repellents and mosquito coils varied between ethnic groups, but was significantly more frequent among those with higher income, more years of education and permanent housing. The reported use of repellents and coils was also more common among women despite their low knowledge of malaria transmission, and low likelihood of having heard information on malaria within the last year. Conclusion The use of personal protection must be increased, particularly among outdoor workers that have higher malaria risk. However, personal protection is widely used and widely

  6. Personality and Information Processing Speed: Independent Influences on Intelligent Performance

    ERIC Educational Resources Information Center

    Bates, Timothy C.; Rock, Andrew

    2004-01-01

    Raven's matrices and inspection time (IT) were recorded from 56 subjects under five arousal levels. Raven's and IT correlated strongly (r = -0.7) as predicted by processing-speed theories of "g." In line with Eysenck's [Eysenck, H. J. (1967). "The biological basis of personality". Springfield, IL: Thomas] arousal theory of extraversion, there was…

  7. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... verify a person's identity in a system of records established and in use before that date. Executive... language that is explicit, easily understood, and not so lengthy as to deter an individual from reading it... records notice(s). If none, the language to be used is: “Routine Use(s): None. However the...

  8. Money makes you reveal more: consequences of monetary cues on preferential disclosure of personal information.

    PubMed

    Mukherjee, Sumitava; Manjaly, Jaison A; Nargundkar, Maithilee

    2013-01-01

    With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure. PMID:24273524

  9. Money makes you reveal more: consequences of monetary cues on preferential disclosure of personal information

    PubMed Central

    Mukherjee, Sumitava; Manjaly, Jaison A.; Nargundkar, Maithilee

    2013-01-01

    With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure. PMID:24273524

  10. Money makes you reveal more: consequences of monetary cues on preferential disclosure of personal information.

    PubMed

    Mukherjee, Sumitava; Manjaly, Jaison A; Nargundkar, Maithilee

    2013-01-01

    With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure.

  11. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON... and Protection Data Bank § 61.14 Confidentiality of Healthcare Integrity and Protection Data...

  12. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON... and Protection Data Bank § 61.14 Confidentiality of Healthcare Integrity and Protection Data...

  13. 75 FR 82041 - Notice of Proposed Information Collection: Comment Request; Floodplain Management and Protection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ... URBAN DEVELOPMENT Notice of Proposed Information Collection: Comment Request; Floodplain Management and... Notice also lists the following information: Title of Proposal: Floodplain Management and Protection of..., ``Floodplain Management,'' and Executive Order 11990, ``Protection of Wetlands.'' Each respondent that...

  14. 77 FR 12875 - Proposed Information Collection; Native American Graves Protection and Repatriation Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-02

    ... National Park Service Proposed Information Collection; Native American Graves Protection and Repatriation... Number ``1024- 0144, Native American Graves Protection and Repatriation Regulations'' in the subject line... entire ICR package free of charge. SUPPLEMENTARY INFORMATION: I. Abstract The Native American...

  15. 19 CFR 206.66 - Limited disclosure of certain confidential business information under administrative protective...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... business information under administrative protective order. 206.66 Section 206.66 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL... certain confidential business information under administrative protective order. In an investigation...

  16. 77 FR 12284 - Access to Confidential Business Information; Protection Strategies Incorporated

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-29

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information; Protection Strategies Incorporated AGENCY... Strategies Incorporated (PSI) of Arlington, VA, to access information which has been submitted to EPA...

  17. Application of Spacesuit Glove Requirements Tools to Athletic and Personal Protective Equipment

    NASA Technical Reports Server (NTRS)

    England, Scott; Benson, Elizabeth; Melsoh, Miranda; Thompson, Shelby; Rajulu, Sudhakar

    2010-01-01

    Despite decades of ongoing improvement, astronauts must still struggle with inhibited dexterity and accelerated fatigue due to the requirement of wearing a pressurized Extra-Vehicular Activity (EVA) glove. Recent research in the Anthropometry and Biomechanics Facility at NASA's Johnson Space Center has focused on developing requirements for improvements in the design of the next generation of EVA glove. In the course of this research, it was decided to expand the scope of the testing to include a variety of commercially available athletic and consumer gloves to help provide a more recognizable comparison for investigators and designers to evaluate the current state of EVA glove mobility and strength. This comparison is being provided with the hope that innovative methods may help commercial development of gloves for various athletic and personal protective endeavors.

  18. Defending the Doomed: Implicit Strategies Concerning Protection of First-Person Shooter Games

    PubMed Central

    Munko, Daniel; Glock, Sabine; Bente, Gary

    2012-01-01

    Abstract Censorship of violent digital games, especially first-person shooter (FPS) games, is broadly discussed between generations. While older people are concerned about possible negative influences of these games, not only players but also nonplayers of the younger net-generation seem to deny any association with real aggressive behavior. Our study aimed at investigating defense mechanisms players and nonplayers use to defend FPS and peers with playing habits. By using a lexical decision task, we found that aggressive concepts are activated by priming the content of FPS but suppressed afterward. Only if participants were instructed to actively suppress aggressive concepts after priming, thought suppression was no longer necessary. Young people still do have negative associations with violent video games. These associations are neglected by implicitly applying defense strategies—independent of own playing habits—to protect this specific hobby, which is common for the net-generation. PMID:22515170

  19. The effect of hyperhydration on physiological and perceived strain during treadmill exercise in personal protective equipment.

    PubMed

    Hostler, David; Gallagher, Michael; Goss, Fredric L; Seitz, Jennifer R; Reis, Steven E; Robertson, Robert J; Northington, William E; Suyama, Joe

    2009-03-01

    Work in personal protective equipment (PPE) impairs thermoregulation causing cardiovascular stress, increased core body temperature, and hypohydration. We examined the effect of pretreating first responders performing treadmill exercise in PPE with an infusion of normal saline on physiological and perceptual strain. Ten (eight males, two females) euhydrated subjects performed treadmill exercise on two occasions wearing a chemical resistant coverall, air purifying respirator, butyl gloves, and heavy boots. During the hyperhydration session, normal saline was rapidly infused through an arm vein prior to donning PPE. Exercise duration and maximum core temperature did not differ between euhydrated and hyperhydrated conditions. Perceptual strain index (PeSI) was higher than physiological strain index (PhSI) in the euhydrated condition (P = 0.002) but neither index differed between the control and experimental conditions. Intravenous hyperhydration did not reduce physiological stress, increase exercise, or influence perceptual strain time when compared to the euhydrated condition in moderately fit individuals. PMID:19037655

  20. Defending the doomed: implicit strategies concerning protection of first-person shooter games.

    PubMed

    Kneer, Julia; Munko, Daniel; Glock, Sabine; Bente, Gary

    2012-05-01

    Censorship of violent digital games, especially first-person shooter (FPS) games, is broadly discussed between generations. While older people are concerned about possible negative influences of these games, not only players but also nonplayers of the younger net-generation seem to deny any association with real aggressive behavior. Our study aimed at investigating defense mechanisms players and nonplayers use to defend FPS and peers with playing habits. By using a lexical decision task, we found that aggressive concepts are activated by priming the content of FPS but suppressed afterward. Only if participants were instructed to actively suppress aggressive concepts after priming, thought suppression was no longer necessary. Young people still do have negative associations with violent video games. These associations are neglected by implicitly applying defense strategies--independent of own playing habits--to protect this specific hobby, which is common for the net-generation. PMID:22515170

  1. Personality.

    PubMed

    Funder, D C

    2001-01-01

    Personality psychology is as active today as at any point in its history. The classic psychoanalytic and trait paradigms are active areas of research, the behaviorist paradigm has evolved into a new social-cognitive paradigm, and the humanistic paradigm is a basis of current work on cross-cultural psychology. Biology and evolutionary theory have also attained the status of new paradigms for personality. Three challenges for the next generation of research are to integrate these disparate approaches to personality (particularly the trait and social-cognitive paradigms), to remedy the imbalance in the person-situation-behavior triad by conceptualizing the basic properties of situations and behaviors, and to add to personality psychology's thin inventory of basic facts concerning the relations between personality and behavior.

  2. 10 CFR 709.24 - Other information provided to a covered person prior to a polygraph examination.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... PROGRAM Safeguarding Privacy and Employee Rights § 709.24 Other information provided to a covered person... asked during the examination; (e) Advise the covered person of the covered person right against...

  3. Personalized Recommendations Based on Users' Information-Centered Social Networks

    ERIC Educational Resources Information Center

    Lee, Danielle

    2013-01-01

    The overwhelming amount of information available today makes it difficult for users to find useful information and as the solution to this information glut problem, recommendation technologies emerged. Among the several streams of related research, one important evolution in technology is to generate recommendations based on users' own social…

  4. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... mental or physical health of the individual or may result in harm to a third party, the following special... medical information may be harmful to the mental or physical health of the individual or to a third party... provide information that is disclosable pursuant to the DoD Freedom of Information Act program (see 32...

  5. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... mental or physical health of the individual or may result in harm to a third party, the following special... medical information may be harmful to the mental or physical health of the individual or to a third party... provide information that is disclosable pursuant to the DoD Freedom of Information Act program (see 32...

  6. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... mental or physical health of the individual or may result in harm to a third party, the following special... medical information may be harmful to the mental or physical health of the individual or to a third party... provide information that is disclosable pursuant to the DoD Freedom of Information Act program (see 32...

  7. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... mental or physical health of the individual or may result in harm to a third party, the following special... medical information may be harmful to the mental or physical health of the individual or to a third party... provide information that is disclosable pursuant to the DoD Freedom of Information Act program (see 32...

  8. The use of stereotypes and individuating information in political person perception.

    PubMed

    Crawford, Jarret T; Jussim, Lee; Madon, Stephanie; Cain, Thomas R; Stevens, Sean T

    2011-04-01

    This article introduces the political person perception model, which identifies conditions under which perceivers rely on stereotypes (party membership), individuating information (issue position), or both in political person perception. Three studies supported the model's predictions. Study 1 showed that perceivers gave primacy to target information that was narrowly relevant to a judgment, whether that information was stereotypic or individuating. Study 2 found that perceivers relied exclusively on individuating information when it was narrowly relevant to the judgment and relied on both stereotype and individuating information when individuating information was not narrowly relevant to the judgment but did imply a political ideology. Study 3 replicated these findings in a more ecologically valid context and showed that people relied on party information in the absence of narrowly relevant policy positions and when individuating information did not imply a political ideology. Implications for political person perception and theories of stereotyping are discussed.

  9. 30 CFR 280.70 - What data and information will be protected from public disclosure?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false What data and information will be protected... CONTINENTAL SHELF Data Requirements Protections § 280.70 What data and information will be protected from public disclosure? In making data and information available to the public, the RD will follow...

  10. Goats favour personal over social information in an experimental foraging task

    PubMed Central

    Baciadonna, Luigi

    2013-01-01

    Animals can use their environments more efficiently by selecting particular sources of information (personal or social), according to specific situations. Group-living animals may benefit from gaining information based on the behaviour of other individuals. Indeed, social information is assumed to be faster and less costly to use than personal information, thus increasing foraging efficiency. However, when food sources change seasonally or are randomly distributed, individual information may become more reliable than social information. The aim of this study was to test the use of conflicting personal versus social information in goats (Capra hircus), in a foraging task. We found that goats relied more on personal than social information, when both types of information were available and in conflict. No effect of social rank was found on the occasions when goats followed other demonstrator goats. Goats are selective browsers/grazers and therefore relying on personal rather than social information could be the most efficient way to find patchily distributed resources in highly variable environments. Studies testing specific assumptions regarding the use of different sources of information can extend our understanding of decision making, including observed patterns of social learning. PMID:24109556

  11. Effect of base layer materials on physiological and perceptual responses to exercise in personal protective equipment.

    PubMed

    Smith, Denise L; Arena, Logan; DeBlois, Jacob P; Haller, Jeannie M; Hultquist, Eric M; Lefferts, Wesley K; Russell, Tim; Wu, Annie; Fehling, Patricia C

    2014-05-01

    Ten men (non-firefighters) completed a 110 min walking/recovery protocol (three 20-min exercise bouts, with recovery periods of 10, 20, and 20 min following successive bouts) in a thermoneutral laboratory while wearing firefighting personal protective equipment over one of four base layers: cotton, modacrylic, wool, and phase change material. There were no significant differences in changes in heart rate, core temperature, rating of perceived exertion, thermal discomfort, and thermal strain among base layers. Sticking to skin, coolness/hotness, and clothing humidity sensation were more favorable (p < 0.05) for wool compared with cotton; no significant differences were identified for the other 7 clothing sensations assessed. Separate materials performance testing of the individual base layers and firefighting ensembles (base layer + turnout gear) indicated differences in thermal protective performance and total heat loss among the base layers and among ensembles; however, differences in heat dissipation did not correspond with physiological responses during exercise or recovery.

