Science.gov

Sample records for personal information protection

  1. Protecting Personal Information on Social Networking Sites

    ERIC Educational Resources Information Center

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  2. Protecting Your Child's Personal Information at School

    ERIC Educational Resources Information Center

    Federal Trade Commission, 2012

    2012-01-01

    Back to school--an annual ritual that includes buying new notebooks, packing lunches, coordinating transportation, and filling out forms: registration forms, health forms, permission slips, and emergency contact forms, to name a few. Many school forms require personal and, sometimes, sensitive information. In the wrong hands, this information can…

  3. 77 FR 59581 - Personal Identity Verification, Release and Handling of Restricted Information, Protection of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-28

    ... Personal Identity Verification, Release and Handling of Restricted Information, Protection of the Florida... rule is identified by RIN 2700-AD38, Personal Identity Verification. It was published in the...

  4. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  5. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  6. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  7. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  8. 32 CFR 701.115 - Protected personal information (PPI).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the misuse and overuse of PPI information that could be used to commit identity theft. PA Coordinators... overuse and misuse of SSNs should be discontinued to avoid the potential for identity theft. For example... PPI is removed to prevent identity theft. (7) Remove PPI from documents prior to posting...

  9. Personal protective equipment

    MedlinePlus

    ... medlineplus.gov/ency/patientinstructions/000447.htm Personal protective equipment To use the sharing features on this page, please enable JavaScript. Personal protective equipment is special equipment you wear to create a ...

  10. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF EDUCATION PROTECTION AND ADVOCACY OF INDIVIDUAL RIGHTS What Conditions Must Be Met After an... 34 Education 2 2011-07-01 2010-07-01 true What are the requirements pertaining to the protection, use, and release of personal information? 381.31 Section 381.31 Education Regulations of the...

  11. Protecting Information

    NASA Astrophysics Data System (ADS)

    Loepp, Susan; Wootters, William K.

    2006-09-01

    For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science.Of particular interest are the potential impacts of quantum physics:(i) a quantum computer, if built, could crack our currently used public-key cryptosystems; and (ii) quantum cryptography promises to provide an alternative to these cryptosystems, basing its security on the laws of nature rather than on computational complexity. No prior knowledge of quantum mechanics is assumed, but students should have a basic knowledge of complex numbers, vectors, and matrices. Accessible to readers familiar with matrix algebra, vector spaces and complex numbers First undergraduate text to cover cryptography, error-correction, and quantum computation together Features exercises designed to enhance understanding, including a number of computational problems, available from www.cambridge.org/9780521534765

  12. About Personal Protective Equipment (PPE)

    MedlinePlus

    ... Equipment for Infection Control Questions About Personal Protective Equipment (PPE) Share Tweet Linkedin Pin it More sharing ... Print Q1. How do manufacturers ensure personal protective equipment (PPE) is safe and effective? A1. To help ...

  13. Personal, Anticipated Information Need

    ERIC Educational Resources Information Center

    Bruce, Harry

    2005-01-01

    Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…

  14. PERSONAL LEADERSHIP PROTECTS RESEARCH SUBJECTS

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Personal leadership promotes the ethical conduct of human research activities. Leadership entails application of one’s cognitive abilities, technical skills, and emotional intelligence during the conduct of research activities, Personal leadership assures human research subject protection....

  15. Developing registries of volunteers: key principles to manage issues regarding personal information protection.

    PubMed

    Lévesque, Emmanuelle; Leclerc, Dominic; Puymirat, Jack; Knoppers, Bartha Maria

    2010-11-01

    Much biomedical research cannot be performed without recruiting human subjects. Increasingly, volunteer registries are being developed to assist researchers with this challenging task. Yet, volunteer registries raise confidentiality issues. Having recently developed a registry of volunteers, the authors searched for normative guidance on how to implement the principle of confidentiality. The authors found that the protection of confidentiality in registries are based on the 10 key elements which are elaborated in detail in the Canadian Standards Association Model Code. This paper describes how these 10 detailed key principles can be used during the developmental stages of volunteer registries.

  16. Personal Protective Equipment

    EPA Pesticide Factsheets

    Response personnel must wear the appropriate level of protection whenever near a hazardous release site. Level A is for the greatest exposure potential, and D is the minimum level. Examples range from totally encapsulated suits to hard hats.

  17. Problems experienced by nurses in relation to disclosure of patient data immediately after enforcement of the personal information protection law in Japan.

    PubMed

    Asanuma, Yuko; Yamanouchi, Kazushi; Sasaki, Noriko; Hosogoe, Sachiko

    2006-01-01

    An extension course for nurses providing details about the Act on the Protection of Personal Information was offered using a remote conferencing system. Experiences or problems related to disclosure of patient data were collected from the participants using a questionnaire. Most of the problems were placed in the category of disclosure of personal data to a third party, followed by those related to security safeguards and administration of employees. It is necessary for the JMHLW to gather more cases in order to expand the number of items in the Casebook by JMHLW. Also, systematic on-the-job education will be needed for nurses.

  18. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  19. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  20. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  1. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  2. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  3. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data

    PubMed Central

    Beck, Eduard J.; Gill, Wayne; De Lay, Paul R.

    2016-01-01

    Background As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs) may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV. The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The success of programs

  4. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data.

    PubMed

    Beck, Eduard J; Gill, Wayne; De Lay, Paul R

    2016-01-01

    Background As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs) may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV. The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The success of programs

  5. Report: Cybersecurity Act of 2015 Report - EPA’s Policies and Procedures to Protect Systems With Personally Identifiable Information

    EPA Pesticide Factsheets

    Report #16-P-0259, August 10, 2016. The EPA has 30 systems that contain sensitive PII. Safeguarding information and preventing system breaches are essential for ensuring the EPA retains the trust of the American public.

  6. Report: Cybersecurity Act of 2015 Report - CSB’s Policies and Procedures to Protect Systems With Personally Identifiable Information

    EPA Pesticide Factsheets

    Report #16-P-0254, August 1, 2016. CSB has one system that contains sensitive PII. Safeguarding such information in the possession of the government and preventing its breach is essential to ensuring CSB retains the trust of the American public.

  7. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... information pursuant to paragraph (c) of this section is governed by the principles of common law as... requesting assistance under the PAIR program, in accordance with the principles of common law as...

  8. Personal protection against biting insects and ticks.

    PubMed

    2011-02-01

    Recent events with the first cases of local transmission of chikungunya and dengue fever virus in southern France by Aedes albopictus, adding to the nuisance and potential vectors that can be encountered when traveling in tropical or sub-tropical countries, has shown the value of a reflection on the Personal protection against vectors (PPAV). It is seen during an outbreak of vector-borne disease, or simply because of nuisance arthropods, that our fellow citizens try to protect themselves individually by using an arsenal of resources available on the market. Yet most of these means have been neither checked for effectiveness or safety tests, however, essential. Travellers, staff on mission or assignment, are looking for specific information on how to protect themselves or their families. Health workers had at their disposal so far indications that vary widely from one source to another. Therefore it seemed important to the Society of Travel Medicine (SMV) and the French Society of Parasitology (SFP) to initiate a reflection on this theme. This reflection took the form of recommendations for good practice, following the outline established by the French High Health Authority (HAS). The aim was to gather all relevant information, verified and validated and the format to be used not only by health personnel (doctors, pharmacists, nurses), but also by travel agents and individuals. This document highlights the need to take into account the risk of vector-borne diseases, some deadly, and the benefit of various methods of personal protection. The choice of methods is clearly oriented towards those whose effectiveness has been proven and potential risks assessed. The paper finally proposes two decision trees based on the transmission type (day or night) and kind of stay (short or roaming, long and steady). It concerns travellers, but also expatriates, residents and nomads.

  9. Personal protection against biting insects and ticks

    PubMed Central

    2011-01-01

    Recent events with the first cases of local transmission of chikungunya and dengue fever virus in southern France by Aedes albopictus, adding to the nuisance and potential vectors that can be encountered when traveling in tropical or sub-tropical countries, has shown the value of a reflection on the Personal protection against vectors (PPAV). It is seen during an outbreak of vector-borne disease, or simply because of nuisance arthropods, that our fellow citizens try to protect themselves individually by using an arsenal of resources available on the market. Yet most of these means have been neither checked for effectiveness or safety tests, however, essential. Travellers, staff on mission or assignment, are looking for specific information on how to protect themselves or their families. Health workers had at their disposal so far indications that vary widely from one source to another. Therefore it seemed important to the Society of Travel Medicine (SMV) and the French Society of Parasitology (SFP) to initiate a reflection on this theme. This reflection took the form of recommendations for good practice, following the outline established by the French High Health Authority (HAS). The aim was to gather all relevant information, verified and validated and the format to be used not only by health personnel (doctors, pharmacists, nurses), but also by travel agents and individuals. This document highlights the need to take into account the risk of vector-borne diseases, some deadly, and the benefit of various methods of personal protection. The choice of methods is clearly oriented towards those whose effectiveness has been proven and potential risks assessed. The paper finally proposes two decision trees based on the transmission type (day or night) and kind of stay (short or roaming, long and steady). It concerns travellers, but also expatriates, residents and nomads. PMID:21395212

  10. 34 CFR 381.31 - What are the requirements pertaining to the protection, use, and release of personal information?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... information pursuant to paragraph (c) of this section is governed by the principles of common law as interpreted by the courts of the United States, except that, for purposes of any periodic audit, report, or... requesting assistance under the PAIR program, in accordance with the principles of common law as...

  11. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) PESTICIDE PROGRAMS LABELING REQUIREMENTS FOR PESTICIDES AND DEVICES Worker Protection Statements § 156.212... equipment statements—(1) Personal protective equipment statements for pesticide handlers. Personal protective equipment statements for pesticide handlers shall be in the HAZARDS TO HUMANS (AND...

  12. Personal Protective Equipment - Protecting Healthcare Providers in an Ebola Outbreak

    PubMed Central

    2015-01-01

    Purpose The current Ebola epidemic that has devastated West Africa has infected and killed more healthcare providers than any other outbreak in the history of this virus. An improved understanding of pathogen transmission and the institution of strategies to protect infection healthcare providers are needed in infectious disease outbreak. This review connects what is known about Ebola virus transmission with personal protective equipment designed to arrest nosocomial transmission. Methods Articles pertaining to filovirus transmission and personal protective equipment in filovirus outbreaks were reviewed and are presented. Additionally, studies evaluating PPE as well as donning and doffing strategies are also presented. Findings Personal Protective equipment is one step in a comprehensive infection prevention and control strategy that is required to protect healthcare providers. Given that the Ebola virus is primarily transmitted through direct contact of mucous membranes and cuts in the skin with infected patients and/or their bodily fluids, it is necessary to cover these potential portals of infection with PPE as part of a structured and instructed donning and doffing procedure. Implications Current recommendations about PPE and the donning and doffing processes are based on anecdotal experience. However the use of non-human viruses can help provide evidence based guidelines on both PPE and processes. PMID:26452427

  13. 75 FR 69369 - Walking-Working Surfaces and Personal Protective Equipment (Fall Protection Systems)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-12

    ... Personal Protective Equipment (Fall Protection Systems) AGENCY: Occupational Safety and Health... Surfaces and Personal Protective Equipment (Fall Protection Systems) proposed rule (29 CFR part 1910... standards on walking-working surfaces and to add personal fall protection systems to the Personal...

  14. Insertion Loss of Personal Protective Clothing

    SciTech Connect

    Shull D.J.; Biesel, V.B.; Cunefare, K.A.

    1999-05-13

    'The use of personal protective clothing that covers the head is a common practice in many industries. Such personal protective clothing will impact the sound pressure level and the frequency content of sounds to which the wearer will be exposed. The use of such clothing, then, may impact speech and alarm audibility. A measure of the impact of such clothing is its insertion loss. Insertion loss measurements were performed on four types of personal protective clothing in use by Westinghouse Savannah River Company personnel which utilize cloth and plastic hood configurations to protect the head. All clothing configurations tested at least partially cover the ears. The measurements revealed that insertion loss of the items tested was notable at frequencies above 1000 Hz only and was a function of material stiffness and acoustic flanking paths to the ear. Further, an estimate of the clothing''s noise reduction rating reveals poor performance in that regard, even though the insertion loss of the test articles was significant at frequencies at and above 1000 Hz.'

  15. Overwhelming Physiological Regulation Through Personal Protection.

    PubMed

    Taylor, Nigel A S

    2015-11-01

    There is often a fine line between providing appropriate personal protection and compromising capability. In some situations, protection must come first. In other circumstances, capability becomes paramount. In the military, mission-specific objectives can force personal protection to be less than ideal. Indeed, levels of protection appropriate within the civilian context could jeopardise health and operational success, and for operations conducted in the heat involving load carriage and armored protection with almost total-body clothing coverage, it is the likely thermal impediment to performance that perhaps first comes to mind. Although this consideration is appropriate, it may direct attention away from the actual cause of, and therefore preventative solutions to, physiological collapse. For instance, although classical heat illness absolutely occurs at the age extremes, and it may affect all people when air temperatures are exceptionally hot, frank hyperthermia is not generally the primary cause of exhaustion when healthy clothed individuals are working in the heat. Instead, another homoeostatic process is implicated; blood pressure regulation. In addition to participating in temperature regulation, the cardiovascular system supports oxygen delivery, blood pressure regulatory, and waste removal requirements. Therefore, the elevated cardiac output accompanying work must be shared. Accordingly, the case will be developed that thermoregulatory failure is often not the primary causal mechanism for soldier collapse, although such individuals may be hyperthermic. Alternatively, moderately, but not excessively, hyperthermic soldiers working under these conditions are perhaps more likely to collapse from cardiovascular insufficiency that precipitates uncompensable hypotension.

  16. Electronic Health Record in Italy and Personal Data Protection.

    PubMed

    Bologna, Silvio; Bellavista, Alessandro; Corso, Pietro Paolo; Zangara, Gianluca

    2016-06-01

    The present article deals with the Italian Electronic Health Record (hereinafter EHR), recently introduced by Act 221/2012, with a specific focus on personal data protection. Privacy issues--e.g., informed consent, data processing, patients' rights and minors' will--are discussed within the framework of recent e-Health legislation, national Data Protection Code, the related Data Protection Authority pronouncements and EU law. The paper is aimed at discussing the problems arising from a complex, fragmentary and sometimes uncertain legal framework on e-Health.

  17. Use of personal protective equipment for respiratory protection.

    PubMed

    Sargent, Edward V; Gallo, Frank

    2003-01-01

    Management of hazards in biomedical research facilities requires the application of the traditional industrial hygiene responsibilities of anticipation, recognition, evaluation, and control to characterize the work environment, evaluate tasks and equipment, identify hazards, define exposure groups, and recommend controls. Generally, the diversity and unique characteristics of hazards faced by laboratory and animal facility employees and the short-term and low-level nature of the exposures factor into the selection of proper exposure control measures in the laboratory. The proper selection of control measures is based on a hierarchy of elimination and minimization by engineering controls, followed last by personal protective equipment when exposures cannot be eliminated. Once it is decided that personal protective equipment is needed, specific regulations and guidelines define safety standards for research facilities, including the elements of a sound respiratory protection program. These elements include respirator selection (including appropriate protection factors), medical evaluation, fit testing, training, inspection, maintenance and care, quality, quantity and flow of breathing air, and routine and emergency use procedures.

  18. 49 CFR 214.111 - Personal protective equipment, generally.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... railroad or railroad contractor shall require the use of foot protection when the potential for foot injury... Personal protective equipment, generally. With the exception of foot protection, the railroad or...

  19. 49 CFR 214.111 - Personal protective equipment, generally.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... railroad or railroad contractor shall require the use of foot protection when the potential for foot injury... Personal protective equipment, generally. With the exception of foot protection, the railroad or...

  20. How Do Students Organize Personal Information Spaces?

    ERIC Educational Resources Information Center

    Hardof-Jaffe, Sharon; Hershkovitz, Arnon; Abu-Kishk, Hama; Bergman, Ofer; Nachmias, Rafi

    2009-01-01

    The purpose of this study is to empirically reveal strategies of students' organization of learning-related digital materials within an online personal information archive. Research population included 518 students who utilized the personal Web space allocated to them on the university servers for archiving information items, and data describing…

  1. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a) Any person who organizes a non-governmental expedition to Antarctica and who does business in the United States shall notify expedition members of the environmental protection obligations of the...

  2. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Protection of personal privacy... personal privacy. (a) Any of the following personnel, medical, or similar records is within the statutory... personal privacy: (1) Personnel and background records personal to any officer or employee of...

  3. Adaptive Visualization for Focused Personalized Information Retrieval

    ERIC Educational Resources Information Center

    Ahn, Jae-wook

    2010-01-01

    The new trend on the Web has totally changed today's information access environment. The traditional information overload problem has evolved into the qualitative level beyond the quantitative growth. The mode of producing and consuming information is changing and we need a new paradigm for accessing information. Personalized search is one of…

  4. Don't Take It Personal: European Union Legal Aspects of Procuring and Protecting Environmental Exposure Data in Population Biobanks Through the Use of a Geo-Information-Systems Toolkit.

    PubMed

    Bovenberg, Jasper Adriaan; de Hoogh, Kees; Knoppers, Bartha Maria; Hveem, Kristian; Hansell, Anna L

    2016-06-01

    Under European Union (EU) law, population-based cohort studies have the right to collect environmental data and to access geospatial data, at street level, on the web, from a host of public sources. As to geospatial information, they should be able to avail themselves of Member States' networks of services for geospatial data sets and services (discovery, viewing, downloading) via the Internet. On the other hand, linkage of health data of biobank participants to environmental data, using geospatial data, is limited, as it must satisfy the provisions of the EU Directive on the Protection of Personal Data, pursuant to which geospatial data regarding biobank participants are likely to qualify as personal data. Hence, we submit that the consents of biobank participants be reviewed to assess whether they cover the generation and linkage of geospatial data. We also submit that biobanks must have measures in place to prevent the re-identification of participants by use of their geospatial data. We present a model Geographic-Information-Systems (GIS) Toolkit, as an example of what measures could be taken to that effect.

  5. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  6. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  7. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  8. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  9. 36 CFR 1202.28 - What rules do NARA employees follow in managing personal information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Collecting Information § 1202.28 What rules do NARA employees follow in managing personal information? All... follow in managing personal information? 1202.28 Section 1202.28 Parks, Forests, and Public Property... protection of nonpublic information in the Standards of Ethical Conduct for Employees of the Executive...

  10. [Protective glasses. Personal eye protection for professional use].

    PubMed

    Eppig, T; Speck, A; Zelzer, B; Langenbucher, A

    2014-01-01

    Several activities in the occupational environment or in leisure time implicate an increased risk of eye injuries. Many injuries could be prevented by wearing adequate eye protection devices; however, the selection of appropriate eye protection devices requires considerations of different attributes in order to achieve a maximum of protection efficiency. This article provides an overview on the three basic types of eye protection device, introduces the classification regarding optical and protective properties and gives some additional advice on the selection of protective eyewear beyond the current standard regulations.

  11. 32 CFR Appendix A to Part 310 - Safeguarding Personally Identifiable Information (PII)

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... granting access to the entire database. 8. Do not totally rely on proprietary software products to protect.... Personally identifiable information must also be protected while it is being processed or accessed in... safeguards that are adequate to protect the information against unauthorized disclosure, access, or...

  12. What Your Can Do to Protect Your Health Information

    MedlinePlus

    ... store health information on your personal computer or mobile device, exchange emails about it, or participate in health-related online communities, here are a few things you should know: While the HIPAA Privacy and Security Rules are in place to protect and secure ...

  13. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  14. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  15. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  16. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  17. 46 CFR 197.555 - Personal protective clothing and equipment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SAFETY AND HEALTH STANDARDS GENERAL PROVISIONS Benzene § 197.555 Personal protective clothing and..., tight-fitting eye goggles to limit dermal exposure to, and prevent eye contact with, liquid benzene....

  18. Usage and Perceived Side Effects of Personal Protective Measures against Mosquitoes among Current Users in Delhi.

    PubMed

    Kohli, Charu; Kumar, Rajesh; Meena, G S; Singh, M M; Sahoo, Jyotiranjan; Ingle, G K

    2014-01-01

    Background. Mosquito-borne diseases constitute an important cause of morbidity and mortality. The use of personal protective measures (PPM) like mats, bednets, screening, repellents, liquid vaporizers, mosquito coils, and so forth has been advocated as an effective tool in control of mosquito-borne diseases, but data about the safety profile of personal protective measures is still scarce. Objective. To study the usage and side effects of personal protective measures against mosquitoes among current users in Delhi. Materials and Methods. A community-based cross-sectional study among 350 adult individuals selected by systematic sampling method. Data was collected using pretested semistructured questionnaire after taking written informed consent. Data was analysed using SPSS version 17. Chi-square/Fisher's Exact test was used for qualitative variables to find association and P value <0.05 was considered significant. Results. Out of 350 families selected, 210 belonged to rural area and 140 to urban area. Personal protective measures were used by 219 (62.5%) subjects. Liquid vaporizer was the most preferred method (41.4%). Most common perceived side effect of personal protective measures was headache (7.7%). Other perceived side effects were cough (3.2%), sore throat (2.7%), allergy (1.3%), and eye irritation (0.9%) predominantly among coil users. Conclusion. There is a need to have a close watch for side effects of personal protective measures among users. Further research is also needed to develop safe and effective personal protective measures against mosquitoes.

  19. Divulging Personal Information within Learning Analytics Systems

    ERIC Educational Resources Information Center

    Ifenthaler, Dirk; Schumacher, Clara

    2015-01-01

    The purpose of this study was to investigate if students are prepared to release any personal data in order to inform learning analytics systems. Besides the well-documented benefits of learning analytics, serious concerns and challenges are associated with the application of these data driven systems. Most notably, empirical evidence regarding…

  20. 32 CFR 806b.10 - How to collect personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false How to collect personal information. 806b.10... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.10 How to collect personal information. Collect personal information directly from the subject of the record whenever possible. Only ask...

  1. Integrated Personal Protective Equipment Standards Support Model

    DTIC Science & Technology

    2008-04-01

    Second, because they are on patrol between calls, police officers don’t have the same amount of time for training that fire fighters do. Third...better trained for operating in PPE, they have more time for specialized training , and it is more cost effective to get them high quality PPE rather than...floor 10 ft. inside door, CB agents. while keeping weapon trained on person. 2-way communication between officer and suspect. 11 Stand up and repair any

  2. Thermal Materials Protect Priceless, Personal Keepsakes

    NASA Technical Reports Server (NTRS)

    2014-01-01

    NASA astronaut Scott Parazynski led the development of materials and techniques for the inspection and repair of the shuttle’s thermal protection system. Parazynski later met Chris Shiver of Houston-based DreamSaver Enterprises LLC and used concepts from his work at Johnson Space Center to develop an enclosure that can withstand 98 percent of residential fires.

  3. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... operations areas and Safeguards Information in the hands of any person subject to the requirements of § 73.21... protected as Safeguards Information include non-public security-related requirements such as: (1) Physical protection. Information not classified as Restricted Data or National Security Information related...

  4. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... operations areas and Safeguards Information in the hands of any person subject to the requirements of § 73.21... protected as Safeguards Information include non-public security-related requirements such as: (1) Physical protection. Information not classified as Restricted Data or National Security Information related...

  5. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... operations areas and Safeguards Information in the hands of any person subject to the requirements of § 73.21... protected as Safeguards Information include non-public security-related requirements such as: (1) Physical protection. Information not classified as Restricted Data or National Security Information related...

  6. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... operations areas and Safeguards Information in the hands of any person subject to the requirements of § 73.21... protected as Safeguards Information include non-public security-related requirements such as: (1) Physical protection. Information not classified as Restricted Data or National Security Information related...

  7. 10 CFR 73.22 - Protection of Safeguards Information: Specific requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... operations areas and Safeguards Information in the hands of any person subject to the requirements of § 73.21... protected as Safeguards Information include non-public security-related requirements such as: (1) Physical protection. Information not classified as Restricted Data or National Security Information related...

  8. Personal protective equipment with integrated POF sensors

    NASA Astrophysics Data System (ADS)

    Witt, J.; Schukar, M.; Krebber, K.; Pažoutová, H.; Demuth, J.; Santostefano, N.; Mäkinen, H.; Pietrowski, P.

    2013-05-01

    Within the EU project i-Protect fibre optic sensors for measuring heart rate, respiratory rate and skin temperature are being developed. The plastic optical fibre (POF) sensors are based on macrobending effects, photoplethysmography and fluorescence thermometry. The sensors and monitoring units are integrated into underwear and are communicating wireless via body area network and communication unit with the rescue command centre. All sensors can be removed from the underwear to allow washing the textile. First prototypes of the fibre optic sensors were tested in comparison to commercial reference sensors.

  9. 77 FR 26776 - Agency Information Collection Activities: Declaration of Persons Who Performed Repairs or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Declaration of Persons Who Performed Repairs or Alterations AGENCY: U.S. Customs and Border Protection, Department of... collection. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security will...

  10. Government Doublethink: Protection or Suppression in Information.

    ERIC Educational Resources Information Center

    Drake, Miriam A.

    2003-01-01

    Discusses regulations and actions related to government withholding, suppressing, and altering information since September 11, 2001. Topics include conflicting goals of an informed citizenry versus national security, science and technology progress versus protection of sensitive information, and public health versus ideology; political pressure;…

  11. Information Protection Engineering: Using Technology and Experience to Protect Assets

    DTIC Science & Technology

    2001-07-01

    advantage con- tained within intellectual capital , trade secrets, or other proprietary information. Newspaper headlines tell the story: • USA Today, 5...of-the-art computing and tele-communications technology, they find themselves increasingly vulner- able to compromises of hard-won intellectual ... capital , business secrets, and proprietary information. Moreover, the need to protect the integrity of infor- mation is equally important, even when

  12. Blocking of Person Information in Small Social Groupings: The Information of Person Categories.

    DTIC Science & Technology

    1983-12-20

    capacity for processing information. Psychological Review , 1956, 63, 81-97. Miller, G. A., Galanter, E., & Pribram, Plans and the structure of behavior. New... Alderfer Yale University School of Organization and Management New Haven, Connecticut 06520 Dr. Janet L. Barnes-Farrell Department of Psychology ...I’D-Ali37 282 BLOCKING OF PERSON INFORMATION IN SMALL SOCIAL i/i GROUPINGS: THE INFORMATION..(U) OHIO STATE5UNIV COLUMBUS DEPT OF PSYCHOLOGY C D

  13. EPA Plan for Reducing Personally Identifiable Information, January 2013

    EPA Pesticide Factsheets

    The EPA Privacy Policy, issued in 2007, establishes the framework and accountability for reducing Agency personally identifiable information (PII). Learn about the Agency's plan to reduce the collection of Personally Identifiable Information (PII).

  14. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... surrogate to determine the personal protective equipment requirements for that route of exposure. If data to... (or its surrogate as specified in paragraph (d)(2) of this section) in category I, the respiratory... surrogate as specified in paragraph (d)(2) of this section) in category II, the respiratory...

  15. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... surrogate to determine the personal protective equipment requirements for that route of exposure. If data to... (or its surrogate as specified in paragraph (d)(2) of this section) in category I, the respiratory... surrogate as specified in paragraph (d)(2) of this section) in category II, the respiratory...

  16. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... surrogate to determine the personal protective equipment requirements for that route of exposure. If data to... (or its surrogate as specified in paragraph (d)(2) of this section) in category I, the respiratory... surrogate as specified in paragraph (d)(2) of this section) in category II, the respiratory...

  17. 40 CFR 156.212 - Personal protective equipment statements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... surrogate to determine the personal protective equipment requirements for that route of exposure. If data to... (or its surrogate as specified in paragraph (d)(2) of this section) in category I, the respiratory... surrogate as specified in paragraph (d)(2) of this section) in category II, the respiratory...

  18. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  19. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  20. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  1. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  2. 30 CFR 56.12020 - Protection of persons at switchgear.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Protection of persons at switchgear. 56.12020 Section 56.12020 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES...

  3. 49 CFR 238.117 - Protection against personal injury.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Protection against personal injury. 238.117 Section 238.117 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... voltage equipment, electrical conductors and switches, and pipes carrying hot fluids or gases on...

  4. 49 CFR 238.117 - Protection against personal injury.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Protection against personal injury. 238.117 Section 238.117 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD... voltage equipment, electrical conductors and switches, and pipes carrying hot fluids or gases on...

  5. Evaluation of commercial products for personal protection against mosquitoes

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Human landing catch studies were conducted in a semi-field setting to determine the efficacy of seven commercial products used for personal protection against mosquitoes. Experiments were conducted in two empty, insecticide free, greenhouse compartments, in Israel, with either 1500 Aedes albopictus...

  6. Chlorobenzylidenemalonitrile Gas Exposure from A Novelty Personal-Protection Gun

    PubMed Central

    Dong, Christopher; de la Garza, Albert

    2007-01-01

    We present an unusual case of chlorobenzylidenemalonitrile (CS) tear-gas exposure from the unwitting discharge of a personal-protection handgun loaded with CS gas. The gun was in a bag of toys purchased from a local thrift store and was discharged by a child. The responding paramedic presumptively identified the substance as CS based solely on personal experience. This recognition led to suboptimal field management of the incident with the paramedic failing to follow the standard operating procedures for an unknown chemical exposure. As this was a benign agent, there were no serious consequences. This case highlights the pre-hospital and emergency department challenges associated with the management of an unknown chemical exposure and the potential consequences if the chemical is a toxic substance. A methodical approach following established protocols can reduce the potential for negative outcomes. Review of the literature found no other report of CS gas exposure from such a personal-protection weapon. PMID:20440402

  7. Hazard Assessment of Personal Protective Clothing for Hydrogen Peroxide Service

    NASA Technical Reports Server (NTRS)

    Greene, Ben; McClure, Mark B.; Johnson, Harry T.

    2004-01-01

    Selection of personal protective equipment (PPE) for hydrogen peroxide service is an important part of the hazard assessment process. But because drip testing of chemical protective clothing for hydrogen peroxide service has not been reported for about 40 years, it is of great interest to test new protective clothing materials with new, high-concentration hydrogen peroxide following similar procedures. The suitability of PPE for hydrogen peroxide service is in part determined by observations made when hydrogen peroxide is dripped onto swatches of protective clothing material. Protective clothing material was tested as received, in soiled condition, and in grossly soiled condition. Materials were soiled by pretreating the material with potassium permanganate (KMnO4) solution then drying to promote a reaction. Materials were grossly soiled with solid KMnO4 to greatly promote reaction. Observations of results including visual changes to the hydrogen peroxide and materials, times to ignition, and self-extinguishing characteristics of the materials are reported.

  8. 77 FR 35700 - Protected Critical Infrastructure Information (PCII) Program Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ... SECURITY Protected Critical Infrastructure Information (PCII) Program Survey AGENCY: National Protection... by this survey serves this purpose. The survey data collected is for internal PCII Program, IICD, and... Information Program. Title: Protected Critical Infrastructure Information (PCII) Program Survey. OMB...

  9. Hiding personal information reveals the worst

    PubMed Central

    John, Leslie K.; Barasz, Kate; Norton, Michael I.