  12. The risk of incomplete personal protection coverage in vector-borne disease.

    PubMed

    Miller, Ezer; Dushoff, Jonathan; Huppert, Amit

    2016-02-01

    Personal protection (PP) techniques, such as insecticide-treated nets, repellents and medications, include some of the most important and commonest ways used today to protect individuals from vector-borne infectious diseases. In this study, we explore the possibility that a PP intervention with partial coverage may have the counterintuitive effect of increasing disease burden at the population level, by increasing the biting intensity on the unprotected portion of the population. To this end, we have developed a dynamic model which incorporates parameters that describe the potential effects of PP on vector searching and biting behaviour and calculated its basic reproductive rate, R0. R0 is a well-established threshold of disease risk; the higher R0 is above unity, the stronger the disease onset intensity. When R0 is below unity, the disease is typically unable to persist. The model analysis revealed that partial coverage with popular PP techniques can realistically lead to a substantial increase in the reproductive number. An increase in R0 implies an increase in disease burden and difficulties in eradication efforts within certain parameter regimes. Our findings therefore stress the importance of studying vector behavioural patterns in response to PP interventions for future mitigation of vector-borne diseases. PMID:26911486

  13. Foraging Bumble Bees Weigh the Reliability of Personal and Social Information.

    PubMed

    Dunlap, Aimee S; Nielsen, Matthew E; Dornhaus, Anna; Papaj, Daniel R

    2016-05-01

    Many animals, including insects, make decisions using both personally gathered information and social information derived from the behavior of other, usually conspecific, individuals [1]. Moreover, animals adjust use of social versus personal information appropriately under a variety of experimental conditions [2-5]. An important factor in how information is used is the information's reliability, that is, how consistently the information is correlated with something of relevance in the environment [6]. The reliability of information determines which signals should be attended to during communication [6-9], which types of stimuli animals should learn about, and even whether learning should evolve [10, 11]. Here, we show that bumble bees (Bombus impatiens) account for the reliability of personally acquired information (which flower color was previously associated with reward) and social information (which flowers are chosen by other bees) in making foraging decisions; however, the two types of information are not treated equally. Bees prefer to use social information if it predicts a reward at all, but if social information becomes entirely unreliable, flower color will be used instead. This greater sensitivity to the reliability of social information, and avoidance of conspecifics in some cases, may reflect the specific ecological circumstances of bee foraging. Overall, the bees' ability to make decisions based on both personally acquired and socially derived information, and the relative reliability of both, demonstrates a new level of sophistication and flexibility in animal, particularly insect, decision-making.

  14. Foraging Bumble Bees Weigh the Reliability of Personal and Social Information.

    PubMed

    Dunlap, Aimee S; Nielsen, Matthew E; Dornhaus, Anna; Papaj, Daniel R

    2016-05-01

    Many animals, including insects, make decisions using both personally gathered information and social information derived from the behavior of other, usually conspecific, individuals [1]. Moreover, animals adjust use of social versus personal information appropriately under a variety of experimental conditions [2-5]. An important factor in how information is used is the information's reliability, that is, how consistently the information is correlated with something of relevance in the environment [6]. The reliability of information determines which signals should be attended to during communication [6-9], which types of stimuli animals should learn about, and even whether learning should evolve [10, 11]. Here, we show that bumble bees (Bombus impatiens) account for the reliability of personally acquired information (which flower color was previously associated with reward) and social information (which flowers are chosen by other bees) in making foraging decisions; however, the two types of information are not treated equally. Bees prefer to use social information if it predicts a reward at all, but if social information becomes entirely unreliable, flower color will be used instead. This greater sensitivity to the reliability of social information, and avoidance of conspecifics in some cases, may reflect the specific ecological circumstances of bee foraging. Overall, the bees' ability to make decisions based on both personally acquired and socially derived information, and the relative reliability of both, demonstrates a new level of sophistication and flexibility in animal, particularly insect, decision-making. PMID:27133871

  15. Personalization.

    ERIC Educational Resources Information Center

    Shore, Rebecca Martin

    1996-01-01

    Describes how a typical high school in Huntington Beach, California, curbed disruptive student behavior by personalizing the school experience for "problem" students. Through mostly volunteer efforts, an adopt-a-kid program was initiated that matched kids' learning styles to adults' personality styles and resulted in fewer suspensions and numerous…

  16. Personality-Informed Interventions for Healthy Aging: Conclusions from a National Institute on Aging Work Group

    ERIC Educational Resources Information Center

    Chapman, Benjamin P.; Hampson, Sarah; Clarkin, John

    2014-01-01

    We describe 2 frameworks in which personality dimensions relevant to health, such as Conscientiousness, can be used to inform interventions designed to promote health aging. First, contemporary data and theory do not suggest that personality is "immutable," but instead focus on questions of who changes, in what way, why, when, and how.…

  17. Using Personal Computers To Acquire Special Education Information. Revised. ERIC Digest #429.

    ERIC Educational Resources Information Center

    ERIC Clearinghouse on Handicapped and Gifted Children, Reston, VA.

    This digest offers basic information about resources, available to users of personal computers, in the area of professional development in special education. Two types of resources are described: those that can be purchased on computer diskettes and those made available by linking personal computers through electronic telephone networks. Resources…

  18. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as...

  19. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as...

  20. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as defined in section...

  1. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as...

  2. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as...

  3. Exploring New Potentials of Blogs for Learning: Can Children Use Blogs for Personal Information Management (PIM)?

    ERIC Educational Resources Information Center

    Yeo, Hwan-Ik; Lee, Yekyung Lisa

    2014-01-01

    This study explores the use of blogs for personal information management (PIM) as a learning tool that could bring increased efficiency and academic self-efficacy for carrying out learning tasks. In order to identify the uses and effects of using blogs for PIM by children, a control group that used personal spaces within the class website and an…

  4. Personal Privacy in an Information Society: What are the Trade-Offs? Insights into Consumer Issues.

    ERIC Educational Resources Information Center

    J.C. Penney Co., Inc., New York, NY.

    Insights into Consumer Issues is one of a group of educational publications and teaching units that J.C. Penney provides for consumer educators as a public service. This folder illustrates that although computerized processing of personal information has brought considerable convenience, the potential risk to personal privacy is of increasing…

  5. 34 CFR 303.401 - Definitions of consent, native language, and personally identifiable information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 34 Education 2 2011-07-01 2010-07-01 true Definitions of consent, native language, and personally... Definitions of consent, native language, and personally identifiable information. As used in this subpart— (a... which consent is sought, in the parent's native language or other mode of communication; (2) The...

  6. Personality-Informed Interventions for Healthy Aging: Conclusions From a National Institute on Aging Workgroup

    PubMed Central

    Chapman, Benjamin P.; Hampson, Sarah; Clarkin, John

    2013-01-01

    We describe two frameworks in which personality dimensions relevant to health, such as Conscientiousness, can be used to inform interventions designed to promote health aging. First, contemporary data and theory do not suggest that personality is “immutable”, but instead focus on questions of who changes, in what way, why, when, and how. In fact, the notion that personality could be changed was part and parcel of many schools of psychotherapy, which suggested that long term and meaningful change in symptoms could not be achieved without change in relevant aspects of personality. We review intervention research documenting change in personality. Based on an integrative view of personality as a complex system, we describe a “bottom-up” model of change in which interventions to change basic personality processes eventuate in changes at the trait level. A second framework leverages the descriptive and predictive power of personality to tailor individual risk prediction and treatment, as well as refine public health programs, to the relevant dispositional characteristics of the target population. These methods dovetail with and add a systematic and rigorous psychosocial dimension to the personalized medicine and patient-centeredness movements in medicine. In addition to improving health through earlier intervention and increased fit between treatments and persons, cost-effectiveness improvements can be realized by more accurate resource allocation. Numerous examples from the personality, health, and aging literature on Conscientiousness and other traits are provided throughout, and we conclude with a series of recommendations for research in these emerging areas. PMID:23978300

  7. Information security governance: a risk assessment approach to health information systems protection.

    PubMed

    Williams, Patricia A H

    2013-01-01

    It is no small task to manage the protection of healthcare data and healthcare information systems. In an environment that is demanding adaptation to change for all information collection, storage and retrieval systems, including those for of e-health and information systems, it is imperative that good information security governance is in place. This includes understanding and meeting legislative and regulatory requirements. This chapter provides three models to educate and guide organisations in this complex area, and to simplify the process of information security governance and ensure appropriate and effective measures are put in place. The approach is risk based, adapted and contextualized for healthcare. In addition, specific considerations of the impact of cloud services, secondary use of data, big data and mobile health are discussed.

  8. Information security governance: a risk assessment approach to health information systems protection.

    PubMed

    Williams, Patricia A H

    2013-01-01

    It is no small task to manage the protection of healthcare data and healthcare information systems. In an environment that is demanding adaptation to change for all information collection, storage and retrieval systems, including those for of e-health and information systems, it is imperative that good information security governance is in place. This includes understanding and meeting legislative and regulatory requirements. This chapter provides three models to educate and guide organisations in this complex area, and to simplify the process of information security governance and ensure appropriate and effective measures are put in place. The approach is risk based, adapted and contextualized for healthcare. In addition, specific considerations of the impact of cloud services, secondary use of data, big data and mobile health are discussed. PMID:24018517

  9. 77 FR 35709 - Notice of Submission of Proposed Information Collection to OMB; Personal Financial and Credit...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ... URBAN DEVELOPMENT Notice of Submission of Proposed Information Collection to OMB; Personal Financial and Credit Statement AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice. SUMMARY: The proposed information collection requirement described below has been submitted to the Office of...

  10. 78 FR 13158 - Proposed Information Collection (Authorization To Disclose Personal Beneficiary/Claimant...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-26

    ... Information to a Third Party) Activity: Comment Request AGENCY: Veterans Benefits Administration, Department... personal beneficiary or claims information to a third party. DATES: Written comments and recommendations on... Beneficiary/Claimant Information to a Third Party, VA Form 21-0845. OMB Control Number: 2900-0736. Type...

  11. Adults Living with Type 2 Diabetes: Kept Personal Health Information Items as Expressions of Need

    ERIC Educational Resources Information Center

    Whetstone, Melinda

    2013-01-01

    This study investigated personal information behavior and information needs that 21 adults managing life with Type 2 diabetes identify explicitly and implicitly during discussions of item acquisition and use of health information items that are kept in their homes. Research drew upon a naturalistic lens, in that semi-structured interviews were…

  12. Informal Learning in Professional and Personal Life: Implications for Instructional Design and Performance Improvement

    ERIC Educational Resources Information Center

    Klein, James D.; Moore, Alison L.

    2016-01-01

    This article focuses on informal learning and its implications for instructional design and performance improvement. The authors begin by sharing a story of how a novice instructional designer employs informal learning strategies in her professional and personal life. Next, they offer a definition of informal learning that encompasses both…

  13. 78 FR 53478 - Proposed Information Collection; United States Park Police Personal History Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-29

    ... National Park Service Proposed Information Collection; United States Park Police Personal History Statement... information about this IC, contact Major Scott Fear, United States Park Police, 1100 Ohio Drive SW...). SUPPLEMENTARY INFORMATION: I. Abstract The United States Park Police (USPP) is a unit of the National...

  14. 32 CFR 719.115 - Release of information pertaining to accused persons; spectators at judicial sessions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .... The provisions of this section are not intended to restrict the release of information designed to... 32 National Defense 5 2010-07-01 2010-07-01 false Release of information pertaining to accused... Matters § 719.115 Release of information pertaining to accused persons; spectators at judicial...

  15. Dissemination of Information in Developing Countries: The Personal Computer and beyond

    ERIC Educational Resources Information Center

    Wong, Wai-Man

    2005-01-01

    With the blooming of information in digital format, dissemination of information is becoming a big challenge for developing countries. It is not only due to the limited provision of personal computers--in addition, the technological infrastructure and the ability to access information are also becoming major concerns in developing countries. This…

  16. Personalizing Information Retrieval Using Task Features, Topic Knowledge, and Task Products

    ERIC Educational Resources Information Center

    Liu, Jingjing

    2010-01-01

    Personalization of information retrieval tailors search towards individual users to meet their particular information needs by taking into account information about users and their contexts, often through implicit sources of evidence such as user behaviors and contextual factors. The current study looks particularly at users' dwelling behavior,…

  17. "Doing Ethics" in the Context of Sharing Patients' Personal Health Information

    ERIC Educational Resources Information Center

    Somerville, Margaret A.

    2004-01-01

    There are at present two inconsistencies with respect to the sharing of personal health information (PHI) among health care professionals caring for a patient whom the information concerns. First, there is an inconsistency between what is in theory the ethics and law governing the confidentiality and privacy of this information--it may only be…

  18. 78 FR 38452 - Agency Information Collection (Authorization To Disclose Personal Beneficiary/Claimant...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-26

    ... to a Third Party) Activity Under OMB Review AGENCY: Veterans Benefits Administration, Department of... Personal Beneficiary/Claimant Information to a Third Party, VA Form 21-0845. OMB Control Number:...

  19. 78 FR 73817 - Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property (FFP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ..., Forest Service, Fire and Aviation Management (F&AM), Attn: Melissa Frey, 1400 Independence Ave. SW... Forest Service Information Collection; Federal Excess Personal Property (FEPP) and Firefighter Property (FFP) Program Cooperative Agreements and Inventory AGENCY: Forest Service, USDA. ACTION:...

  20. 38 CFR 74.25 - What types of personally identifiable information will VA collect?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... DEPARTMENT OF VETERANS AFFAIRS (CONTINUED) VETERANS SMALL BUSINESS REGULATIONS Records Management § 74.25 What types of personally identifiable information will VA collect? In order to establish owner... in a specific business seeking to obtain verified status....

  1. An Investigation of Career and Job Satisfaction in Relation to Personality Traits of Information Professionals

    ERIC Educational Resources Information Center

    Williamson, Jeanine M.; Pemberton, Anne E.; Lounsbury, John W.

    2005-01-01

    This study collected data on personality characteristics, job satisfaction, and career satisfaction from more than 1,300 information professionals. Respondents included academic reference librarians, archivists, catalogers, distance education librarians, public librarians, records managers, school media specialists, special librarians, systems…

  2. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., subpart C of 32 CFR part 286 (“DoD Freedom of Information Act Program”) as “For Official Use Only,” and... decomposition, pulping, pulverizing, shredding, or mutilation are acceptable. For electronic records, and...

  3. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., subpart C of 32 CFR part 286 (“DoD Freedom of Information Act Program”) as “For Official Use Only,” and... decomposition, pulping, pulverizing, shredding, or mutilation are acceptable. For electronic records, and...

  4. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., subpart C of 32 CFR part 286 (“DoD Freedom of Information Act Program”) as “For Official Use Only,” and... decomposition, pulping, pulverizing, shredding, or mutilation are acceptable. For electronic records, and...

  5. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., subpart C of 32 CFR part 286 (“DoD Freedom of Information Act Program”) as “For Official Use Only,” and... decomposition, pulping, pulverizing, shredding, or mutilation are acceptable. For electronic records, and...

  6. 32 CFR 327.6 - Collecting personal information

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for De... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used...

  7. [Personal genetic information and ethical consideration: from medical viewpoint].

    PubMed

    Morisaki, Takayuki

    2009-06-01

    Rapid progress in human genetic research has identified not only the entire DNA sequence of human genome DNA but the information on an individual risk to a hereditary disease or common diseases. Although individual genetic information will help to establish development of disease prevention method or better new therapeutic procedure, it will also raise quite a few ethical issues. Here, recent research progress on this field and corresponding regulatory procedures by professionals and governmental (Japan and other countries)/intergovernmental body are discussed.

  8. Developing COSHH Essentials: dermal exposure, personal protective equipment and first aid.

    PubMed

    Garrod, A N I; Rajan-Sithamparanadarajah, R

    2003-10-01

    The 'control banding' approach in COSHH Essentials combines the potential for harm with the potential for exposure by inhalation to band measures to control exposure at source, as generic strategies. These are simply adapted to specific tasks and circumstances to produce specific control advice. Where it is not possible or practical to use this control advice, the control bands can suggest adequate respiratory protective equipment using 'protection factors'. Proposals in the paper enable the user to identify the right level of respiratory protective equipment (RPE), and to begin selecting suitable RPE. Selection is made through a formatted questionnaire, enabling the user to give the right facts to the supplier. COSHH Essentials applies mainly to exposure by inhalation. However, skin exposure is very common and uptake via the skin can be an important contributor to body dose. This paper examines the factors concerning skin exposure, and the options for banding the potential for harm to the skin or via the skin. Proposals have then been made for dermal exposure control. Planning for emergencies is an important facet of risk control. Proposals are outlined to band chemical hazards for emergency planning according to a minimum of information, i.e. the danger symbol on a product label.

  9. Developing COSHH Essentials: dermal exposure, personal protective equipment and first aid.

    PubMed

    Garrod, A N I; Rajan-Sithamparanadarajah, R

    2003-10-01

    The 'control banding' approach in COSHH Essentials combines the potential for harm with the potential for exposure by inhalation to band measures to control exposure at source, as generic strategies. These are simply adapted to specific tasks and circumstances to produce specific control advice. Where it is not possible or practical to use this control advice, the control bands can suggest adequate respiratory protective equipment using 'protection factors'. Proposals in the paper enable the user to identify the right level of respiratory protective equipment (RPE), and to begin selecting suitable RPE. Selection is made through a formatted questionnaire, enabling the user to give the right facts to the supplier. COSHH Essentials applies mainly to exposure by inhalation. However, skin exposure is very common and uptake via the skin can be an important contributor to body dose. This paper examines the factors concerning skin exposure, and the options for banding the potential for harm to the skin or via the skin. Proposals have then been made for dermal exposure control. Planning for emergencies is an important facet of risk control. Proposals are outlined to band chemical hazards for emergency planning according to a minimum of information, i.e. the danger symbol on a product label. PMID:14530184

  10. Information quantity and quality affect the realistic accuracy of personality judgment.

    PubMed

    Letzring, Tera D; Wells, Shannon M; Funder, David C

    2006-07-01

    Triads of unacquainted college students interacted in 1 of 5 experimental conditions that manipulated information quantity (amount of information) and information quality (relevance of information to personality), and they then made judgments of each others' personalities. To determine accuracy, the authors compared the ratings of each judge to a broad-based accuracy criterion composed of personality ratings from 3 types of knowledgeable informants (the self, real-life acquaintances, and clinician-interviewers). Results supported the hypothesis that information quantity and quality would be positively related to objective knowledge about the targets and realistic accuracy. Interjudge consensus and self-other agreement followed a similar pattern. These findings are consistent with expectations based on models of the process of accurate judgment (D. C. Funder, 1995, 1999) and consensus (D. A. Kenny, 1994). PMID:16834483

  11. A tiered-layered-staged model for informed consent in personal genome testing.

    PubMed

    Bunnik, Eline M; Janssens, A Cecile J W; Schermer, Maartje H N

    2013-06-01

    In recent years, developments in genomics technologies have led to the rise of commercial personal genome testing (PGT): broad genome-wide testing for multiple diseases simultaneously. While some commercial providers require physicians to order a personal genome test, others can be accessed directly. All providers advertise directly to consumers and offer genetic risk information about dozens of diseases in one single purchase. The quantity and the complexity of risk information pose challenges to adequate pre-test and post-test information provision and informed consent. There are currently no guidelines for what should constitute informed consent in PGT or how adequate informed consent can be achieved. In this paper, we propose a tiered-layered-staged model for informed consent. First, the proposed model is tiered as it offers choices between categories of diseases that are associated with distinct ethical, personal or societal issues. Second, the model distinguishes layers of information with a first layer offering minimal, indispensable information that is material to all consumers, and additional layers offering more detailed information made available upon request. Finally, the model stages informed consent as a process by feeding information to consumers in each subsequent stage of the process of undergoing a test, and by accommodating renewed consent for test result updates, resulting from the ongoing development of the science underlying PGT. A tiered-layered-staged model for informed consent with a focus on the consumer perspective can help overcome the ethical problems of information provision and informed consent in direct-to-consumer PGT.

  12. Pattern of use of personal protective equipments and measures during application of pesticides by agricultural workers in a rural area of Ahmednagar district, India

    PubMed Central

    Singh, Bhoopendra; Gupta, Mudit Kumar

    2009-01-01

    Background: Pesticides, despite their known toxicity, are widely used in developing countries for agricultural purposes. Objectives: To find various patterns of hardware use for spraying of insecticides, prevalent storage practice adopted by the user, types of personal protective equipments used for the handling of chemicals; to detect dangerous practices and the extent to which safety norms being followed by the users during the application/treatments, and finally their knowledge concerning the risks of pesticides. Materials and Methods: The agriculture workers who had been involved in pesticide application for agricultural purpose were interviewed face-to-face to gain information on the following determinants of pesticide exposure: Types, treatment equipment, use of personal protection and safety measures during the application/treatments and knowledge of the risks of pesticide exposure. Results: Hundred workers, aged between 21 and 60 years old, were included. Pesticides were mostly applied with manual equipment using Knapsack (70%) and only 5% farmers were using Tractor-mounted sprayer. Workers frequently performed tasks involving additional exposure to pesticides (mixing chemicals, 66%, or washing equipment, 65%). Majority of the workers/applicators used no personal protection measures or used it defectively/partially. Most of the workers/respondents (77%) did not bother for safety and health risks of pesticide exposure. Conclusions: Workers involved in pesticide application use personal protection measures very poorly and defectively. Almost half of the applicators were not following right direction with respect to wind direction while spraying, thus it increase the risk of exposure. There is a clear need to develop specific training and prevention programs for these workers. The determinants of pesticide exposure in agricultural workers described in this study should be properly assessed in epidemiological studies of the health effects of pesticides on

  13. Protecting health information privacy in research: what's an ethics committee like yours doing in a job like this?

    PubMed

    Thomson, Colin

    2006-02-01

    The Commonwealth and State legislation designed to protect the privacy of personal health information has attracted the criticism that the constraints imposed on the use of the information in research obstructs that research. A central and common feature of the legislation is the reliance upon the review by human research ethics committees of research that proposes to use personal health information for research without prior consent from those whose information it is. The origins of this reliance are explored and explained and it is suggested that this has proved to be an inappropriate policy choice. The extension of the reliance is then described and the conceptual, procedural, workload and structural consequences of requiring these voluntary committees to conform to legislative standards of review of issues of the public interest are critically examined. In recent reviews of the Commonwealth legislation, there is recognition of the underlying uncertainty as to the appropriate balance between protection of personal privacy and the promotion of beneficial research. In the further exploration of these matters that those reviews recommended, a close and critical examination of the wisdom of continuing to rely on ethics committees is needed.

  14. Interactional Features of Repair Negotiation in NS-NNS Interaction on Two Task Types: Information Gap and Personal Information Exchange

    ERIC Educational Resources Information Center

    Kitajima, Ryu

    2013-01-01

    The studies in task-based approaches in second language acquisition claim that controlled and goal convergent tasks such as information gap tasks surpass open-ended conversations such as personal information exchange tasks for the development of the learner's interlanguage, in that the formers promote more repair negotiation. And yet, few studies…

  15. 16 CFR 1112.49 - How may a person submit information alleging grounds for adverse action, and what information...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... TO THIRD PARTY CONFORMITY ASSESSMENT BODIES Adverse Actions: Types, Grounds, Allegations, Procedural Requirements, and Publication § 1112.49 How may a person submit information alleging grounds for adverse action... grounds for adverse action, and what information should be submitted? 1112.49 Section 1112.49...

  16. Exploiting personalized information for reagent selection in drug design.

    PubMed

    Boström, Jonas; Falk, Niklas; Tyrchan, Christian

    2011-03-01

    Drug discovery is currently being industrialized. This fact is confusing, given that it is happening in times when the rest of the world has entered the subsequent information age. Here, we introduce a concept and an infrastructure for the now popular and well-known recommender systems in the context of exploiting one of the cornerstones of drug design: chemical reagent selection. The goal is to create and transfer information openly to facilitate intuition and serendipity in drug design. The system is tailored to highlight reagents from our corporate reagent database; reagents that a chemist might not have considered based purely on their own experience.

  17. 78 FR 16539 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Personal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-15

    ... equipment (PPE) for the eyes, face, head, extremities, torso, and respiratory system whenever workers are... shields, protective barriers, life-saving equipment, personal fall arrest systems, and positioning device systems that meet the applicable provisions of the subpart. This ICR covers hazard assessment...

  18. No More "Personal Notes"? Data Protection Policy and Practice in Higher Education Counselling Services in the UK

    ERIC Educational Resources Information Center

    Jenkins, Peter; Potter, Steve

    2007-01-01

    The introduction of the Data Protection Act 1998 has presented significant challenges to counselling recording, through its detailed requirements for the processing of personal data. The impact of these changes on recording in Higher Education counselling services in the UK is explored, using responses from an electronic survey of universities and…

  19. Personal Protective Equipment Use and Safety Behaviors among Farm Adolescents: Gender Differences and Predictors of Work Practices

    ERIC Educational Resources Information Center

    Reed, Deborah B.; Browning, Steven R.; Westneat, Susan C.; Kidd, Pamela S.

    2006-01-01

    Context: Children on farms perform work that places them at risk for acute and chronic negative health outcomes. Despite strategies for preventing and reducing the risk of disease and injury, children's use of personal protective equipment and safety equipped farm machinery has generally remained unreported. Purpose: This paper reports the use of…

  20. Community Violence and Psychological Distress: The Protective Effects of Emotional Social Support and Sense of Personal Control among Older Adolescents

    ERIC Educational Resources Information Center

    Rosenthal, Beth Spenciner; Wilson, W. Cody

    2008-01-01

    This empirical study investigated three mechanisms of protection (preventive, compensatory, buffering) for two factors (emotional social support, sense of personal control) in the relationship between exposure to community violence and psychological distress among 947 diverse, older adolescents. Findings indicate that social support and sense of…

  1. 6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Disclosure of Protected Critical Infrastructure... PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.8 Disclosure of Protected Critical Infrastructure... Infrastructure Protection, or either's designee may choose to provide or authorize access to PCII under one...

  2. 6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Disclosure of Protected Critical Infrastructure... PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.8 Disclosure of Protected Critical Infrastructure... Infrastructure Protection, or either's designee may choose to provide or authorize access to PCII under one...

  3. 40 CFR 174.9 - Confidential business information claims for plant-incorporated protectant submissions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... claims for plant-incorporated protectant submissions. 174.9 Section 174.9 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PROCEDURES AND REQUIREMENTS FOR PLANT-INCORPORATED PROTECTANTS General Provisions § 174.9 Confidential business information claims for...

  4. 40 CFR 174.9 - Confidential business information claims for plant-incorporated protectant submissions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... claims for plant-incorporated protectant submissions. 174.9 Section 174.9 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PROCEDURES AND REQUIREMENTS FOR PLANT-INCORPORATED PROTECTANTS General Provisions § 174.9 Confidential business information claims for...

  5. 40 CFR 174.9 - Confidential business information claims for plant-incorporated protectant submissions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... claims for plant-incorporated protectant submissions. 174.9 Section 174.9 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PROCEDURES AND REQUIREMENTS FOR PLANT-INCORPORATED PROTECTANTS General Provisions § 174.9 Confidential business information claims for...

  6. 40 CFR 174.9 - Confidential business information claims for plant-incorporated protectant submissions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... claims for plant-incorporated protectant submissions. 174.9 Section 174.9 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PROCEDURES AND REQUIREMENTS FOR PLANT-INCORPORATED PROTECTANTS General Provisions § 174.9 Confidential business information claims for...