    2016-01-01

    Seven experiments explore people’s decisions to share or withhold personal information, and the wisdom of such decisions. When people choose not to reveal information—to be “hiders”—they are judged negatively by others (experiment 1). These negative judgments emerge when hiding is volitional (experiments 2A and 2B) and are driven by decreases in trustworthiness engendered by decisions to hide (experiments 3A and 3B). Moreover, hiders do not intuit these negative consequences: given the choice to withhold or reveal unsavory information, people often choose to withhold, but observers rate those who reveal even questionable behavior more positively (experiments 4A and 4B). The negative impact of hiding holds whether opting not to disclose unflattering (drug use, poor grades, and sexually transmitted diseases) or flattering (blood donations) information, and across decisions ranging from whom to date to whom to hire. When faced with decisions about disclosure, decision-makers should be aware not just of the risk of revealing, but of what hiding reveals. PMID:26755591

  10. A guide to unclassified sensitive information protection

    SciTech Connect

    Donahue, S.C.

    1996-11-14

    This document is a reference guide for CIC-Division employees who lead or participate in projects that use and/or produce unclassified sensitive information. It is intended for use on a case by case basis to develop project specific sensitive information handling procedures and standards. It contains criteria for identifying sensitive information and determining levels of sensitivity, and describes cost effective measures for protecting various levels of sensitive information. The goal of this document is to help establish good business practices that benefit both the Laboratory and its customers. Division personnel are encouraged to apply these guidelines.

  11. A patient privacy protection scheme for medical information system.

    PubMed

    Lu, Chenglang; Wu, Zongda; Liu, Mingyong; Chen, Wei; Guo, Junfang

    2013-12-01

    In medical information systems, there are a lot of confidential information about patient privacy. It is therefore an important problem how to prevent patient's personal privacy information from being disclosed. Although traditional security protection strategies (such as identity authentication and authorization access control) can well ensure data integrity, they cannot prevent system's internal staff (such as administrators) from accessing and disclosing patient privacy information. In this paper, we present an effective scheme to protect patients' personal privacy for a medical information system. In the scheme, privacy data before being stored in the database of the server of a medical information system would be encrypted using traditional encryption algorithms, so that the data even if being disclosed are also difficult to be decrypted and understood. However, to execute various kinds of query operations over the encrypted data efficiently, we would also augment the encrypted data with additional index, so as to process as much of the query as possible at the server side, without the need to decrypt the data. Thus, in this paper, we mainly explore how the index of privacy data is constructed, and how a query operation over privacy data is translated into a new query over the corresponding index so that it can be executed at the server side immediately. Finally, both theoretical analysis and experimental evaluation validate the practicality and effectiveness of our proposed scheme.

  12. The Delicate Balance: Reconciling Privacy Protection with the Freedom of Information Principle.

    ERIC Educational Resources Information Center

    McCamus, John D.

    1986-01-01

    This comparison of freedom of information legislation in Canada and the United States focuses on the concern evident in both to protect personal privacy. Specific criteria for achieving a balance between access and privacy are articulated. (CLB)

  13. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Protection of restricted data and national security... Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National...

  14. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Protection of restricted data and national security... Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National...

  15. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data...

  16. 22 CFR 96.26 - Protection of information and documents by the accrediting entity.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of information and documents by the... ACCREDITATION OF AGENCIES AND APPROVAL OF PERSONS UNDER THE INTERCOUNTRY ADOPTION ACT OF 2000 (IAA) Evaluation of Applicants for Accreditation and Approval § 96.26 Protection of information and documents by...

  17. Personal Health Information in Canada: A Comparison of Citizen Expectations and Legislation

    ERIC Educational Resources Information Center

    Peekhaus, Wilhelm

    2008-01-01

    This paper explores whether the Canadian legislative protections in place to safeguard medical privacy meet the expectations of Canadians. An overview of current governance systems designed to protect the privacy of personal health information at both the federal and provincial levels is first presented. This is followed by an empirical analysis…

  18. Personal protective equipment and decontamination of adults and children.

    PubMed

    Holland, Michael G; Cawthon, David

    2015-02-01

    Accurate identification of the hazardous material is essential for proper care. Efficient hospital security and triage must prevent contaminated victims from entering the emergency department (ED) and causing secondary contamination. The decontamination area should be located outside the ambulance entrance. Decontamination priorities are protection of the health care worker, utilization of Level C personal protective equipment, and proper decontamination of the exposed patient. Decontamination proceeds in a head-to-toe sequence. Run-off water is a hazardous waste. Hospital and Community Management Planning for these emergencies is essential for proper preparation and effective response to the hazardous materials incident.

  19. Biological Aerosol Test Method and Personal Protective Equipment (PPE) Decon

    DTIC Science & Technology

    2011-05-01

    technologies for disinfecting filtering facepiece respirators (FFRs) by aerosolizing, sampling, and analyzing viability of A/H5N1 virus on FFRs...personal respiratory protective devices. A component of that effort was to conduct a study of technologies for disinfecting filtering facepiece...flat-fold/three-panel, surgical , N95 respirator that is designed to resist splash and splatter of bodily fluids and infectious materials. These masks

  20. [Safety analysis for astronaut and the personal protective equipment].

    PubMed

    Chen, J D; Sun, J B; Shi, H P; Sun, H L

    1999-12-01

    Objective. To analyze and study astronaut and his personal equipment safety. Method. Three of the most widely used approaches, failure mode and effect analysis (FMEA), fault tree analysis (FTA) and system hazards analysis (SHA) were used. Result. It was demonstrated that astronaut and the personal equipment are subjected to various potential hazards, such as human errors, astronaut illness, fire or space suit emergency decompression, etc. Their causes, mechanisms, possible effects and criticality of some critical potential hazards were analyzed and identified in more details with considerations of the historic accidents of manned spaceflight. And the compensating provisions and preventive measures for each hazard were discussed. Conclusion. The analysis study may be helpful in enhancing the safety of the astronaut and its personal protective equipment.

  1. [Management System of Personal Data Protection in the Health Care Field].

    PubMed

    Yamamoto, Ryuichi

    2014-11-01

    In Japan, the law on personal data protection was enacted in 2005. Privacy is a human right, including the 1981 right to be let alone. The need for confidentiality in the health care field has been accepted since the ancient Greek era, and privacy in the 19th century was developed in this field. However, the concept of privacy has gradually altered, especially due to the development of information technology. The author suggests that the guideline for the security of heath information systems of the Ministry of Health, Labour, and Welfare is very important and information security management with PDCA cycles is essential for personal data protection in the health care field. In recent years, gathering a large amount of life logging or health-related data and analyzing such data for academic and/or industrial applications has become common. Revising privacy protection legislation has become an urgent political issue in many countries. The Japanese Government published their policy to personal data protection act in Dec. 2013. Balancing public benefit and privacy is a major task of future legislation. The author recommends that health care professionals pay attention to, participate in the discussion of, and make suggestions regarding this act.

  2. Insect repellents and associated personal protection for a reduction in human disease

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Personal protection measures against biting arthropods include topical insect repellents, area repellents, insecticide-treated bednets and treated clothing. The literature on the effectiveness of personal protection products against arthropods is mainly limited to studies of prevention of bites, rat...

  3. Selecting PPE for the Workplace (Personal Protective Equipment for the Eyes and Face)

    MedlinePlus

    ... Additional References Site Map Credits Selecting Personal Protective Equipment (PPE) for the Workplace Impact Heat Chemicals Dust Optical Radiation OSHA Requirements Home | Selecting Personal Protective Equipment (PPE) for the Workplace | OSHA Requirements Site Map | ...

  4. Can Smartphones and Privacy Coexist Assessing Technologies and Regulations Protecting Personal Data on Android and iOS Devices

    DTIC Science & Technology

    2016-01-01

    C O R P O R A T I O N Can Smartphones and Privacy Coexist? Assessing Technologies and Regulations Protecting Personal Data on Android and iOS...depend on policymakers gaining greater insights into technological, social , and governmental forces that shape today’s evolving smartphone environment...over how their personal information is shared. The challenge with defining privacy is that often what is considered personal or private may

  5. Influences of Information Availability on Cognitive Processes in Person Perception.

    ERIC Educational Resources Information Center

    Lingle, John H.; Ostrom, Thomas M.

    Three experiments were conducted investigating information processing in a person perception task. A sequential judgement paradigm was employed in which subjects judged the suitability of stimulus persons for two different occupations. Traits describing each person were present for subjects' first judgements but not their second. Second decision…

  6. Effects of personal experience on self-protective behavior.

    PubMed

    Weinstein, N D

    1989-01-01

    This article seeks to further our understanding of self-protective behavior by examining the effects of a particularly powerful stimulus to action: personal experience. It reviews the effects of automobile accidents on seat belt use, criminal victimization other than rape on individual crime prevention efforts, natural hazards experience on both natural hazards preparedness and compliance with evacuation warnings, and myocardial infarction on smoking. Theories suggesting mechanisms that could link personal experience to behavior are described, and data concerning the effects of experience on some key variables in these theories are discussed. Tentative propositions are offered to resolve the many apparent discrepancies in this literature. These propositions concern the effects of experience on risk perceptions, the influence of experience on risk salience, the specificity of responses to victimization, and the duration of experience effects.

  7. Evaluation of commercial products for personal protection against mosquitoes.

    PubMed

    Revay, Edita E; Junnila, Amy; Xue, Rui-De; Kline, Daniel L; Bernier, Ulrich R; Kravchenko, Vasiliy D; Qualls, Whitney A; Ghattas, Nina; Müller, Günter C

    2013-02-01

    Human landing catch studies were conducted in a semi-field setting to determine the efficacy of seven commercial products used for personal protection against mosquitoes. Experiments were conducted in two empty, insecticide free, mesh-enclosed greenhouses, in Israel, with either 1500 Aedes albopictus or 1500 Culex pipiens released on consecutive study nights. The products tested in this study were the OFF!(®) Clip-On™ Mosquito Repellent (Metofluthrin 31.2%) and the Terminix(®) ALLCLEAR(®) Sidekick Mosquito Repeller (Cinnamon oil 10.5%; Eugenol 13%; Geranium oil 21%; Peppermint 5.3%; Lemongrass oil 2.6%), which are personal diffusers; Super Band™ Wristband (22% Citronella oil) and the PIC(®) Citronella Plus Wristband (Geraniol 15%; Lemongrass oil 5%, Citronella oil 1%); the Sonic Insect Repeller Keychain; the Mosquito Guard Patch (Oil of Lemon Eucalyptus 80mg), an adhesive-backed sticker for use on textiles; and the Mosquito Patch (vitamin B1 300mg), a transdermal patch. It was determined that the sticker, transdermal patch, wristbands and sonic device did not provide significant protection to volunteers compared with the mosquito attack rate on control volunteers who were not wearing a repellent device. The personal diffusers: - OFF!(®) Clip-On™ and Terminix(®) ALLCLEAR(®) Sidekick - provided superior protection compared with all other devices in this study. These diffusers reduced biting on the arms of volunteers by 96.28% and 95.26% respectively, for Ae. albopictus, and by 94.94% and 92.15% respectively, for Cx. pipiens. In a second trial conducted to compare these devices directly, biting was reduced by the OFF!(®) Clip-On™ and the Terminix(®) ALLCLEAR(®) by 87.55% and 92.83%, respectively, for Ae. albopictus, and by 97.22% and 94.14%, respectively, for Cx. pipiens. There was no significant difference between the performances of the two diffusers for each species.

  8. Efficiency of personal protective equipment used in agriculture.

    PubMed

    Meirelles, Luiz Antônio; Veiga, Marcelo Motta; de Castro Moura Duarte, Francisco José

    2012-01-01

    Despite the practical importance of Personal Protective Equipment (PPE), both in production and in consumption, it is observed a main problem regarding the quality of many PPE�s used in Brazil. This study found a gap between the state of the art and the state of prevailing practices in the design of PPE�s, which main consequences affect the health of workers who use PPE in agriculture activities. The results of this study identified legal constraints of this occurrence, involving the validation of PPE designed for isolate agents, without the analysis of relevant activities and without prototypes experiments in more frequent use situation.

  9. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.5 Individual access to personal information... individuals under this section is not considered a “public release” of information. (c) Verification...

  10. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.4 Collecting personal information. (a) General... information on public Web sites without the express permission of the user. Requests for exceptions must...

  11. Continuum Thinking and the Contexts of Personal Information Management

    ERIC Educational Resources Information Center

    Huvila, Isto; Eriksen, Jon; Häusner, Eva-Maria; Jansson, Ina-Maria

    2014-01-01

    Introduction: Recent personal information management literature has underlined the significance of the contextuality of personal information and its use. The present article discusses the applicability of the records continuum model and its generalisation, continuum thinking, as a theoretical framework for explicating the overlap and evolution of…

  12. River Protection Project information systems assessment

    SciTech Connect

    JOHNSON, A.L.

    1999-07-28

    The Information Systems Assessment Report documents the results from assessing the Project Hanford Management Contract (PHMC) Hanford Data Integrator 2000 (HANDI 2000) system, Business Management System (BMS) and Work Management System phases (WMS), with respect to the System Engineering Capability Assessment Model (CAM). The assessment was performed in accordance with the expectations stated in the fiscal year (FY) 1999 Performance Agreement 7.1.1, item (2) which reads, ''Provide an assessment report on the selected Integrated Information System by July 31, 1999.'' This report assesses the BMS and WMS as implemented and planned for the River Protection Project (RPP). The systems implementation is being performed under the PHMC HANDI 2000 information system project. The project began in FY 1998 with the BMS, proceeded in FY 1999 with the Master Equipment List portion of the WMS, and will continue the WMS implementation as funding provides. This report constitutes an interim quality assessment providing information necessary for planning RPP's information systems activities. To avoid confusion, HANDI 2000 will be used when referring to the entire system, encompassing both the BMS and WMS. A graphical depiction of the system is shown in Figure 2-1 of this report.

  13. Remote Effect of Insecticide-Treated Nets and the Personal Protection against Malaria Mosquito Bites.

    PubMed

    Moiroux, Nicolas; Chandre, Fabrice; Hougard, Jean-Marc; Corbel, Vincent; Pennetier, Cédric

    2017-01-01

    Experimental huts are part of the WHO process for testing and evaluation of Insecticide Treated Nets (ITN) in semi-field conditions. Experimental Hut Trials (EHTs) mostly focus on two main indicators (i.e., mortality and blood feeding reduction) that serve as efficacy criteria to obtain WHO interim recommendation. However, several other outputs that rely on counts of vectors collected in the huts are neglected although they can give useful information about vectors' behavior and personal protection provided by ITNs. In particular, EHTs allow to measure the deterrent effect and personal protection of ITNs. To provide a better assessment of ITNs efficacy, we performed a retrospective analysis of the deterrence and the personal protection against malaria transmission for 12 unwashed and 13 washed ITNs evaluated through EHTs conducted in West Africa. A significant deterrent effect was shown for six of the 12 unwashed ITNs tested. When washed 20 times, only three ITNs had significant deterrent effect (Rate Ratios (RR)<1; p<0.05) and three showed an apparent "attractiveness" (RR>1; p<0.01). When compared to the untreated net, all unwashed ITNs showed lower number of blood-fed Anopheles indicating a significant personal protection (RR<1, p<0.05). However, when washed 20 times, three ITNs that were found to be attractive did not significantly reduce human-vector contact (p>0.05). Current WHO efficacy criteria do not sufficiently take into account the deterrence effect of ITNs. Moreover, the deterrence variability is rarely discussed in EHT's reports. Our findings highlighted the long-range effect (deterrent or attractive) of ITNs that may have significant consequences for personal/community protection against malaria transmission. Indicators measuring the deterrence should be further considered for the evaluation of ITNs.

  14. Remote Effect of Insecticide-Treated Nets and the Personal Protection against Malaria Mosquito Bites

    PubMed Central

    Chandre, Fabrice; Hougard, Jean-Marc; Corbel, Vincent; Pennetier, Cédric

    2017-01-01

    Experimental huts are part of the WHO process for testing and evaluation of Insecticide Treated Nets (ITN) in semi-field conditions. Experimental Hut Trials (EHTs) mostly focus on two main indicators (i.e., mortality and blood feeding reduction) that serve as efficacy criteria to obtain WHO interim recommendation. However, several other outputs that rely on counts of vectors collected in the huts are neglected although they can give useful information about vectors’ behavior and personal protection provided by ITNs. In particular, EHTs allow to measure the deterrent effect and personal protection of ITNs. To provide a better assessment of ITNs efficacy, we performed a retrospective analysis of the deterrence and the personal protection against malaria transmission for 12 unwashed and 13 washed ITNs evaluated through EHTs conducted in West Africa. A significant deterrent effect was shown for six of the 12 unwashed ITNs tested. When washed 20 times, only three ITNs had significant deterrent effect (Rate Ratios (RR)<1; p<0.05) and three showed an apparent “attractiveness” (RR>1; p<0.01). When compared to the untreated net, all unwashed ITNs showed lower number of blood-fed Anopheles indicating a significant personal protection (RR<1, p<0.05). However, when washed 20 times, three ITNs that were found to be attractive did not significantly reduce human-vector contact (p>0.05). Current WHO efficacy criteria do not sufficiently take into account the deterrence effect of ITNs. Moreover, the deterrence variability is rarely discussed in EHT’s reports. Our findings highlighted the long-range effect (deterrent or attractive) of ITNs that may have significant consequences for personal/community protection against malaria transmission. Indicators measuring the deterrence should be further considered for the evaluation of ITNs. PMID:28129371

  15. Contamination during doffing of personal protective equipment by healthcare providers

    PubMed Central

    Lim, Seong Mi; Cha, Won Chul; Chae, Minjung Kathy; Jo, Ik Joon

    2015-01-01

    Objective In this study, we aimed to describe the processes of both the donning and the doffing of personal protective equipment for Ebola and evaluate contamination during the doffing process. Methods We recruited study participants among physicians and nurses of the emergency department of Samsung Medical Center in Seoul, Korea. Participants were asked to carry out doffing and donning procedures with a helper after a 50-minute brief training and demonstration based on the 2014 Centers for Disease Control and Prevention protocol. Two separate cameras with high-density capability were set up, and the donning and doffing processes were video-taped. A trained examiner inspected all video recordings and coded for intervals, errors, and contaminations defined as the outside of the equipment touching the clinician’s body surface. Results Overall, 29 participants were enrolled. Twenty (68.9%) were female, and the mean age was 29.2 years. For the donning process, the average interval until the end was 234.2 seconds (standard deviation [SD], 65.7), and the most frequent errors occurred when putting on the outer gloves (27.5%), respirator (20.6%), and hood (20.6%). For the doffing process, the average interval until the end was 183.7 seconds (SD, 38.4), and the most frequent errors occurred during disinfecting the feet (37.9%), discarding the scrubs (17.2%), and putting on gloves (13.7%), respectively. During the doffing process, 65 incidences of contamination occurred (2.2 incidents/person). The most vulnerable processes were removing respirators (79.2%), removing the shoe covers (65.5%), and removal of the hood (41.3%). Conclusion A significant number of contaminations occur during the doffing process of personal protective equipment. PMID:27752591

  16. DEVELOPMENT OF PERSONAL PROTECTIVE EQUIPMENT FOR DECONTAMINATION AND DECOMMISSIONING

    SciTech Connect

    M.A. Ebadian, Ph.D.

    1999-01-01

    The purpose of this one-year investigation is to perform a technology integration/search, thereby ensuring that the safest and most cost-effective options are developed and subsequently used during the deactivation and decommissioning (D&D) of U.S. Department of Energy Environmental Management (DOE-EM) sites. Issues of worker health and safety are the main concern, followed by cost. Two lines of action were explored: innovative Personal Cooling Systems (PCS) and Personal Monitoring Equipment (PME). PME refers to sensors affixed to the worker that warn of an approaching heat stress condition, thereby preventing it. Three types of cooling systems were investigated: Pre-Chilled or Forced-Air System (PCFA), Umbilical Fluid-Chilled System (UFCS), and Passive Vest System (PVS). Of these, the UFCS leads the way. The PVS or Gel pack vest lagged due to a limited cooling duration. And the PCFA or chilled liquid air supply was cumbersome and required an expensive and complex recharge system. The UFCS in the form of the Personal Ice Cooling System (PICS) performed exceptionally. The technology uses a chilled liquid circulating undergarment and a Personal Protective Equipment (PPE) external pump and ice reservoir. The system is moderately expensive, but the recharge is low-tech and inexpensive enough to offset the cost. There are commercially available PME that can be augmented to meet the DOE's heat stress alleviation need. The technology is costly, in excess of $4,000 per unit. Workers easily ignore the alarm. The benefit to health & safety is indirect so can be overlooked. A PCS is a more justifiable expenditure.

  17. Are Norms of Disclosure of Online and Offline Personal Information Associated with the Disclosure of Personal Information Online?

    ERIC Educational Resources Information Center

    Mesch, Gustavo S.; Beker, Guy

    2010-01-01

    This study investigated whether norms of self-disclosure of one's online and offline identity are linked to online disclosure of personal and intimate information. We expected online disclosure of personal and intimate information to be associated with norms of online disclosure. Secondary analysis of the 2006 Pew and American Life Survey of…

  18. Permeation Resistance of Personal Protective Equipment Materials to Monomethyhydrazine

    NASA Technical Reports Server (NTRS)

    Waller, J. M.; Williams, J. H.

    1997-01-01

    Permeation resistance was determined by measuring the breakthrough time and time-averaged vapor transmission rate of monomethylhydrazine (MMH) through two types of personal protective equipment (PPE). The two types of PPE evaluated were the totally encapsulating ILC Dover Chemturion Model 1212 chemical protective suit with accessories, and the FabOhio polyvinyl chloride (PVC) splash garment. Two exposure scenarios were simulated: (1) a saturated vapor exposure for 2 hours (h), and (2) a brief MMH 'splash' followed by a 2-h saturated vapor exposure. Time-averaged MMH concentrations inside the totally-encapsulating suit were calculated by summation of the area-weighted contributions made by each suit component. Results show that the totally encapsulating suit provides adequate protection at the new 10 ppb Threshold Limit Value Time-Weighted Average (TLV-TWA). The permeation resistance of the PVC splash garment to MMH was poorer than any of the totally encapsulating suit materials tested. Breakthrough occurred soon after initial vapor or 'splash' exposure.

  19. Large-scale Health Information Database and Privacy Protection*1

    PubMed Central

    YAMAMOTO, Ryuichi

    2016-01-01

    Japan was once progressive in the digitalization of healthcare fields but unfortunately has fallen behind in terms of the secondary use of data for public interest. There has recently been a trend to establish large-scale health databases in the nation, and a conflict between data use for public interest and privacy protection has surfaced as this trend has progressed. Databases for health insurance claims or for specific health checkups and guidance services were created according to the law that aims to ensure healthcare for the elderly; however, there is no mention in the act about using these databases for public interest in general. Thus, an initiative for such use must proceed carefully and attentively. The PMDA*2 projects that collect a large amount of medical record information from large hospitals and the health database development project that the Ministry of Health, Labour and Welfare (MHLW) is working on will soon begin to operate according to a general consensus; however, the validity of this consensus can be questioned if issues of anonymity arise. The likelihood that researchers conducting a study for public interest would intentionally invade the privacy of their subjects is slim. However, patients could develop a sense of distrust about their data being used since legal requirements are ambiguous. Nevertheless, without using patients’ medical records for public interest, progress in medicine will grind to a halt. Proper legislation that is clear for both researchers and patients will therefore be highly desirable. A revision of the Act on the Protection of Personal Information is currently in progress. In reality, however, privacy is not something that laws alone can protect; it will also require guidelines and self-discipline. We now live in an information capitalization age. I will introduce the trends in legal reform regarding healthcare information and discuss some basics to help people properly face the issue of health big data and privacy

  20. Large-scale Health Information Database and Privacy Protection.

    PubMed

    Yamamoto, Ryuichi

    2016-09-01

    Japan was once progressive in the digitalization of healthcare fields but unfortunately has fallen behind in terms of the secondary use of data for public interest. There has recently been a trend to establish large-scale health databases in the nation, and a conflict between data use for public interest and privacy protection has surfaced as this trend has progressed. Databases for health insurance claims or for specific health checkups and guidance services were created according to the law that aims to ensure healthcare for the elderly; however, there is no mention in the act about using these databases for public interest in general. Thus, an initiative for such use must proceed carefully and attentively. The PMDA projects that collect a large amount of medical record information from large hospitals and the health database development project that the Ministry of Health, Labour and Welfare (MHLW) is working on will soon begin to operate according to a general consensus; however, the validity of this consensus can be questioned if issues of anonymity arise. The likelihood that researchers conducting a study for public interest would intentionally invade the privacy of their subjects is slim. However, patients could develop a sense of distrust about their data being used since legal requirements are ambiguous. Nevertheless, without using patients' medical records for public interest, progress in medicine will grind to a halt. Proper legislation that is clear for both researchers and patients will therefore be highly desirable. A revision of the Act on the Protection of Personal Information is currently in progress. In reality, however, privacy is not something that laws alone can protect; it will also require guidelines and self-discipline. We now live in an information capitalization age. I will introduce the trends in legal reform regarding healthcare information and discuss some basics to help people properly face the issue of health big data and privacy

  1. The Personalized Information Retrieval Model Based on User Interest

    NASA Astrophysics Data System (ADS)

    Gong, Songjie

    Personalized information retrieval systems can help customers to gain orientation in information overload by determining which items are relevant for their interests. One type of information retrieval is content-based filtering. In content-based filtering, items contain words in natural language. Meanings of words in natural language are often ambiguous. The problem of word meaning disambiguation is often decomposed to determining semantic similarity of words. In this paper, the architecture of personalized information retrieval based on user interest is presented. The architecture includes user interface model, user interest model, detecting interest model and update model. It established a user model for personalized information retrieval based on user interest keyword list on client server, which can supply personalized information retrieval service for user with the communications and collaboration of all modules of the architecture.

  2. Managing Personal and Group Collections of Information

    NASA Technical Reports Server (NTRS)

    Wolfe, Shawn R.; Wragg, Stephen D.; Chen, James R.; Koga, Dennis (Technical Monitor)

    1999-01-01

    The internet revolution has dramatically increased the amount of information available to users. Various tools such as search engines have been developed to help users find the information they need from this vast repository. Users often also need tools to help manipulate the growing amount of useful information they have discovered. Current tools available for this purpose are typically local components of web browsers designed to manage URL bookmarks. They provide limited functionalities to handle high information complexities. To tackle this have created DIAMS, an agent-based tool to help users or groups manage their information collections and share their collections with other. the main features of DIAMS are described here.

  3. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  4. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  5. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  6. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  7. 15 CFR 270.351 - Protection of voluntarily submitted information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Protection of voluntarily submitted information. Notwithstanding any other provision of law, a Team, NIST, any investigation participant, and any agency receiving information from a Team, NIST, or any...

  8. 75 FR 9860 - Release, Handling, and Protection of Restricted Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-04

    ... use or disclosure. (d) If the contractor will be operating an information technology system for NASA..., Security Requirements for Unclassified Information Technology Resources, which requires the implementation of an Information Technology Security Plan to protect information processed, stored, or...

  9. Trust-based information system architecture for personal wellness.

    PubMed

    Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd

    2014-01-01

    Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed.

  10. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of personal information collected from children. 312.8 Section 312.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity...

  11. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Rights to request privacy protection for protected... ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights to request privacy protection for protected health information....

  12. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Rights to request privacy protection for protected... ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights to request privacy protection for protected health information....

  13. 45 CFR 164.522 - Rights to request privacy protection for protected health information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Rights to request privacy protection for protected... ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.522 Rights to request privacy protection for protected health information....

  14. Are Informant Reports of Personality More Internally Consistent Than Self Reports of Personality?

    PubMed

    Balsis, Steve; Cooper, Luke D; Oltmanns, Thomas F

    2015-08-01

    The present study examined whether informant-reported personality was more or less internally consistent than self-reported personality in an epidemiological community sample (n = 1,449). Results indicated that across the 5 NEO (Neuroticism-Extraversion-Openness) personality factors and the 10 personality disorder trait dimensions, informant reports tended to be more internally consistent than self reports, as indicated by equal or higher Cronbach's alpha scores and higher average interitem correlations. In addition, the informant reports collectively outperformed the self reports for predicting responses on a global measure of health, indicating that the informant reports are not only more reliable than self reports, but they can also be useful in predicting an external criterion. Collectively these findings indicate that informant reports tend to have greater internal consistency than self reports.

  15. Protecting quantum information with optimal control

    NASA Astrophysics Data System (ADS)

    Grace, Matthew

    Quantum computation (QC) holds the promise of efficiently solving problems which are practically intractable for classical computers. However, realizing this advantage requires the precise control of a quantum information processor (QIP) and effective protection of this processor from the pernicious inuence of decoherence induced by the surrounding environment. Therefore, the ability to generate high-fidelity logical operations in the presence of environmental coupling is crucial. Methods of optimal control are applied to the field of quantum information processing, providing practical solutions for the generation of logical operations and the suppression of undesired environmental effects. The work contained in this dissertation explores important aspects of system and control design. Results obtained in this work (i) illustrate how practical QC can be greatly facilitated by optimal control theory and (ii) reveal interesting physical insights through the discovery of effective control mechanisms. A special design of the physical structure of quantum information systems is formulated which is naturally immune to certain types of decoherence and yields tremendous flexibility in the construction of logical operations for QC. A fundamental component of this design involves encoding the logical basis states of a quantum bit into multiple physical levels of the corresponding quantum system. This design also makes the QIP better suited for the interaction with ultrafast broadband laser fields used in quantum control applications. Numerical simulations demonstrate the utility of this encoding approach for thermally excited quantum systems. Optimization algorithms are developed which generate controls that protect the QIP from the effects of the environment, with or without the weak-coupling or Born approximation, and simultaneously achieve a target objective, e.g., a state-to-state transition or unitary quantum operation. For the optimal control of quantum operations, a

  16. Personal property at the Oak Ridge Operations Office and the Office of Scientific and Technical Information

    SciTech Connect

    1998-04-01

    The Oak Ridge Operations Office (Operations Office) and the Office of Scientific and Technical Information (OSTI) are responsible for safeguarding and controlling personal property in their possession and in the possession of their contractors. Categories of personal property include vehicles, heavy mobile equipment, computers and software, office furniture and equipment, laboratory equipment, security and protection equipment, and shop equipment. The objective of this audit was to determine whether the Operations Office and OSTI adequately safeguarded and properly accounted for personal property in their possession and in the possession of their non-integrated contractors.

  17. 78 FR 53478 - Proposed Information Collection; United States Park Police Personal History Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-29

    ... National Park Service Proposed Information Collection; United States Park Police Personal History Statement... Police Personal History Statement) to collect detailed personal history information from applicants... information, including financial data and residence history. Selective Service information and military...