  7. 40 CFR 174.9 - Confidential business information claims for plant-incorporated protectant submissions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... claims for plant-incorporated protectant submissions. 174.9 Section 174.9 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PROCEDURES AND REQUIREMENTS FOR PLANT-INCORPORATED PROTECTANTS General Provisions § 174.9 Confidential business information claims for...

  8. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.

    PubMed

    Namoğlu, Nihan; Ulgen, Yekta

    2013-01-01

    Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects. PMID:23823398

  9. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.

    PubMed

    Namoğlu, Nihan; Ulgen, Yekta

    2013-01-01

    Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects.

  10. 32 CFR 327.6 - Collecting personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for De... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to... mandatory; and (v) The effects on the individual if he or she chooses not to provide the...

  11. 32 CFR 327.6 - Collecting personal information

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for De... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to... mandatory; and (v) The effects on the individual if he or she chooses not to provide the...

  12. 32 CFR 327.6 - Collecting personal information

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for De... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to... mandatory; and (v) The effects on the individual if he or she chooses not to provide the...

  13. 32 CFR 327.6 - Collecting personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for De... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used to... mandatory; and (v) The effects on the individual if he or she chooses not to provide the...

  14. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... language that is explicit, easily understood, and not so lengthy as to deter an individual from reading it... records notice(s). If none, the language to be used is: “Routine Use(s): None. However the ‘Blanket... requested information; (ii) Within the body with a notation of its location below the title; (iii) On...

  15. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... language that is explicit, easily understood, and not so lengthy as to deter an individual from reading it... records notice(s). If none, the language to be used is: “Routine Use(s): None. However the ‘Blanket... requested information; (ii) Within the body with a notation of its location below the title; (iii) On...

  16. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... language that is explicit, easily understood, and not so lengthy as to deter an individual from reading it... records notice(s). If none, the language to be used is: “Routine Use(s): None. However the ‘Blanket... requested information; (ii) Within the body with a notation of its location below the title; (iii) On...

  17. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2010-01-01 2010-01-01 false Protected Critical Infrastructure...

  18. 45 CFR 61.12 - Requesting information from the Healthcare Integrity and Protection Data Bank.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Integrity and Protection Data Bank. 61.12 Section 61.12 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION... Integrity and Protection Data Bank § 61.12 Requesting information from the Healthcare Integrity...

  19. 45 CFR 61.12 - Requesting information from the Healthcare Integrity and Protection Data Bank.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Integrity and Protection Data Bank. 61.12 Section 61.12 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION... Integrity and Protection Data Bank § 61.12 Requesting information from the Healthcare Integrity...

  20. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2014-01-01 2014-01-01 false Protected Critical Infrastructure...

  1. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2013-01-01 2013-01-01 false Protected Critical Infrastructure...

  2. Development of personal pollen information-the next generation of pollen information and a step forward for hay fever sufferers.

    PubMed

    Kmenta, Maximilian; Bastl, Katharina; Jäger, Siegfried; Berger, Uwe

    2014-10-01

    Pollen allergies affect a large part of the European population and are considered likely to increase. User feedback indicates that there are difficulties in providing proper information and valid forecasts using traditional methods of aerobiology due to a variety of factors. Allergen content, pollen loads, and pollen allergy symptoms vary per region and year. The first steps in challenging such issues have already been undertaken. A personalized pollen-related symptom forecast is thought to be a possible answer. However, attempts made thus far have not led to an improvement in daily forecasting procedures. This study describes a model that was launched in 2013 in Austria to provide the first available personal pollen information. This system includes innovative forecast models using bi-hourly pollen data, traditional pollen forecasts based on historical data, meteorological data, and recent symptom data from the patient's hayfever diary. Furthermore, it calculates the personal symptom load in real time, in particular, the entries of the previous 5 days, to classify users. The personal pollen information was made available in Austria on the Austrian pollen information website and via a mobile pollen application, described herein for the first time. It is supposed that the inclusion of personal symptoms will lead to major improvements in pollen information concerning hay fever sufferers.

  3. Using reduced personal protective equipment in an endemically infected mouse colony.

    PubMed

    Baker, Samuel W; Prestia, Kevin A; Karolewski, Brian

    2014-05-01

    Personal protective equipment (PPE) frequently is used to reduce the risk of spreading adventitial diseases in rodent colonies. The PPE worn often reflects the historic practices of the research institution rather than published performance data. Standard PPE for a rodent facility typically consists of a disposable hair bonnet, gown, face mask, shoe covers, and gloves, which are donned on facility entry and removed on exiting. This study evaluated the effect of a reduced PPE protocol on disease spread within an endemically infected mouse colony. In the reduced protocol, only the parts of the wearer that came in direct contact with the mice or their environment were covered with PPE. To test the reduced PPE protocol, proven naïve mice were housed in a facility endemically infected with murine norovirus and mouse hepatitis virus for 12 wk. During that time, routine husbandry operations were conducted by using either the standard or reduced PPE protocols. All study mice remained free of virus antibody when reduced PPE was implemented. These results indicate that reduced PPE is adequate for disease containment when correct techniques for handling microisolation caging are used. Reducing the amount of PPE used in an animal facility affords considerable cost savings yet limits the risk of disease spread. PMID:24827569

  4. Using Reduced Personal Protective Equipment in an Endemically Infected Mouse Colony

    PubMed Central

    Baker, Samuel W; Prestia, Kevin A; Karolewski, Brian

    2014-01-01

    Personal protective equipment (PPE) frequently is used to reduce the risk of spreading adventitial diseases in rodent colonies. The PPE worn often reflects the historic practices of the research institution rather than published performance data. Standard PPE for a rodent facility typically consists of a disposable hair bonnet, gown, face mask, shoe covers, and gloves, which are donned on facility entry and removed on exiting. This study evaluated the effect of a reduced PPE protocol on disease spread within an endemically infected mouse colony. In the reduced protocol, only the parts of the wearer that came in direct contact with the mice or their environment were covered with PPE. To test the reduced PPE protocol, proven naïve mice were housed in a facility endemically infected with murine norovirus and mouse hepatitis virus for 12 wk. During that time, routine husbandry operations were conducted by using either the standard or reduced PPE protocols. All study mice remained free of virus antibody when reduced PPE was implemented. These results indicate that reduced PPE is adequate for disease containment when correct techniques for handling microisolation caging are used. Reducing the amount of PPE used in an animal facility affords considerable cost savings yet limits the risk of disease spread. PMID:24827569

  5. Ebola virus disease: The use of fluorescents as markers of contamination for personal protective equipment.

    PubMed

    Bell, Todd; Smoot, John; Patterson, Justin; Smalligan, Roger; Jordan, Richard

    2015-01-01

    The recent Ebola virus disease (EVD) outbreak has created interest in personal protective equipment (PPE) content and usage. PPE testing has historically been done by individual component, rather than as a bundle for contact isolation. Fluorescent agents are commonly used in training for infection control techniques. The purpose of our study was to compare 2 PPE bundles and to evaluate the feasibility of fluorescent markers as an assessment tool for PPE effectiveness. Eight healthcare providers volunteered for this preliminary study. Participants were randomized to 1 of 2 PPE bundles that meet current (October 20, 2014) CDC recommendations. One PPE bundle utilized commercial EVD-recommended components. The other PPE bundle used components already available at local hospitals or retail stores. Participants were also randomized to standard or high volume exposures (HVE) to simulate fluid splash. Each participant was assisted in PPE donning and doffing by an experienced trainer. A training mannequin was contaminated with fluorescent agents to simulate bodily fluids. Participants were then given clinical tasks to care for the EVD "patient." De-gowned participants were examined under "black light" for fluorescence indicative of contamination. One participant in each PPE arm had evidence of contamination. One of the contamination events was suspected during the patient care exercise. The other contamination event was not suspected until black light examination. In spite of a large difference in cost of PPE, the two bundle arms performed similarly. Bundle testing using fluorescent markers could help identify optimal PPE systems.

  6. Attitude towards personal protective equipment in the French nuclear fuel industry.

    PubMed

    Guseva Canu, Irina; Faust, Ségolène; Canioni, Pierre; Collomb, Philippe; Samson, Eric; Laurier, Dominique

    2013-06-01

    This descriptive cross-sectional study examines the compliance of workers from the European Gaseous Diffusion Uranium Enrichment Consortium (EURODIF) with personal protection equipment (PPE) in view of the various hazards in the nuclear fuel industry. The PPE inventory was drawn up by an industrial hygienist in charge of the PPE at EURODIF. Two hundred and twenty seven (10%) randomly selected, active and retired, EURODIF workers filled in a questionnaire on their attitudes towards PPE. Exposure data from the EURODIF job exposure matrix were used to examine whether PPE usage varies according to exposure level. The study suggests a PPE usage profile that varies depending on the hazards present and PPE available. Anti-uranium PPE and gloves were among the best rated, while anti-spray goggles were the least used. We found that, for most hazards known to cause cancer or irreversible health damage, PPE usage varied according to exposure (homogeneity test, p<0.05; trend test, p<0.05). The continuous use of PPE among workers should be encouraged through improvements to the PPE management system. A precise model of individual exposure can only be designed if the use and efficiency of PPE are taken into consideration.

  7. The Impact of Firefighter Personal Protective Equipment and Treadmill Protocol on Maximal Oxygen Uptake

    PubMed Central

    Lee, Joo-Young; Bakri, Ilham; Kim, Jung-Hyun; Son, Su-Young; Tochihara, Yutaka

    2015-01-01

    This study investigated the effects of firefighter personal protective equipment (PPE) on the determination of maximal oxygen uptake (VO2max) while using two different treadmill protocols: a progressive incline protocol (PIP) and a progressive speed protocol (PSP), with three clothing conditions (Light-light clothing; Boots-PPE with rubber boots; Shoes-PPE with running shoes). Bruce protocol with Light was performed for a reference test. Results showed there was no difference in VO2max between Bruce Light, PIP Light, and PSP Light. However, VO2max was reduced in Boots and Shoes with shortened maximal performance time (7 and 6 min reduced for PIP Boots and Shoes, respectively; 11 and 9 min reduced for PSP Boots and Shoes, respectively), whereas the increasing rate of VO2 in Boots and Shoes during submaximal exercise was greater compared with Light. Wearing firefighter boots compared with wearing running shoes also significantly affected submaximal VO2 but not VO2max. These results suggest that firefighters’ maximal performance determined from a typical VO2max test without wearing PPE may overestimate the actual performance capability of firefighters wearing PPE. PMID:23668854

  8. Ebola virus disease: The use of fluorescents as markers of contamination for personal protective equipment.

    PubMed

    Bell, Todd; Smoot, John; Patterson, Justin; Smalligan, Roger; Jordan, Richard

    2015-01-01

    The recent Ebola virus disease (EVD) outbreak has created interest in personal protective equipment (PPE) content and usage. PPE testing has historically been done by individual component, rather than as a bundle for contact isolation. Fluorescent agents are commonly used in training for infection control techniques. The purpose of our study was to compare 2 PPE bundles and to evaluate the feasibility of fluorescent markers as an assessment tool for PPE effectiveness. Eight healthcare providers volunteered for this preliminary study. Participants were randomized to 1 of 2 PPE bundles that meet current (October 20, 2014) CDC recommendations. One PPE bundle utilized commercial EVD-recommended components. The other PPE bundle used components already available at local hospitals or retail stores. Participants were also randomized to standard or high volume exposures (HVE) to simulate fluid splash. Each participant was assisted in PPE donning and doffing by an experienced trainer. A training mannequin was contaminated with fluorescent agents to simulate bodily fluids. Participants were then given clinical tasks to care for the EVD "patient." De-gowned participants were examined under "black light" for fluorescence indicative of contamination. One participant in each PPE arm had evidence of contamination. One of the contamination events was suspected during the patient care exercise. The other contamination event was not suspected until black light examination. In spite of a large difference in cost of PPE, the two bundle arms performed similarly. Bundle testing using fluorescent markers could help identify optimal PPE systems. PMID:26793445

  9. Ebola virus disease: The use of fluorescents as markers of contamination for personal protective equipment

    PubMed Central

    Bell, Todd; Smoot, John; Patterson, Justin; Smalligan, Roger; Jordan, Richard

    2014-01-01

    The recent Ebola virus disease (EVD) outbreak has created interest in personal protective equipment (PPE) content and usage. PPE testing has historically been done by individual component, rather than as a bundle for contact isolation. Fluorescent agents are commonly used in training for infection control techniques. The purpose of our study was to compare 2 PPE bundles and to evaluate the feasibility of fluorescent markers as an assessment tool for PPE effectiveness. Eight healthcare providers volunteered for this preliminary study. Participants were randomized to 1 of 2 PPE bundles that meet current (October 20, 2014) CDC recommendations. One PPE bundle utilized commercial EVD-recommended components. The other PPE bundle used components already available at local hospitals or retail stores. Participants were also randomized to standard or high volume exposures (HVE) to simulate fluid splash. Each participant was assisted in PPE donning and doffing by an experienced trainer. A training mannequin was contaminated with fluorescent agents to simulate bodily fluids. Participants were then given clinical tasks to care for the EVD “patient.” De-gowned participants were examined under “black light” for fluorescence indicative of contamination. One participant in each PPE arm had evidence of contamination. One of the contamination events was suspected during the patient care exercise. The other contamination event was not suspected until black light examination. In spite of a large difference in cost of PPE, the two bundle arms performed similarly. Bundle testing using fluorescent markers could help identify optimal PPE systems. PMID:26793445

  10. Genomic research and data-mining technology: implications for personal privacy and informed consent.

    PubMed

    Tavani, Herman T

    2004-01-01

    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social implications (ELSI) program requirements that were established to guide researchers working on the Human Genome Project (HGP). Next I consider a case illustration involving deCODE Genetics, a privately owned genetic company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The deCODE case also illustrates some ways in which an ICT technique known as data mining has both aided and posed special challenges for researchers working in the field of population genomics. On the one hand, data-mining tools have greatly assisted researchers in mapping the human genome and in identifying certain "disease genes" common in specific populations (which, in turn, has accelerated the process of finding cures for diseases tha affect those populations). On the other hand, this technology has significantly threatened the privacy of research subjects participating in population genomics studies, who may, unwittingly, contribute to the construction of new groups (based on arbitrary and non-obvious patterns and statistical correlations) that put those subjects at risk for discrimination and stigmatization. In the final section of this paper I examine some ways in which the use of data mining in the context of population genomics research poses a critical challenge for the principle of informed consent, which traditionally has played a central role in protecting the privacy interests of research subjects participating in epidemiological studies.