  18. RFID Based Context Information Security System Architecture for Securing Personal Information under Ubiquitous Environment

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Park, Gil-Cheol; Kim, Seoksoo

    2007-12-01

    In this study, framework for securing personal information among various contexts collected and utilized under ubiquitous environment is proposed. The proposed framework will analyze relativity among information used to determine the exposure of personal information according to circumstances where personal information is used. In addition, the study will define the definition of role-based structure and propose a structure applying password security system according to access level. Furthermore, the study will propose a method for building information security system using RFID tag information which generates context information.

  19. A security system for personal genome information at DNA level.

    PubMed

    Kawazoe, Yumi; Shiba, Toshikazu; Yamamoto, Masahito; Ohuchi, Azuma

    2002-01-01

    The personal information encoded in genomic DNA should not be made available to the public. With the increasing discoveries of new genes, it has become necessary to establish a security system for personal genome information. Although many security systems that are applied for electrical information in computers have been developed and established, there is no security system for information at DNA level. In this paper, we describe a new security system for information encoded within DNA. The original genomic DNA was mixed with many kinds of dummy DNAs (mixtures of natural and/or artificial DNAs) resulting in the masking of the original information. Using these dummy molecules, we succeeded to completely 'lock'the original genome information. If this information must be 'unlocked', it can be extracted and analyzed by a removal of dummy DNAs using molecular tagging techniques or by selective amplification using key primers.

  20. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Environmental protection information. 673.4... FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a) Any... States shall notify expedition members of the environmental protection obligations of the...

  1. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Environmental protection information. 673.4... FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a) Any... States shall notify expedition members of the environmental protection obligations of the...

  2. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Environmental protection information. 673.4... FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a) Any... States shall notify expedition members of the environmental protection obligations of the...

  3. 45 CFR 673.4 - Environmental protection information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Environmental protection information. 673.4... FOUNDATION ANTARCTIC NON-GOVERNMENTAL EXPEDITIONS § 673.4 Environmental protection information. (a) Any... States shall notify expedition members of the environmental protection obligations of the...

  4. 48 CFR 32.1104 - Protection of EFT information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Protection of EFT... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 32.1104 Protection of EFT information. The Government shall protect against improper disclosure of contractors' EFT information....

  5. 48 CFR 32.1104 - Protection of EFT information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Protection of EFT... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 32.1104 Protection of EFT information. The Government shall protect against improper disclosure of contractors' EFT information....

  6. 48 CFR 32.1104 - Protection of EFT information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Protection of EFT... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 32.1104 Protection of EFT information. The Government shall protect against improper disclosure of contractors' EFT information....

  7. 48 CFR 32.1104 - Protection of EFT information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Protection of EFT... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 32.1104 Protection of EFT information. The Government shall protect against improper disclosure of contractors' EFT information....

  8. 48 CFR 32.1104 - Protection of EFT information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Protection of EFT... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 32.1104 Protection of EFT information. The Government shall protect against improper disclosure of contractors' EFT information....

  9. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 2 2010-07-01 2010-07-01 false Public information and consumer.../Maintenance Program Requirements § 51.368 Public information and consumer protection. (a) Public awareness... the test that were failed. (b) Consumer protection. The oversight agency shall institute...

  10. Smartphone Mobile Application Delivering Personalized, Real-Time Sun Protection Advice: A Randomized Clinical Trial

    PubMed Central

    Buller, David B.; Berwick, Marianne; Lantz, Kathy; Buller, Mary Klein; Shane, James; Kane, Ilima; Liu, Xia

    2014-01-01

    Importance Mobile smart phones are rapidly emerging as an effective means of communicating with many Americans. Using mobile applications, they can access remote databases, track time and location, and integrate user input to provide tailored health information. Objective A smart phone mobile application providing personalized, real-time sun protection advice was evaluated in a randomized trial. Design The trial was conducted in 2012 and had a randomized pretest-posttest controlled design with a 10-week follow-up. Setting Data was collected from a nationwide population-based survey panel. Participants The trial enrolled a sample of n=604 non-Hispanic and Hispanic adults from the Knowledge Panel® aged 18 or older who owned an Android smart phone. Intervention The mobile application provided advice on sun protection (i.e., protection practices and risk of sunburn) and alerts (to apply/reapply sunscreen and get out of the sun), hourly UV Index, and vitamin D production based on the forecast UV Index, phone's time and location, and user input. Main Outcomes and Measures Percent of days using sun protection and time spent outdoors (days and minutes) in the midday sun and number of sunburns in the past 3 months were collected. Results Individuals in the treatment group reported more shade use but less sunscreen use than controls. Those who used the mobile app reported spending less time in the sun and using all protection behaviors combined more. Conclusions and Relevance The mobile application improved some sun protection. Use of the mobile application was lower than expected but associated with increased sun protection. Providing personalized advice when and where people are in the sun may help reduce sun exposure. PMID:25629710

  11. Implementing personalized medicine with asymmetric information on prevalence rates.

    PubMed

    Antoñanzas, Fernando; Juárez-Castelló, Carmelo A; Rodríguez-Ibeas, Roberto

    2016-12-01

    Although personalized medicine is becoming the new paradigm to manage some diseases, the economics of personalized medicine have only focused on assessing the efficiency of specific treatments, lacking a theoretical framework analyzing the interactions between pharmaceutical firms and healthcare systems leading to the implementation of personalized treatments. We model the interaction between the hospitals and the manufacturer of a new treatment as an adverse selection problem where the firm does not have perfect information on the prevalence across hospitals of the genetic characteristics of the patients making them eligible to receive a new treatment. As a result of the model, hospitals with high prevalence rates benefit from the information asymmetry only when the standard treatment is inefficient when applied to the patients eligible to receive the new treatment. Otherwise, information asymmetry has no value. Personalized medicine may be fully or partially implemented depending on the proportion of high prevalence hospitals.

  12. Personal Genomic Information Management and Personalized Medicine: Challenges, Current Solutions, and Roles of HIM Professionals

    PubMed Central

    Alzu'bi, Amal; Zhou, Leming; Watzlaf, Valerie

    2014-01-01

    In recent years, the term personalized medicine has received more and more attention in the field of healthcare. The increasing use of this term is closely related to the astonishing advancement in DNA sequencing technologies and other high-throughput biotechnologies. A large amount of personal genomic data can be generated by these technologies in a short time. Consequently, the needs for managing, analyzing, and interpreting these personal genomic data to facilitate personalized care are escalated. In this article, we discuss the challenges for implementing genomics-based personalized medicine in healthcare, current solutions to these challenges, and the roles of health information management (HIM) professionals in genomics-based personalized medicine. PMID:24808804

  13. Personality and information gathering in free-ranging great tits.

    PubMed

    van Overveld, Thijs; Matthysen, Erik

    2013-01-01

    One aspect of animal personality that has been well described in captivity, but received only little attention in studies in the wild, is that personality types may vary in their behavioural flexibility towards environmental changes. A fundamental factor underlying such differences is believed to be the degree to which individual behavior is guided by environmental stimuli. We tested this hypothesis in the wild using free-ranging great tits. Personality variation was quantified using exploratory behaviour in a novel environment, which has previously been shown to be repeatable and correlated with other behaviours in this and other populations of the same species. By temporarily removing food at feeding stations we examined whether birds with different personality differed in returning to visit empty feeders as this may provide information on how birds continue to sample their environment after a sudden change in conditions. In two summer experiments, we found that fast-exploring juveniles visited empty feeders less often compared to slow-exploring juveniles. In winter, sampling behaviour was sex dependent but not related to personality. In both seasons, we found that birds who sampled empty feeders more often were more likely to rediscover food after we again re-baited the feeding stations, but there was no effect of personality. Our results show that personality types may indeed differ in ways of collecting environmental information, which is consistent with the view of personalities as different styles of coping with environmental changes. The adaptive value of these alternative behavioural tactics, however, needs to be further explored.

  14. A Study of Personal Information Management Strategies for Online Faculty

    ERIC Educational Resources Information Center

    Kearns, Lorna R.; Frey, Barbara A.; Tomer, Christinger; Alman, Susan

    2014-01-01

    The literature suggests that personal information management is a serious challenge for many computer users. Online faculty are especially challenged because of the large number of electronic files necessitated by teaching online. Those who have experience in this environment may offer valuable insights regarding information management challenges…

  15. The User-Subjective Approach to Personal Information Management Systems.

    ERIC Educational Resources Information Center

    Bergman, Ofer; Beyth-Marom, Ruth; Nachmias, Rafi

    2003-01-01

    Explains personal information management (PIM) systems and suggests a user-subjective approach to PIM system design. Advocates that PIM systems relate to the subjective value-added attributes that the user gives the stored data so that the user can find information again, recall it when needed, and use it effectively in the next interaction.…

  16. Information Centers for Newly Blind Persons in Israel.

    ERIC Educational Resources Information Center

    Dickstein, N.; Gozovsky, M.

    1994-01-01

    This article describes the development and implementation of an innovative program of information centers in Israel that is designed to identify newly blind persons and to give them first-hand information about available services, as well as to stimulate an awareness of rehabilitation services among medical personnel. (Author/DB)

  17. Management Guide to the Protection of Information Resources.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…

  18. Ubiquitous Data Management in a Personal Information Environment

    NASA Astrophysics Data System (ADS)

    Mohammad, Atif Farid

    This paper presents a novel research work on Personal Information Environment (PIE), which is a relatively new field to get explored. PIE is a self managing pervasive environment. It contains an individual's personal pervasive information associated within user's related or non-related contextual environments. Contexts are vitally important because they control, influence and affect everything within them by dominating its pervasive content(s). This paper shows in depth the achievement of Personal Information Environment, which deals with a user's devices, which are to be spontaneous, readily self-manageable on autonomic basis. This paper shows an actual implementation of pervasive data management of a PIE-user, which contains append and update of PIE's data from the last device used by the user to another PIE devices for further processing and storage needs. Data recharging is utilized to transmit and receive data among PIE devices.

  19. Chest Compression With Personal Protective Equipment During Cardiopulmonary Resuscitation

    PubMed Central

    Chen, Jie; Lu, Kai-Zhi; Yi, Bin; Chen, Yan

    2016-01-01

    Abstract Following a chemical, biological, radiation, and nuclear incident, prompt cardiopulmonary resuscitation (CPR) procedure is essential for patients who suffer cardiac arrest. But CPR when wearing personal protection equipment (PPE) before decontamination becomes a challenge for healthcare workers (HCW). Although previous studies have assessed the impact of PPE on airway management, there is little research available regarding the quality of chest compression (CC) when wearing PPE. A present randomized cross-over simulation study was designed to evaluate the effect of PPE on CC performance using mannequins. The study was set in one university medical center in the China. Forty anesthesia residents participated in this randomized cross-over study. Each participant performed 2 min of CC on a manikin with and without PPE, respectively. Participants were randomized into 2 groups that either performed CC with PPE first, followed by a trial without PPE after a 180-min rest, or vice versa. CPR recording technology was used to objectively quantify the quality of CC. Additionally, participants’ physiological parameters and subjective fatigue score values were recorded. With the use of PPE, a significant decrease of the percentage of effective compressions (41.3 ± 17.1% with PPE vs 67.5 ± 15.6% without PPE, P < 0.001) and the percentage of adequate compressions (67.7 ± 18.9% with PPE vs 80.7 ± 15.5% without PPE, P < 0.001) were observed. Furthermore, the increases in heart rate, mean arterial pressure, and subjective fatigue score values were more obvious with the use of PPE (all P < 0.01). We found significant deterioration of CC performance in HCW with the use of a level-C PPE, which may be a disadvantage for enhancing survival of cardiac arrest. PMID:27057878

  20. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or secret... relates to the trade secrets, processes, operations, style of work, or apparatus, or to the...

  1. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or secret... relates to the trade secrets, processes, operations, style of work, or apparatus, or to the...

  2. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or secret... relates to the trade secrets, processes, operations, style of work, or apparatus, or to the...

  3. 45 CFR 164.502 - Uses and disclosures of protected health information: general rules.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...: adults and emancipated minors. If under applicable law a person has authority to act on behalf of an... authority to act on behalf of an individual who is an unemancipated minor in making decisions related to... act as an individual, with respect to protected health information pertaining to a health care...

  4. 45 CFR 164.502 - Uses and disclosures of protected health information: general rules.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...: adults and emancipated minors. If under applicable law a person has authority to act on behalf of an... authority to act on behalf of an individual who is an unemancipated minor in making decisions related to... act as an individual, with respect to protected health information pertaining to a health care...

  5. 45 CFR 164.502 - Uses and disclosures of protected health information: general rules.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...: adults and emancipated minors. If under applicable law a person has authority to act on behalf of an... authority to act on behalf of an individual who is an unemancipated minor in making decisions related to... act as an individual, with respect to protected health information pertaining to a health care...

  6. 76 FR 50487 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-15

    ... SECURITY Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National... Information (PCII) Stakeholder Survey. DHS previously published this ICR in the Federal Register on March 31... Federal, state, and local entities with homeland security duties. This survey is designed to...

  7. Managing personal health information in distributed research network environments

    PubMed Central

    2013-01-01

    Background Studying rare outcomes, new interventions and diverse populations often requires collaborations across multiple health research partners. However, transferring healthcare research data from one institution to another can increase the risk of data privacy and security breaches. Methods A working group of multi-site research programmers evaluated the need for tools to support data security and data privacy. The group determined that data privacy support tools should: 1) allow for a range of allowable Protected Health Information (PHI); 2) clearly identify what type of data should be protected under the Health Insurance Portability and Accountability Act (HIPAA); and 3) help analysts identify which protected health information data elements are allowable in a given project and how they should be protected during data transfer. Based on these requirements we developed two performance support tools to support data programmers and site analysts in exchanging research data. Results The first tool, a workplan template, guides the lead programmer through effectively communicating the details of multi-site programming, including how to run the program, what output the program will create, and whether the output is expected to contain protected health information. The second performance support tool is a checklist that site analysts can use to ensure that multi-site program output conforms to expectations and does not contain protected health information beyond what is allowed under the multi-site research agreements. Conclusions Together the two tools create a formal multi-site programming workflow designed to reduce the chance of accidental PHI disclosure. PMID:24099117

  8. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 2 2012-07-01 2012-07-01 false Public information and consumer... PROGRAMS REQUIREMENTS FOR PREPARATION, ADOPTION, AND SUBMITTAL OF IMPLEMENTATION PLANS Inspection/Maintenance Program Requirements § 51.368 Public information and consumer protection. (a) Public...

  9. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 2 2011-07-01 2011-07-01 false Public information and consumer... PROGRAMS REQUIREMENTS FOR PREPARATION, ADOPTION, AND SUBMITTAL OF IMPLEMENTATION PLANS Inspection/Maintenance Program Requirements § 51.368 Public information and consumer protection. (a) Public...

  10. 40 CFR 51.368 - Public information and consumer protection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 2 2013-07-01 2013-07-01 false Public information and consumer... PROGRAMS REQUIREMENTS FOR PREPARATION, ADOPTION, AND SUBMITTAL OF IMPLEMENTATION PLANS Inspection/Maintenance Program Requirements § 51.368 Public information and consumer protection. (a) Public...

  11. 76 FR 17935 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... SECURITY Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National... the Critical Infrastructure Information Act of 2002, (Sections 211-215, Title II, Subtitle B of the... owners and operators of critical infrastructure and protected systems. The PCII Program is implemented...

  12. 12 CFR 568.5 - Protection of customer information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Protection of customer information. 568.5 Section 568.5 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.5 Protection of customer information. Savings associations and their subsidiaries...

  13. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.4 Collecting personal information. (a) General..., the Privacy Act Statement is not required if the individual is only requested to furnish or verify the... a Privacy Act system of records. (4) When asking an individual for his or her SSN or other...

  14. 32 CFR 327.6 - Collecting personal information

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) PRIVACY PROGRAM DEFENSE COMMISSARY AGENCY PRIVACY ACT PROGRAM § 327.6 Collecting personal information (a... identification purposes in connection with the normal use of his or her records. (d) Privacy act statements. When... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used...

  15. 32 CFR 327.6 - Collecting personal information

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) PRIVACY PROGRAM DEFENSE COMMISSARY AGENCY PRIVACY ACT PROGRAM § 327.6 Collecting personal information (a... identification purposes in connection with the normal use of his or her records. (d) Privacy act statements. When... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used...

  16. 32 CFR 505.4 - Collecting personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.4 Collecting personal information. (a) General..., the Privacy Act Statement is not required if the individual is only requested to furnish or verify the... a Privacy Act system of records. (4) When asking an individual for his or her SSN or other...

  17. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    PubMed

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user.

  18. Using interactive computer simulation for teaching the proper use of personal protective equipment.

    PubMed

    Hung, Pan-Pan; Choi, Kup-Sze; Chiang, Vico Chung-Lim

    2015-02-01

    The use of personal protective equipment is one of the basic infection control precautions in health care. The effectiveness of personal protective equipment is highly dependent on adequate staff training. In this project, a computer simulation program, as a supplement to conventional training approaches, was developed to facilitate the learning of the proper use of personal protective equipment. The simulation program was a Web-based interactive software with user-friendly graphical interface for users to practice the use of personal protective equipment usage via drag-and-drop metaphors and respond to questions online. The effectiveness of the computer simulation software was investigated by a controlled study. Fifty healthcare workers were randomly assigned into two groups: one received conventional personal protective equipment training only (control group), whereas the other also received the same conventional training but followed by using the developed simulation program for self-learning (experimental group). Their performance was assessed by personal protective equipment donning and doffing evaluation before and after the training. The results showed that the computer simulation program is able to improve the healthcare workers' understanding and competence in using personal protective equipment.

  19. Cognitive, personality, and social factors associated with adolescents' online personal information disclosure.

    PubMed

    Liu, Cong; Ang, Rebecca P; Lwin, May O

    2013-08-01

    The current study aims to understand the factors that influence adolescents' disclosure of personally identifiable information (PII) on social networking sites (SNSs). A survey was conducted among 780 adolescent participants (between 13 and 18) who were Facebook users. Structural equation modeling was used for analyzing the data and obtaining an overarching model that include cognitive, personality, and social factors that influence adolescents' PII disclosure. Results showed privacy concern as the cognitive factor reduces adolescents' PII disclosure and it serves as a potential mediator for personality and social factors. Amongst personality factors, narcissism was found to directly increase PII disclosure, and social anxiety indirectly decreases PII disclosure by increasing privacy concern. Amongst social factors, active parental mediation decreases PII disclosure directly and indirectly by increasing privacy concern. Restrictive parental mediation decreases PII disclosure only indirectly by increasing privacy concern. Implications of the findings to parents, educators, and policy makers were discussed.

  20. Solving the software protection problem with intrinsic personal physical unclonable functions.

    SciTech Connect

    Nithyanand, Rishab; Sion, Radu

    2011-09-01

    Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure (within reasonable error bounds) but hard to clone. The unclonability property comes from the accepted hardness of replicating the multitude of characteristics introduced during the manufacturing process. This makes PUFs useful for solving problems such as device authentication, software protection, licensing, and certified execution. In this paper, we focus on the effectiveness of PUFs for software protection in offline settings. We first argue that traditional (black-box) PUFs are not useful for protecting software in settings where communication with a vendor's server or third party network device is infeasible or impossible. Instead, we argue that Intrinsic PUFs are needed to solve the above mentioned problems because they are intrinsically involved in processing the information that is to be protected. Finally, we describe how sources of randomness in any computing device can be used for creating intrinsic-personal-PUFs (IP-PUF) and present experimental results in using standard off-the-shelf computers as IP-PUFs.

  1. Informed consent in direct-to-consumer personal genome testing: the outline of a model between specific and generic consent.

    PubMed

    Bunnik, Eline M; Janssens, A Cecile J W; Schermer, Maartje H N

    2014-09-01

    Broad genome-wide testing is increasingly finding its way to the public through the online direct-to-consumer marketing of so-called personal genome tests. Personal genome tests estimate genetic susceptibilities to multiple diseases and other phenotypic traits simultaneously. Providers commonly make use of Terms of Service agreements rather than informed consent procedures. However, to protect consumers from the potential physical, psychological and social harms associated with personal genome testing and to promote autonomous decision-making with regard to the testing offer, we argue that current practices of information provision are insufficient and that there is a place--and a need--for informed consent in personal genome testing, also when it is offered commercially. The increasing quantity, complexity and diversity of most testing offers, however, pose challenges for information provision and informed consent. Both specific and generic models for informed consent fail to meet its moral aims when applied to personal genome testing. Consumers should be enabled to know the limitations, risks and implications of personal genome testing and should be given control over the genetic information they do or do not wish to obtain. We present the outline of a new model for informed consent which can meet both the norm of providing sufficient information and the norm of providing understandable information. The model can be used for personal genome testing, but will also be applicable to other, future forms of broad genetic testing or screening in commercial and clinical settings.

  2. Exploring Healthcare Consumer Acceptance of Personal Health Information Management Technology through Personal Health Record Systems

    ERIC Educational Resources Information Center

    Wu, Huijuan

    2013-01-01

    Healthcare technologies are evolving from a practitioner-centric model to a patient-centric model due to the increasing need for technology that directly serves healthcare consumers, including healthy people and patients. Personal health information management (PHIM) technology is one of the technologies designed to enhance an individual's ability…

  3. Socio-technical aspects of the use of health related personal information for management and research.

    PubMed

    Iversen, K R; Grøtan, T O

    1996-10-01

    This paper focuses on the organisational, technical and ethical aspects related to the use of person identifiable health information for various health care management, administration, finance, research and educational purposes. It is based on the ethical standpoint that to the individuals in question, the identifiable health information represents the uttermost sensitive and critical information. In addition, nobody, possibly apart from the patients themselves, may claim ownership of such information. Thus identifiable health information should be (per individual) kept as collected and protected as possible, within the scope of the patient provider relationship. Identifiable health information should, whenever possible and reasonable, be restricted to the health care professionals providing the treatment and care to the patient, and only be made available to others, e.g. for management, research or educational purposes, either in anonymous or pseudonymous form. Secure information management (SIM) is presented as the socio-technical means to facilitate our ethical standpoint in a practical health care environment.

  4. Sharing sensitive personal health information through Facebook: the unintended consequences.

    PubMed

    Househ, Mowafa

    2011-01-01

    The purpose of this paper was to explore the types of sensitive health information posted by individuals through social network media sites such as Facebook. The researcher found several instances in which individuals, who could be identified by their user profiles, posted personal and sensitive health information related to mental and genetic disorders and sexually transmitted diseases. The data suggest that Facebook users should be made aware of the potential harm that may occur when sharing sensitive health information publicly through Facebook. Ethical considerations in undertaking such research are also examined.

  5. PCASSO: a design for secure communication of personal health information via the internet.

    PubMed

    Baker, D B; Masys, D R

    1999-05-01

    The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.

  6. Colloquium: Protecting quantum information against environmental noise

    NASA Astrophysics Data System (ADS)

    Suter, Dieter; Álvarez, Gonzalo A.

    2016-10-01

    Quantum technologies represent a rapidly evolving field in which the specific properties of quantum mechanical systems are exploited to enhance the performance of various applications such as sensing, transmission, and processing of information. Such devices can be useful only if the quantum systems also interact with their environment. However, the interactions with the environment can degrade the specific quantum properties of these systems, such as coherence and entanglement. It is therefore essential that the interaction between a quantum system and the environment is controlled in such a way that the unwanted effects of the environment are suppressed while the necessary interactions are retained. This Colloquium gives an overview, aimed at newcomers to this field, of some of the challenges that need to be overcome to achieve this goal. A number of techniques have been developed for this purpose in different areas of physics including magnetic resonance, optics, and quantum information. They include the application of static or time-dependent fields to the quantum system, which are designed to average the effect of the environmental interactions to zero. Quantum error correction schemes were developed to detect and eliminate certain errors that occur during the storage and processing of quantum information. In many physical systems, it is useful to use specific quantum states that are intrinsically less susceptible to environmental noise for encoding the quantum information. The dominant contribution to the loss of information is pure dephasing, i.e., through the loss of coherence in quantum mechanical superposition states. Accordingly, most schemes for reducing loss of information focus on dephasing processes. This is also the focus of this Colloquium.

  7. The role of genetic information in personalized medicine.

    PubMed

    Gamma, Alex

    2013-01-01

    Personalized medicine is the latest promise of a gene-centered biomedicine to provide treatments custom-tailored to the specific needs of patients. Although surrounded by much hype, personalized medicine at present lacks the empirical and theoretical foundations necessary to render it a realistic long-term perspective. In particular, the role of genetic data and the relationship between causal understanding, prediction, prevention, and treatment of a disease need clarifying. This article critically examines the concept of information in genetics and its relation to modern-day genetic determinism, using pharmacogenetics, personalized medicine's core discipline, as a test case. The article concludes that: (1) genetic knowledge does not constitute a privileged basis for personalized medicine because there is an a priori complete causal parity of genetic and nongenetic resources of development; and (2) prediction, prevention, and treatment all depend on a causal-mechanistic understanding that will follow only from integrating data across the whole gamut of developmental factors-genetic and non-genetic. In a future successful personalized medicine, genes will have no special status, either as determinants of phenotype, markers of disease or as targets of treatment.

  8. Personal Protection Measures Against Mosquitoes, Ticks, and Other Arthropods.

    PubMed

    Alpern, Jonathan D; Dunlop, Stephen J; Dolan, Benjamin J; Stauffer, William M; Boulware, David R

    2016-03-01

    Arthropod-associated diseases are a major cause of morbidity among travelers. Obtaining a detailed travel itinerary and understanding traveler-specific and destination-specific risk factors can help mitigate the risk of vector-borne diseases. DEET, picaridin, PMD, and IR3535 are insect repellents that offer sufficient protection against arthropod bites. IR3535 does not provide adequate protection against Anopheles mosquitoes, and should be avoided in malaria-endemic regions. General protective measures, such as bite avoidance, protective clothing, insecticide-treated bed nets, and insecticide-treated clothing, should be recommended, especially in malaria-endemic areas. Spatial repellents may prevent nuisance biting, but have not been shown to prevent against vector-borne disease.

  9. 41 CFR 50-204.7 - Personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., chemical hazards, radiological hazards, or mechanical irritants encountered in a manner capable of causing... protective equipment shall be of safe design and construction for the work to be performed....

  10. [Exposure to mineral oils at worksites and novel solutions for polymer protective materials in selected personal protective equipment].

    PubMed

    Krzemińska, Sylwia; Irzmańska, Emilia

    2011-01-01

    Exposure of workers to health hazards due to contact with mineral oils occurs primarily in the chemical, petrochemical, machine-building, metallurgic and car industries. Under worksite conditions, the respiratory system and the skin are the primary routes of entry of mineral oils into the human body. Long-term exposure of the skin to oily substances may lead not only to irritation and allergic lesions. The studies conducted in this area have confirmed a significant increase in the incidence of skin cancers in persons chronically exposed to mineral oils. Protection of workers' health at worksites associated with the risk of contact with mineral oils requires, in addition to collective protective and organizational solutions, personal protective equipment with appropriate protection and utility parameters confirmed by laboratory tests. The essential preventive measures include protection of the human skin by means of appropriate protective clothing and gloves, which provide an effective barrier against a wide spectrum of chemical compounds present in mineral oils. Knowledge of polymer materials is the prerequisite for designing more and more effective and functional protective clothing and gloves. Studies aimed at obtaining higher levels of skin protection against varied toxic substances, including mineral oils, have been conducted, among others, to develop modern glove and clothing materials ensuring resistance to oils. The rapid progress of nanotechnology and the use of nanoadditives in polymer materials has made it possible to undertake works aimed at developing modern polymer nanostructures designed for construction of oil-resistant protective clothing and gloves. In this review paper the authors have presented the current knowledge of polymer materials, from traditional ones to polymer nanostructures, used in personal equipment protecting against mineral oils.

  11. Evaluating Common De-Identification Heuristics for Personal Health Information

    PubMed Central

    Jabbouri, Sam; Sams, Scott; Drouet, Youenn; Power, Michael

    2006-01-01

    Background With the growing adoption of electronic medical records, there are increasing demands for the use of this electronic clinical data in observational research. A frequent ethics board requirement for such secondary use of personal health information in observational research is that the data be de-identified. De-identification heuristics are provided in the Health Insurance Portability and Accountability Act Privacy Rule, funding agency and professional association privacy guidelines, and common practice. Objective The aim of the study was to evaluate whether the re-identification risks due to record linkage are sufficiently low when following common de-identification heuristics and whether the risk is stable across sample sizes and data sets. Methods Two methods were followed to construct identification data sets. Re-identification attacks were simulated on these. For each data set we varied the sample size down to 30 individuals, and for each sample size evaluated the risk of re-identification for all combinations of quasi-identifiers. The combinations of quasi-identifiers that were low risk more than 50% of the time were considered stable. Results The identification data sets we were able to construct were the list of all physicians and the list of all lawyers registered in Ontario, using 1% sampling fractions. The quasi-identifiers of region, gender, and year of birth were found to be low risk more than 50% of the time across both data sets. The combination of gender and region was also found to be low risk more than 50% of the time. We were not able to create an identification data set for the whole population. Conclusions Existing Canadian federal and provincial privacy laws help explain why it is difficult to create an identification data set for the whole population. That such examples of high re-identification risk exist for mainstream professions makes a strong case for not disclosing the high-risk variables and their combinations identified here

  12. 10 CFR 37.31 - Protection of information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Protection of information. 37.31 Section 37.31 Energy NUCLEAR REGULATORY COMMISSION PHYSICAL PROTECTION OF CATEGORY 1 AND CATEGORY 2 QUANTITIES OF RADIOACTIVE... the regulations and laws. (e) The licensee shall retain all fingerprint and criminal history...

  13. Protecting the Privacy and Security of Your Health Information

    MedlinePlus

    ... Rader Laura Adams Lee Stevens Pam Crum Stef Woods Your Health Records About Blue Button About the ... technical, and physical safeguards. You may have additional protections and health information rights under your State's laws. ...

  14. Report: Assessing EPA’s Efforts to Protect Sensitive Information

    EPA Pesticide Factsheets

    Report #2006-S-00006, September 19, 2006. This is the EPA OIG's completed Data Collection Instrument, as prescribed by the PCIE to use in meeting its requirements under OMB Memo M-06-16, Protection of Sensitive Agency Information.

  15. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection...

  16. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection...

  17. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection...

  18. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection...

  19. 41 CFR 109-1.5107 - Physical protection of personal property.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... personal property. 109-1.5107 Section 109-1.5107 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS GENERAL 1-INTRODUCTION 1.51-Personal Property Management Standards and Practices § 109-1.5107 Physical protection...

  20. 22 CFR 1003.5 - Access to personal information from Inter-American Foundation records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Access to personal information from Inter... SAFEGUARDING PERSONAL INFORMATION IN IAF RECORDS § 1003.5 Access to personal information from Inter-American... Foundation, 1515 Wilson Boulevard, Rosslyn, Virginia 22209. Personal contacts should normally be made...