  11. National Perspectives on Data Protection.

    ERIC Educational Resources Information Center

    Yurow, Jane

    1983-01-01

    Discussion of different approaches to protecting personal information in Europe and the United States highlights data protection laws and agreements (international transfer of personal data, European laws, United States state and federal laws), United States and European views of privacy protection, national economic and political goals, and…

  12. Public, private and personal: Qualitative research on policymakers' opinions on smokefree interventions to protect children in 'private' spaces

    PubMed Central

    2010-01-01

    Background Governments use law to constrain aspects of private activities for purposes of protecting health and social wellbeing. Policymakers have a range of perceptions and beliefs about what is public or private. An understanding of the possible drivers of policymaker decisions about where government can or should intervene for health is important, as one way to better guide appropriate policy formation. Our aim was to identify obstacles to, and opportunities for, government smokefree regulation of private and public spaces to protect children. In particular, to seek policymaker opinions on the regulation of smoking in homes, cars and public parks and playgrounds in a country with incomplete smokefree laws (New Zealand). Methods Case study, using structured interviews to ask policymakers (62 politicians and senior officials) about their opinions on new smokefree legislation for public and private places. Supplementary data was obtained from the Factiva media database, on the views of New Zealand local authority councillors about policies for smokefree outdoor public places. Results Overall, interviewees thought that government regulation of smoking in private places was impractical and unwise. However, there were some differences on what was defined as 'private', particularly for cars. Even in public parks, smoking was seen by some as a 'personal' decision, and unlikely to be amenable to regulation. Most participants believed that educative, supportive and community-based measures were better and more practical means of reducing smoking in private places, compared to regulation. Conclusions The constrained view of the role of regulation of smoking in public and private domains may be in keeping with current political discourse in New Zealand and similar Anglo-American countries. Policy and advocacy options to promote additional smokefree measures include providing a better voice for childrens' views, increasing information to policymakers about the harms to

  13. Chemical exposure reduction: Factors impacting on South African herbicide sprayers' personal protective equipment compliance and high risk work practices.

    PubMed

    Andrade-Rivas, Federico; Rother, Hanna-Andrea

    2015-10-01

    The high exposure risks of workers to herbicides in low- and middle-income countries is an important public health concern because of the potential resulting negative impacts on workers' health. This study investigated workers' personal protective equipment (PPE) compliance as a risk mitigation measure; particularly workers who apply herbicides for Working for Water (WfW) - a South African invasive alien vegetation control programme. The study aim was to understand workers' low PPE compliance by analysing their risk perceptions of herbicide use, working conditions and socio-cultural context. Research methods included ethnographic observations, informal interviews, visual media, questionnaires and a focus group. Study results indicated that low PPE compliance persists despite workers' awareness of herbicide exposure risks and as a result of the influence from workers' socio-cultural context (i.e. gender dynamics and social status), herbicide risk perceptions and working conditions (i.e. environmental and logistical). Interestingly, teams comprised of mostly women had the highest compliance rate. These findings highlighted that given the complexity of PPE compliance, especially in countries with several economic and social constraints, exposure reduction interventions should not rely solely on PPE use promotion. Instead, other control strategies requiring less worker input for effectiveness should be implemented, such as elimination and substitution of highly hazardous pesticides, and altering application methods. PMID:26093240

  14. Chemical exposure reduction: Factors impacting on South African herbicide sprayers' personal protective equipment compliance and high risk work practices.

    PubMed

    Andrade-Rivas, Federico; Rother, Hanna-Andrea

    2015-10-01

    The high exposure risks of workers to herbicides in low- and middle-income countries is an important public health concern because of the potential resulting negative impacts on workers' health. This study investigated workers' personal protective equipment (PPE) compliance as a risk mitigation measure; particularly workers who apply herbicides for Working for Water (WfW) - a South African invasive alien vegetation control programme. The study aim was to understand workers' low PPE compliance by analysing their risk perceptions of herbicide use, working conditions and socio-cultural context. Research methods included ethnographic observations, informal interviews, visual media, questionnaires and a focus group. Study results indicated that low PPE compliance persists despite workers' awareness of herbicide exposure risks and as a result of the influence from workers' socio-cultural context (i.e. gender dynamics and social status), herbicide risk perceptions and working conditions (i.e. environmental and logistical). Interestingly, teams comprised of mostly women had the highest compliance rate. These findings highlighted that given the complexity of PPE compliance, especially in countries with several economic and social constraints, exposure reduction interventions should not rely solely on PPE use promotion. Instead, other control strategies requiring less worker input for effectiveness should be implemented, such as elimination and substitution of highly hazardous pesticides, and altering application methods.

  15. 75 FR 52768 - National Protection and Programs Directorate; Agency Information Collection Activities: Office of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... training program to improve security in the chemical industry sector. Information is automatically.... chemical industry direct employment is about 850,000 (2009 per the American Chemistry Council... Infrastructure Protection; Chemical Security Awareness Training Program AGENCY: National Protection and...

  16. 22 CFR 123.17 - Exports of firearms, ammunition, and personal protective gear.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... person brought into the United States under the provisions of 27 CFR 478.115(d). (The latter provision... include one additional filter canister, for personal use to Afghanistan, provided the conditions...

  17. The impact of personalized social cues of immediacy on consumers' information disclosure: a social cognitive approach.

    PubMed

    Lee, Doohwang; LaRose, Robert

    2011-06-01

    This study examined how personalized social cues of immediacy can affect two types of information disclosure intentions (embarrassing information and descriptive information) directly and indirectly through two positive outcome expectations (social trust and customization outcome expectations) and two negative outcome expectations (embarrassment and information abuse outcome expectations) in the context of a personal health record (PHR) Web-site service. An online experiment was chosen and 252 participants were directed to visit a newly created PHR Web site. The results showed that, regardless of the two different type of information, participants' exposure to the high-immediacy level on the site increased their information disclosure intentions even when their privacy self-efficacy beliefs were controlled. Further, the results of path analyses suggest that such main effect on information disclosure is mediated by social cognitive variables of positive and negative outcome expectations.

  18. Personal Digital Information Archiving among Students of Social Sciences and Humanities

    ERIC Educational Resources Information Center

    Krtalic, Maja; Marcetic, Hana; Micunovic, Milijana

    2016-01-01

    Introduction: As both academic citizens and active participants in information society who use information, students produce huge amounts of personal digital data and documents. It is therefore important to raise questions about their awareness, responsibility, tendencies and activities they undertake to preserve their collective digital heritage.…

  19. 17 CFR 400.4 - Information concerning associated persons of financial institutions that are government...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... regulatory agency for such financial institution, a statement correcting such information. (c) For the... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Information concerning associated persons of financial institutions that are government securities brokers or dealers. 400.4...

  20. Survey of Health Professionals' Information Habits and Needs Through Personal Interviews.

    ERIC Educational Resources Information Center

    Stinson, E. Ray; Mueller, Dorothy A.

    The first of three phases of a project to develop a Comprehensive Integrated Cancer Information System (CICIS) consisted of a survey which was conducted through personal interviews with 402 Alabama health professionals to determine their sources of health information. Type of practice, location of practice, age, size of hospital, and specialty…

  1. 32 CFR 505.7 - Disclosure of personal information to other agencies and third parties.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... for federal employment); (xii) Social Security Number (SSN); and (xiii) The information that would... released if their positions or duties require frequent interaction with the public. (3) Disclosure of.... (g) Social rosters. (1) Before including personal information such as a spouse's name, home...

  2. 32 CFR 505.7 - Disclosure of personal information to other agencies and third parties.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... for federal employment); (xii) Social Security Number (SSN); and (xiii) The information that would... released if their positions or duties require frequent interaction with the public. (3) Disclosure of.... (g) Social rosters. (1) Before including personal information such as a spouse's name, home...

  3. Using Telecomputing to Provide Information and Support to Caregivers of Persons with Dementia.

    ERIC Educational Resources Information Center

    Smyth, Kathleen A.; Harris, Phyllis Braudy

    1993-01-01

    Outlines rationale for the Alzheimer's Disease Support Center (ADSC), a telecomputing-based project designed to provide information and support to caregivers of persons with dementia. Describes ADSC's context, structure, content, and operation. Notes that inherent features of telecomputing make computer-mediated information and support systems…

  4. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... parent of that child, taking into account available technology; and (ii) Not be unduly burdensome to the... information provided by a child. 312.6 Section 312.6 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS... review personal information provided by a child. (a) Upon request of a parent whose child has...

  5. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... parent of that child, taking into account available technology; and (ii) Not be unduly burdensome to the... information provided by a child. 312.6 Section 312.6 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS... review personal information provided by a child. (a) Upon request of a parent whose child has...

  6. 16 CFR 312.6 - Right of parent to review personal information provided by a child.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... parent of that child, taking into account available technology; and (ii) Not be unduly burdensome to the... information provided by a child. 312.6 Section 312.6 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS... review personal information provided by a child. (a) Upon request of a parent whose child has...

  7. Influences of Formal Learning, Personal Learning Orientation, and Supportive Learning Environment on Informal Learning

    ERIC Educational Resources Information Center

    Choi, Woojae; Jacobs, Ronald L.

    2011-01-01

    While workplace learning includes formal and informal learning, the relationship between the two has been overlooked, because they have been viewed as separate entities. This study investigated the effects of formal learning, personal learning orientation, and supportive learning environment on informal learning among 203 middle managers in Korean…

  8. Personality Traits and Group-Based Information Behaviour: An Exploratory Study

    ERIC Educational Resources Information Center

    Hyldegard, Jette

    2009-01-01

    Introduction: The relationship between hypothesised behaviour resulting from a personality test and actual information behaviour resulting from a group-based assignment process is addressed in this paper. Methods: Three voluntary groups of ten librarianship and information science students were followed during a project assignment. The long…

  9. 17 CFR 248.10 - Limits on disclosure of nonpublic personal information to nonaffiliated third parties.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Limits on disclosure of nonpublic personal information to nonaffiliated third parties. 248.10 Section 248.10 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information...

  10. Design Considerations for Today's Online Learners: A Study of Personalized, Relationship-Based Social Awareness Information

    ERIC Educational Resources Information Center

    Heo, Misook

    2009-01-01

    This article examined online learners' preferences in personalized, relationship-based social awareness information sharing in course management systems. Three hundred seventy-seven online learners' willingness to share social awareness information was measured through a national survey. Results indicated that today's online learners are open…

  11. Information Needs of Family Caregivers of Persons with Cognitive versus Physical Deficits

    ERIC Educational Resources Information Center

    Koenig, Kelly N.; Steiner, Victoria; Pierce, Linda L.

    2011-01-01

    This study compared information needs of caregivers of persons with dementia with caregivers of those who received rehabilitation treatment. Caregivers were provided a 48-item survey and asked to choose their top ten information needs. Dementia caregivers' (n = 33) top needs were dealing with forgetfulness/confusion (91%) and repeating…

  12. Social Networking Privacy Control: Exploring University Variables Related to Young Adults' Sharing of Personally Identifiable Information

    ERIC Educational Resources Information Center

    Zimmerman, Melisa S.

    2014-01-01

    The growth of the Internet, and specifically social networking sites (SNSs) like Facebook, create opportunities for individuals to share private and identifiable information with a closed or open community. Internet crime has been on the rise and research has shown that criminals are using individuals' personal information pulled from social…

  13. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for information concerning other persons. 1900.32 Section 1900.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  14. Information Policy in the European Community: Balancing Protection and Competition.

    ERIC Educational Resources Information Center

    Sillince, J. A. A.

    1994-01-01

    Discusses European Community policy relating to information technology and the information industry. Topics addressed include the information services industry; transborder information flow, including electronic mail, data owner responsibility, and software piracy; digital data networks; electronic data interchange; telecommunications; information…

  15. Real-life experience with personally familiar faces enhances discrimination based on global information

    PubMed Central

    Van Belle, Goedele

    2016-01-01

    Despite the agreement that experience with faces leads to more efficient processing, the underlying mechanisms remain largely unknown. Building on empirical evidence from unfamiliar face processing in healthy populations and neuropsychological patients, the present experiment tested the hypothesis that personal familiarity is associated with superior discrimination when identity information is derived based on global, as opposed to local facial information. Diagnosticity and availability of local and global information was manipulated through varied physical similarity and spatial resolution of morph faces created from personally familiar or unfamiliar faces. We found that discrimination of subtle changes between highly similar morph faces was unaffected by familiarity. Contrariwise, relatively more pronounced physical (i.e., identity) differences were more efficiently discriminated for personally familiar faces, indicating more efficient processing of global, as opposed to local facial information through real-life experience. PMID:26855852

  16. 41 CFR 102-41.150 - What special information do we provide on reports of unclaimed personal property?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... do we provide on reports of unclaimed personal property? 102-41.150 Section 102-41.150 Public... MANAGEMENT REGULATION PERSONAL PROPERTY 41-DISPOSITION OF SEIZED, FORFEITED, VOLUNTARILY ABANDONED, AND UNCLAIMED PERSONAL PROPERTY Unclaimed Personal Property § 102-41.150 What special information do we...