  1. Using personal digital assistants to access drug information.

    PubMed

    McCreadie, Scott R; Stevenson, James G; Sweet, Burgunda V; Kramer, Mike

    2002-07-15

    The use of personal digital assistants (PDAs) to access drug information in a health system is described. Given the widespread use of PDAs at an 872-bed university health system, an opportunity existed to provide current drug information to physicians via these devices. As part of the health system's intranet, extensive online content had been made available through a browser; extension to PDAs was a natural next step. There were two primary requirements: the ability to synchronize information with the database server when a PDA was used and the development of content and applications by using existing staff. Mobile enterprise software was chosen that supports multiple PDA platforms, is easy to use, and does not require programming skills. The software works through customized "channels," or collections of information from a content provider. The customized channel service works over the Internet. Two channels of content were created, an ambulatory care channel and an inpatient care channel. The ambulatory care channel contains a list of preferred ambulatory care agents, poison control information, the locations of outpatient pharmacies, drug information, and safety tips for prescribing. The inpatient channel contains the inpatient formulary, current news and events, information on currrent drug shortages and recalls, pharmacy contact information, and medication safety tips. When a user synchronizes his or her PDA, the software contacts the department's intranet servers and processes the request. The data are compressed and downloaded to the user's PDA. A university health system successfully used PDAs to access drug and other information.

  2. Review of chamber design requirements for testing of personal protective clothing ensembles.

    PubMed

    Gao, Pengfei; King, William P; Shaffer, Ronald

    2007-08-01

    This review focuses on the physical requirements for conducting ensemble testing and describes the salient issues that organizations involved in the design, test, or certification of personal protective equipment (PPE) and protective clothing ensembles need to consider for strategic planning. Several current and proposed PPE ensemble test practices and standards were identified. The man-in-simulant test (MIST) is the primary procedure used by the military to evaluate clothing ensembles for protection against chemical and biological warfare agents. MIST has been incorporated into the current editions of protective clothing and equipment standards promulgated by the National Fire Protection Association (NFPA). ASTM has recently developed a new test method (ASTM F 2588-06) for MIST evaluation of protective ensembles. Other relevant test methods include those described in International Organization for Standardization (ISO) standards. The primary differences among the test methods were the choice of test challenge material (e.g., sulfur hexafluoride, methyl salicylate, sodium chloride particles, corn oil, fluorophore-impregnated silica) and the exercise protocol for the subject(s). Although ensemble test methods and standards provide detailed descriptions of the test procedures, none give specific requirements for chamber design. A literature survey identified 28 whole-body exposure chambers that have been or could potentially be used for testing protective clothing ensembles using human test subjects. Median chamber size, median floor space, and median volume per subject were calculated from 15 chambers (involving human test subjects), where size information is available. Based on the literature survey of existing chambers and the review of the current and proposed standards and test methods, chamber design requirements will be dictated by the test methods selected. Due to widely different test conditions for aerosol/particulate and vapor ensemble testing, it is

  3. Effectiveness of Personal Protective Equipment for Healthcare Workers Caring for Patients with Filovirus Disease: A Rapid Review

    PubMed Central

    Quach, Pauline; Hamel, Candyce; Thavorn, Kednapa; Garritty, Chantelle; Skidmore, Becky; Vallenas, Constanza; Norris, Susan L.; Egger, Matthias; Eremin, Sergey; Ferri, Mauricio; Shindo, Nahoko; Moher, David

    2015-01-01

    Background A rapid review, guided by a protocol, was conducted to inform development of the World Health Organization’s guideline on personal protective equipment in the context of the ongoing (2013–present) Western African filovirus disease outbreak, with a focus on health care workers directly caring for patients with Ebola or Marburg virus diseases. Methods Electronic databases and grey literature sources were searched. Eligibility criteria initially included comparative studies on Ebola and Marburg virus diseases reported in English or French, but criteria were expanded to studies on other viral hemorrhagic fevers and non-comparative designs due to the paucity of studies. After title and abstract screening (two people to exclude), full-text reports of potentially relevant articles were assessed in duplicate. Fifty-seven percent of extraction information was verified. The Grading of Recommendations Assessment, Development and Evaluation framework was used to inform the quality of evidence assessments. Results Thirty non-comparative studies (8 related to Ebola virus disease) were located, and 27 provided data on viral transmission. Reporting of personal protective equipment components and infection prevention and control protocols was generally poor. Conclusions Insufficient evidence exists to draw conclusions regarding the comparative effectiveness of various types of personal protective equipment. Additional research is urgently needed to determine optimal PPE for health care workers caring for patients with filovirus. PMID:26451847

  4. Informed consent for research participation in frail older persons.

    PubMed

    Barron, Jeremy S; Duffey, Patricia L; Byrd, Linda Jo; Campbell, Robin; Ferrucci, Luigi

    2004-02-01

    Informed consent has been the most scrutinized and controversial aspect of clinical research ethics. Institutional review boards (IRBs), government regulatory agencies, and the threat of litigation have all contributed to increasingly detailed consent documents that hope to ensure that subjects are not misled or coerced. Unfortunately, the growing regulatory burden on researchers has not succeeded in protecting subjects, but has rather made the consent process less effective and has discouraged research on vulnerable populations. As a matter of fact, investigators and ethicists continue to identify failures of the consenting process, particularly concerning participation in research of older individuals. The challenges involved in ensuring appropriate consent from the elderly include physical frailty, reduced autonomy and privacy, and impaired decision-making capacity due to dementia, delirium, or other neuropsychiatric illnesses. Ageism among investigators also contributes to failure of informed consent. The evaluation and continuing re-evaluation of an individual's decision-making capacity is critical but difficult. In the most extreme cases, the older adult's ability to participate in the consent process is clearly impaired. However, in many instances, the decision-making capacity is only partially impaired but declines during the course of a research project. Implementing methods of effective communication may enable many frail elderly individuals to make informed decisions. Special challenges are posed by research on end-of-life care, which typically involves frail, older subjects who are uniquely vulnerable, and research is conducted in institutional settings where subtle violations of autonomy are routine. Clearly, the frail elderly represent a vulnerable population that deserves special attention when developing and evaluating an informed consent process. Two important ethical conflicts should be kept in mind. First, although vulnerable older patients must

  5. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... and they shall not be worn for any other use. (4) Closed systems. If handling tasks are performed using properly functioning systems that enclose the pesticide to prevent it from contacting handlers...

  6. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... and they shall not be worn for any other use. (4) Closed systems. If handling tasks are performed using properly functioning systems that enclose the pesticide to prevent it from contacting handlers...

  7. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... and they shall not be worn for any other use. (4) Closed systems. If handling tasks are performed using properly functioning systems that enclose the pesticide to prevent it from contacting handlers...

  8. 40 CFR 170.240 - Personal protective equipment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., chemical-resistant gloves, chemical-resistant footwear, respiratory protection devices, chemical-resistant... and they shall not be worn for any other use. (4) Closed systems. If handling tasks are performed using properly functioning systems that enclose the pesticide to prevent it from contacting handlers...

  9. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... steel-toe shoes or steel-toe boots) and non-specialty prescription safety eyewear, provided that the... and allows the employee, at his or her request, to use shoes or boots with built-in metatarsal protection, the employer is not required to reimburse the employee for the shoes or boots. (4) The...

  10. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... steel-toe shoes or steel-toe boots) and non-specialty prescription safety eyewear, provided that the... and allows the employee, at his or her request, to use shoes or boots with built-in metatarsal protection, the employer is not required to reimburse the employee for the shoes or boots. (4) The...

  11. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... steel-toe shoes or steel-toe boots) and non-specialty prescription safety eyewear, provided that the... and allows the employee, at his or her request, to use shoes or boots with built-in metatarsal protection, the employer is not required to reimburse the employee for the shoes or boots. (4) The...

  12. 29 CFR 1926.95 - Criteria for personal protective equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... steel-toe shoes or steel-toe boots) and non-specialty prescription safety eyewear, provided that the... and allows the employee, at his or her request, to use shoes or boots with built-in metatarsal protection, the employer is not required to reimburse the employee for the shoes or boots. (4) The...

  13. Heat Strain in Personal Protective Clothing: Challenges and Intervention Strategies

    NASA Astrophysics Data System (ADS)

    McLellan, T. M.; Daanen, H. A. M.

    Humans rely on sweat evaporation during exercise in the heat to promote cooling and to maintain thermal homeostasis. In protective clothing, however, sweat evaporation is severely hampered and this may lead to uncompensable heat strain, where core body temperature continues to rise leading to physical exhaustion and the cessation of work. The tolerance time depends on three main factors: (1) the initial core temperature that may be reduced by heat acclimation and pre-cooling, (2) the final core temperature, which can be increased due to physical training, and (3) the rate of change in body core temperature, which is dependent on the thermal environment, work rate and individual factors like body composition. Methods to reduce heat strain in protective clothing include: (1) increasing clothing permeability for air, (2) adjusting pacing strategy, including work/rest schedules, (3) physical training, and (4) cooling interventions.

  14. Experimental evaluation of personal protection devices against graphite nanoaerosols: fibrous filter media, masks, protective clothing, and gloves.

    PubMed

    Golanski, L; Guiot, A; Rouillon, F; Pocachard, J; Tardif, F

    2009-06-01

    In this study, different conventional personal protection devices (fibrous filters, cartridges for respirators, protective clothing, and gloves) well qualified for micron particles were tested with graphite nanoparticles ranging from 10 to 100 nm (electrical mobility diameter). For this purpose, two specific test benches were designed: one for filter-based devices which are tested under a controlled air flow and other for gloves and protective clothing based on the "through diffusion method." The penetration versus particle size shows for most tested filter media the behavior predicted by the theoretical Brownian capture: penetration decreases when particle diameter decreases. No thermal rebound was detected until 10 nm for graphite nanoparticles. Protective clothes were tested by two methods and same trends were obtained. Nonwoven fabrics (air-tight materials) are much more efficient against nanoparticles than cotton and paper. Gloves tested by "through diffusion technique," in static condition seem to efficiently protect against graphite nanoparticles in spite of their important porosity.

  15. Determinants of the Rigor of State Protection Policies for Persons With Dementia in Assisted Living.

    PubMed

    Nattinger, Matthew C; Kaskie, Brian

    2017-01-01

    Continued growth in the number of individuals with dementia residing in assisted living (AL) facilities raises concerns about their safety and protection. However, unlike federally regulated nursing facilities, AL facilities are state-regulated and there is a high degree of variation among policies designed to protect persons with dementia. Despite the important role these protection policies have in shaping the quality of life of persons with dementia residing in AL facilities, little is known about their formation. In this research, we examined the adoption of AL protection policies pertaining to staffing, the physical environment, and the use of chemical restraints. For each protection policy type, we modeled policy rigor using an innovative point-in-time approach, incorporating variables associated with state contextual, institutional, political, and external factors. We found that the rate of state AL protection policy adoptions remained steady over the study period, with staffing policies becoming less rigorous over time. Variables reflecting institutional policy making, including legislative professionalism and bureaucratic oversight, were associated with the rigor of state AL dementia protection policies. As we continue to evaluate the mechanisms contributing to the rigor of AL protection policies, it seems that organized advocacy efforts might expand their role in educating state policy makers about the importance of protecting persons with dementia residing in AL facilities and moving to advance appropriate policies.

  16. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  17. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  18. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  19. 14 CFR 1203.301 - Identification of information requiring protection.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Identification of information requiring protection. 1203.301 Section 1203.301 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.301 Identification...

  20. Theft of information in the take-grant protection model

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    Using the information transfer extensions to the Take-Grant Protection Model, the concept of theft of information is defined and necessary and sufficient conditions for such theft to occur are presented, as well as bounds on the number of actors involved in such theft. Finally, the application of these results to reference monitors are explored.

  1. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Amendment of protected health information. 164.526 Section 164.526 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information §...

  2. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Amendment of protected health information. 164.526 Section 164.526 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information §...

  3. 49 CFR 1522.125 - Protection of information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program § 1522.125 Protection of information. (a) Sensitive Security Information. Each validation... authorized by TSA, no validation firm, or any of its officers, Security Coordinators, validators,...

  4. Audit Report on "Protection of the Department of Energy's Unclassified Sensitive Electronic Information"

    SciTech Connect

    2009-08-01

    The Department of Energy and its contractors store and process massive quantities of sensitive information to accomplish national security, energy, science, and environmental missions. Sensitive unclassified data, such as personally identifiable information (PII), official use only, and unclassified controlled nuclear information require special handling and protection to prevent misuse of the information for inappropriate purposes. Industry experts have reported that more than 203 million personal privacy records have been lost or stolen over the past three years, including information maintained by corporations, educational institutions, and Federal agencies. The loss of personal and other sensitive information can result in substantial financial harm, embarrassment, and inconvenience to individuals and organizations. Therefore, strong protective measures, including data encryption, help protect against the unauthorized disclosure of sensitive information. Prior reports involving the loss of sensitive information have highlighted weaknesses in the Department's ability to protect sensitive data. Our report on Security Over Personally Identifiable Information (DOE/IG-0771, July 2007) disclosed that the Department had not fully implemented all measures recommended by the Office of Management and Budget (OMB) and required by the National Institute of Standards and Technology (NIST) to protect PII, including failures to identify and encrypt PII maintained on information systems. Similarly, the Government Accountability Office recently reported that the Department had not yet installed encryption technology to protect sensitive data on the vast majority of laptop computers and handheld devices. Because of the potential for harm, we initiated this audit to determine whether the Department and its contractors adequately safeguarded sensitive electronic information. The Department had taken a number of steps to improve protection of PII. Our review, however, identified

  5. 17 CFR 248.10 - Limits on disclosure of nonpublic personal information to nonaffiliated third parties.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...: Privacy of Consumer Financial Information and Safeguarding Personal Information Limits on Disclosures § 248.10 Limits on disclosure of nonpublic personal information to nonaffiliated third parties. (a)(1... nonpublic personal information to nonaffiliated third parties. 248.10 Section 248.10 Commodity...

  6. 17 CFR 248.10 - Limits on disclosure of nonpublic personal information to nonaffiliated third parties.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...: Privacy of Consumer Financial Information and Safeguarding Personal Information Limits on Disclosures § 248.10 Limits on disclosure of nonpublic personal information to nonaffiliated third parties. (a)(1... nonpublic personal information to nonaffiliated third parties. 248.10 Section 248.10 Commodity...

  7. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... employment). (d) School and year of graduation. (e) Home of record. (f) Home address and phone. (g) Age and... sensitive units. (i) Office and unit address and duty phone for overseas or for routinely deployable...

  8. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... employment). (d) School and year of graduation. (e) Home of record. (f) Home address and phone. (g) Age and... sensitive units. (i) Office and unit address and duty phone for overseas or for routinely deployable...

  9. Outdoor workers' acceptance of personal protective measures against solar ultraviolet radiation.

    PubMed

    Weber, Marko; Uller, Andreas; Schulmeister, Karl; Brusl, Helmut; Hann, Hans; Kindl, Peter

    2007-01-01

    The acceptance and usability of personal protection against solar UV radiation was evaluated in a field study with a group of tinsmiths in Austria. The personal protective measures (PPM) tested involved four categories: shirts, headwear, sunglasses and topically applied sunscreens; at least six different products per category were tested. Recommendations for the "ideal" shirt, headwear, pair of sunglasses and topical sunscreen are given based on data from questionnaires, i.e., from the point of view of the workers, independently from the actual physical level of protection (such as low transmittance or area of coverage) provided. It is argued that in practice it is important to consider the acceptance and usability of protective measures as well as the level of physical protection when providing PPM.

  10. Do medical students receive training in correct use of personal protective equipment?

    PubMed Central

    John, Amrita; Tomas, Myreen E.; Hari, Aditya; Wilson, Brigid M.; Donskey, Curtis J.

    2017-01-01

    ABSTRACT Background: Healthcare personnel often use incorrect technique for donning and doffing of personal protective equipment (PPE). Objective: We tested the hypothesis that medical students receive insufficient training on correct methods for donning and doffing PPE. Methods: We conducted a cross-sectional survey of medical students on clinical rotations at two teaching hospitals to determine the type of training they received in PPE technique. The students performed simulations of contaminated PPE removal with fluorescent lotion on gloves and were assessed for correct PPE technique and skin and/or clothing contamination. To obtain additional information on PPE training during medical education, residents, fellows, and attending physicians completed written questionnaires on PPE training received during medical school and on knowledge of PPE protocols recommended by the Centers for Disease Control and Prevention. Results: Of 27 medical students surveyed, only 11 (41%) reported receiving PPE training, and none had received training requiring demonstration of proficiency. During simulations, 25 of 27 (92.5%) students had one or more lapses in technique and 12 (44%) contaminated their skin with fluorescent lotion. For 100 residents, fellows and attending physicians representing 67 different medical schools, only 53% reported receiving training in use of PPE and only 39% selected correct donning and doffing sequence. Conclusions: Our findings suggest that there is a need for development of effective strategies to train medical students in correct use of PPE. Abbreviations: PPE: Personal protective equipment; MRSA: Methicillin-resistant Staphylococcus aureus; SARS: Severe acute respiratory syndrome; MERS: Middle East respiratory syndrome; WHO: World Health Organization; CDC: Centers for Disease Control and Prevention; OSCE: Objective structured clinical examination PMID:28178912

  11. Intimate partner survivors' help-seeking and protection efforts: a person-oriented analysis.

    PubMed

    Nurius, Paula S; Macy, Rebecca J; Nwabuzor, Ijeoma; Holt, Victoria L

    2011-02-01

    Domestic violence advocates and researchers advocate for a survivor-centered approach for assisting women experiencing intimate partner violence (IPV), with individualized safety plans and services; yet little empirical work has been done to determine IPV survivors' specific combinations of vulnerabilities and assets that might inform such an approach. Using latent profile analysis of a cohort of 448 survivors, five distinct subgroups were previously identified in terms of biopsychosocial asset and vulnerability profiles. The purpose of the current study was to apply person-oriented methodology for survivor-centered investigation of differences in help-seeking and protective actions according to subgroup membership within this cohort. Though not differing demographically, the subgroups were found to differ significantly and meaningfully in their patterns of IPV help-seeking and protective actions. Thus, reliance on population-aggregate linear relationships between IPV exposure and safety efforts may risk overlooking important variation by vulnerability and asset profile, and knowledge of distinct clusters among functioning profiles may help with understanding of survivors' coping strategies.The authors outline service-need considerations across the subgroups and provide guidance for targeted outreach, locating IPV survivors and matching services to their needs.

  12. Examination of an Electronic Patient Record Display Method to Protect Patient Information Privacy.

    PubMed

    Niimi, Yukari; Ota, Katsumasa

    2017-02-01

    Electronic patient records facilitate the provision of safe, high-quality medical care. However, because personnel can view almost all stored information, this study designed a display method using a mosaic blur (pixelation) to temporarily conceal information patients do not want shared. This study developed an electronic patient records display method for patient information that balanced the patient's desire for personal information protection against the need for information sharing among medical personnel. First, medical personnel were interviewed about the degree of information required for both individual duties and team-based care. Subsequently, they tested a mock display method that partially concealed information using a mosaic blur, and they were interviewed about the effectiveness of the display method that ensures patient privacy. Participants better understood patients' demand for confidentiality, suggesting increased awareness of patients' privacy protection. However, participants also indicated that temporary concealment of certain information was problematic. Other issues included the inconvenience of removing the mosaic blur to obtain required information and risk of insufficient information for medical care. Despite several issues with using a display method that temporarily conceals information according to patient privacy needs, medical personnel could accept this display method if information essential to medical safety remains accessible.

  13. Fluorescence-based optical chemical sensors for personal protection

    NASA Astrophysics Data System (ADS)

    Korent Urek, Špela; Lobnik, Aleksandra; Turel, Matejka

    2010-04-01

    The World Health Organization has reported that each year approximately 3 million people are poised by organophosphate substances (pesticides and nerve agents) resulting in 220,000 deaths. Organophosphates (OP) are toxic compounds which cause rapid and severe inhibition of serine proteases, most markedly acetylcholinesterase, which is vital to nerve function. This inhibition is often fatal. OP nerve agents are generally stable, easy to disperse, and highly toxic. They can be absorbed through the skin, by ingestion, or by respiration. A release of a nerve agent has the potential to rapidly affect a large number of people. The ease of manufacturing and dispensability of nerve agents, as well as available, inexpensive starting materials make these agents a weapon of choice for criminal terrorist attacks. One of the major steps toward protection against dangerous substances is to develop sensor devices that can act as an early warning system to the endangered people.

  14. 77 FR 25499 - Notice of Proposed Information Collection: Comment Request; Personal Financial and Credit Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT Notice of Proposed Information Collection: Comment Request; Personal Financial and... also lists the following information: Title of Proposal: Personal Financial and Credit Statement....

  15. Personal Protective Equipment for Filovirus Epidemics: A Call for Better Evidence

    PubMed Central

    Sprecher, Armand G.; Caluwaerts, An; Draper, Mike; Feldmann, Heinz; Frey, Clifford P.; Funk, Renée H.; Kobinger, Gary; Le Duc, James W.; Spiropoulou, Christina; Williams, Warren Jon

    2015-01-01

    Personal protective equipment (PPE) is an important part of worker protection during filovirus outbreaks. The need to protect against a highly virulent fluid-borne pathogen in the tropical environment imposes a heat stress on the wearer that is itself a safety risk. No evidence supports the choice of PPE employed in recent outbreaks, and standard testing procedures employed by the protective garment industry do not well simulate filovirus exposure. Further research is needed to determine the appropriate PPE for filoviruses and the heat stress that it imposes. PMID:25821225

  16. Law Enforcement Head-Borne Personal Protective Equipment Hearing Attenuation

    DTIC Science & Technology

    2009-04-01

    PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response...number PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1 . REPORT DATE (DD-MM-YYYY) XX-04-2009 2. REPORT TYPE Final 3. DATES COVERED (From...Blank CONTENTS 1 . INTRODUCTION 11 2. IMPORTANCE OF TESTS 11 2.1 Importance of Localization and Speech Intelligibility 12 2.1.1 Situational

  17. The role of privacy protection in healthcare information systems adoption.

    PubMed

    Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui

    2013-10-01

    Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.

  18. Information Services to the Disadvantaged Person: A Challenge for Information Professionals in Thailand.

    ERIC Educational Resources Information Center

    Butdisuwan, Sujin

    This paper considers the provision of library and information services to disadvantaged persons in Thailand and focuses on the need to provide appropriate staff training to library staff working with these groups. The results of a number of specific projects are used as illustrative examples. The paper begins with an overview of the disadvantaged…

  19. Open consent, biobanking and data protection law: can open consent be 'informed' under the forthcoming data protection regulation?

    PubMed

    Hallinan, Dara; Friedewald, Michael

    2015-01-01

    This article focuses on whether a certain form of consent used by biobanks--open consent--is compatible with the Proposed Data Protection Regulation. In an open consent procedure, the biobank requests consent once from the data subject for all future research uses of genetic material and data. However, as biobanks process personal data, they must comply with data protection law. Data protection law is currently undergoing reform. The Proposed Data Protection Regulation is the culmination of this reform and, if voted into law, will constitute a new legal framework for biobanking. The Regulation puts strict conditions on consent--in particular relating to information which must be given to the data subject. It seems clear that open consent cannot meet these requirements. 4 categories of information cannot be provided with adequate specificity: purpose, recipient, possible third country transfers, data collected. However, whilst open consent cannot meet the formal requirements laid out by the Regulation, this is not to say that these requirements are substantially undebateable. Two arguments could be put forward suggesting the applicable consent requirements should be rethought. First, from policy documents regarding the drafting process, it seems that the informational requirements in the Regulation are so strict in order to protect the data subject from risks inherent in the use of the consent mechanism in a certain context--exemplified by the online context. There are substantial differences between this context and the biobanking context. Arguably, a consent transaction in the biobanking does not present the same type of risk to the data subject. If the risks are different, then perhaps there are also grounds for a reconsideration of consent requirements? Second, an argument can be made that the legislator drafted the Regulation based on certain assumptions as to the nature of 'data'. The authors argue that these assumptions are difficult to apply to genetic data

  20. [The real-world effectiveness of personal protective equipment and additional risks for workers' health].

    PubMed

    Denisov, É I; Morozova, T V; Adeninskaia, E E; Kur'erov, N N

    2013-01-01

    The effectiveness of personal protective equipment (PPE) of hearing, respiratory organs and hands is considered. It is shown that real effect of PPE is twice lower than declared by supplier; this presumes some derating system. The aspects of discomfort and additional risks are analyzed. The hygienic and physiologic evaluation of PPE is required along with elaboration of an official document (OSH standard or sanitary regulation) on selection, personal fit, organization of use and individual training of workers and their motivation.

  1. An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives

    PubMed Central

    Neri, Emilio; Jonker, Elizabeth

    2007-01-01

    Background The public is concerned about the privacy of their health information, especially as more of it is collected, stored, and exchanged electronically. But we do not know the extent of leakage of personal health information (PHI) from data custodians. One form of data leakage is through computer equipment that is sold, donated, lost, or stolen from health care facilities or individuals who work at these facilities. Previous studies have shown that it is possible to get sensitive personal information (PI) from second-hand disk drives. However, there have been no studies investigating the leakage of PHI in this way. Objectives The aim of the study was to determine the extent to which PHI can be obtained from second-hand computer disk drives. Methods A list of Canadian vendors selling second-hand computer equipment was constructed, and we systematically went through the shuffled list and attempted to purchase used disk drives from the vendors. Sixty functional disk drives were purchased and analyzed for data remnants containing PHI using computer forensic tools. Results It was possible to recover PI from 65% (95% CI: 52%-76%) of the drives. In total, 10% (95% CI: 5%-20%) had PHI on people other than the owner(s) of the drive, and 8% (95% CI: 7%-24%) had PHI on the owner(s) of the drive. Some of the PHI included very sensitive mental health information on a large number of people. Conclusions There is a strong need for health care data custodians to either encrypt all computers that can hold PHI on their clients or patients, including those used by employees and subcontractors in their homes, or to ensure that their computers are destroyed rather than finding a second life in the used computer market. PMID:17942386

  2. Relationships: empirical contribution. Understanding personality pathology in adolescents: the five factor model of personality and social information processing.

    PubMed

    Hessels, Christel; van den Hanenberg, Danique; de Castro, Bram Orobio; van Aken, Marcel A G

    2014-02-01

    This study seeks to integrate two research traditions that lie at the base of the understanding of personality pathology in adolescents. The first research tradition refers to normal personality according to the Five Factor Model (FFM). The second tradition specifies the key feature of personality disorder as the capacity to mentalize, which can be reflected in Social Information Processing (SIP). In a clinical sample of 96 adolescents, the authors investigated response generation, coping strategy, and memories of past frustrating experiences as part of SIP, as mediator in the relationship between personality and personality pathology, and a possible moderating role of personality on the relationship between SIP and personality pathology. The hypothesized mediation, by which the effects of personality dimensions on personality pathology was expected to be mediated by SIP variables, was found only for the effect of Neuroticism, most specifically on BPD, which appeared to be mediated by memories the patients had about past frustrating conflict situations with peers. Some moderating effects of personality on the relationship between SIP variables and personality pathology were found, suggesting that high Agreeableness and sometimes low Neuroticism can buffer this relationship. These results suggest that personality dimensions and social cognitions both independently and together play a role in adolescents' personality pathology.

  3. You are born with your genes: justice and protection against discrimination in the use of genetic information.

    PubMed

    Francis, Leslie P

    2010-01-01

    Genetic information poses an apparent paradox for justice in health care. On the one hand, genetic information seems to be exactly the kind of information that it is unjust to take into account in the distribution of important goods. On the other hand, genetic information may increasingly become useful in individual patient care as evidence for personalized medicine increases. Although it is important to emphasize the difference between genetic information and the social construct of race, nonetheless, the historical interplay between discrimination based on assumptions about heritability and discrimination based on race are significant. Thus, this article defends the importance of paying very close attention to protections in the use of genetic information. Three current examples of inadequate protection are cited. First, informed consent to genetic testing should incorporate potential confidentiality risks raised by this information. Second, the Genetic Information Nondiscrimination Act is too porous to protect employees from their employers' possession of genetic information; if such information is used in discriminatory ways, burdens of seeking protection then fall on the employees. More stringent strategies for protecting information are thus desirable. Finally, current designs of interoperable health records fail to allow for the sequestration of genetic information. Efforts to develop such sequestration techniques should be encouraged; among other benefits, they would be helpful in shielding genetic information from employers.

  4. Drunk Personality: Reports from Drinkers and Knowledgeable Informants

    PubMed Central

    Winograd, Rachel P.; Steinley, Douglas; Sher, Kenneth J.

    2014-01-01

    Objective Existing literature supports the Five-Factor Model (FFM) of personality (i.e., Extraversion, Agreeableness, Conscientiousness, Emotional Stability, and Intellect or Openness) as a comprehensive representation of stable aspects of mood, affect, and behavior. This study evaluated the FFM as a framework for both self-perceptions of drunkenness (i.e. individual changes in mood, affect, and behavior associated with one’s own intoxication), as well “drinking buddies’” perceptions of their friends’ drunkenness (i.e., changes in mood, affect, and behavior associated with a friend’s intoxication) and the association of reported sober-to-drunk differences with negative alcohol-related consequences. Method College-student drinkers (N = 374 [187 “drinking buddy” pairs]) reported on their sober and drunk levels of the five factors, as well as those of their drinking buddy. Buddies completed parallel assessments for themselves and their friend in order for rater agreement to be determined. All participants completed assessments of harmful alcohol outcomes experienced within the past year. Results Regardless of reporter, differences between drunken and sober states were found across all five factors and agreement between self and informant reports was consistently significant and comparable across sober and drunk conditions. Low levels of drunk Conscientiousness and drunk Emotional Stability were associated with experiencing more alcohol-related consequences, even when controlling for sober factor levels and binge drinking frequency. Conclusions Findings support the use of the FFM as a clinically relevant framework for organizing differences in personality expression associated with intoxication and the validity of self-reports of drunk personality. PMID:24796850

  5. Balancing Good Intentions: Protecting the Privacy of Electronic Health Information

    ERIC Educational Resources Information Center

    McClanahan, Kitty

    2008-01-01

    Electronic information is a vital but complex component in the modern health care system, fueling ongoing efforts to develop a universal electronic health record infrastructure. This innovation creates a substantial tension between two desirable values: the increased quality and utility of patient medical records and the protection of the privacy…

  6. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Protection of foreign government information. 2400.38 Section 2400.38 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY...

  7. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Protection of foreign government information. 2400.38 Section 2400.38 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY...

  8. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Protection of foreign government information. 2400.38 Section 2400.38 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY...

  9. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Protection of foreign government information. 2400.38 Section 2400.38 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY...

  10. 32 CFR 2400.38 - Protection of foreign government information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Protection of foreign government information. 2400.38 Section 2400.38 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY...

  11. Executive Guide to the Protection of Information Resources.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    The purpose of this guide is to help the policy maker address a series of questions regarding the protection and safety of computer systems and data processed within his/her agency. It introduces information systems security concerns, outlines the management issues that must be addressed by agency policies and programs, and describes the essential…

  12. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  13. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  14. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  15. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  16. 10 CFR 26.37 - Protection of information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Program Elements § 26.37 Protection of information... program, including determinations of fitness, FFD program audits, or some human resources functions; (6... test results, MRO reviews, determinations of fitness, and management actions pertaining to the...