  17. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON HEALTH CARE PROVIDERS, SUPPLIERS AND PRACTITIONERS Disclosure of Information by the Healthcare...

  18. 45 CFR 164.502 - Uses and disclosures of protected health information: general rules.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Uses and disclosures of protected health information: general rules. 164.502 Section 164.502 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES... Health Information § 164.502 Uses and disclosures of protected health information: general rules....

  19. 45 CFR 164.520 - Notice of privacy practices for protected health information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Notice of privacy practices for protected health information. 164.520 Section 164.520 Public Welfare Department of Health and Human Services ADMINISTRATIVE... using or disclosing protected health information that is genetic information of an individual for...

  20. 45 CFR 164.520 - Notice of privacy practices for protected health information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Notice of privacy practices for protected health information. 164.520 Section 164.520 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE... using or disclosing protected health information that is genetic information of an individual for...

  1. Towards a personalized environmental health information service using low-cost sensors and crowdsourcing

    NASA Astrophysics Data System (ADS)

    Castell, Nuria; Liu, Hai-Ying; Schneider, Philipp; Cole-Hunter, Tom; Lahoz, William; Bartonova, Alena

    2015-04-01

    Most European cities exceed the air quality guidelines established by the WHO to protect human health. As such, citizens are exposed to potentially harmful pollutant levels. Some cities have services (e.g., web pages, mobile apps, etc.) which provide timely air quality information to the public. However, air quality data at individual level is currently scarce or non-existent. Making this information directly useful to individuals poses a challenge. For instance, if a user is informed that the air quality is "poor", what does that mean for him/her, and how can this information be acted upon? Despite individuals having a unique relationship with their environment, the information on the state of atmospheric components and related hazards is currently mostly generic, and seldom personally relevant. This undermines citizens' interest in their environment, and consequently limits their ability to recognize and change both their contribution and their exposure to air pollution. In Oslo, two EU founded projects, CITI-SENSE (Engelken-Jorge et al., 2014) and Citi-Sense-MOB (Castell et al., 2014), are trying to establish a dialogue with citizens by providing them with the possibility of getting personalized air quality information on their smartphones. The users are able to check the air quality in their immediate surroundings and track their individual exposure while moving through the urban environment (Castell et al., 2014). In this way, they may be able to reduce their exposure such as by changing transport modes or routes, for example by selecting less polluted streets to walk or cycle through. Using a smartphone application, citizens are engaged in collecting and sharing environmental data generated by low-cost air quality sensors, and in reporting their individual perception (turning citizens into sensors themselves). The highly spatially resolved data on air quality and perception is geo-located. This allows for simultaneous visualization of both kinds of the sensor

  2. The effect of age and role information on expectations for big five personality traits.

    PubMed

    Wood, Dustin; Roberts, Brent W

    2006-11-01

    In four studies, the authors investigated the extent to which expectations for personality traits in age-graded roles correspond to patterns of personality trait change across the life course. In Studies 1 (N = 43) and 2 (N = 126), the authors examined the age-graded roles of high school student, college student, parent, and grandparent and found that expectations for how people behave in these age-graded roles showed strong parallels to the documented pattern of personality trait development and that this pattern of expectations was largely shared by younger and older participants. In Studies 3 (N = 252) and 4 (N = 123), the authors separated age and role information (e.g., marital, parental, and employment status) and found that people use both sources of information independently in forming expectations of others. The implications for understanding the interplay of expectations and personality trait development are discussed.

  3. Ebola Response: Modeling the Risk of Heat Stress from Personal Protective Clothing

    PubMed Central

    Potter, Adam W.; Gonzalez, Julio A.; Xu, Xiaojiang

    2015-01-01

    Introduction A significant number of healthcare workers have responded to aid in the relief and containment of the 2013 Ebola virus disease (EVD) outbreak in West Africa. Healthcare workers are required to wear personal protective clothing (PPC) to impede the transmission of the virus; however, the impermeable design and the hot humid environment lead to risk of heat stress. Objective Provide healthcare workers quantitative modeling and analysis to aid in the prevention of heat stress while wearing PPC in West Africa. Methods A sweating thermal manikin was used to measure the thermal (Rct) and evaporative resistance (Ret) of the five currently used levels of PPC for healthcare workers in the West Africa EVD response. Mathematical methods of predicting the rise in core body temperature (Tc) in response to clothing, activity, and environment was used to simulate different responses to PPC levels, individual body sizes, and two hot humid conditions: morning/evening (air temperature: 25°C, relative humidity: 40%, mean radiant temperature: 35°C, wind velocity: 1 m/s) and mid-day (30°C, 60%, 70°C, 1 m/s). Results Nearly still air (0.4 m/s) measures of Rct ranged from 0.18 to 0.26 m2 K/W and Ret ranged from 25.53 to 340.26 m2 Pa/W. Conclusion Biophysical assessments and modeling in this study provide quantitative guidance for prevention of heat stress of healthcare workers wearing PPC responding to the EVD outbreak in West Africa. PMID:26575389

  4. Chest Compression With Personal Protective Equipment During Cardiopulmonary Resuscitation: A Randomized Crossover Simulation Study.

    PubMed

    Chen, Jie; Lu, Kai-Zhi; Yi, Bin; Chen, Yan

    2016-04-01

    Following a chemical, biological, radiation, and nuclear incident, prompt cardiopulmonary resuscitation (CPR) procedure is essential for patients who suffer cardiac arrest. But CPR when wearing personal protection equipment (PPE) before decontamination becomes a challenge for healthcare workers (HCW). Although previous studies have assessed the impact of PPE on airway management, there is little research available regarding the quality of chest compression (CC) when wearing PPE.A present randomized cross-over simulation study was designed to evaluate the effect of PPE on CC performance using mannequins.The study was set in one university medical center in the China.Forty anesthesia residents participated in this randomized cross-over study.Each participant performed 2 min of CC on a manikin with and without PPE, respectively. Participants were randomized into 2 groups that either performed CC with PPE first, followed by a trial without PPE after a 180-min rest, or vice versa.CPR recording technology was used to objectively quantify the quality of CC. Additionally, participants' physiological parameters and subjective fatigue score values were recorded.With the use of PPE, a significant decrease of the percentage of effective compressions (41.3 ± 17.1% with PPE vs 67.5 ± 15.6% without PPE, P < 0.001) and the percentage of adequate compressions (67.7 ± 18.9% with PPE vs 80.7 ± 15.5% without PPE, P < 0.001) were observed. Furthermore, the increases in heart rate, mean arterial pressure, and subjective fatigue score values were more obvious with the use of PPE (all P < 0.01).We found significant deterioration of CC performance in HCW with the use of a level-C PPE, which may be a disadvantage for enhancing survival of cardiac arrest. PMID:27057878

  5. Comparison groups on bills: Automated, personalized energy information

    SciTech Connect

    Iyer, Maithili; Kempton, Willett; Payne, Christopher

    2006-07-01

    A program called ``Innovative Billing?? has been developed to provide individualized energy information for a mass audience?the entireresidential customer base of an electric or gas utility. Customers receive a graph on the bill that compares that customer?s consumption with othersimilar customers for the same month. The program aims to stimulate customers to make ef?ciency improvements. To group as many as severalmillion customers into small ``comparison groups??, an automated method must be developed drawing solely from the data available to the utility.This paper develops and applies methods to compare the quality of resulting comparison groups.A data base of 114,000 customers from a utility billing system was used to evaluate Innovative Billing comparison groups, comparing fouralternative criteria: house characteristics (?oor area, housing type, and heating fuel); street; meter read route; billing cycle. Also, customers wereinterviewed to see what forms of comparison graphs made most sense and led to fewest errors of interpretation. We ?nd that good qualitycomparison groups result from using street name, meter book, or multiple house characteristics. Other criteria we tested, such as entire cycle, entiremeter book, or single house characteristics such as ?oor area, resulted in poor quality comparison groups. This analysis provides a basis forchoosing comparison groups based on extensive user testing and statistical analysis. The result is a practical set of guidelines that can be used toimplement realistic, inexpensive innovative billing for the entire customer base of an electric or gas utility.

  6. Sharing personal health information via service-oriented computing: a case of long-term care.

    PubMed

    Lin, Yung-Hsiu; Chen, Rong-Rong; Guo, Sophie Huey-Ming; Chiang, Su-Chien; Chang, Her-Kun

    2012-12-01

    Sharing personal health information among healthcare providers is a crucial business process not only for saving limited healthcare resources but also for increasing patient's healthcare quality. Building an effective personal health information sharing process from established healthcare systems is a challenge in terms of coordination different business operations among healthcare providers and restructuring technical details existed in different healthcare information systems. This study responds this challenge with a service-oriented approach and develops a business software application to describe how the challenge can be alleviated from both managerial and technical perspectives. The software application in this study depicts personal health information sharing process among different providers in a long-term care setting. The information sharing scenario is based on an industrial initiative, such as Integrating the Healthcare Enterprise (IHE) from healthcare domain and the technologies for implementing the scenario are Web Service technologies from Service-oriented computing paradigm. The implementation in this study can inform healthcare researchers and practitioners applying technologies from service-oriented computing to design and develop healthcare collaborative systems to meet the increasing need for personal health information sharing.

  7. Deformation kinetics of layered personal protective material under impact via terahertz reflectometry

    NASA Astrophysics Data System (ADS)

    Rahman, Anis; Rahman, Aunik; Mentzer, Mark A.

    2014-05-01

    Terahertz dynamic scanning reflectometry (TDSR) was used for measuring layered materials' deformation kinetics spectra. Multi-layered materials are used for protective devices such as helmet and body armor. An in-situ measurement of deformation profile and other dynamic characteristics is important when such material is subjected to ballistic impacts. Current instrumentation is limited in their abilities to provide sub-surface information in a non-destructive fashion. A high sensitivity TDSR has been used to measure dynamic surface deformation characteristics in real-time (in-situ) and also at post deformation (ex-situ). Real-time ballistic deformation kinetics was captured with a high speed measurement system. The kinetics spectra was used to compute a number of crucial parameters such as deformation length and its propagation profile, the relaxation position, and the macroscopic vibration profile. In addition, the loss of mass due to impact was quantified for accurate determination of the trauma causing energy. For non-metallic substrates, a transmitted beam was used to calibrate mass loss, a priori, of the laminate layers due to impact. Deformation kinetics information may then be used to formulate trauma diagnosis conditions from blunt hit via the Sturdivan criterion [1]. The basic difference in the proposed approach is that here diagnostic criteria are inferred by measuring the helmet itself; no need to draw blood or any biopsy from the patient.

  8. 77 FR 35700 - Protected Critical Infrastructure Information (PCII) Program Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ...), National Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP... DHS/NPPD/IP/IICD, 245 Murray Lane, SW., Mailstop 0602, Arlington, VA 20598-0602. Email requests should... NPPD/IP use only.OMB is particularly interested in comments that: 1. Evaluate whether the...

  9. The inadvertent disclosure of personal health information through peer-to-peer file sharing programs

    PubMed Central

    Neri, Emilio; Jonker, Elizabeth; Sokolova, Marina; Peyton, Liam; Neisa, Angelica; Scassa, Teresa

    2010-01-01

    Objective There has been a consistent concern about the inadvertent disclosure of personal information through peer-to-peer file sharing applications, such as Limewire and Morpheus. Examples of personal health and financial information being exposed have been published. We wanted to estimate the extent to which personal health information (PHI) is being disclosed in this way, and compare that to the extent of disclosure of personal financial information (PFI). Design After careful review and approval of our protocol by our institutional research ethics board, files were downloaded from peer-to-peer file sharing networks and manually analyzed for the presence of PHI and PFI. The geographic region of the IP addresses was determined, and classified as either USA or Canada. Measurement We estimated the proportion of files that contain personal health and financial information for each region. We also estimated the proportion of search terms that return files with personal health and financial information. We ascertained and discuss the ethical issues related to this study. Results Approximately 0.4% of Canadian IP addresses had PHI, as did 0.5% of US IP addresses. There was more disclosure of financial information, at 1.7% of Canadian IP addresses and 4.7% of US IP addresses. An analysis of search terms used in these file sharing networks showed that a small percentage of the terms would return PHI and PFI files (ie, there are people successfully searching for PFI and PHI on the peer-to-peer file sharing networks). Conclusion There is a real risk of inadvertent disclosure of PHI through peer-to-peer file sharing networks, although the risk is not as large as for PFI. Anyone keeping PHI on their computers should avoid installing file sharing applications on their computers, or if they have to use such tools, actively manage the risks of inadvertent disclosure of their, their family's, their clients', or patients' PHI. PMID:20190057

  10. Protecting Privacy and Confidentiality in a Multiple Use, Multiple User Mental Health Information System.

    ERIC Educational Resources Information Center

    Bank, Rheta; Laska, Eugene M.