  17. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS ADVANCED TECHNOLOGY PROGRAM General § 295.9 Protection of confidential information. As required by section 278n(d)(5... confidential basis in connection with the activities of any business or joint research and development...

  18. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS...

  19. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS...

  20. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS...

  1. 15 CFR 295.9 - Protection of confidential information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false Protection of confidential information. 295.9 Section 295.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST EXTRAMURAL PROGRAMS...

  2. Hand hygiene and the use of personal protective equipment.

    PubMed

    Wyeth, Jenny

    Infection prevention and control nurses (IPCNs) have an extremely wide remit in relation to the facilitation of appropriate infection prevention and control practice within healthcare environments. In order to be effective IPCNs need to be involved at all stages of healthcare service delivery and need to form close working relationships with staff at all levels and in all departments within their organisation. The provision of the necessary facilities within the clinical environment, along with the ongoing training and support of staff are essential prerequisites to changing the behaviour of staff in order to consistently deliver effective hand hygiene and other infection prevention and control practices. Auditing of practice and the investigation of incidents enable the identification of areas of practice requiring improvement, which subsequently informs the continual development of training programmes and initiatives with a view to improving patient and staff safety. IPCNs need to be able to react swiftly to the emergence of new infectious organisms and/or evidence to identify what is required in order to ensure that staff are compliant with anticipated practice to maintain the safety of the patients in their care, themselves and their colleagues.

  3. Use and disclosure of health information and protection of patient privacy in Taiwan.

    PubMed

    Liu, Han-Hsi

    2010-03-01

    This paper examines Taiwan's current regulatory system for the use of healthcare information from the viewpoint of patient privacy protection. The author proposes a patient-centered, cooperative system centered on the "traffic light theory", as a solution to the potential conflict between the use of healthcare information and the protection of patient privacy. Taiwan, a country with a national healthcare insurance program and state-of-the-art electronic technology, takes a distinctive approach to the protection of patient privacy. On January 1st, 2004, the Bureau of National Health Insurance (BNHI) implemented a comprehensive embedded integrated circuit (IC) card, which puts the wide-ranging health information of its 22 million beneficiaries online to facilitate review of use and disclosure. It is well understood that healthcare information is of a personal and sensitive nature, demanding stringent privacy protection. Nevertheless, there is no denying the potential benefit of using personal health information (PHI) to achieve public good, especially in the area of cost containment. The comprehensive e-health system in Taiwan greatly facilitates copying, transmission, and use of PHI, but does the regulatory system provide enough safeguards for patient privacy? Because the law in Taiwan does not provide clear standards for the use and disclosure of healthcare information, healthcare providers are either too conservative or too aggressive. While most healthcare providers keep their oath of confidentiality, some rogue members severely abuse patient privacy. This paper proposes a "traffic-light system" to remedy this situation. Flashing yellow lights allow aggressive drivers to ignore others, while causing overly cautious drivers to be too hesitant. The author contends that clear standards should have been established for healthcare providers. Like car drivers, healthcare providers need red and green traffic signals. The law should indicate, through workable privacy

  4. Review of Extracting Information From the Social Web for Health Personalization

    PubMed Central

    Karlsen, Randi; Bonander, Jason

    2011-01-01

    In recent years the Web has come into its own as a social platform where health consumers are actively creating and consuming Web content. Moreover, as the Web matures, consumers are gaining access to personalized applications adapted to their health needs and interests. The creation of personalized Web applications relies on extracted information about the users and the content to personalize. The Social Web itself provides many sources of information that can be used to extract information for personalization apart from traditional Web forms and questionnaires. This paper provides a review of different approaches for extracting information from the Social Web for health personalization. We reviewed research literature across different fields addressing the disclosure of health information in the Social Web, techniques to extract that information, and examples of personalized health applications. In addition, the paper includes a discussion of technical and socioethical challenges related to the extraction of information for health personalization. PMID:21278049

  5. 78 FR 29375 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ... SECURITY Protected Critical Infrastructure Information (PCII) Office Self- Assessment Questionnaire AGENCY... Information Collection Division (IICD), Protected Critical Infrastructure Information (PCII) Program will...: The PCII Program was created by Congress under the Critical Infrastructure Information Act of...

  6. 77 FR 68795 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-16

    ... SECURITY Protected Critical Infrastructure Information (PCII) Office Self- Assessment Questionnaire AGENCY... Information Collection Division (IICD), Protected Critical Infrastructure Information (PCII) Program will... PCII Program under the Critical Infrastructure Information Act of 2002 for DHS to encourage...

  7. Personalized Information Environments: Do Public Libraries Want a Slice of the PIE?

    ERIC Educational Resources Information Center

    Worcester, Lea

    2003-01-01

    Discussion of personalized information environments (PIEs) focuses on library personalized interfaces. Describes academic library PIEs and commercial sites, such as Amazon.com that use personalization; explores the Public Library of Charlotte and Mecklenburg's personalized interface; and discusses opportunities and challenges PIEs offer public…

  8. Risk and Protective Factors Associated with Personal Mastery Among Sexual Minority African American Female Sex Workers

    PubMed Central

    Buttram, Mance E.; Surratt, Hilary L.; Kurtz, Steven P.

    2014-01-01

    Research among sexual minorities has traditionally examined problems such as substance use, HIV risk, mental health problems, and victimization. Among sexual minority street-based female sex workers, these vulnerabilities can be magnified. Grounded in theories of resilience, this study examines risk and protective factors associated with a high level of personal mastery among a vulnerable population of women. Data are drawn from baseline interviews from street-based African American female sex workers enrolled in a randomized intervention trial in Miami, Florida. We compare sexual minority (N=197) and heterosexual (N=365) women on measures of risk and protective factors; among sexual minority women we present logistic regression analyses which reveal that severe mental distress and HIV transmission risk are associated with low levels of personal mastery, while protective factors of transportation access and social support are associated with high levels of personal mastery. These findings suggest that these protective factors may potentially facilitate the development of personal mastery and represent beneficial avenues for intervention efforts. PMID:25530691

  9. 78 FR 12065 - National Institute for Occupational Safety and Health Personal Protective Technology for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-21

    ... Health Personal Protective Technology for Pesticide Handlers: Stakeholder Meeting AGENCY: The National... a.m.-6 p.m.) will include formal sessions on potential health effects of pesticide exposure, work... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HEALTH...

  10. 77 FR 60029 - Strengthening Protections Against Trafficking in Persons in Federal Contracts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-02

    ... From the Federal Register Online via the Government Publishing Office #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal Register / Vol. 77, No. 191 / Tuesday, October 2, 2012 / Presidential Documents#0;#0; #0; #0;Title 3-- #0;The President ] Executive Order 13627 of September 25, 2012 Strengthening Protections Against Trafficking in Persons in Federal...

  11. Information support systems for cultural heritage protection against flooding

    NASA Astrophysics Data System (ADS)

    Nedvedova, K.; Pergl, R.

    2015-08-01

    The goal of this paper is to present use of different kind of software applications to create complex support system for protection of cultural heritage against flooding. The project is very complex and it tries to cover the whole area of the problem from prevention to liquidation of aftermath effects. We used GIS for mapping the risk areas, ontology systems for vulnerability assessment application and the BORM method (Business Object Relation Modelling) for flood protection system planning guide. Those modern technologies helped us to gather a lot of information in one place and provide the knowledge to the broad audience.

  12. Personal health records: Consumer attitudes toward privacy and security of their personal health information.

    PubMed

    Lafky, Deborah Beranek; Horan, Thomas A

    2011-03-01

    Personal health record (PHR) systems are a subject of intense interest in the move to improve healthcare accessibility and quality. Although a number of vendors continue to put forward PHR systems, user-centered design research has lagged, and it has not been clear what features are important to prospective PHR users. Here, we report on a user-centered design study that combines qualitative and quantitative approaches to investigate several dimensions relevant to PHR design, and to look at the effect of health status on user needs. The results indicate that health status, especially disability and chronic illness, is relevant to PHR design. Further, the results provide empirical evidence about the role of privacy and security in users' attitudes toward PHR use. The exact nature of these attitudes differs from widely held perceptions about consumer values in healthcare information management.

  13. Ethical considerations in internet use of electronic protected health information.

    PubMed

    Polito, Jacquelyn M

    2012-03-01

    Caregivers, patients, and their family members are increasingly reliant on social network websites for storing, communicating, and referencing medical information. The Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule seeks balance by protecting the privacy of patients' health information and assuring that this information is available to those who need it to provide health care. Though federal and state governments have created laws and policies to safeguard patient privacy and confidentiality, the laws are inadequate against the rapid and innovative use of electronic health websites. As Internet use broadens access to information, health professionals must be aware that this information is not always secure. We must identify and reflect on medical ethics issues and be accountable for maintaining privacy for the patient.

  14. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... person or organization (for example, personal telephone lists or memory aids) that are retained or... notes are an extension of the individual's memory. These notes, however, must be maintained...

  15. [Personal protective equipments: considerations on the requirements and characteristics of selection and use].

    PubMed

    Galbiati, C

    2010-01-01

    The choice of PPE (Personal Protective Equipment) required two steps: the first related to the security features and the second related to ergonomics assessments and acceptance by the user. For the first aspect the legislation and technical regulations set clear requirements PPE, but choose a PPE's supplier means, of course, also make an assessment on the cost for PPE and service providers related. We will consider the technical, structural and ergonomic for PPE, to understand how to move towards the right solution. An important reference is the Ministerial Decree 2 maggio 2001: Criteria for identification and use of personal protective equipment (PPE), which describes the criteria for selection of proper protective equipment only for certain types of PPE for other the references is the European legislation or some guidelines.

  16. Consumer support for health information exchange and personal health records: a regional health information organization survey.

    PubMed

    Patel, Vaishali N; Dhopeshwarkar, Rina V; Edwards, Alison; Barrón, Yolanda; Sparenborg, Jeffrey; Kaushal, Rainu

    2012-06-01

    In order to characterize consumer support for electronic health information exchange (HIE) and personal health records (PHRs) in a community where HIE is underway, we conducted a survey of English speaking adults who visited primary care practices participating in a regional community-wide clinical data exchange, during August, 2008. Amongst the 117 respondents, a majority supported physicians' use of HIE (83%) or expressed interest in potentially using PHRs (76%). Consumers' comfort sending personal information electronically over the Internet and their perceptions regarding the potential benefits of HIE were independently associated with their support for HIE. Consumers' prior experience using the Internet to manage their healthcare, perceptions regarding the potential benefits of PHRs and college education were independently associated with potential PHR use. Bolstering consumer support for HIE and PHRs will require addressing privacy and security concerns, demonstrating clinical benefits, and reaching out to those who are less educated and computer literate.

  17. The European Conformity Assessment Procedures and the Quality Assurance Instruments for Personal Protective Equipment in the Internal Market.

    PubMed

    Lambert, Joachim

    1995-01-01

    Conformity assessment procedures prescribed by European legislation are presented and their concrete implementation is illustrated by the example of personal protective equipment (PPE). The different categories of PPE defined by Council Directive 89/686/EEC are explained with reference to the applicable conformity assessment elements. Quality assurance of production is presented as the central element of the conformity assessment procedure for complex PPE. Special emphasis is put on the necessity of having a regular exchange of views and information among notified bodies in Europe. Ways in which third countries can eventually carry out conformity assessment on the basis of a contract with the European Community Commission are explained.

  18. 75 FR 82041 - Notice of Proposed Information Collection: Comment Request; Floodplain Management and Protection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ...] Notice of Proposed Information Collection: Comment Request; Floodplain Management and Protection of... lists the following information: Title of Proposal: Floodplain Management and Protection of Wetlands..., ``Floodplain Management,'' and Executive Order 11990, ``Protection of Wetlands.'' Each respondent that...

  19. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... members of the Military Services and all married persons are not considered minors regardless of age, and... person or organization (for example, personal telephone lists or memory aids) that are retained or... notes are an extension of the individual's memory. These notes, however, must be maintained...

  20. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... members of the Military Services and all married persons are not considered minors regardless of age, and... person or organization (for example, personal telephone lists or memory aids) that are retained or... notes are an extension of the individual's memory. These notes, however, must be maintained...

  1. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... members of the Military Services and all married persons are not considered minors regardless of age, and... person or organization (for example, personal telephone lists or memory aids) that are retained or... notes are an extension of the individual's memory. These notes, however, must be maintained...

  2. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Protected Critical Infrastructure Information... SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.4 Protected Critical Infrastructure Information...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager...

  3. 77 FR 39573 - Additional Identifying Information Associated With Persons Whose Property and Interests in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-03

    ... Office of Foreign Assets Control Additional Identifying Information Associated With Persons Whose... Treasury's Office of Foreign Assets Control (``OFAC'') is publishing additional indentifying information... on June 1, 2012. FOR FURTHER INFORMATION CONTACT: Assistant Director, Sanctions...

  4. Theft of information in the take-grant protection model

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    Questions of information flow are in many ways more important than questions of access control, because the goal of many security policies is to thwart the unauthorized release of information, not merely the illicit obtaining of access rights to that information. The Take-Grant Protection Model is a theoretical tool for examining such issues because conditions necessary and sufficient for information to flow between two objects, and for rights to objects to be obtained or stolen, are known. These results are extended by examining the question of information flow from an object the owner of which is unwilling to release that information. Necessary and sufficient conditions for such theft of information to occur are derived, and bounds on the number of subjects that must take action for the theft to occur are presented. To emphasize the usefulness of these results, the security policies of complete isolation, transfer of rights with the cooperation of an owner, and transfer of information (but not rights) with the cooperation of the owner are presented; the last is used to model a simple reference monitor guarding a resource.

  5. 32 CFR 806b.34 - Protecting records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... contact with information in identifiable form. Protect information according to its sensitivity level. Consider the personal sensitivity of the information and the risk of disclosure, loss or alteration....

  6. 32 CFR 806b.34 - Protecting records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... contact with information in identifiable form. Protect information according to its sensitivity level. Consider the personal sensitivity of the information and the risk of disclosure, loss or alteration....

  7. 32 CFR 327.8 - Disclosure of personal information to other agencies and third parties

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... established for each user of the information outside DeCA who need official access to the records. This use... 32 National Defense 2 2010-07-01 2010-07-01 false Disclosure of personal information to other... § 327.8 Disclosure of personal information to other agencies and third parties (a) Disclosures...

  8. Attenuation of X and Gamma Rays in Personal Radiation Shielding Protective Clothing.

    PubMed

    Kozlovska, Michaela; Cerny, Radek; Otahal, Petr

    2015-11-01

    A collection of personal radiation shielding protective clothing, suitable for use in case of accidents in nuclear facilities or radiological emergency situations involving radioactive agents, was gathered and tested at the Nuclear Protection Department of the National Institute for Nuclear, Chemical and Biological Protection, Czech Republic. Attenuating qualities of shielding layers in individual protective clothing were tested via spectra measurement of x and gamma rays, penetrating them. The rays originated from different radionuclide point sources, the gamma ray energies of which cover a broad energy range. The spectra were measured by handheld spectrometers, both scintillation and High Purity Germanium. Different narrow beam geometries were adjusted using a special testing bench and a set of various collimators. The main experimentally determined quantity for individual samples of personal radiation shielding protective clothing was x and gamma rays attenuation for significant energies of the spectra. The attenuation was assessed comparing net peak areas (after background subtraction) in spectra, where a tested sample was placed between the source and the detector, and corresponding net peak areas in spectra, measured without the sample. Mass attenuation coefficients, which describe attenuating qualities of shielding layers materials in individual samples, together with corresponding lead equivalents, were determined as well. Experimentally assessed mass attenuation coefficients of the samples were compared to the referred ones for individual heavy metals.

  9. [Personal identification using information from cranio-facial region].

    PubMed

    Minaguchi, Kiyoshi

    2007-11-01

    Much of Forensic Odontology is concerned with personal identification, through examination of cranio-facial region. This paper describes several studies in which we worked with materials derived from cranio-facial region. The following topics are addressed : (1) Human saliva contains proteins specific to salivary glands, proteins which are highly polymorphic compared with those found in other body fluids. In particular, six genes for proline-rich proteins coded many proteins found in human saliva, and we found several of them. At least five kinds of cystatin are secreted in saliva. We constructed recombinant polymorphic proteins, cystatin SAl and SA2. Using these proteins, we compared effects of amino acid mutation on protease inhibitor activity, and demonstrated a novel function for type-2 cystatin cytokine-inducing activity. (2) Among autosomal STR loci, we identified the D12S67 locus as highly polymorphic, with a heterozygosity of 95%, by investigating differences in nucleotide repeat units. Highly polymorphic autosomal STR loci offer an effective forensic tool under certain conditions, in addition to multiplex PCR, and therefore merit further study in forensic practice. (3) Although digitalization is prevalent in photography, analog images are preferable in certain circumstances as they offer better resolution. (4) Usually, information on mtDNA polymorphisms from HV1 and HV2 in the control region is used in forensic practice. However, information from the coding region considerably increases the discrimination power of mtDNA polymorphisms. It is important to increase the volume of coding region information available with regard to mtDNA polymorphisms for future forensic practice. (5) Y-STR polymorphisms are closely associated with binary haplogroups, and it is possible to estimate a binary haplogroup from an STR haplotype. (6) Mitochondrial DNA and Y-chromosomal polymorphisms can be used to determine geographic origin in individuals from East Asia, something

  10. [A serious challenge for youth protection services: intervening with parents suffering from borderline personality disorder (BPD)].

    PubMed

    Laporte, Lise

    2007-01-01

    An exploratory survey of 68 youth protection services' workers in Montréal, who followed 1,030 children reveals that 39 % of these children have at least one parent who suffer from mental health problems. Among these parents, 48 % of mothers and 30 % of fathers have a personality disorder, and for the majority, a borderline personality disorder. This mental health problem is preoccupying for youth protection workers because of its high prevalence, its impact on children and case workers and the difficulties brought forth by having to intervene in a context of authority and within an organization not adapted to the management of this mental health problem. Some intervention's guidelines to work with these parents are presented as well as some challenges and future perspectives.

  11. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... that access is provided the individual. (7) Regardless of age, all DA military personnel and all... personal notes of individuals used as memory aids. These documents are not Privacy Act records and are not...'s personal convenience and the notes are restricted to that of memory aids; (iii) Not the result...

  12. Personal Record Keeping. The CIRcular: Consumer Information Report 21.

    ERIC Educational Resources Information Center

    Bank of America NT & SA, San Francisco, CA.

    This report explains the importance of keeping personal records, describes types of records to keep, and suggests places in which to keep them and ways to organize them. Guidelines are offered for keeping the following types of records: (1) personal documents (family records, wills, passports, diplomas, and social security cards); (2) property…

  13. Heat strain imposed by personal protective ensembles: quantitative analysis using a thermoregulation model

    NASA Astrophysics Data System (ADS)

    Xu, Xiaojiang; Gonzalez, Julio A.; Santee, William R.; Blanchard, Laurie A.; Hoyt, Reed W.

    2016-07-01

    The objective of this paper is to study the effects of personal protective equipment (PPE) and specific PPE layers, defined as thermal/evaporative resistances and the mass, on heat strain during physical activity. A stepwise thermal manikin testing and modeling approach was used to analyze a PPE ensemble with four layers: uniform, ballistic protection, chemical protective clothing, and mask and gloves. The PPE was tested on a thermal manikin, starting with the uniform, then adding an additional layer in each step. Wearing PPE increases the metabolic rates (dot{M}) , thus dot{M} were adjusted according to the mass of each of four configurations. A human thermoregulatory model was used to predict endurance time for each configuration at fixed dot{M} and at its mass adjusted dot{M} . Reductions in endurance time due to resistances, and due to mass, were separately determined using predicted results. Fractional contributions of PPE's thermal/evaporative resistances by layer show that the ballistic protection and the chemical protective clothing layers contribute about 20 %, respectively. Wearing the ballistic protection over the uniform reduced endurance time from 146 to 75 min, with 31 min of the decrement due to the additional resistances of the ballistic protection, and 40 min due to increased dot{M} associated with the additional mass. Effects of mass on heat strain are of a similar magnitude relative to effects of increased resistances. Reducing resistances and mass can both significantly alleviate heat strain.

  14. Privacy and Personal Information Held by Government: A Comparative Study, Japan and New Zealand

    NASA Astrophysics Data System (ADS)

    Cullen, Rowena

    This chapter reports on the concepts of information privacy and trust in government among citizens in Japan and New Zealand in a transnational, crosscultural study. Data from both countries are presented, and cultural and other factors are sought that might explain differences in attitudes shown. In both countries, citizens display a range of views, not related to age or gender. New Zealand citizens express concern about information privacy in relation to information held by government, but show a higher level of trust in government overall, and most attribute breaches of privacy to incompetence, rather than deliberate malfeasance. Japanese citizens interviewed also indicated that they had major concerns about information privacy, and had considerably less trust in government than New Zealand respondents showed. They were more inclined to attribute breaches of privacy to lax behavior in individuals than government systems. In both countries citizens showed an awareness of the tradeoffs necessary between personal privacy and the needs of the state to hold information for the benefit of all citizens, but knew little about the protection offered by privacy legislation, and expressed overall concern about privacy practices in the modern state. The study also provides evidence of cultural differences that can be related to Hofstede's dimensions of culture.

  15. Person re-identification employing 3D scene information

    NASA Astrophysics Data System (ADS)

    Bak, Sławomir; Brémond, François

    2015-09-01

    The person reidentification task applied in a real-world scenario is addressed. Finding people in a network of cameras is challenging due to significant variations in lighting conditions, different color responses, and different camera viewpoints. State-of-the-art algorithms are likely to fail due to serious perspective and pose changes. Most of the existing approaches try to cope with all these changes by applying metric learning tools to find a transfer function between a camera pair while ignoring the body alignment issue. Additionally, this transfer function usually depends on the camera pair and requires labeled training data for each camera. This might be unattainable in a large camera network. We employ three-dimensional scene information for minimizing perspective distortions and estimating the target pose. The estimated pose is further used for splitting a target trajectory into reliable chunks, each one with a uniform pose. These chunks are matched through a network of cameras using a previously learned metric pool. However, instead of learning transfer functions that cope with all appearance variations, we propose to learn a generic metric pool that only focuses on pose changes. This pool consists of metrics, each one learned to match a specific pair of poses and not being limited to a specific camera pair. Automatically estimated poses determine the proper metric, thus improving matching. We show that metrics learned using only a single camera can significantly improve the matching across the whole camera network, providing a scalable solution. We validated our approach on publicly available datasets, demonstrating increase in the reidentification performance.

  16. Polycyclic aromatic hydrocarbons produced by electrocautery smoke and the use of personal protective equipment 1

    PubMed Central

    Claudio, Caroline Vieira; Ribeiro, Renata Perfeito; Martins, Júlia Trevisan; Marziale, Maria Helena Palucci; Solci, Maria Cristina; Dalmas, José Carlos

    2017-01-01

    ABSTRACT Objective: analyze the concentration of polycyclic aromatic hydrocarbons in electrocautery smoke in operating rooms and the use of personal protective equipment by the intraoperative team when exposed to hydrocarbons. Method: exploratory and cross-sectional field research conducted in a surgery center. Gases were collected by a vacuum suction pump from a sample of 50 abdominal surgeries in which an electrocautery was used. A form was applied to identify the use of personal protective equipment. Gases were analyzed using chromatography. Descriptive statistics and Spearman's test were used to treat data. Results: there were 17 (34%) cholecystectomies with an average duration of 136 minutes, while the average time of electrocautery usage was 3.6 minutes. Airborne hydrocarbons were detected in operating rooms in 100% of the surgeries. Naphthalene was detected in 48 (96.0%) surgeries and phenanthrene in 49 (98.0%). The average concentration of these compounds was 0.0061 mg/m3 and a strong correlation (0.761) was found between them. The intraoperative teams did not use respirator masks such as the N95. Conclusion: electrocautery smoke produces gases that are harmful to the health of the intraoperative team, which is a concern considering the low adherence to the use of personal protective equipment. PMID:28301033

  17. The Structure of Informal Social Networks of Persons with Profound Intellectual and Multiple Disabilities

    ERIC Educational Resources Information Center

    Kamstra, A.; van der Putten, A. A. J.; Vlaskamp, C.

    2015-01-01

    Background: Persons with less severe disabilities are able to express their needs and show initiatives in social contacts, persons with profound intellectual and multiple disabilities (PIMD), however, depend on others for this. This study analysed the structure of informal networks of persons with PIMD. Materials and Methods: Data concerning the…

  18. 76 FR 80966 - Agency Information Collection Activities; Proposed Collection: Age, Sex, and Race of Persons...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-27

    ... Federal Bureau of Investigation Agency Information Collection Activities; Proposed Collection: Age, Sex, and Race of Persons Arrested 18 Years of Age and Over; Age, Sex, and Race of Persons Arrested Under 18... the form/collection: Age, Sex, and Race of Persons Arrested 18 Years of Age and Over; Age, Sex,...

  19. "Insensitive" to touch: fabric-supported lubricant-swollen polymeric films for omniphobic personal protective gear.

    PubMed

    Damle, Viraj G; Tummala, Abhishiktha; Chandrashekar, Sriram; Kido, Cassidee; Roopesh, Ajay; Sun, Xiaoda; Doudrick, Kyle; Chinn, Jeff; Lee, James R; Burgin, Timothy P; Rykaczewski, Konrad

    2015-02-25

    The use of personal protective gear made from omniphobic materials that easily shed drops of all sizes could provide enhanced protection from direct exposure to most liquid-phase biological and chemical hazards and facilitate the postexposure decontamination of the gear. In recent literature, lubricated nanostructured fabrics are seen as attractive candidates for personal protective gear due to their omniphobic and self-healing characteristics. However, the ability of these lubricated fabrics to shed low surface tension liquids after physical contact with other objects in the surrounding, which is critical in demanding healthcare and military field operations, has not been investigated. In this work, we investigate the depletion of oil from lubricated fabrics in contact with highly absorbing porous media and the resulting changes in the wetting characteristics of the fabrics by representative low and high surface tension liquids. In particular, we quantify the loss of the lubricant and the dynamic contact angles of water and ethanol on lubricated fabrics upon repeated pressurized contact with highly absorbent cellulose-fiber wipes at different time intervals. We demonstrate that, in contrast to hydrophobic nanoparticle coated microfibers, fabrics encapsulated within a polymer that swells with the lubricant retain the majority of the oil and are capable of repelling high as well as low surface tension liquids even upon multiple contacts with the highly absorbing wipes. The fabric supported lubricant-swollen polymeric films introduced here, therefore, could provide durable and easy to decontaminate protection against hazardous biological and chemical liquids.

  20. 10 CFR 1044.11 - How do you protect the information that you want to disclose?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false How do you protect the information that you want to... 2000 § 1044.11 How do you protect the information that you want to disclose? To protect classified information and unclassified controlled nuclear information you plan to disclose, you must: (a) Only...

  1. Quantitative Information Differences Between Object-Person Presentation Methods

    ERIC Educational Resources Information Center

    Boyd, J. Edwin; Perry, Raymond P.

    1972-01-01

    Subjects used significantly more adjectives, on an adjective checklist (ACL), in giving their impressions of an object-person; based on written and audiovisual presentations, more than audio presentations. (SD)

  2. Tuberculosis Infection Control in Health-Care Facilities: Environmental Control and Personal Protection.

    PubMed

    Lee, Ji Yeon

    2016-10-01

    Transmission of tuberculosis (TB) is a recognized risk to patients and healthcare workers in healthcare settings. The literature review suggests that implementation of combination control measures reduces the risk of TB transmission. Guidelines suggest a three-level hierarchy of controls including administrative, environmental, and respiratory protection. Among environmental controls, installation of ventilation systems is a priority because ventilation reduces the number of infectious particles in the air. Natural ventilation is cost-effective but depends on climatic conditions. Supplemented intervention such as air-cleaning methods including high efficiency particulate air filtration and ultraviolet germicidal irradiation should be considered in areas where adequate ventilation is difficult to achieve. Personal protective equipment including particulate respirators provides additional benefit when administrative and environmental controls cannot assure protection.

  3. Tuberculosis Infection Control in Health-Care Facilities: Environmental Control and Personal Protection

    PubMed Central

    2016-01-01

    Transmission of tuberculosis (TB) is a recognized risk to patients and healthcare workers in healthcare settings. The literature review suggests that implementation of combination control measures reduces the risk of TB transmission. Guidelines suggest a three-level hierarchy of controls including administrative, environmental, and respiratory protection. Among environmental controls, installation of ventilation systems is a priority because ventilation reduces the number of infectious particles in the air. Natural ventilation is cost-effective but depends on climatic conditions. Supplemented intervention such as air-cleaning methods including high efficiency particulate air filtration and ultraviolet germicidal irradiation should be considered in areas where adequate ventilation is difficult to achieve. Personal protective equipment including particulate respirators provides additional benefit when administrative and environmental controls cannot assure protection. PMID:27790274

  4. A guide to the selection of personal protective equipment for use in responding to a release of chemical warfare agents

    SciTech Connect

    Foust, C.B.

    1997-10-01

    Recognition by the US Army that a potential threat to the public from continued storage was potentially as great a threat as from transportation and the final demilitarization of chemical agents gave rise to the Chemical Stockpile Emergency Preparedness Program (CSEPP). CSEPP is a civilian community emergency preparedness program complementing the Department of Defense`s initiative to destroy domestic stockpiles of aged chemical warface munitions. An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with any HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern the selection of personal protective equipment (PPE). PPE includes all clothing, respirators and detection equipment used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel. FEMA requested that ORNL create training materials for CSEPP participants. These training materials were to provide information on a variety of topics and answer questions that a typical CSEPP participant might ask, including the following: how did the Army select the CSEPP recommended ensemble (i.e., protective clothing, respiratory equipment, and detection equipment); how does the CSEPP participant know this ensemble is the right PPE for chemical warfare agents and will actually protect him; what are the concept of operations and work rules? Does one need to know what the CSEPP concept of operations and work rules include? This report describes the training document ORNL created.

  5. A fractionation of the physiological burden of the personal protective equipment worn by firefighters.

    PubMed

    Taylor, Nigel A S; Lewis, Michael C; Notley, Sean R; Peoples, Gregory E

    2012-08-01

    Load carriage increases physiological strain, reduces work capacity and elevates the risk of work-related injury. In this project, the separate and combined physiological consequences of wearing the personal protective equipment used by firefighters were evaluated. The overall impact upon performance was first measured in 20 subjects during a maximal, job-related obstacle course trial and an incremental treadmill test to exhaustion (with and without protective equipment). The fractional contributions of the thermal protective clothing, helmet, breathing apparatus and boots were then separately determined during steady-state walking (4.8 km h(-1), 0% gradient) and bench stepping (20 cm at 40 steps min(-1)). The protective equipment reduced exercise tolerance by 56% on a treadmill, with the ambulatory oxygen consumption reserve (peak minus steady-state walking) being 31% lower. For the obstacle course, performance declined by 27%. Under steady-state conditions, the footwear exerted the greatest relative metabolic impact during walking and bench stepping, being 8.7 and 6.4 times greater per unit mass than the breathing apparatus. Indeed, the relative influence of the clothing on oxygen cost was at least three times that of the breathing apparatus. Therefore, the most efficient way to reduce the physiological burden of firefighters' protective equipment, and thereby increase safety, would be to reduce the mass of the boots and thermal protective clothing.