    1978-01-01

    These aspects of maintaining the security of computer-processed information concerning mental health patients are discussed: legal protection, technological safeguards, and managerial responsibility. (CTM)

  11. Medial prefrontal dissociations during processing of trait diagnostic and nondiagnostic person information.

    PubMed

    Mitchell, Jason P; Cloutier, Jasmin; Banaji, Mahzarin R; Macrae, C Neil

    2006-06-01

    Previous research has suggested that perceivers spontaneously extract trait-specific information from the behaviour of others. However, little is known about whether perceivers spontaneously engage in the same depth of social-cognitive processing for all person information or reserve such processing specifically for information that conveys diagnostic clues about another person's dispositions. Moreover, a question remains as to whether the processing of such nondiagnostic information can be affected by perceivers' explicit goal to consider another's dispositions or not. To examine processing of diagnostic and nondiagnostic social information as a function of perceivers' explicit social-cognitive goals, participants underwent functional magnetic resonance imaging (fMRI) scanning while performing social (impression formation) or non-social orienting tasks using statements that conveyed either diagnostic or nondiagnostic information about the target's personality traits. Replicating two earlier studies, results identified a region of dorsal medial prefrontal cortex (mPFC) that was preferentially activated by impression formation. Interestingly, no difference between trait-diagnostic and nondiagnostic information was observed when participants had the explicit goal of forming an impression, but a substantial effect of diagnosticity emerged when task instructions oriented them away from considering the target as a social agent. These results suggest that trait-nondiagnostic information is not subject to spontaneous social-cognitive processing, but that such processing may nevertheless occur when perceivers have the explicit goal to use that information to form an impression of a target. PMID:18985100

  12. Medial prefrontal dissociations during processing of trait diagnostic and nondiagnostic person information.

    PubMed

    Mitchell, Jason P; Cloutier, Jasmin; Banaji, Mahzarin R; Macrae, C Neil

    2006-06-01

    Previous research has suggested that perceivers spontaneously extract trait-specific information from the behaviour of others. However, little is known about whether perceivers spontaneously engage in the same depth of social-cognitive processing for all person information or reserve such processing specifically for information that conveys diagnostic clues about another person's dispositions. Moreover, a question remains as to whether the processing of such nondiagnostic information can be affected by perceivers' explicit goal to consider another's dispositions or not. To examine processing of diagnostic and nondiagnostic social information as a function of perceivers' explicit social-cognitive goals, participants underwent functional magnetic resonance imaging (fMRI) scanning while performing social (impression formation) or non-social orienting tasks using statements that conveyed either diagnostic or nondiagnostic information about the target's personality traits. Replicating two earlier studies, results identified a region of dorsal medial prefrontal cortex (mPFC) that was preferentially activated by impression formation. Interestingly, no difference between trait-diagnostic and nondiagnostic information was observed when participants had the explicit goal of forming an impression, but a substantial effect of diagnosticity emerged when task instructions oriented them away from considering the target as a social agent. These results suggest that trait-nondiagnostic information is not subject to spontaneous social-cognitive processing, but that such processing may nevertheless occur when perceivers have the explicit goal to use that information to form an impression of a target.

  13. Some legal implications of the Precautionary Principle: improving information-generation and legal protections.

    PubMed

    Cranor, Carl F

    2004-01-01

    In creating a legal agenda in service of the Precautionary Principle, the idea of precaution requires more inventories and better monitoring of the condition of public and workforce health than at present. Rectifying problems of the past to better serve the aims of precaution will require more affirmative pre-market and much more post-market knowledge-generation by those who create and use potentially toxic substances, improved pre-market review of substances, better responses to early warnings, and quicker protective post-market responses to evidence of toxicity. This paper conceptualizes a model pre-market screening law to highlight the need for primary prevention measures and to provide philosophic ideas for improving post-market laws and addressing a large universe of existing substances that have been poorly characterized. Although retrospective personal injury law does not have good mechanisms for precaution, even this can be more protective than it is at present by enhancing causes of action for reasonable fear of disease and medical monitoring, and moving to create new causes of action for failure to develop and disseminate information needed to assess the toxicity of substances.

  14. Cognitive models in training health professionals to protect patients' confidential information.

    PubMed

    Patel, V L; Arocha, J F; Shortliffe, E H

    2000-11-01

    Recent advances in theories of learning and knowledge acquisition in culturally-situated environments have illuminated the role of cognition in changing behavior, and in turn on influencing performance for the long term. One such advance focuses on the relationship between explicit formal training and implicit knowledge acquired through daily interactive activities in schools and organizations. The former relates more to instruction regarding the policy issues whereas the latter is tied closely to cultural, moral and organizational values. In this paper, we draw on these theories of cognition and learning to show the shift in thinking that is needed regarding education of health professionals, including steps required to assure that the protection of confidential information becomes part of their routine practices. Illustrative examples are used to show the nature of conceptual change in the health professional's knowledge organization and reasoning strategies that is necessary for more sustained behavior change with regards to protecting data confidentiality and privacy of individual patients. This re-conceptualization is intended to be reflected at various levels of training and education for health professionals, including influences on personal and organizational practices as well as revisions in medical-school and graduate-medical curricula. PMID:11154965

  15. Some legal implications of the Precautionary Principle: improving information-generation and legal protections.

    PubMed

    Cranor, Carl F

    2004-01-01

    In creating a legal agenda in service of the Precautionary Principle, the idea of precaution requires more inventories and better monitoring of the condition of public and workforce health than at present. Rectifying problems of the past to better serve the aims of precaution will require more affirmative pre-market and much more post-market knowledge-generation by those who create and use potentially toxic substances, improved pre-market review of substances, better responses to early warnings, and quicker protective post-market responses to evidence of toxicity. This paper conceptualizes a model pre-market screening law to highlight the need for primary prevention measures and to provide philosophic ideas for improving post-market laws and addressing a large universe of existing substances that have been poorly characterized. Although retrospective personal injury law does not have good mechanisms for precaution, even this can be more protective than it is at present by enhancing causes of action for reasonable fear of disease and medical monitoring, and moving to create new causes of action for failure to develop and disseminate information needed to assess the toxicity of substances. PMID:15212203

  16. A tiered-layered-staged model for informed consent in personal genome testing.

    PubMed

    Bunnik, Eline M; Janssens, A Cecile J W; Schermer, Maartje H N

    2013-06-01

    In recent years, developments in genomics technologies have led to the rise of commercial personal genome testing (PGT): broad genome-wide testing for multiple diseases simultaneously. While some commercial providers require physicians to order a personal genome test, others can be accessed directly. All providers advertise directly to consumers and offer genetic risk information about dozens of diseases in one single purchase. The quantity and the complexity of risk information pose challenges to adequate pre-test and post-test information provision and informed consent. There are currently no guidelines for what should constitute informed consent in PGT or how adequate informed consent can be achieved. In this paper, we propose a tiered-layered-staged model for informed consent. First, the proposed model is tiered as it offers choices between categories of diseases that are associated with distinct ethical, personal or societal issues. Second, the model distinguishes layers of information with a first layer offering minimal, indispensable information that is material to all consumers, and additional layers offering more detailed information made available upon request. Finally, the model stages informed consent as a process by feeding information to consumers in each subsequent stage of the process of undergoing a test, and by accommodating renewed consent for test result updates, resulting from the ongoing development of the science underlying PGT. A tiered-layered-staged model for informed consent with a focus on the consumer perspective can help overcome the ethical problems of information provision and informed consent in direct-to-consumer PGT. PMID:23169494

  17. Combining information from ancestors and personal experiences to predict individual differences in developmental trajectories.

    PubMed

    Stamps, Judy A; Krishnan, V V

    2014-11-01

    A persistent question in biology is how information from ancestors combines with personal experiences over the lifetime to affect the developmental trajectories of phenotypic traits. We address this question by modeling individual differences in behavioral developmental trajectories on the basis of two assumptions: (1) differences among individuals in the behavior expressed at birth or hatching are based on information from their ancestors (via genes, epigenes, and prenatal maternal effects), and (2) information from ancestors is combined with information from personal experiences over ontogeny via Bayesian updating. The model predicts relationships between the means and the variability of the behavior expressed by neonates and the subsequent developmental trajectories of their behavior when every individual is reared under the same environmental conditions. Several predictions of the model are supported by data from previous studies of behavioral development, for example, that the temporal stability of personality will increase with age and that the intercepts and slopes of developmental trajectories for boldness will be negatively correlated across individuals or genotypes when subjects are raised in safe environments. We describe how other specific predictions of the model can be used to test the hypothesis that information from ancestors and information from personal experiences are combined via nonadditive, Bayesian-like processes. PMID:25325748

  18. Combining information from ancestors and personal experiences to predict individual differences in developmental trajectories.

    PubMed

    Stamps, Judy A; Krishnan, V V

    2014-11-01

    A persistent question in biology is how information from ancestors combines with personal experiences over the lifetime to affect the developmental trajectories of phenotypic traits. We address this question by modeling individual differences in behavioral developmental trajectories on the basis of two assumptions: (1) differences among individuals in the behavior expressed at birth or hatching are based on information from their ancestors (via genes, epigenes, and prenatal maternal effects), and (2) information from ancestors is combined with information from personal experiences over ontogeny via Bayesian updating. The model predicts relationships between the means and the variability of the behavior expressed by neonates and the subsequent developmental trajectories of their behavior when every individual is reared under the same environmental conditions. Several predictions of the model are supported by data from previous studies of behavioral development, for example, that the temporal stability of personality will increase with age and that the intercepts and slopes of developmental trajectories for boldness will be negatively correlated across individuals or genotypes when subjects are raised in safe environments. We describe how other specific predictions of the model can be used to test the hypothesis that information from ancestors and information from personal experiences are combined via nonadditive, Bayesian-like processes.

  19. Integrating personalized health information from MedlinePlus in a patient portal.

    PubMed

    Borbolla, Damian; Del Fiol, Guilherme; Taliercio, Vanina; Otero, Carlos; Campos, Fernando; Martinez, Marcela; Luna, Daniel; Quiros, Fernan

    2014-01-01

    The objective of this paper is to describe the implementation and use of context aware information in Spanish from MedlinePlus embedded in a Patient Portal. Personalized information can help patients solve problems, make treatment decisions, gain confidence in their ability to care for themselves and communicate with providers. To integrate MedlinePlus information in our institutional PHR we used the HL7 Context-Aware Knowledge Retrieval Standard, also known as the Infobutton Standard. After analysing one year of use, patients accessed MedlinePlus information in Spanish in a similar rate to other personalized information generated locally. Infobuttons associated to laboratory test results were used in approximately 10% of patients portal sessions when reviewing lab results. PMID:25160204

  20. Library workers' personal beliefs about childhood vaccination and vaccination information provision*

    PubMed Central

    Keselman, Alla; Smith, Catherine Arnott; Hundal, Savreen

    2014-01-01

    This is a report on the impact of library workers' personal beliefs on provision of vaccination information. Nine public librarians were interviewed about a hypothetical scenario involving a patron who is concerned about possible vaccination-autism connections. The analysis employed thematic coding. Results suggested that while most participants supported childhood vaccination, tension between their personal views and neutrality impacted their ability to conduct the interaction. The neutrality stance, though consonant with professional guidelines, curtails librarians' ability to provide accurate health information. Outreach and communication between public and health sciences libraries can help librarians provide resources to address health controversies. PMID:25031563

  1. Library workers' personal beliefs about childhood vaccination and vaccination information provision.

    PubMed

    Keselman, Alla; Smith, Catherine Arnott; Hundal, Savreen

    2014-07-01

    This is a report on the impact of library workers' personal beliefs on provision of vaccination information. Nine public librarians were interviewed about a hypothetical scenario involving a patron who is concerned about possible vaccination-autism connections. The analysis employed thematic coding. Results suggested that while most participants supported childhood vaccination, tension between their personal views and neutrality impacted their ability to conduct the interaction. The neutrality stance, though consonant with professional guidelines, curtails librarians' ability to provide accurate health information. Outreach and communication between public and health sciences libraries can help librarians provide resources to address health controversies. PMID:25031563

  2. Library workers' personal beliefs about childhood vaccination and vaccination information provision.

    PubMed

    Keselman, Alla; Smith, Catherine Arnott; Hundal, Savreen

    2014-07-01

    This is a report on the impact of library workers' personal beliefs on provision of vaccination information. Nine public librarians were interviewed about a hypothetical scenario involving a patron who is concerned about possible vaccination-autism connections. The analysis employed thematic coding. Results suggested that while most participants supported childhood vaccination, tension between their personal views and neutrality impacted their ability to conduct the interaction. The neutrality stance, though consonant with professional guidelines, curtails librarians' ability to provide accurate health information. Outreach and communication between public and health sciences libraries can help librarians provide resources to address health controversies.

  3. Replacing personally-identifying information in medical records, the Scrub system.

    PubMed Central

    Sweeney, L.

    1996-01-01

    We define a new approach to locating and replacing personally-identifying information in medical records that extends beyond straight search-and-replace procedures, and we provide techniques for minimizing risk to patient confidentiality. The straightforward approach of global search and replace properly located no more than 30-60% of all personally-identifying information that appeared explicitly in our sample database. On the other hand, our Scrub system found 99-100% of these references. Scrub uses detection algorithms that employ templates and specialized knowledge of what constitutes a name, address, phone number and so forth. PMID:8947683

  4. 10 CFR 603.895 - Protection of information in programmatic reports.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... protected data statute, which provides for the protection from public disclosure, for a period of up to 5... 10 Energy 4 2012-01-01 2012-01-01 false Protection of information in programmatic reports. 603.895 Section 603.895 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS TECHNOLOGY...

  5. 10 CFR 603.895 - Protection of information in programmatic reports.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... protected data statute, which provides for the protection from public disclosure, for a period of up to 5... 10 Energy 4 2011-01-01 2011-01-01 false Protection of information in programmatic reports. 603.895 Section 603.895 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS TECHNOLOGY...

  6. 16 CFR 1061.8 - Information on the heightened degree of protection afforded.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... protection afforded. 1061.8 Section 1061.8 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION GENERAL APPLICATIONS FOR EXEMPTION FROM PREEMPTION § 1061.8 Information on the heightened degree of protection afforded... State or local requirement provides a significantly higher degree of protection from the risk of...

  7. 77 FR 47589 - Notice of Request for Extension of Approval of an Information Collection; Horse Protection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-09

    ... Approval of an Information Collection; Horse Protection Regulations AGENCY: Animal and Plant Health... collection associated with the Horse Protection Program. DATES: We will consider all comments that we receive... the Horse Protection Program, contact Dr. Rachel Cezar, Senior Staff Veterinarian, Animal Care,...

  8. Do Reincarnation Beliefs Protect Older Adult Chinese Buddhists against Personal Death Anxiety?

    ERIC Educational Resources Information Center

    Hui, Victoria Ka-Ying; Coleman, Peter G.

    2012-01-01

    The aim of this exploratory survey study was to develop and validate a Buddhist reincarnation beliefs scale and explore the relation between Buddhist reincarnation beliefs and personal death anxiety in 141 older adult Hong Kong Chinese Buddhists. Buddhist reincarnation beliefs were unrelated to personal death anxiety. This suggests that not all…

  9. 22 CFR 123.17 - Exports of firearms, ammunition, and personal protective gear.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... the foreign person brought into the United States under the provisions of 27 CFR 478.115(d). (The... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Exports of firearms, ammunition, and personal... REGULATIONS LICENSES FOR THE EXPORT OF DEFENSE ARTICLES § 123.17 Exports of firearms, ammunition, and...

  10. Maintenance of influenza virus infectivity on the surfaces of personal protective equipment and clothing used in healthcare settings

    PubMed Central

    Sakaguchi, Hiroko; Kajioka, Jitsuo; Watanabe, Mayumi; Nakano, Ryuichi; Hirose, Tatsuko; Ohta, Hiroshi; Aizawa, Yoshiharu

    2010-01-01

    Objectives The maintenance of infectivity of influenza viruses on the surfaces of personal protective equipment and clothing is an important factor in terms of controlling viral cross-infection in the environment and preventing contact infection. The aim of this study was to determine if laboratory-grown influenza A (H1N1) virus maintained infectivity on the surfaces of personal protective equipment and clothing used in healthcare settings. Methods Influenza A virus (0.5 mL) was deposited on the surface of a rubber glove, an N95 particulate respirator, a surgical mask made of non-woven fabric, a gown made of Dupont Tyvek, a coated wooden desk, and stainless steel. Each sample was left for 1, 8, and 24 h, and hemagglutination (HA) and 50% tissue culture infective dose (TCID50)/mL were measured. Results The HA titer of this influenza A virus did not decrease in any of the materials tested even after 24 h. The infectivity of influenza A virus measured by TCID50 was maintained for 8 h on the surface of all materials, with the exception of the rubber glove for which virus infectivity was maintained for 24 h. Conclusions Our results indicate that the replacement/renewal of personal protective equipment and clothing by healthcare professionals in cases of exposure to secretions and droplets containing viruses spread by patients is an appropriate procedure to prevent cross-infection. PMID:21432565

  11. Human exposure to early morning Anopheles funestus biting behavior and personal protection provided by long-lasting insecticidal nets.

    PubMed

    Moiroux, Nicolas; Damien, Georgia B; Egrot, Marc; Djenontin, Armel; Chandre, Fabrice; Corbel, Vincent; Killeen, Gerry F; Pennetier, Cédric

    2014-01-01

    A shift towards early morning biting behavior of the major malaria vector Anopheles funestus have been observed in two villages in south Benin following distribution of long-lasting insecticidal nets (LLINs), but the impact of these changes on the personal protection efficacy of LLINs was not evaluated. Data from human and An. funestus behavioral surveys were used to measure the human exposure to An. funestus bites through previously described mathematical models. We estimated the personal protection efficacy provided by LLINs and the proportions of exposure to bite occurring indoors and/or in the early morning. Average personal protection provided by using of LLIN was high (≥80% of the total exposure to bite), but for LLIN users, a large part of remaining exposure occurred outdoors (45.1% in Tokoli-V and 68.7% in Lokohoué) and/or in the early morning (38.5% in Tokoli-V and 69.4% in Lokohoué). This study highlights the crucial role of LLIN use and the possible need to develop new vector control strategies targeting malaria vectors with outdoor and early morning biting behavior. This multidisciplinary approach that supplements entomology with social science and mathematical modeling illustrates just how important it is to assess where and when humans are actually exposed to malaria vectors before vector control program managers, policy-makers and funders conclude what entomological observations imply.

  12. Personal finances for the physician: a primer on maintaining and protecting your earnings.

    PubMed

    Hill, Austin D; Ortega, Marc E; Williams, Anthony C

    2014-07-01

    Personal finance is a key component to your success as a physician. Your clinical practice does not exist in a vacuum unaffected by circumstances and decisions in your personal life. Though some events in your personal life that can negatively affect your practice are random and unavoidable, consistently making sound decisions regarding your personal life and finances will allow you to continue practicing at a high level. Most core principles of personal finance are common sense and do not involve high level math. Although the concepts are straightforward, people, including physicians, routinely fail to make good decisions at the most elementary level. The core common sense principles for financial success are: do not get divorced, manage your own money, live in a state without state income tax, and drive an old car. Follow these tenants and the path to successful and satisfactory retirement will be smooth. PMID:24918832

  13. Personal finances for the physician: a primer on maintaining and protecting your earnings.

    PubMed

    Hill, Austin D; Ortega, Marc E; Williams, Anthony C

    2014-07-01

    Personal finance is a key component to your success as a physician. Your clinical practice does not exist in a vacuum unaffected by circumstances and decisions in your personal life. Though some events in your personal life that can negatively affect your practice are random and unavoidable, consistently making sound decisions regarding your personal life and finances will allow you to continue practicing at a high level. Most core principles of personal finance are common sense and do not involve high level math. Although the concepts are straightforward, people, including physicians, routinely fail to make good decisions at the most elementary level. The core common sense principles for financial success are: do not get divorced, manage your own money, live in a state without state income tax, and drive an old car. Follow these tenants and the path to successful and satisfactory retirement will be smooth.

  14. Volatile Organic Compounds Off-gassing from Firefighters' Personal Protective Equipment Ensembles after Use.

    PubMed

    Fent, Kenneth W; Evans, Douglas E; Booher, Donald; Pleil, Joachim D; Stiegel, Matthew A; Horn, Gavin P; Dalton, James

    2015-01-01

    Firefighters' personal protective equipment (PPE) ensembles will become contaminated with various compounds during firefighting. Some of these compounds will off-gas following a response, which could result in inhalation exposure. This study was conducted to determine the magnitude and composition of volatile organic compounds (VOCs) generated during controlled structure burns that subsequently off-gassed from the firefighters' PPE, and were systemically absorbed and exhaled in firefighters' breath. Three crews of five firefighters performed entry, suppression, and overhaul during a controlled burn. We used evacuated canisters to sample air inside the burn structure during active fire and overhaul. After each burn, we placed PPE from two firefighters inside clean enclosures and sampled the air using evacuated canisters over 15 min. Firefighters' exhaled breath was collected ∼1 hr before and 4-14 min after each burn. Using gas chromatography/mass spectrometry, the evacuated canister samples were analyzed for 64 VOCs and the exhaled breath samples were analyzed for benzene, toluene, ethylbenzene, xylene, and styrene (BTEXS). Fourteen of the same VOCs were detected off-gassing from PPE in 50% or more of the samples. Compared to background levels, we measured >5 fold increases in mean off-gas concentrations of styrene, benzene, 1,4-dichlorobenzene, acetone, and cyclohexane. Several of the compounds detected off-gassing from PPE were also measured at concentrations above background during active fire and overhaul, including benzene, propene, and styrene. The overhaul and off-gas air concentrations were well below applicable short-term occupational exposure limits. Compared to pre-burn levels, we measured >2 fold increases in mean breath concentrations of benzene, toluene, and styrene after the burns. Air concentrations of BTEXS measured off-gassing from firefighters' used PPE and in firefighters' post-burn exhaled breath were significantly correlated. The firefighters

  15. Personal Protection of Permethrin-Treated Clothing against Aedes aegypti, the Vector of Dengue and Zika Virus, in the Laboratory

    PubMed Central

    Orsborne, James; DeRaedt Banks, Sarah; Hendy, Adam; Gezan, Salvador A.; Kaur, Harparkash; Wilder-Smith, Annelies; Lindsay, Steve W.; Logan, James G.

    2016-01-01

    Background The dengue and Zika viruses are primarily transmitted by Aedes aegypti mosquitoes, which are most active during day light hours and feed both in and outside of the household. Personal protection technologies such as insecticide-treated clothing could provide individual protection. Here we assessed the efficacy of permethrin-treated clothing on personal protection in the laboratory. Methods The effect of washing on treated clothing, skin coverage and protection against resistant and susceptible Ae. aegypti was assessed using modified WHO arm-in-cage assays. Coverage was further assessed using free-flight room tests to investigate the protective efficacy of unwashed factory-dipped permethrin-treated clothing. Clothing was worn as full coverage (long sleeves and trousers) and partial coverage (short sleeves and shorts). Residual permethrin on the skin and its effect on mosquitoes was measured using modified WHO cone assays and quantified using high-pressure liquid chromatography (HPLC) analysis. Results In the arm-in-cage assays, unwashed clothing reduced landing by 58.9% (95% CI 49.2–66.9) and biting by 28.5% (95% CI 22.5–34.0), but reduced to 18.5% (95% CI 14.7–22.3) and 11.1% (95% CI 8.5–13.8) respectively after 10 washes. Landing and biting for resistant and susceptible strains was not significantly different (p<0.05). In free-flight room tests, full coverage treated clothing reduced landing by 24.3% (95% CI 17.4–31.7) and biting by 91% (95% CI 82.2–95.9) with partial coverage reducing landing and biting by 26.4% (95% CI 20.3–31.2) and 49.3% (95% CI 42.1–59.1) respectively with coverage type having no significant difference on landing (p<0.05). Residual permethrin was present on the skin in low amounts (0.0041mg/cm2), but still produced a KD of >80% one hour after wearing treated clothing. Conclusion Whilst partially covering the body with permethrin-treated clothing provided some protection against biting, wearing treated clothing with

  16. Personalized health care system with virtual reality rehabilitation and appropriate information for seniors.

    PubMed

    Gachet Páez, Diego; Aparicio, Fernando; de Buenaga, Manuel; Padrón, Víctor

    2012-01-01

    The concept of the information society is now a common one, as opposed to the industrial society that dominated the economy during the last years. It is assumed that all sectors should have access to information and reap its benefits. Elderly people are, in this respect, a major challenge, due to their lack of interest in technological progress and their lack of knowledge regarding the potential benefits that information society technologies might have on their lives. The Naviga Project (An Open and Adaptable Platform for the Elderly and Persons with Disability to Access the Information Society) is a European effort, whose main goal is to design and develop a technological platform allowing elder people and persons with disability to access the internet and the information society. Naviga also allows the creation of services targeted to social networks, mind training and personalized health care. In this paper we focus on the health care and information services designed on the project, the technological platform developed and details of two representative elements, the virtual reality hand rehabilitation and the health information intelligent system.

  17. Personalized Health Care System with Virtual Reality Rehabilitation and Appropriate Information for Seniors

    PubMed Central

    Páez, Diego Gachet; Aparicio, Fernando; de Buenaga, Manuel; Padrón, Víctor

    2012-01-01

    The concept of the information society is now a common one, as opposed to the industrial society that dominated the economy during the last years. It is assumed that all sectors should have access to information and reap its benefits. Elderly people are, in this respect, a major challenge, due to their lack of interest in technological progress and their lack of knowledge regarding the potential benefits that information society technologies might have on their lives. The Naviga Project (An Open and Adaptable Platform for the Elderly and Persons with Disability to Access the Information Society) is a European effort, whose main goal is to design and develop a technological platform allowing elder people and persons with disability to access the internet and the information society. Naviga also allows the creation of services targeted to social networks, mind training and personalized health care. In this paper we focus on the health care and information services designed on the project, the technological platform developed and details of two representative elements, the virtual reality hand rehabilitation and the health information intelligent system. PMID:22778598

  18. An Information Push-Delivery System Design for Personal Information Service on the Internet.

    ERIC Educational Resources Information Center

    Chen, Chen-Tung; Tai, Wei-Shen

    2003-01-01

    Discussion of information overload from the Internet focuses on an information push-delivery system, which applies fuzzy information retrieval and fuzzy similarity measurement to avoid the information overload problem. Describes an empirical investigation conducted with students at Da-Yeh University (Taiwan) that investigated satisfaction with a…

  19. 10 CFR 603.895 - Protection of information in programmatic reports.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Protection of information in programmatic reports. 603.895... AGREEMENTS Award Terms Related to Other Administrative Matters Financial and Programmatic Reporting § 603.895 Protection of information in programmatic reports. If a TIA is awarded under the authority of 42 U.S.C....

  20. 30 CFR 1206.62 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Does ONRR protect information I provide? 1206.62 Section 1206.62 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Indian Oil § 1206.62 Does ONRR protect information I...