  6. Identifying Personality Pathology Associated With Major Depressive Episodes: Incremental Validity of Informant Reports

    PubMed Central

    Galione, Janine N.; Oltmanns, Thomas F.

    2016-01-01

    Major limitations are associated with the use of a single source of information to assess personality pathology. The construct validity of standardized interviews and informant reports on personality pathology has been established relative to other measures of personality pathology, but it is also important to consider these measures in relation to other constructs that should be related to personality pathology. One example is major depression. In this study, we evaluated whether less common clinical methods of assessment for measuring the same personality pathology constructs, including semistructured interviews and informant reports, demonstrate unique validity, using major depressive episode (MDE) as the external criterion. This analysis focuses on a representative, community-based sample of 1,437 participants and informants. We conducted a hierarchical logistic regression analysis and determined the order of entering the predictor variables based on likelihood of being used in a clinical setting as well as empirical recommendations. Each step of our regression model significantly increased our ability to predict lifetime MDE, including self, interviewer, and informant reports of personality pathology. Overall, these findings indicate that multiple sources of personality assessment provide unique information about the relationship between maladaptive personality traits and a history of MDE. Thus, semistructured diagnostic interviews and informant reports can be used as a resource to improve the validity of personality assessments. PMID:24004355

  7. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 4 3 , provides additional guidance regarding For Official Use Only information. 3 http://www.dtic.mil/whs/directives/corres/pdf/54007r_0998/p54007r.pdf. (c) Do not disclose personal information...

  8. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 4 3 , provides additional guidance regarding For Official Use Only information. 3 http://www.dtic.mil/whs/directives/corres/pdf/54007r_0998/p54007r.pdf. (c) Do not disclose personal information...

  9. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 4 3 , provides additional guidance regarding For Official Use Only information. 3 http://www.dtic.mil/whs/directives/corres/pdf/54007r_0998/p54007r.pdf. (c) Do not disclose personal information...

  10. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 4 3 , provides additional guidance regarding For Official Use Only information. 3 http://www.dtic.mil/whs/directives/corres/pdf/54007r_0998/p54007r.pdf. (c) Do not disclose personal information...

  11. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 4 3 , provides additional guidance regarding For Official Use Only information. 3 http://www.dtic.mil/whs/directives/corres/pdf/54007r_0998/p54007r.pdf. (c) Do not disclose personal information...

  12. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  13. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  14. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  15. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  16. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Placing personal information on shared drives. 806b.43 Section 806b.43 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE... shared drives. Personal information should never be placed on shared drives for access by groups...

  17. Guidelines for the Selection, Training, and Placement of Blind Persons in Information Service Expediting.

    ERIC Educational Resources Information Center

    Vieceli, Louis; And Others

    A potentially suitable job for the college educated blind person is that of an Information Service Expediter (ISE), an occupation which uses telecommunications equipment to provide clients with information services. A conference was held to develop specific guidelines for the selection, training, and placement of blind persons as ISE's. Papers…

  18. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  19. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 4 2014-10-01 2014-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  20. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  1. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 4 2013-10-01 2013-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  2. 42 CFR 455.106 - Disclosure by providers: Information on persons convicted of crimes.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 4 2012-10-01 2012-10-01 false Disclosure by providers: Information on persons convicted of crimes. 455.106 Section 455.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... persons convicted of crimes. (a) Information that must be disclosed. Before the Medicaid agency...

  3. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... represented on the Senior Policy Operating Group shall, to the extent permitted by law, share information on... international trafficking in persons. In its coordinating role, the Senior Policy Operating Group shall... INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION §...

  4. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... represented on the Senior Policy Operating Group shall, to the extent permitted by law, share information on... international trafficking in persons. In its coordinating role, the Senior Policy Operating Group shall... INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION §...

  5. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... represented on the Senior Policy Operating Group shall, to the extent permitted by law, share information on... international trafficking in persons. In its coordinating role, the Senior Policy Operating Group shall... INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION §...

  6. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... represented on the Senior Policy Operating Group shall, to the extent permitted by law, share information on... international trafficking in persons. In its coordinating role, the Senior Policy Operating Group shall... INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION §...

  7. 22 CFR 104.2 - Sharing of information regarding international trafficking in persons.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... represented on the Senior Policy Operating Group shall, to the extent permitted by law, share information on... international trafficking in persons. In its coordinating role, the Senior Policy Operating Group shall... INTERNATIONAL TRAFFICKING IN PERSONS: INTERAGENCY COORDINATION OF ACTIVITIES AND SHARING OF INFORMATION §...

  8. Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications

    ERIC Educational Resources Information Center

    Cox, Trissa

    2012-01-01

    Information privacy is a major concern for consumers adopting emerging technologies dependent on location-based services. This study sought to determine whether a relationship exists among factors of personalization, locatability, perceived playfulness, privacy concern and behavioral intention to disclose personal information for individuals using…

  9. 12 CFR 911.6 - Persons and entities with access to unpublished information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Persons and entities with access to unpublished information. 911.6 Section 911.6 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.6 Persons and entities with access...

  10. 12 CFR 911.6 - Persons and entities with access to unpublished information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Persons and entities with access to unpublished information. 911.6 Section 911.6 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.6 Persons and entities with access...

  11. 12 CFR 911.6 - Persons and entities with access to unpublished information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Persons and entities with access to unpublished information. 911.6 Section 911.6 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.6 Persons and entities with access...

  12. 12 CFR 911.6 - Persons and entities with access to unpublished information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Persons and entities with access to unpublished information. 911.6 Section 911.6 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.6 Persons and entities with access...

  13. Exploring Information Literacy in Relationship: Intelligence and Personality as Factors

    ERIC Educational Resources Information Center

    Cooper, Timothy A.

    2012-01-01

    In the last three decades, the domain of Information Literacy (IL) has caught the attention of international college educators and information professionals. The explosion of information in education, government and business requires college students to have the skills necessary to enter an information-rich digital age. These skills include the…

  14. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON... and Protection Data Bank § 61.14 Confidentiality of Healthcare Integrity and Protection Data...

  15. 32 CFR 310.13 - Safeguarding personal information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .... (a) General responsibilities. DoD Components shall establish appropriate administrative, technical and physical safeguards to ensure that the records in each system of records are protected from unauthorized access, alteration, or disclosure and that their confidentiality is preserved and...

  16. Toward a genetically-informed model of borderline personality disorder.

    PubMed

    Livesley, John

    2008-02-01

    This article describes a conceptual framework for describing borderline personality disorder (BPD) based on empirical studies of the phenotypic structure and genetic architecture of personality. The proposed phenotype has 2 components: (1) a description of core self and interpersonal pathology-the defining features of personality disorder-as these features are expressed in the disorder; and (2) a set of traits based on the anxious-dependent or emotional dysregulation factor of the four-factor model of PD. Four kinds of traits are described: emotional (anxiousness, emotional reactivity, emotional intensity, and pessimistic-anhedonia), interpersonal (submissiveness, insecure attachment, social apprehensiveness, and need for approval), cognitive (cognitive dysregulation), and self-harm (behaviors and ideas). Formulation of the phenotype was guided by the conceptualization of personality as a system of interrelated sub-systems. The psychopathology associated with BPD involves most components of the system. The trait structure of the disorder is assumed to reflect the genetic architecture of personality and individual traits are assumed to be based on adaptive mechanisms. It is suggested that borderline traits are organized around the trait of anxiousness and that an important feature of BPD is dysregulation of the threat management system leading to pervasive fearfulness and unstable emotions. The interpersonal traits are assumed to be heritable characteristics that evolved to deal with interpersonal threats that arose as a result of social living. The potential for unstable and conflicted interpersonal relationships that is inherent to the disorder is assumed to result from the interplay between the adaptive structure of personality and psychosocial adversity. The etiology of the disorder is discussed in terms of biological and environmental factors associated with each component of the phenotype.

  17. 19 CFR 206.66 - Limited disclosure of certain confidential business information under administrative protective...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... business information under administrative protective order. 206.66 Section 206.66 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL... certain confidential business information under administrative protective order. In an investigation...

  18. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... Program administration. (a) Preparedness Directorate Program Management. The Secretary of...

  19. 78 FR 24208 - Agency Information Collection Activities; Proposed Collection; Comment Request; Protection of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-24

    ... HUMAN SERVICES Food and Drug Administration Agency Information Collection Activities; Proposed Collection; Comment Request; Protection of Human Subjects: Informed Consent; Institutional Review Boards... that provide protection for human subjects of clinical investigations conducted in support...

  20. 10 CFR 73.23 - Protection of Safeguards Information-Modified Handling: Specific requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... include non-public security-related requirements such as protective measures, interim compensatory measures, additional security measures, and the following, as applicable: (1) Physical protection. Information not classified as Restricted Data or National Security Information related to physical...

  1. Flame-retardant contamination of firefighter personal protective clothing - A potential health risk for firefighters.

    PubMed

    Alexander, Barbara M; Baxter, C Stuart

    2016-09-01

    There is a high incidence of cardiovascular disease and certain cancers in firefighters that may be related to their occupational exposure to hazardous substances. Exposure may result from contaminated personal protective gear, as well as from direct exposure at fire scenes. This study characterized flame-retardant contamination on firefighter personal protective clothing to assess exposure of firefighters to these chemicals. Samples from used and unused firefighter protective clothing, including gloves, hoods and a coat wristlet, were extracted with methylene chloride and analyzed by EPA method 8270D Specific Ion Method (SIM) for polybrominated diphenyl ethers (PBDEs). Until recently PBDEs were some of the most common flame-retardant chemicals used in the US. Fifteen of the seventeen PBDEs for which analysis was performed were found on at least one clothing swatch. Every clothing sample, including an unused hood and all three layers of an unused glove, held a detectable concentration of at least one PBDE. These findings, along with previous research, suggest that firefighters are exposed to PBDE flame retardants at levels much higher than the general public. PBDEs are found widely dispersed in the environment and still persist in existing domestic materials such as clothing and furnishings. Firefighter exposure to flame retardants therefore merits further study.

  2. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... judgment is made that access to such records could have an adverse effect on the mental or physical health..., the individual will be asked to provide the name of a personal health care provider, and the records will be provided to that health care provider, along with an explanation of why access without...

  3. Personality and Information Processing Speed: Independent Influences on Intelligent Performance

    ERIC Educational Resources Information Center

    Bates, Timothy C.; Rock, Andrew

    2004-01-01

    Raven's matrices and inspection time (IT) were recorded from 56 subjects under five arousal levels. Raven's and IT correlated strongly (r = -0.7) as predicted by processing-speed theories of "g." In line with Eysenck's [Eysenck, H. J. (1967). "The biological basis of personality". Springfield, IL: Thomas] arousal theory of extraversion, there was…

  4. Respecting, protecting, persons, humans, and conceptual muddles in the bioethics convention.

    PubMed

    Delkeskamp-Hayes, C

    2000-04-01

    The Convention on Human Rights and Biomedicine confuses respect for a person's right to self-determination with concern about protecting human beings generally. In a legal document, this mixture of deontological with utilitarian considerations undermines what it should preserve: respect for human dignity as the foundation of modern rights-based democracies. Falling prey to the ambiguity of freedom, the Convention blurs the dividing line between morality and the law. The document should be remedied through distinguishing fundamental rights from social 'rights', persons as entitled to the right to self-determination from born humans as entitled to the right to life and from members of the human species as entitled to the morally responsible care of voting majorities. For the cultivating of the required responsibility, the conditions for an adequate public debate should be secured.

  5. Historical development of legal protection for the rights of mentally ill persons in France.

    PubMed

    Thoret, Y; Kantin, S

    1994-12-01

    The authors trace the development of legal protection of the rights of mentally ill persons to the experiences of Gabriel-Honoré de Riqueti, the Count of Mirabeau, who was imprisoned without due process more than 200 years ago. Influenced by the ideas of the leaders of the American Revolution, he later became a representative to the French Republic's National Assembly and played a pivotal role in defining human rights, including the rights of mentally ill persons, in France. He advocated involvement of judicial authorities in any decision to confine a citizen, even in the case of mental disorder. French civil commitment legislation of 1838 established the authority of physicians and civil officials in commitment decisions, but limited judicial involvement to review after commitment. A new 1990 law limits judicial involvement to review after commitment, but extends the rights of hospitalized patients in many areas.

  6. 45 CFR 164.524 - Access of individuals to protected health information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...). (3) Other responsibility. If the covered entity does not maintain the protected health information... 45 Public Welfare 1 2012-10-01 2012-10-01 false Access of individuals to protected health... Health Information § 164.524 Access of individuals to protected health information. (a) Standard:...

  7. 45 CFR 164.524 - Access of individuals to protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...). (3) Other responsibility. If the covered entity does not maintain the protected health information... 45 Public Welfare 1 2010-10-01 2010-10-01 false Access of individuals to protected health... Health Information § 164.524 Access of individuals to protected health information. (a) Standard:...

  8. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Protected Critical Infrastructure Information... SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.4 Protected Critical Infrastructure Information... as a PCII Officer in order to carry out the responsibilities stated in paragraph (d) of this...

  9. Information security governance: a risk assessment approach to health information systems protection.

    PubMed

    Williams, Patricia A H

    2013-01-01

    It is no small task to manage the protection of healthcare data and healthcare information systems. In an environment that is demanding adaptation to change for all information collection, storage and retrieval systems, including those for of e-health and information systems, it is imperative that good information security governance is in place. This includes understanding and meeting legislative and regulatory requirements. This chapter provides three models to educate and guide organisations in this complex area, and to simplify the process of information security governance and ensure appropriate and effective measures are put in place. The approach is risk based, adapted and contextualized for healthcare. In addition, specific considerations of the impact of cloud services, secondary use of data, big data and mobile health are discussed.

  10. Personalized Recommendations Based on Users' Information-Centered Social Networks

    ERIC Educational Resources Information Center

    Lee, Danielle

    2013-01-01

    The overwhelming amount of information available today makes it difficult for users to find useful information and as the solution to this information glut problem, recommendation technologies emerged. Among the several streams of related research, one important evolution in technology is to generate recommendations based on users' own social…

  11. Money makes you reveal more: consequences of monetary cues on preferential disclosure of personal information.

    PubMed

    Mukherjee, Sumitava; Manjaly, Jaison A; Nargundkar, Maithilee

    2013-01-01

    With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure.

  12. Automatic detection of protected health information from clinic narratives.

    PubMed

    Yang, Hui; Garibaldi, Jonathan M

    2015-12-01

    This paper presents a natural language processing (NLP) system that was designed to participate in the 2014 i2b2 de-identification challenge. The challenge task aims to identify and classify seven main Protected Health Information (PHI) categories and 25 associated sub-categories. A hybrid model was proposed which combines machine learning techniques with keyword-based and rule-based approaches to deal with the complexity inherent in PHI categories. Our proposed approaches exploit a rich set of linguistic features, both syntactic and word surface-oriented, which are further enriched by task-specific features and regular expression template patterns to characterize the semantics of various PHI categories. Our system achieved promising accuracy on the challenge test data with an overall micro-averaged F-measure of 93.6%, which was the winner of this de-identification challenge.

  13. Search and seizure law; practical advice and interpretation for nuclear protective force persons

    SciTech Connect

    Cadwell, J.J.

    1983-07-06

    Recent Supreme Court decisions, which interpret the 200-year-old Fourth Amendment of the US Constitution, are used to provide a brief overview of some search and seizure subjects important to management and officers responsible for physical protection of nuclear facilities. The overview is framed in practical terms in order to make the comments applicable to the everyday activity of nuclear-protective-force persons. The Supreme Court has described several exceptions where searches and seizures (arrests) are permitted without a warrant, despite the Fourth Amendment which states that warrants are always required. The seven exceptions briefly discussed are search incidents to a lawful arrest, the automobile-search exception, the suitcase or container exception, the hot-pursuit or emergency exception, the stop-and-frisk exception, the plain-view exception, and consent to be searched.

  14. Factors Surgical Team Members Perceive Influence Choices of Wearing or Not Wearing Personal Protective Equipment during Operative/Invasive Procedures

    ERIC Educational Resources Information Center

    Cuming, Richard G.

    2009-01-01

    Exposure to certain bloodborne pathogens can prematurely end a person's life. Healthcare workers (HCWs), especially those who are members of surgical teams, are at increased risk of exposure to these pathogens. The proper use of personal protective equipment (PPE) during operative/invasive procedures reduces that risk. Despite this, some HCWs fail…

  15. The use of stereotypes and individuating information in political person perception.

    PubMed

    Crawford, Jarret T; Jussim, Lee; Madon, Stephanie; Cain, Thomas R; Stevens, Sean T

    2011-04-01

    This article introduces the political person perception model, which identifies conditions under which perceivers rely on stereotypes (party membership), individuating information (issue position), or both in political person perception. Three studies supported the model's predictions. Study 1 showed that perceivers gave primacy to target information that was narrowly relevant to a judgment, whether that information was stereotypic or individuating. Study 2 found that perceivers relied exclusively on individuating information when it was narrowly relevant to the judgment and relied on both stereotype and individuating information when individuating information was not narrowly relevant to the judgment but did imply a political ideology. Study 3 replicated these findings in a more ecologically valid context and showed that people relied on party information in the absence of narrowly relevant policy positions and when individuating information did not imply a political ideology. Implications for political person perception and theories of stereotyping are discussed.

  16. 77 FR 12875 - Proposed Information Collection; Native American Graves Protection and Repatriation Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-02

    ... remains and NAGPRA cultural items. $ Value of Information collections Annual Annual Avg. time/ Total... personal identifying information in your comment, you should be aware that your entire comment, including your personal identifying information, may be made publicly available at any time. While you can ask...

  17. Foraging Bumble Bees Weigh the Reliability of Personal and Social Information.

    PubMed

    Dunlap, Aimee S; Nielsen, Matthew E; Dornhaus, Anna; Papaj, Daniel R

    2016-05-09

    Many animals, including insects, make decisions using both personally gathered information and social information derived from the behavior of other, usually conspecific, individuals [1]. Moreover, animals adjust use of social versus personal information appropriately under a variety of experimental conditions [2-5]. An important factor in how information is used is the information's reliability, that is, how consistently the information is correlated with something of relevance in the environment [6]. The reliability of information determines which signals should be attended to during communication [6-9], which types of stimuli animals should learn about, and even whether learning should evolve [10, 11]. Here, we show that bumble bees (Bombus impatiens) account for the reliability of personally acquired information (which flower color was previously associated with reward) and social information (which flowers are chosen by other bees) in making foraging decisions; however, the two types of information are not treated equally. Bees prefer to use social information if it predicts a reward at all, but if social information becomes entirely unreliable, flower color will be used instead. This greater sensitivity to the reliability of social information, and avoidance of conspecifics in some cases, may reflect the specific ecological circumstances of bee foraging. Overall, the bees' ability to make decisions based on both personally acquired and socially derived information, and the relative reliability of both, demonstrates a new level of sophistication and flexibility in animal, particularly insect, decision-making.

  18. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Section 505.5 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL... the Federal Register; or (ii) The information was compiled in reasonable anticipation of a civil... supervision could be harmful to the individual. (2) Information that may be harmful to the record...

  19. 32 CFR 505.5 - Individual access to personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Section 505.5 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL... the Federal Register; or (ii) The information was compiled in reasonable anticipation of a civil... supervision could be harmful to the individual. (2) Information that may be harmful to the record...

  20. Measuring the "Information Market(s)": A Personal Experience.

    ERIC Educational Resources Information Center

    Schwuchow, Werner

    1995-01-01

    Investigates whether information services markets are measurable so that results are comparable between countries and over different periods of time. Topics include definitions of information services; statistical criteria for data collection; survey methodologies; guidelines for data analyses; and disseminating survey results. (LRW)

  1. Modern Methods of Real-Time Gamma Radiation Monitoring for General Personal Protection

    NASA Astrophysics Data System (ADS)

    Korostynska, O.; Arshak, K.; Arshak, A.; Vaseashta, Ashok

    Real-time radiation detectors become an essential part of emergency personnel who may have to respond to unknown accidents, incidents or terrorist attacks, which could involve radioactive material. More and more ordinary citizens are interested in personal radiation protection as well. Reasons include lost sources, nuclear industrial accidents, nuclear or radiological terrorism and the possibility of nuclear weapons being used in a war. People want to have the ability to measure it for themselves and they want to be notified when the radiation levels are increased. To meet this demand, considerable research into new sensors is underway, including efforts to enhance the sensor performance through both the material properties and manufacturing technologies. Deep understanding of physical properties of the materials under the influence of radiation exposure is vital for the effective design of dosimeter devices. Detection of radiation is based on the fact that both the electrical and the optical properties of the materials undergo changes upon the exposure to ionizing radiation. It is believed that radiation causes structural defects. The influence of radiation depends on both the dose and the parameters of the films including their thickness: the degradation is more severe for the higher dose and the thinner films. This paper presents overview of modern methods of real-time gamma radiation monitoring for personal protection of radiation workers and general public and suggests further developments in this area.

  2. Defining Requirements and Applying Information Modeling for Protecting Enterprise Assets

    NASA Astrophysics Data System (ADS)

    Fortier, Stephen C.; Volk, Jennifer H.

    The advent of terrorist threats has heightened local, regional, and national governments' interest in emergency response and disaster preparedness. The threat of natural disasters also challenges emergency responders to act swiftly and in a coordinated fashion. When a disaster occurs, an ad hoc coalition of pre-planned groups usually forms to respond to the incident. History has shown that these “system of systems” do not interoperate very well. Communications between fire, police and rescue components either do not work or are inefficient. Government agencies, non-governmental organizations (NGOs), and private industry use a wide array of software platforms for managing data about emergency conditions, resources and response activities. Most of these are stand-alone systems with very limited capability for data sharing with other agencies or other levels of government. Information technology advances have facilitated the movement towards an integrated and coordinated approach to emergency management. Other communication mechanisms, such as video teleconferencing, digital television and radio broadcasting, are being utilized to combat the challenges of emergency information exchange. Recent disasters, such as Hurricane Katrina and the tsunami in Indonesia, have illuminated the weaknesses in emergency response. This paper will discuss the need for defining requirements for components of ad hoc coalitions which are formed to respond to disasters. A goal of our effort was to develop a proof of concept that applying information modeling to the business processes used to protect and mitigate potential loss of an enterprise was feasible. These activities would be modeled both pre- and post-incident.

  3. 34 CFR 303.401 - Definitions of consent, native language, and personally identifiable information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Definitions of consent, native language, and personally... Definitions of consent, native language, and personally identifiable information. As used in this subpart— (a... which consent is sought, in the parent's native language or other mode of communication; (2) The...

  4. 34 CFR 303.401 - Definitions of consent, native language, and personally identifiable information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 34 Education 2 2011-07-01 2010-07-01 true Definitions of consent, native language, and personally... Definitions of consent, native language, and personally identifiable information. As used in this subpart— (a... which consent is sought, in the parent's native language or other mode of communication; (2) The...

  5. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as...

  6. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as...

  7. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as...

  8. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... § 1.6050B-1 Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as...

  9. 26 CFR 1.6050B-1 - Information returns by person making unemployment compensation payments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as defined in section...

  10. Exploring New Potentials of Blogs for Learning: Can Children Use Blogs for Personal Information Management (PIM)?

    ERIC Educational Resources Information Center

    Yeo, Hwan-Ik; Lee, Yekyung Lisa

    2014-01-01

    This study explores the use of blogs for personal information management (PIM) as a learning tool that could bring increased efficiency and academic self-efficacy for carrying out learning tasks. In order to identify the uses and effects of using blogs for PIM by children, a control group that used personal spaces within the class website and an…

  11. Personality-Informed Interventions for Healthy Aging: Conclusions from a National Institute on Aging Work Group

    ERIC Educational Resources Information Center

    Chapman, Benjamin P.; Hampson, Sarah; Clarkin, John

    2014-01-01

    We describe 2 frameworks in which personality dimensions relevant to health, such as Conscientiousness, can be used to inform interventions designed to promote health aging. First, contemporary data and theory do not suggest that personality is "immutable," but instead focus on questions of who changes, in what way, why, when, and how.…

  12. 77 FR 35709 - Notice of Submission of Proposed Information Collection to OMB; Personal Financial and Credit...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT Notice of Submission of Proposed Information Collection to OMB; Personal Financial and...: Personal Financial and Credit Statement. OMB Approval Number: 2502-0001. Form Numbers:...

  13. 32 CFR 327.6 - Collecting personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... records, or similar information. (c) Collecting social security numbers (SSNs). (1) It is unlawful for De... inclusion in a system of records, a Privacy Act Statement is required regardless of the medium used...

  14. The fear of other persons' laughter: Poor neuronal protection against social signals of anger and aggression.

    PubMed

    Papousek, Ilona; Schulter, Günter; Rominger, Christian; Fink, Andreas; Weiss, Elisabeth M

    2016-01-30

    The fear of other persons' laughter (gelotophobia) occurs in the context of several psychiatric conditions, particularly in the schizophrenia spectrum and social phobia. It entails severe personal and inter-personal problems including heightened aggression and possibly violence. Individuals with gelotophobia (n=30; 24 with social phobia or Cluster A diagnosis) and matched symptom-free controls (n=30) were drawn from a large screening sample (n=1440). EEG coherences were recorded during the confrontation with other people's affect expressions, to investigate the brain's modulatory control over the emotionally laden perceptual input. Gelotophobia was associated with more loose functional coupling of prefrontal and posterior cortex during the processing of expressions of anger and aggression, thus leaving the individual relatively unprotected from becoming affected by these social signals. The brain's response to social signals of anger/aggression and the accompanied heightened permeability for this kind of information explains the particular sensitivity to actual or supposed malicious aspects of laughter (and possibly of other ambiguous social signals) in individuals with gelotophobia, which represents the core feature of the condition. Heightened perception of stimuli that could be perceived as offensive, which is inherent in several psychiatric conditions, may be particularly evident in the fear of other persons' laughter.

  15. Interactional Features of Repair Negotiation in NS-NNS Interaction on Two Task Types: Information Gap and Personal Information Exchange

    ERIC Educational Resources Information Center

    Kitajima, Ryu

    2013-01-01

    The studies in task-based approaches in second language acquisition claim that controlled and goal convergent tasks such as information gap tasks surpass open-ended conversations such as personal information exchange tasks for the development of the learner's interlanguage, in that the formers promote more repair negotiation. And yet, few studies…

  16. "Doing Ethics" in the Context of Sharing Patients' Personal Health Information

    ERIC Educational Resources Information Center

    Somerville, Margaret A.

    2004-01-01

    There are at present two inconsistencies with respect to the sharing of personal health information (PHI) among health care professionals caring for a patient whom the information concerns. First, there is an inconsistency between what is in theory the ethics and law governing the confidentiality and privacy of this information--it may only be…

  17. 41 CFR 102-36.235 - What information do we provide when reporting excess personal property?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What information do we... Property Reporting Excess Personal Property § 102-36.235 What information do we provide when reporting... addition, provide the following information on your report of excess, when applicable: (1) Major...

  18. Dissemination of Information in Developing Countries: The Personal Computer and beyond

    ERIC Educational Resources Information Center

    Wong, Wai-Man

    2005-01-01

    With the blooming of information in digital format, dissemination of information is becoming a big challenge for developing countries. It is not only due to the limited provision of personal computers--in addition, the technological infrastructure and the ability to access information are also becoming major concerns in developing countries. This…

  19. Adults Living with Type 2 Diabetes: Kept Personal Health Information Items as Expressions of Need

    ERIC Educational Resources Information Center

    Whetstone, Melinda

    2013-01-01

    This study investigated personal information behavior and information needs that 21 adults managing life with Type 2 diabetes identify explicitly and implicitly during discussions of item acquisition and use of health information items that are kept in their homes. Research drew upon a naturalistic lens, in that semi-structured interviews were…

  20. Informal Learning in Professional and Personal Life: Implications for Instructional Design and Performance Improvement

    ERIC Educational Resources Information Center

    Klein, James D.; Moore, Alison L.

    2016-01-01

    This article focuses on informal learning and its implications for instructional design and performance improvement. The authors begin by sharing a story of how a novice instructional designer employs informal learning strategies in her professional and personal life. Next, they offer a definition of informal learning that encompasses both…

  1. Personal Web home pages of adolescents with cancer: self-presentation, information dissemination, and interpersonal connection.

    PubMed

    Suzuki, Lalita K; Beale, Ivan L

    2006-01-01

    The content of personal Web home pages created by adolescents with cancer is a new source of information about this population of potential benefit to oncology nurses and psychologists. Individual Internet elements found on 21 home pages created by youths with cancer (14-22 years old) were rated for cancer-related self-presentation, information dissemination, and interpersonal connection. Examples of adolescents' online narratives were also recorded. Adolescents with cancer used various Internet elements on their home pages for cancer-related self-presentation (eg, welcome messages, essays, personal history and diary pages, news articles, and poetry), information dissemination (e.g., through personal interest pages, multimedia presentations, lists, charts, and hyperlinks), and interpersonal connection (eg, guestbook entries). Results suggest that various elements found on personal home pages are being used by a limited number of young patients with cancer for self-expression, information access, and contact with peers.

  2. 76 FR 42676 - Information Collection; Federal Excess Personal Property (FEPP) Inventory

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-19

    ...In accordance with the Paperwork Reduction Act of 1995, the Forest Service is seeking comments from all interested individuals and organizations on the extension, with revision, of a currently approved information collection, Federal Excess Personal Property (FEPP)...

  3. Personality-Informed Interventions for Healthy Aging: Conclusions From a National Institute on Aging Workgroup

    PubMed Central

    Chapman, Benjamin P.; Hampson, Sarah; Clarkin, John

    2013-01-01

    We describe two frameworks in which personality dimensions relevant to health, such as Conscientiousness, can be used to inform interventions designed to promote health aging. First, contemporary data and theory do not suggest that personality is “immutable”, but instead focus on questions of who changes, in what way, why, when, and how. In fact, the notion that personality could be changed was part and parcel of many schools of psychotherapy, which suggested that long term and meaningful change in symptoms could not be achieved without change in relevant aspects of personality. We review intervention research documenting change in personality. Based on an integrative view of personality as a complex system, we describe a “bottom-up” model of change in which interventions to change basic personality processes eventuate in changes at the trait level. A second framework leverages the descriptive and predictive power of personality to tailor individual risk prediction and treatment, as well as refine public health programs, to the relevant dispositional characteristics of the target population. These methods dovetail with and add a systematic and rigorous psychosocial dimension to the personalized medicine and patient-centeredness movements in medicine. In addition to improving health through earlier intervention and increased fit between treatments and persons, cost-effectiveness improvements can be realized by more accurate resource allocation. Numerous examples from the personality, health, and aging literature on Conscientiousness and other traits are provided throughout, and we conclude with a series of recommendations for research in these emerging areas. PMID:23978300

  4. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2013-01-01 2013-01-01 false Protected Critical Infrastructure...

  5. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2014-01-01 2014-01-01 false Protected Critical Infrastructure...

  6. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Safeguarding of Protected Critical Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected...

  7. 30 CFR 280.70 - What data and information will be protected from public disclosure?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false What data and information will be protected from public disclosure? 280.70 Section 280.70 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT... CONTINENTAL SHELF Data Requirements Protections § 280.70 What data and information will be protected...

  8. 45 CFR 61.12 - Requesting information from the Healthcare Integrity and Protection Data Bank.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Integrity and Protection Data Bank. 61.12 Section 61.12 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION... Integrity and Protection Data Bank § 61.12 Requesting information from the Healthcare Integrity...

  9. Perceived parental protection and cortisol responses among young females with borderline personality disorder and controls.

    PubMed

    Lyons-Ruth, Karlen; Choi-Kain, Lois; Pechtel, Pia; Bertha, Eszter; Gunderson, John

    2011-10-30

    Borderline personality disorder (BPD) has been associated with deviations in cortisol in response to interpersonal stressors. Identifying mechanisms contributing to such deviations may help to address emotional dysregulation and the increased risk of self-destructive behavior. While dysfunctional relationships to caregivers have been widely reported among individuals with BPD, their contribution to cortisol hyperresponsiveness has yet to be investigated. Fifty-one females (aged 18-24years) participated to assess the impact of BPD and the quality of protective care in mother-daughter relationships on stress responsiveness. Seventeen females with BPD and twenty females without BPD participated with their mothers in a videotaped parent-young adult conflict discussion. Fourteen non-BPD females without their mothers were assessed for cortisol levels without stress exposure. Salivary cortisol samples were collected at lab entry and 20 and 40min after the onset of the discussion. Results revealed a higher overall cortisol response in the BPD group upon lab entry. BPD participants reported less experienced protection in the mother-daughter relationship which was associated with higher cortisol levels on lab entry and higher distress at study end. Results point to the perceived quality of parental protection as likely to modulate the activity of the stress response system among BPD patients.

  10. Development of personal pollen information-the next generation of pollen information and a step forward for hay fever sufferers.

    PubMed

    Kmenta, Maximilian; Bastl, Katharina; Jäger, Siegfried; Berger, Uwe

    2014-10-01

    Pollen allergies affect a large part of the European population and are considered likely to increase. User feedback indicates that there are difficulties in providing proper information and valid forecasts using traditional methods of aerobiology due to a variety of factors. Allergen content, pollen loads, and pollen allergy symptoms vary per region and year. The first steps in challenging such issues have already been undertaken. A personalized pollen-related symptom forecast is thought to be a possible answer. However, attempts made thus far have not led to an improvement in daily forecasting procedures. This study describes a model that was launched in 2013 in Austria to provide the first available personal pollen information. This system includes innovative forecast models using bi-hourly pollen data, traditional pollen forecasts based on historical data, meteorological data, and recent symptom data from the patient's hayfever diary. Furthermore, it calculates the personal symptom load in real time, in particular, the entries of the previous 5 days, to classify users. The personal pollen information was made available in Austria on the Austrian pollen information website and via a mobile pollen application, described herein for the first time. It is supposed that the inclusion of personal symptoms will lead to major improvements in pollen information concerning hay fever sufferers.

  11. Personality and the response to predation risk: effects of information quantity and quality.

    PubMed

    Brown, Grant E; Elvidge, Chris K; Ramnarine, Indar; Chivers, Douglas P; Ferrari, Maud C O

    2014-09-01

    Within aquatic ecosystems, chemosensory cues provide valuable public information regarding the form and degree of risk, allowing prey to make informed behavioural decisions. Such cues, however, may vary in both relative concentration detected (i.e. 'quantity') and reliability of the information available (i.e. 'quality'), leading to varying response patterns. Moreover, prey species are also known to exhibit consistent behavioural tactics towards managing risk (i.e. personality), possibly shaping their use of public information. Here, we present two experiments examining the potential interacting effects of personality and the quantity (Experiment 1) or quality (Experiment 2) of public information on the short-term predator avoidance responses of wild-caught Trinidadian guppies under semi-natural conditions. Our first experiment demonstrated that personality shaped responses to a high concentration of alarm cues (high risk), with shyer guppies exhibiting stronger antipredator responses than bolder guppies. When exposed to either low risk or stream water controls, personality had no effect on the intensity of response. Our second experiment demonstrated that personality again shaped the response to high concentrations of alarm cues (a known risk) but not to a novel chemosensory cue (tilapia odour). When exposed to the unknown novel cue, guppies exhibited a relatively high intensity antipredator response, regardless of personality. Combined, our results suggest that individual risk-taking tactics shape the use of public information in a context-dependent fashion.

  12. Personal Library Curation: An Ethnographic Study of Scholars' Information Practices

    ERIC Educational Resources Information Center

    Antonijevic, Smiljana; Cahoy, Ellysa Stern

    2014-01-01

    This paper presents findings of a Mellon Foundation-funded study conducted at Penn State University in University Park during Fall 2012 that explored scholars' information practices across disciplines encompassing the sciences, humanities, and social sciences. Drawing on results of the Web-based survey and ethnographic interviews, we present…

  13. 32 CFR 310.17 - Individual access to personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... mental or physical health of the individual or may result in harm to a third party, the following special... medical information may be harmful to the mental or physical health of the individual or to a third party... deny an individual access to a record or a copy of a record solely because the physical condition...

  14. Information Policy in the European Community: Balancing Protection and Competition.

    ERIC Educational Resources Information Center

    Sillince, J. A. A.

    1994-01-01

    Discusses European Community policy relating to information technology and the information industry. Topics addressed include the information services industry; transborder information flow, including electronic mail, data owner responsibility, and software piracy; digital data networks; electronic data interchange; telecommunications; information…

  15. TANK VAPOR CHEMICALS OF POTENTIAL CONCERN & EXISTING DIRECT READING INSTRUMENTION & PERSONAL PROTECTIVE EQUIPMENT CONSIDERATIONS

    SciTech Connect

    BUTLER, N.K.

    2004-11-01

    This document takes the newly released Industrial Hygiene Chemical Vapor Technical Basis (RPP-22491) and evaluates the chemicals of potential concern (COPC) identified for selected implementation actions by the industrial hygiene organization. This document is not intended as a hazard analysis with recommended controls for all tank farm activities. Not all of the chemicals listed are present in all tanks; therefore, hazard analyses can and should be tailored as appropriate. Detection of each chemical by current industrial hygiene non-specific instrumentation in use at the tank farms is evaluated. Information gaps are identified and recommendations are made to resolve these needs. Of the 52 COPC, 34 can be detected with existing instrumentation. Three additional chemicals could be detected with a photoionization detector (PID) equipped with a different lamp. Discussion with specific instrument manufacturers is warranted. Consideration should be given to having the SapphIRe XL customized for tank farm applications. Other instruments, sampling or modeling techniques should be evaluated to estimate concentrations of chemicals not detected by direct reading instruments. In addition, relative instrument response needs to be factored in to action levels used for direct reading instruments. These action levels should be correlated to exposures to the COPC and corresponding occupational exposure limits (OELs). The minimum respiratory protection for each of the COPC is evaluated against current options. Recommendations are made for respiratory protection based on each chemical. Until exposures are sufficiently quantified and analyzed, the current use of supplied air respiratory protection is appropriate and protective for the COPC. Use of supplied air respiratory protection should be evaluated once a detailed exposure assessment for the COPC is completed. The established tank farm OELs should be documented in the TFC-PLN-34. For chemicals without an established tank farm OEL

  16. Changes of oxidative/antioxidative parameters and DNA damage in firefighters wearing personal protective equipment during treadmill walking training.

    PubMed

    Park, Eunju; Lee, Yun-Jeong; Lee, Sun-Woo; Bang, Chang-Hoon; Lee, GyuChang; Lee, Jun-Kyoung; Kwan, Jung-Suk; Huh, Yu-Sub

    2016-11-01

    [Purpose] The purpose of this study was to investigate the influence of personal protective equipment on the oxidant/antioxidant parameters and DNA damage in firefighters during training and recovery. [Subjects and Methods] Twelve male nonsmoking volunteer firefighters (35.1 ± 7.2 years) underwent two maximal treadmill training (9 METs, 6 km/h), within 2 weeks, one in regular clothes and one in personal protective equipment weighing 22.1 kg. Blood samples were obtained before, right after, and 40 min after training. Plasma conjugated dienes, total radical trapping antioxidant potential, erythrocytes antioxidant enzymes activities, and leukocyte DNA damage were measured. [Results] Wearing personal protective equipment during treadmill walking training resulted in increases of plasma conjugated dienes, total radical trapping antioxidant potential, and leukocyte DNA resistance to oxidative stress, which were recovered after in 40 min of rest. Erythrocyte antioxidant enzymes activities remained unchanged during the training either with regular clothes or personal protective equipment. [Conclusion] These results suggest that wearing personal protective equipment during firefighting work could induce oxidative stress, which was enough to produce DNA damage in leukocytes.

  17. Changes of oxidative/antioxidative parameters and DNA damage in firefighters wearing personal protective equipment during treadmill walking training

    PubMed Central

    Park, Eunju; Lee, Yun-Jeong; Lee, Sun-Woo; Bang, Chang-Hoon; Lee, GyuChang; Lee, Jun-Kyoung; Kwan, Jung-Suk; Huh, Yu-Sub

    2016-01-01

    [Purpose] The purpose of this study was to investigate the influence of personal protective equipment on the oxidant/antioxidant parameters and DNA damage in firefighters during training and recovery. [Subjects and Methods] Twelve male nonsmoking volunteer firefighters (35.1 ± 7.2 years) underwent two maximal treadmill training (9 METs, 6 km/h), within 2 weeks, one in regular clothes and one in personal protective equipment weighing 22.1 kg. Blood samples were obtained before, right after, and 40 min after training. Plasma conjugated dienes, total radical trapping antioxidant potential, erythrocytes antioxidant enzymes activities, and leukocyte DNA damage were measured. [Results] Wearing personal protective equipment during treadmill walking training resulted in increases of plasma conjugated dienes, total radical trapping antioxidant potential, and leukocyte DNA resistance to oxidative stress, which were recovered after in 40 min of rest. Erythrocyte antioxidant enzymes activities remained unchanged during the training either with regular clothes or personal protective equipment. [Conclusion] These results suggest that wearing personal protective equipment during firefighting work could induce oxidative stress, which was enough to produce DNA damage in leukocytes. PMID:27942144

  18. 78 FR 16539 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Personal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-15

    ... equipment (PPE) for the eyes, face, head, extremities, torso, and respiratory system whenever workers are... shields, protective barriers, life-saving equipment, personal fall arrest systems, and positioning device systems that meet the applicable provisions of the subpart. This ICR covers hazard assessment...

  19. Personal protective equipment, hygiene behaviours and occupational risk of illness after July 2011 flood in Copenhagen, Denmark.

    PubMed

    Wójcik, O P; Holt, J; Kjerulf, A; Müller, L; Ethelberg, S; Mølbak, K

    2013-08-01

    Incidence of various diseases can increase following a flood. We aimed to identify professionals in Copenhagen who became ill after contact with 2 July 2011 floodwater/sediment and determine risks and protective factors associated with illness. We conducted a cohort study of employees engaged in post-flood management activities. Participants completed a questionnaire collecting information about demographics, floodwater/sediment exposure, compliance with standard precautions, and symptoms of illness. Overall, 257 professionals participated, with 56 (22%) cases. Risk of illness was associated with not washing hands after floodwater/sediment contact [relative risk (RR) 2∙45], exposure to floodwater at work and home (RR 2∙35), smoking (RR 1∙92), direct contact with floodwater (RR 1∙86), and eating/drinking when in contact with floodwater (RR 1∙77). Professionals need to follow standard precautions when in contact with floodwater/sediment, especially proper hand hygiene after personal protective equipment use and before eating/drinking and smoking.

  20. Informed consent in experimentation involving mentally impaired persons: ethical issues.

    PubMed

    Petrini, Carlo

    2010-01-01

    The problem of experimentation involving subjects whose mental condition prevents them from understanding information and providing proper informed consent has been addressed in various codes, declarations, conventions, treaties and regulations adopted by national, international and supranational institutions and authorities. This article summarizes the basic ethical criteria these documents provide and stresses the historical development from the nearly total exclusion of incapacitated subjects, established in the mid-twentieth century, to their contemporary inclusion in clinical trials on certain ethical conditions. The problem of proxy consent by legal representatives for participation in clinical trials is addressed particularly in reference to current Italian regulations. Exceptions to human experimentation requirements in emergency situations are also briefly discussed.

  1. Defending the doomed: implicit strategies concerning protection of first-person shooter games.

    PubMed

    Kneer, Julia; Munko, Daniel; Glock, Sabine; Bente, Gary

    2012-05-01

    Censorship of violent digital games, especially first-person shooter (FPS) games, is broadly discussed between generations. While older people are concerned about possible negative influences of these games, not only players but also nonplayers of the younger net-generation seem to deny any association with real aggressive behavior. Our study aimed at investigating defense mechanisms players and nonplayers use to defend FPS and peers with playing habits. By using a lexical decision task, we found that aggressive concepts are activated by priming the content of FPS but suppressed afterward. Only if participants were instructed to actively suppress aggressive concepts after priming, thought suppression was no longer necessary. Young people still do have negative associations with violent video games. These associations are neglected by implicitly applying defense strategies--independent of own playing habits--to protect this specific hobby, which is common for the net-generation.

  2. Persuasion to use personal protective equipment in constructing subway stations: application of social marketing.

    PubMed

    Shamsi, Mahmoud; Pariani, Abbas; Shams, Mohsen; Soleymani-nejad, Marzieh

    2016-04-01

    To study the effects of an intervention based on social marketing to persuade workers to use personal protective equipment (PPE) in constructing subway stations in Isfahan, Iran. This was a quasi-experimental study. Two stations were selected as intervention and control groups. Intervention was designed based on results of a formative research. A free package containing a safety helmet with a tailored message affixed to it, mask and gloves and an educational pamphlet was delivered to the intervention group. After 6 weeks, behaviours in the intervention and control stations were measured using an observational checklist. After the intervention, the percentage of workers who used PPE at the intervention station increased significantly. OR for helmet and mask usage was 7.009 and 2.235, respectively, in the intervention group. Social marketing can be used to persuade workers to use PPE in the workplace.

  3. Defending the Doomed: Implicit Strategies Concerning Protection of First-Person Shooter Games

    PubMed Central

    Munko, Daniel; Glock, Sabine; Bente, Gary

    2012-01-01

    Abstract Censorship of violent digital games, especially first-person shooter (FPS) games, is broadly discussed between generations. While older people are concerned about possible negative influences of these games, not only players but also nonplayers of the younger net-generation seem to deny any association with real aggressive behavior. Our study aimed at investigating defense mechanisms players and nonplayers use to defend FPS and peers with playing habits. By using a lexical decision task, we found that aggressive concepts are activated by priming the content of FPS but suppressed afterward. Only if participants were instructed to actively suppress aggressive concepts after priming, thought suppression was no longer necessary. Young people still do have negative associations with violent video games. These associations are neglected by implicitly applying defense strategies—independent of own playing habits—to protect this specific hobby, which is common for the net-generation. PMID:22515170

  4. Application of Spacesuit Glove Requirements Tools to Athletic and Personal Protective Equipment

    NASA Technical Reports Server (NTRS)

    England, Scott; Benson, Elizabeth; Melsoh, Miranda; Thompson, Shelby; Rajulu, Sudhakar

    2010-01-01

    Despite decades of ongoing improvement, astronauts must still struggle with inhibited dexterity and accelerated fatigue due to the requirement of wearing a pressurized Extra-Vehicular Activity (EVA) glove. Recent research in the Anthropometry and Biomechanics Facility at NASA's Johnson Space Center has focused on developing requirements for improvements in the design of the next generation of EVA glove. In the course of this research, it was decided to expand the scope of the testing to include a variety of commercially available athletic and consumer gloves to help provide a more recognizable comparison for investigators and designers to evaluate the current state of EVA glove mobility and strength. This comparison is being provided with the hope that innovative methods may help commercial development of gloves for various athletic and personal protective endeavors.

  5. Perceived patient control over personal health information in the presence of context-specific concerns

    NASA Astrophysics Data System (ADS)

    Nanayakkara, Prabhashi A.

    Information privacy issues have plagued the world of electronic media since its inception. This research focused mainly on factors that increase or decrease perceived patient control over personal health information (CTL) in the presence of context-specific concerns. Control agency theory was used for the paper's theoretical contributions. Personal and proxy control agencies acted as the independent variables, and context-specific concerns for information privacy (CFIP) were used as the moderator between proxy control agency, healthcare provider, and CTL. Demographic data and three control variables-- the desire for information control, privacy experience, and trust propensity--were also included in the model to gauge the contribution to CTL from external factors. Only personal control agency and desire for information control were found to impact CTL.

  6. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.

    PubMed

    Namoğlu, Nihan; Ulgen, Yekta

    2013-01-01

    Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects.

  7. Genomic research and data-mining technology: implications for personal privacy and informed consent.

    PubMed

    Tavani, Herman T

    2004-01-01

    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social implications (ELSI) program requirements that were established to guide researchers working on the Human Genome Project (HGP). Next I consider a case illustration involving deCODE Genetics, a privately owned genetic company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The deCODE case also illustrates some ways in which an ICT technique known as data mining has both aided and posed special challenges for researchers working in the field of population genomics. On the one hand, data-mining tools have greatly assisted researchers in mapping the human genome and in identifying certain "disease genes" common in specific populations (which, in turn, has accelerated the process of finding cures for diseases tha affect those populations). On the other hand, this technology has significantly threatened the privacy of research subjects participating in population genomics studies, who may, unwittingly, contribute to the construction of new groups (based on arbitrary and non-obvious patterns and statistical correlations) that put those subjects at risk for discrimination and stigmatization. In the final section of this paper I examine some ways in which the use of data mining in the context of population genomics research poses a critical challenge for the principle of informed consent, which traditionally has played a central role in protecting the privacy interests of research subjects participating in epidemiological studies.

  8. Personal Protective Equipment Use and Handwashing Among Animal Farmers: A Multi-site Assessment.

    PubMed

    Odo, Nnaemeka U; Raynor, Peter C; Beaudoin, Amanda; Somrongthong, Ratana; Scheftel, Joni M; Donahue, James G; Bender, Jeffrey B

    2015-01-01

    The goal of this study was to compare and contrast the use of personal protective equipment (PPE) and the practice of handwashing among participants of four studies assessing poultry and swine farms in the midwestern United States and in Thailand. This largely descriptive exercise was designed to assess and compare the frequency of these protective practices among the study populations. There were a total of 1113 surveys analyzed across the four studies. The respondents included workers in direct contact with animals as well as flock owners and veterinarians tending to farms. Handwashing was the most common practice observed among all participants with 42% "always" and 35% "sometimes" washing their hands after contact with the animals. This practice was least common among Minnesota swine workers. Even Thai poultry farmers, who demonstrated the lowest overall PPE use, reported a higher frequency of handwashing. Mask use during animal farming activities ("always" or "sometimes") was least commonly practiced, ranging from 1% in Thailand to 26% among backyard poultry farmers in Minnesota. Minnesota poultry and swine farmers had similar frequencies of mask (26%) and glove use (51% and 49%). All other comparisons differed significantly across the four sites (p-values <0.05). The use of PPE in animal farming differed by study location and is likely related to prevalent norms in the respective regions. Overall, the use of PPE did not appear to be influenced by the particular animal (poultry or swine) being farmed. These findings may prove useful to regulating bodies and farm owners in formulating policy or planning strategies for improving personal hygiene practices in animal farming and preparing for influenza and other potential zoonotic disease outbreaks.

  9. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted... CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.25 Protection of National Security Information and Restricted Data in storage. (a) Secret matter,...

  10. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted... CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.25 Protection of National Security Information and Restricted Data in storage. (a) Secret matter,...

  11. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted... CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.25 Protection of National Security Information and Restricted Data in storage. (a) Secret matter,...

  12. Preparing the United States for Zika Virus: Pre-emptive Vector Control and Personal Protection.

    PubMed

    Diaz, James H

    2016-12-01

    Discovered in 1947 in a monkey in the Zika forest of Uganda, Zika virus was dismissed as a cause of a mild illness that was confined to Africa and Southeast Asia and transmitted by Aedes mosquitoes. In 2007, Zika virus appeared outside of its endemic borders in an outbreak on the South Pacific Island of Yap. In 2013, Zika virus was associated with a major neurological complication, Guillain-Barré syndrome, in a larger outbreak in the French Polynesian Islands. From the South Pacific, Zika invaded Brazil in 2015 and caused another severe neurological complication, fetal microcephaly. The mosquito-borne transmission of Zika virus can be propagated by sexual transmission and, possibly, by blood transfusions, close personal contacts, and organ transplants, like other flaviviruses. Since these combined mechanisms of infectious disease transmission could result in catastrophic incidences of severe neurological diseases in adults and children, the public should know what to expect from Zika virus, how to prevent infection, and what the most likely failures in preventive measures will be. With federal research funding stalled, a Zika vaccine is far away. The only national strategies to prepare the United States for Zika virus invasion now are effective vector control measures and personal protection from mosquito bites. In addition to a basic knowledge of Aedes mosquito vectors and their biting behaviors, an understanding of simple household vector control measures, and the selection of the best chemical and physical mosquito repellents will be required to repel the Zika threat.

  13. Developmental protective and risk factors in borderline personality disorder: a study using the Adult Attachment Interview.

    PubMed

    Barone, Lavinia

    2003-03-01

    Mental representations and attachment in a sample of adults with Borderline Personality Disorder were assessed using the George, Kaplan and Main (1985) Adult Attachment Interview (AAI). Eighty subjects participated in the study: 40 nonclinical and 40 with Borderline Personality Disorder (BPD). The results obtained showed a specific distribution of attachment patterns in the clinical sample: free/autonomous subjects (F) represented only 7%, dismissing classifications (Ds) reached about 20%, entangled/preoccupied (E) 23% and unresolved with traumatic experiences (U) 50%. The two samples differed in their attachment patterns distribution by two (secure vs. insecure status), three (F, Ds and E) and four-way (F, Ds, E and U) categories comparisons. In order to identify more specific protective or risk factors of BPD, 25 one-way ANOVAs with clinical status as variable (clinical vs. nonclinical) were conducted on each scale of the coding system of the interview. Results support the hypothesis that some developmental relational experiences seem to constitute pivotal risk factors underlying this disorder. Results demonstrated potential benefits in using AAI scales in addition to the traditional categories. Implications for research and treatment are discussed.

  14. 17 CFR 201.322 - Evidence: Confidential information, protective orders.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... EXCHANGE COMMISSION RULES OF PRACTICE Rules of Practice Rules Regarding Hearings § 201.322 Evidence... introduced as evidence, or any witness who testifies at a hearing may file a motion requesting a protective... hearing are presumed to be public. A motion for a protective order shall be granted only upon a...

  15. 31 CFR 501.733 - Evidence: confidential information, protective orders.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... introduced as evidence; or any witness who testifies at a hearing may file a motion requesting a protective... introduced in a public hearing are presumed to be public. A motion for a protective order shall be granted... documents shall be maintained under seal and shall be disclosed only in accordance with orders of...

  16. The risk of incomplete personal protection coverage in vector-borne disease

    PubMed Central

    Miller, Ezer; Dushoff, Jonathan; Huppert, Amit

    2016-01-01

    Personal protection (PP) techniques, such as insecticide-treated nets, repellents and medications, include some of the most important and commonest ways used today to protect individuals from vector-borne infectious diseases. In this study, we explore the possibility that a PP intervention with partial coverage may have the counterintuitive effect of increasing disease burden at the population level, by increasing the biting intensity on the unprotected portion of the population. To this end, we have developed a dynamic model which incorporates parameters that describe the potential effects of PP on vector searching and biting behaviour and calculated its basic reproductive rate, R0. R0 is a well-established threshold of disease risk; the higher R0 is above unity, the stronger the disease onset intensity. When R0 is below unity, the disease is typically unable to persist. The model analysis revealed that partial coverage with popular PP techniques can realistically lead to a substantial increase in the reproductive number. An increase in R0 implies an increase in disease burden and difficulties in eradication efforts within certain parameter regimes. Our findings therefore stress the importance of studying vector behavioural patterns in response to PP interventions for future mitigation of vector-borne diseases. PMID:26911486

  17. Effect of base layer materials on physiological and perceptual responses to exercise in personal protective equipment.

    PubMed

    Smith, Denise L; Arena, Logan; DeBlois, Jacob P; Haller, Jeannie M; Hultquist, Eric M; Lefferts, Wesley K; Russell, Tim; Wu, Annie; Fehling, Patricia C

    2014-05-01

    Ten men (non-firefighters) completed a 110 min walking/recovery protocol (three 20-min exercise bouts, with recovery periods of 10, 20, and 20 min following successive bouts) in a thermoneutral laboratory while wearing firefighting personal protective equipment over one of four base layers: cotton, modacrylic, wool, and phase change material. There were no significant differences in changes in heart rate, core temperature, rating of perceived exertion, thermal discomfort, and thermal strain among base layers. Sticking to skin, coolness/hotness, and clothing humidity sensation were more favorable (p < 0.05) for wool compared with cotton; no significant differences were identified for the other 7 clothing sensations assessed. Separate materials performance testing of the individual base layers and firefighting ensembles (base layer + turnout gear) indicated differences in thermal protective performance and total heat loss among the base layers and among ensembles; however, differences in heat dissipation did not correspond with physiological responses during exercise or recovery.

  18. [Personal protective equipment: directions for the application of Legislative Decree 81/08 in surveillance].

    PubMed

    Messineo, A; Sanna, S; Imperatore, A; Villarini, S; Leone, M

    2010-01-01

    The laws on workplace safety and in particular the DLgs. 81/08, contemplate an organisation which firstly promotes collective protection measures and elimination of any type of risk. The use of Personal Protective Equipment (PPE) is therefore always secondary to the correct implementation of all possible technical and organisational procedures. DLgs 81/08 establishes that PPE must be in accordance with DLgs 475/92, with DM 02.05.01 and UNI rules. Regulation 453/2010 (REACH), requires the contents of the safety data of dangerous substances. Given this complexity, the evaluation of the correct adoption and use of PPE is particularly challenging. In order to assist controlling activities, a document has been written containing the main guidelines. A first draft of the document was approved by the Committee of Directors of the SPRESAL of the "Regione Lazio" in 2008. The evolution of regulations and the need to make further improvements have made it necessary to draw up a new version to improve supervision in the workplace.

  19. 45 CFR 164.526 - Amendment of protected health information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164... otherwise providing a link to the location of the amendment. (2) Informing the individual. In...

  20. Personal Digital Information Archiving among Students of Social Sciences and Humanities

    ERIC Educational Resources Information Center

    Krtalic, Maja; Marcetic, Hana; Micunovic, Milijana

    2016-01-01

    Introduction: As both academic citizens and active participants in information society who use information, students produce huge amounts of personal digital data and documents. It is therefore important to raise questions about their awareness, responsibility, tendencies and activities they undertake to preserve their collective digital heritage.…

  1. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for information concerning other persons. 1900.32 Section 1900.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  2. 38 CFR 74.25 - What types of personally identifiable information will VA collect?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... identifiable information will VA collect? 74.25 Section 74.25 Pensions, Bonuses, and Veterans' Relief... What types of personally identifiable information will VA collect? In order to establish owner eligibility, the Department will collect individual names and Social Security numbers for veterans,...

  3. Information Needs of Family Caregivers of Persons with Cognitive versus Physical Deficits

    ERIC Educational Resources Information Center

    Koenig, Kelly N.; Steiner, Victoria; Pierce, Linda L.

    2011-01-01

    This study compared information needs of caregivers of persons with dementia with caregivers of those who received rehabilitation treatment. Caregivers were provided a 48-item survey and asked to choose their top ten information needs. Dementia caregivers' (n = 33) top needs were dealing with forgetfulness/confusion (91%) and repeating…

  4. 41 CFR 102-36.235 - What information do we provide when reporting excess personal property?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What information do we... Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT... Property Reporting Excess Personal Property § 102-36.235 What information do we provide when...

  5. 41 CFR 102-36.235 - What information do we provide when reporting excess personal property?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What information do we... Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT... Property Reporting Excess Personal Property § 102-36.235 What information do we provide when...

  6. 32 CFR 1800.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for information concerning other persons. 1800.32 Section 1800.32 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC ACCESS TO NACIC RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  7. 32 CFR 1800.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Procedures for information concerning other persons. 1800.32 Section 1800.32 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC ACCESS TO NACIC RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  8. 32 CFR 1800.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Procedures for information concerning other persons. 1800.32 Section 1800.32 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC ACCESS TO NACIC RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  9. 32 CFR 1800.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Procedures for information concerning other persons. 1800.32 Section 1800.32 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC ACCESS TO NACIC RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  10. 32 CFR 1800.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Procedures for information concerning other persons. 1800.32 Section 1800.32 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC ACCESS TO NACIC RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  11. Social Networking Privacy Control: Exploring University Variables Related to Young Adults' Sharing of Personally Identifiable Information

    ERIC Educational Resources Information Center

    Zimmerman, Melisa S.

    2014-01-01

    The growth of the Internet, and specifically social networking sites (SNSs) like Facebook, create opportunities for individuals to share private and identifiable information with a closed or open community. Internet crime has been on the rise and research has shown that criminals are using individuals' personal information pulled from social…

  12. Stereotype-Based versus Personal-Based Filtering Rules in Information Filtering Systems.

    ERIC Educational Resources Information Center

    Kuflik, Tsvi; Shapira, Bracha; Shoval, Peretz

    2003-01-01

    Discusses rule-based information filtering systems and user profiles that express the user's information filtering policy. Compares the effectiveness of two alternative rule-based filtering methods: stereotype-based rules, where users are assigned to a group of similar users; and personal-based rules, where each user has his/her own personal…

  13. Design Considerations for Today's Online Learners: A Study of Personalized, Relationship-Based Social Awareness Information

    ERIC Educational Resources Information Center

    Heo, Misook

    2009-01-01

    This article examined online learners' preferences in personalized, relationship-based social awareness information sharing in course management systems. Three hundred seventy-seven online learners' willingness to share social awareness information was measured through a national survey. Results indicated that today's online learners are open…

  14. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Procedures for information concerning other persons. 1900.32 Section 1900.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  15. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Procedures for information concerning other persons. 1900.32 Section 1900.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  16. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Procedures for information concerning other persons. 1900.32 Section 1900.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  17. 32 CFR 1900.32 - Procedures for information concerning other persons.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Procedures for information concerning other persons. 1900.32 Section 1900.32 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA)...

  18. Personality Traits and Group-Based Information Behaviour: An Exploratory Study

    ERIC Educational Resources Information Center

    Hyldegard, Jette

    2009-01-01

    Introduction: The relationship between hypothesised behaviour resulting from a personality test and actual information behaviour resulting from a group-based assignment process is addressed in this paper. Methods: Three voluntary groups of ten librarianship and information science students were followed during a project assignment. The long…

  19. 29 CFR 2400.4 - Collection and disclosure of personal information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) To a person pursuant to a requirement of the Freedom of Information Act (5 U.S.C. 552); (ii) To those...'s rights, benefits or privileges under Federal programs; and (iv) Inform any individual requested to... maintained which describes how any individual exercises rights guaranteed by the First Amendment unless...

  20. Real-life experience with personally familiar faces enhances discrimination based on global information

    PubMed Central

    Van Belle, Goedele

    2016-01-01

    Despite the agreement that experience with faces leads to more efficient processing, the underlying mechanisms remain largely unknown. Building on empirical evidence from unfamiliar face processing in healthy populations and neuropsychological patients, the present experiment tested the hypothesis that personal familiarity is associated with superior discrimination when identity information is derived based on global, as opposed to local facial information. Diagnosticity and availability of local and global information was manipulated through varied physical similarity and spatial resolution of morph faces created from personally familiar or unfamiliar faces. We found that discrimination of subtle changes between highly similar morph faces was unaffected by familiarity. Contrariwise, relatively more pronounced physical (i.e., identity) differences were more efficiently discriminated for personally familiar faces, indicating more efficient processing of global, as opposed to local facial information through real-life experience. PMID:26855852

  1. Comparison groups on bills: Automated, personalized energy information

    SciTech Connect

    Iyer, Maithili; Kempton, Willett; Payne, Christopher

    2006-07-01

    A program called ``Innovative Billing?? has been developed to provide individualized energy information for a mass audience?the entireresidential customer base of an electric or gas utility. Customers receive a graph on the bill that compares that customer?s consumption with othersimilar customers for the same month. The program aims to stimulate customers to make ef?ciency improvements. To group as many as severalmillion customers into small ``comparison groups??, an automated method must be developed drawing solely from the data available to the utility.This paper develops and applies methods to compare the quality of resulting comparison groups.A data base of 114,000 customers from a utility billing system was used to evaluate Innovative Billing comparison groups, comparing fouralternative criteria: house characteristics (?oor area, housing type, and heating fuel); street; meter read route; billing cycle. Also, customers wereinterviewed to see what forms of comparison graphs made most sense and led to fewest errors of interpretation. We ?nd that good qualitycomparison groups result from using street name, meter book, or multiple house characteristics. Other criteria we tested, such as entire cycle, entiremeter book, or single house characteristics such as ?oor area, resulted in poor quality comparison groups. This analysis provides a basis forchoosing comparison groups based on extensive user testing and statistical analysis. The result is a practical set of guidelines that can be used toimplement realistic, inexpensive innovative billing for the entire customer base of an electric or gas utility.

  2. Towards a personalized environmental health information service using low-cost sensors and crowdsourcing

    NASA Astrophysics Data System (ADS)

    Castell, Nuria; Liu, Hai-Ying; Schneider, Philipp; Cole-Hunter, Tom; Lahoz, William; Bartonova, Alena

    2015-04-01

    Most European cities exceed the air quality guidelines established by the WHO to protect human health. As such, citizens are exposed to potentially harmful pollutant levels. Some cities have services (e.g., web pages, mobile apps, etc.) which provide timely air quality information to the public. However, air quality data at individual level is currently scarce or non-existent. Making this information directly useful to individuals poses a challenge. For instance, if a user is informed that the air quality is "poor", what does that mean for him/her, and how can this information be acted upon? Despite individuals having a unique relationship with their environment, the information on the state of atmospheric components and related hazards is currently mostly generic, and seldom personally relevant. This undermines citizens' interest in their environment, and consequently limits their ability to recognize and change both their contribution and their exposure to air pollution. In Oslo, two EU founded projects, CITI-SENSE (Engelken-Jorge et al., 2014) and Citi-Sense-MOB (Castell et al., 2014), are trying to establish a dialogue with citizens by providing them with the possibility of getting personalized air quality information on their smartphones. The users are able to check the air quality in their immediate surroundings and track their individual exposure while moving through the urban environment (Castell et al., 2014). In this way, they may be able to reduce their exposure such as by changing transport modes or routes, for example by selecting less polluted streets to walk or cycle through. Using a smartphone application, citizens are engaged in collecting and sharing environmental data generated by low-cost air quality sensors, and in reporting their individual perception (turning citizens into sensors themselves). The highly spatially resolved data on air quality and perception is geo-located. This allows for simultaneous visualization of both kinds of the sensor

  3. Privacy Protection Standards for the Information Sharing Environment

    DTIC Science & Technology

    2009-09-01

    recognizing the immense growth of electronic data processing, in 1981 the Council of Europe promulgated the Convention for the Protection of...Processing Convention, 1981 , Articles 1-8). State parties are allowed to derogate from the Convention for “protecting State security, public safety, the...monetary interests of the State or the suppression of criminal offences” (Bignami, 2007; Data Processing Convention, 1981 , Article 9). Parties to

  4. Personalization.

    ERIC Educational Resources Information Center

    Shore, Rebecca Martin

    1996-01-01

    Describes how a typical high school in Huntington Beach, California, curbed disruptive student behavior by personalizing the school experience for "problem" students. Through mostly volunteer efforts, an adopt-a-kid program was initiated that matched kids' learning styles to adults' personality styles and resulted in fewer suspensions…

  5. Informing cancer patient based on his type of personality: the arrogant (narcissistic) patient.

    PubMed

    Kallergis, G

    2012-01-01

    The task of informing the cancer patient is considered an arduous one as it typically involves breaking bad news to the patient. It appears that the adoption of an empathic approach is vital within a therapeutic relationship. This applies to every character or personality type, perhaps more so to the arrogant patient with a feeling of superiority. The question "Is it possible to determine who should be told what, when and how" basically implies the adoption of an empathic approach and the tailoring of information to each cancer patient. The use of character traits contributes to managing the physically ill patient in the best possible way. Therefore, follows the question: in what way does a character or personality type affect cancer patient informing? The aim of this article was to describe the arrogant (narcissistic) character or type of personality in an analytic way so that any therapist can make a diagnosis and tailor the information strategy to the patient's needs. As method of research was used the qualitative method research through groups with doctors and nurses, while research within groups lasted for 5 years. The degree of informing the arrogant personality in the range "minimal - small - medium - large - very large" is: The degree of denial varies between "large" and "very large" while the degree of informing varies between "medium" and "small". Informing the family: The patient objects to a common approach with the family as he is concerned about inflicting a blow to his image.

  6. 30 CFR 206.365 - Does MMS protect information I provide?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... MANAGEMENT PRODUCT VALUATION Geothermal Resources § 206.365 Does MMS protect information I provide? Certain information you submit to MMS regarding royalties or fees on geothermal resources or byproducts,...

  7. 24 CFR 81.76 - FOIA requests and protection of GSE information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... (FANNIE MAE) AND THE FEDERAL HOME LOAN MORTGAGE CORPORATION (FREDDIE MAC) Access to Information § 81.76...)), to protect data and information that would constitute a clearly unwarranted invasion of...

  8. The inadvertent disclosure of personal health information through peer-to-peer file sharing programs

    PubMed Central

    Neri, Emilio; Jonker, Elizabeth; Sokolova, Marina; Peyton, Liam; Neisa, Angelica; Scassa, Teresa

    2010-01-01

    Objective There has been a consistent concern about the inadvertent disclosure of personal information through peer-to-peer file sharing applications, such as Limewire and Morpheus. Examples of personal health and financial information being exposed have been published. We wanted to estimate the extent to which personal health information (PHI) is being disclosed in this way, and compare that to the extent of disclosure of personal financial information (PFI). Design After careful review and approval of our protocol by our institutional research ethics board, files were downloaded from peer-to-peer file sharing networks and manually analyzed for the presence of PHI and PFI. The geographic region of the IP addresses was determined, and classified as either USA or Canada. Measurement We estimated the proportion of files that contain personal health and financial information for each region. We also estimated the proportion of search terms that return files with personal health and financial information. We ascertained and discuss the ethical issues related to this study. Results Approximately 0.4% of Canadian IP addresses had PHI, as did 0.5% of US IP addresses. There was more disclosure of financial information, at 1.7% of Canadian IP addresses and 4.7% of US IP addresses. An analysis of search terms used in these file sharing networks showed that a small percentage of the terms would return PHI and PFI files (ie, there are people successfully searching for PFI and PHI on the peer-to-peer file sharing networks). Conclusion There is a real risk of inadvertent disclosure of PHI through peer-to-peer file sharing networks, although the risk is not as large as for PFI. Anyone keeping PHI on their computers should avoid installing file sharing applications on their computers, or if they have to use such tools, actively manage the risks of inadvertent disclosure of their, their family's, their clients', or patients' PHI. PMID:20190057

  9. 19 CFR 207.7 - Limited disclosure of certain business proprietary information under administrative protective...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... information under administrative protective order. 207.7 Section 207.7 Customs Duties UNITED STATES... administrative protective order. (a)(1) Disclosure. Upon receipt of a timely application filed by an authorized... authorized applicant under an administrative protective order described in paragraph (b) of this section....

  10. 19 CFR 207.7 - Limited disclosure of certain business proprietary information under administrative protective...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... information under administrative protective order. 207.7 Section 207.7 Customs Duties UNITED STATES... administrative protective order. (a)(1) Disclosure. Upon receipt of a timely application filed by an authorized... authorized applicant under an administrative protective order described in paragraph (b) of this section....

  11. 19 CFR 207.7 - Limited disclosure of certain business proprietary information under administrative protective...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... information under administrative protective order. 207.7 Section 207.7 Customs Duties UNITED STATES... administrative protective order. (a)(1) Disclosure. Upon receipt of a timely application filed by an authorized... authorized applicant under an administrative protective order described in paragraph (b) of this section....

  12. 77 FR 47589 - Notice of Request for Extension of Approval of an Information Collection; Horse Protection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-09

    ... Approval of an Information Collection; Horse Protection Regulations AGENCY: Animal and Plant Health... collection associated with the Horse Protection Program. DATES: We will consider all comments that we receive... the Horse Protection Program, contact Dr. Rachel Cezar, Senior Staff Veterinarian, Animal Care,...

  13. Developing COSHH Essentials: dermal exposure, personal protective equipment and first aid.

    PubMed

    Garrod, A N I; Rajan-Sithamparanadarajah, R

    2003-10-01

    The 'control banding' approach in COSHH Essentials combines the potential for harm with the potential for exposure by inhalation to band measures to control exposure at source, as generic strategies. These are simply adapted to specific tasks and circumstances to produce specific control advice. Where it is not possible or practical to use this control advice, the control bands can suggest adequate respiratory protective equipment using 'protection factors'. Proposals in the paper enable the user to identify the right level of respiratory protective equipment (RPE), and to begin selecting suitable RPE. Selection is made through a formatted questionnaire, enabling the user to give the right facts to the supplier. COSHH Essentials applies mainly to exposure by inhalation. However, skin exposure is very common and uptake via the skin can be an important contributor to body dose. This paper examines the factors concerning skin exposure, and the options for banding the potential for harm to the skin or via the skin. Proposals have then been made for dermal exposure control. Planning for emergencies is an important facet of risk control. Proposals are outlined to band chemical hazards for emergency planning according to a minimum of information, i.e. the danger symbol on a product label.

  14. Pattern of use of personal protective equipments and measures during application of pesticides by agricultural workers in a rural area of Ahmednagar district, India

    PubMed Central

    Singh, Bhoopendra; Gupta, Mudit Kumar

    2009-01-01

    Background: Pesticides, despite their known toxicity, are widely used in developing countries for agricultural purposes. Objectives: To find various patterns of hardware use for spraying of insecticides, prevalent storage practice adopted by the user, types of personal protective equipments used for the handling of chemicals; to detect dangerous practices and the extent to which safety norms being followed by the users during the application/treatments, and finally their knowledge concerning the risks of pesticides. Materials and Methods: The agriculture workers who had been involved in pesticide application for agricultural purpose were interviewed face-to-face to gain information on the following determinants of pesticide exposure: Types, treatment equipment, use of personal protection and safety measures during the application/treatments and knowledge of the risks of pesticide exposure. Results: Hundred workers, aged between 21 and 60 years old, were included. Pesticides were mostly applied with manual equipment using Knapsack (70%) and only 5% farmers were using Tractor-mounted sprayer. Workers frequently performed tasks involving additional exposure to pesticides (mixing chemicals, 66%, or washing equipment, 65%). Majority of the workers/applicators used no personal protection measures or used it defectively/partially. Most of the workers/respondents (77%) did not bother for safety and health risks of pesticide exposure. Conclusions: Workers involved in pesticide application use personal protection measures very poorly and defectively. Almost half of the applicators were not following right direction with respect to wind direction while spraying, thus it increase the risk of exposure. There is a clear need to develop specific training and prevention programs for these workers. The determinants of pesticide exposure in agricultural workers described in this study should be properly assessed in epidemiological studies of the health effects of pesticides on

  15. National Perspectives on Data Protection.

    ERIC Educational Resources Information Center

    Yurow, Jane

    1983-01-01

    Discussion of different approaches to protecting personal information in Europe and the United States highlights data protection laws and agreements (international transfer of personal data, European laws, United States state and federal laws), United States and European views of privacy protection, national economic and political goals, and…

  16. 10 CFR 1044.07 - How can you find out if a particular person is authorized to receive a protected disclosure?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... PROVISIONS) SECURITY REQUIREMENTS FOR PROTECTED DISCLOSURES UNDER SECTION 3164 OF THE NATIONAL DEFENSE... Security as necessary to determine the security access authorization of the person to receive the...

  17. 10 CFR 1044.07 - How can you find out if a particular person is authorized to receive a protected disclosure?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... PROVISIONS) SECURITY REQUIREMENTS FOR PROTECTED DISCLOSURES UNDER SECTION 3164 OF THE NATIONAL DEFENSE... Security as necessary to determine the security access authorization of the person to receive the...

  18. 10 CFR 1044.07 - How can you find out if a particular person is authorized to receive a protected disclosure?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... PROVISIONS) SECURITY REQUIREMENTS FOR PROTECTED DISCLOSURES UNDER SECTION 3164 OF THE NATIONAL DEFENSE... Security as necessary to determine the security access authorization of the person to receive the...

  19. 10 CFR 1044.07 - How can you find out if a particular person is authorized to receive a protected disclosure?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... PROVISIONS) SECURITY REQUIREMENTS FOR PROTECTED DISCLOSURES UNDER SECTION 3164 OF THE NATIONAL DEFENSE... Security as necessary to determine the security access authorization of the person to receive the...

  20. Use of insecticide-treated clothes for personal protection against malaria: a community trial

    PubMed Central

    Kimani, Elizabeth W; Vulule, John M; Kuria, Isabel W; Mugisha, Fredrick

    2006-01-01

    Background The study sought to determine the effect of using insecticide-treated clothes (ITCs) on personal protection against malaria infection. The specific objectives were to determine the effect of using ITCs on the rate of infection with malaria parasites and the effect on indoor mosquito density. Methods This study was done in Dadaab refugee camps, North Eastern Province Kenya between April and August 2002, and involved a total of 198 participants, all refugees of Somali origin. The participants were selected through multi-stage cluster sampling. Half of the participants (treatment group) had their personal clothes worn on a daily basis (Diras, Saris, Jalbaabs, Ma'awis and shirts) and their bedding (sheets and blankets) treated with insecticide (permethrin). The other half (comparison group) had their clothes treated with placebo (plain water). Indoor mosquito density was determined from twelve households belonging to the participants; six in the treatment block and six in the comparison block. During pre-test and post-test, laboratory analysis of blood samples was done, indoor mosquito density determined and questionnaires administered. Using STATA statistical package, tests for significant difference between the two groups were conducted. Results Use of ITCs reduced both malaria infection rates and indoor mosquito density significantly. The odds of malaria infection in the intervention group were reduced by about 70 percent. The idea of using ITCs for malaria infection control was easily accepted among the refugees and they considered it beneficial. No side effects related to use of the ITCs were observed from the participants. Conclusion The use of ITCs reduces malaria infection rate and has potential as an appropriate method of malaria control. It is recommended, therefore, that this strategy be considered for use among poor communities like slum dwellers and other underprivileged communities, such as street children and refugees, especially during an

  1. Risk and protective factors for cognitive impairment in persons aged 85 years and older

    PubMed Central

    Cha, Ruth H.; Mielke, Michelle M.; Geda, Yonas E.; Boeve, Bradley F.; Machulda, Mary M.; Knopman, David S.; Petersen, Ronald C.

    2015-01-01

    Objective: To determine risk and protective factors for mild cognitive impairment (MCI) among persons 85 years and older. Methods: Participants in the population-based prospective Mayo Clinic Study of Aging were comprehensively evaluated at baseline and at 15 monthly intervals to determine incident MCI. At baseline, lifestyle factors in midlife and late life were assessed by self-reported questionnaire; vascular and comorbid conditions were abstracted from participants' medical records. Results: Of 256 participants who were cognitively normal at enrollment (median age 87.3 years, 62% women), 121 developed MCI at a median 4.1 years of follow-up. Predictors of MCI were APOE ε4 allele (hazard ratio [HR] 1.89; p = 0.008), current depressive symptoms (HR 1.78; p = 0.02), midlife onset of hypertension (HR 2.43; p = 0.005), increasing number of vascular diseases (HR 1.13; p = 0.02), and chronic conditions from the Charlson Comorbidity Index (HR 1.08; p = 0.006). Models were adjusted for sex and education, with age as the time variable. The risk of MCI was reduced for participants who reported engagement in artistic (HR 0.27; p = 0.03), craft (HR 0.55; p = 0.02), and social (HR 0.45; p = 0.005) activities in both midlife and late life, and in the use of a computer in late life (HR 0.47; p = 0.008). Conclusions: Chronic disease burden increases risk of MCI, whereas certain lifestyle factors reduce risk in persons 85 years and older. This implies that preventive strategies for MCI may need to begin in midlife and should persist throughout late life. PMID:25854867

  2. An Information Push-Delivery System Design for Personal Information Service on the Internet.

    ERIC Educational Resources Information Center

    Chen, Chen-Tung; Tai, Wei-Shen

    2003-01-01

    Discussion of information overload from the Internet focuses on an information push-delivery system, which applies fuzzy information retrieval and fuzzy similarity measurement to avoid the information overload problem. Describes an empirical investigation conducted with students at Da-Yeh University (Taiwan) that investigated satisfaction with a…

  3. 30 CFR 206.62 - Does MMS protect information I provide?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Does MMS protect information I provide? 206.62 Section 206.62 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE INTERIOR MINERALS REVENUE MANAGEMENT PRODUCT VALUATION Indian Oil § 206.62 Does MMS protect information I provide? The MMS will...

  4. 30 CFR 206.108 - Does MMS protect information I provide?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Does MMS protect information I provide? 206.108 Section 206.108 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE INTERIOR MINERALS REVENUE MANAGEMENT PRODUCT VALUATION Federal Oil § 206.108 Does MMS protect information I provide?...

  5. 30 CFR 1206.108 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Does ONRR protect information I provide? 1206.108 Section 1206.108 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Federal Oil § 1206.108 Does ONRR protect information I...

  6. 30 CFR 1206.62 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Does ONRR protect information I provide? 1206.62 Section 1206.62 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Indian Oil § 1206.62 Does ONRR protect information I...

  7. 30 CFR 1206.62 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Does ONRR protect information I provide? 1206.62 Section 1206.62 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Indian Oil § 1206.62 Does ONRR protect information I...

  8. 30 CFR 1206.108 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Does ONRR protect information I provide? 1206.108 Section 1206.108 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Federal Oil § 1206.108 Does ONRR protect information I...

  9. 30 CFR 1206.108 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Does ONRR protect information I provide? 1206.108 Section 1206.108 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Federal Oil § 1206.108 Does ONRR protect information I...

  10. 30 CFR 1206.62 - Does ONRR protect information I provide?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Does ONRR protect information I provide? 1206.62 Section 1206.62 Mineral Resources OFFICE OF NATURAL RESOURCES REVENUE, DEPARTMENT OF THE INTERIOR NATURAL RESOURCES REVENUE PRODUCT VALUATION Indian Oil § 1206.62 Does ONRR protect information I...

  11. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2011-01-01 2011-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  12. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  13. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national... National Security Information in accordance with the applicable provisions of laws of the United States...

  14. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national... National Security Information in accordance with the applicable provisions of laws of the United States...

  15. 45 CFR 164.528 - Accounting of disclosures of protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) Implementation specifications: Provision of the accounting. (1) The covered entity must act on the individual's... 45 Public Welfare 1 2010-10-01 2010-10-01 false Accounting of disclosures of protected health... Health Information § 164.528 Accounting of disclosures of protected health information. (a)...

  16. 45 CFR 164.520 - Notice of privacy practices for protected health information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Notice of privacy practices for protected health... DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.520 Notice of privacy practices for protected health information. (a)...

  17. 45 CFR 164.520 - Notice of privacy practices for protected health information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Notice of privacy practices for protected health... DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.520 Notice of privacy practices for protected health information. (a)...

  18. 48 CFR 8.608 - Protection of classified and sensitive information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Protection of classified and sensitive information. 8.608 Section 8.608 Federal Acquisition Regulations System FEDERAL... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall...

  19. 48 CFR 8.608 - Protection of classified and sensitive information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Protection of classified and sensitive information. 8.608 Section 8.608 Federal Acquisition Regulations System FEDERAL... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall...

  20. Personal Protective Equipment Use and Safety Behaviors among Farm Adolescents: Gender Differences and Predictors of Work Practices

    ERIC Educational Resources Information Center

    Reed, Deborah B.; Browning, Steven R.; Westneat, Susan C.; Kidd, Pamela S.

    2006-01-01

    Context: Children on farms perform work that places them at risk for acute and chronic negative health outcomes. Despite strategies for preventing and reducing the risk of disease and injury, children's use of personal protective equipment and safety equipped farm machinery has generally remained unreported. Purpose: This paper reports the use of…

  1. No More "Personal Notes"? Data Protection Policy and Practice in Higher Education Counselling Services in the UK

    ERIC Educational Resources Information Center

    Jenkins, Peter; Potter, Steve

    2007-01-01

    The introduction of the Data Protection Act 1998 has presented significant challenges to counselling recording, through its detailed requirements for the processing of personal data. The impact of these changes on recording in Higher Education counselling services in the UK is explored, using responses from an electronic survey of universities and…

  2. Library workers' personal beliefs about childhood vaccination and vaccination information provision.

    PubMed

    Keselman, Alla; Smith, Catherine Arnott; Hundal, Savreen

    2014-07-01

    This is a report on the impact of library workers' personal beliefs on provision of vaccination information. Nine public librarians were interviewed about a hypothetical scenario involving a patron who is concerned about possible vaccination-autism connections. The analysis employed thematic coding. Results suggested that while most participants supported childhood vaccination, tension between their personal views and neutrality impacted their ability to conduct the interaction. The neutrality stance, though consonant with professional guidelines, curtails librarians' ability to provide accurate health information. Outreach and communication between public and health sciences libraries can help librarians provide resources to address health controversies.

  3. Replacing personally-identifying information in medical records, the Scrub system.

    PubMed Central

    Sweeney, L.

    1996-01-01

    We define a new approach to locating and replacing personally-identifying information in medical records that extends beyond straight search-and-replace procedures, and we provide techniques for minimizing risk to patient confidentiality. The straightforward approach of global search and replace properly located no more than 30-60% of all personally-identifying information that appeared explicitly in our sample database. On the other hand, our Scrub system found 99-100% of these references. Scrub uses detection algorithms that employ templates and specialized knowledge of what constitutes a name, address, phone number and so forth. PMID:8947683

  4. Information System Security: User Authentication Protection at Central Design Activities

    DTIC Science & Technology

    2007-11-02

    passwords from an insider attack. One-time passwords from a smart card , token, or encrypted challenge/response dialog offered increased protection...improve user authentication procedures, such as a smart card . The June 7, 2001, Security Wire Digest reports that an attacker gained access to the

  5. Emotion differentiation as a protective factor against nonsuicidal self-injury in borderline personality disorder.

    PubMed

    Zaki, Landon F; Coifman, Karin G; Rafaeli, Eshkol; Berenson, Kathy R; Downey, Geraldine

    2013-09-01

    Evidence that nonsuicidal self-injury (NSSI) serves a maladaptive emotion regulation function in borderline personality disorder (BPD) has drawn attention to processes that may increase risk for NSSI by exacerbating negative emotion, such as rumination. However, more adaptive forms of emotion processing, including differentiating broad emotional experiences into nuanced emotion categories, might serve as a protective factor against NSSI. Using an experience-sampling diary, the present study tested whether differentiation of negative emotion was associated with lower frequency of NSSI acts and urges in 38 individuals with BPD who reported histories of NSSI. Participants completed a dispositional measure of rumination and a 21-day experience-sampling diary, which yielded an index of negative emotion differentiation and frequency of NSSI acts and urges. A significant rumination by negative emotion differentiation interaction revealed that rumination predicted higher rates of NSSI acts and urges in participants with difficulty differentiating their negative emotions. The results extend research on emotion differentiation into the clinical literature and provide empirical support for clinical theories that suggest emotion identification and labeling underlie strategies for adaptive self-regulation and decreased NSSI risk in BPD.

  6. Attitude towards personal protective equipment in the French nuclear fuel industry.

    PubMed

    Guseva Canu, Irina; Faust, Ségolène; Canioni, Pierre; Collomb, Philippe; Samson, Eric; Laurier, Dominique

    2013-06-01

    This descriptive cross-sectional study examines the compliance of workers from the European Gaseous Diffusion Uranium Enrichment Consortium (EURODIF) with personal protection equipment (PPE) in view of the various hazards in the nuclear fuel industry. The PPE inventory was drawn up by an industrial hygienist in charge of the PPE at EURODIF. Two hundred and twenty seven (10%) randomly selected, active and retired, EURODIF workers filled in a questionnaire on their attitudes towards PPE. Exposure data from the EURODIF job exposure matrix were used to examine whether PPE usage varies according to exposure level. The study suggests a PPE usage profile that varies depending on the hazards present and PPE available. Anti-uranium PPE and gloves were among the best rated, while anti-spray goggles were the least used. We found that, for most hazards known to cause cancer or irreversible health damage, PPE usage varied according to exposure (homogeneity test, p<0.05; trend test, p<0.05). The continuous use of PPE among workers should be encouraged through improvements to the PPE management system. A precise model of individual exposure can only be designed if the use and efficiency of PPE are taken into consideration.

  7. Borderline personality disorder features and history of childhood maltreatment in mothers involved with child protective services.

    PubMed

    Perepletchikova, Francheska; Ansell, Emily; Axelrod, Seth

    2012-05-01

    This study examines the history of childhood maltreatment and Borderline Personality Disorder (BPD) symptoms in mothers whose children were removed from the home by Child Protective Services (CPS) to identify potential targets for future intervention efforts. Forty-one mothers of children removed from the home due to abuse and/or neglect and 58 community-control mothers without CPS involvement were assessed for history of childhood maltreatment, alcohol and drug use, and BPD features. CPS-involved mothers scored significantly higher on measures of childhood maltreatment history and BPD features than did control mothers. The highest BPD scores were associated with the most severe histories of mothers' childhood maltreatment. In total, 50% of CPS-involved mothers reported elevated BPD features, compared with 15% of control mothers. Further, 19% of CPS-involved mothers had self-reported scores consistent with a BPD diagnosis, compared with 4% of control mothers. BPD features rather than maltreatment history per se predicted maternal involvement with CPS, controlling for alcohol and drug use predictors. The present data suggest that evidence-based treatments to address BPD symptoms may be indicated for some CPS-involved parents.

  8. Public, private and personal: Qualitative research on policymakers' opinions on smokefree interventions to protect children in 'private' spaces

    PubMed Central

    2010-01-01

    Background Governments use law to constrain aspects of private activities for purposes of protecting health and social wellbeing. Policymakers have a range of perceptions and beliefs about what is public or private. An understanding of the possible drivers of policymaker decisions about where government can or should intervene for health is important, as one way to better guide appropriate policy formation. Our aim was to identify obstacles to, and opportunities for, government smokefree regulation of private and public spaces to protect children. In particular, to seek policymaker opinions on the regulation of smoking in homes, cars and public parks and playgrounds in a country with incomplete smokefree laws (New Zealand). Methods Case study, using structured interviews to ask policymakers (62 politicians and senior officials) about their opinions on new smokefree legislation for public and private places. Supplementary data was obtained from the Factiva media database, on the views of New Zealand local authority councillors about policies for smokefree outdoor public places. Results Overall, interviewees thought that government regulation of smoking in private places was impractical and unwise. However, there were some differences on what was defined as 'private', particularly for cars. Even in public parks, smoking was seen by some as a 'personal' decision, and unlikely to be amenable to regulation. Most participants believed that educative, supportive and community-based measures were better and more practical means of reducing smoking in private places, compared to regulation. Conclusions The constrained view of the role of regulation of smoking in public and private domains may be in keeping with current political discourse in New Zealand and similar Anglo-American countries. Policy and advocacy options to promote additional smokefree measures include providing a better voice for childrens' views, increasing information to policymakers about the harms to

  9. Operator dermal exposure and protection provided by personal protective equipment and working coveralls during mixing/loading, application and sprayer cleaning in vineyards.

    PubMed

    Thouvenin, Isabelle; Bouneb, Françoise; Mercier, Thierry

    2017-06-01

    The efficiency of a working coverall combined with personal protective equipment to protect operators against dermal exposure to plant protection products under field conditions was studied. Operators wore a non-certified water-repellent finish polyester/cotton coverall plus a certified gown during the mixing/loading and the cleaning phases. Insecticide foliar application to a vineyard was selected as the exposure scenario. The overall dermal residue levels measured in this study were in the range of data recently collected in Europe. The water-repellent finish working coverall reduced body exposure by a factor of approximately 95%. Wearing a Category III Type 3 partial body gown during mixing/loading and cleaning of the application equipment led to a further protective effect of 98.7%. The combination of a water-repellent finish working coverall and partial body protection during specific tasks provided satisfactory levels of protection and can be considered as suitable protection for the conditions of use studied.

  10. Industrial information database service by personal computer network 'Saitamaken Industrial Information System'

    NASA Astrophysics Data System (ADS)

    Sugahara, Keiji

    Saitamaken Industrial Information System provides onlined database services, which does not rely on computers for the whole operation, but utilizes computers, optical disk files or facsimiles for certain operations as we think fit. It employes the method of providing information for various, outputs, that is, image information is sent from optical disk files to facsimiles, or other information is provided from computers to terminals as well as facsimiles. Locating computers as a core in the system, it enables integrated operations. The system at terminal side was developed separately with functions such as operation by turnkey style, down-loading of statistical information and the newest menu.

  11. Checking Questionable Entry of Personally Identifiable Information Encrypted by One-Way Hash Transformation

    PubMed Central

    Chen, Xianlai; Fann, Yang C; McAuliffe, Matthew; Vismer, David

    2017-01-01

    Background As one of the several effective solutions for personal privacy protection, a global unique identifier (GUID) is linked with hash codes that are generated from combinations of personally identifiable information (PII) by a one-way hash algorithm. On the GUID server, no PII is permitted to be stored, and only GUID and hash codes are allowed. The quality of PII entry is critical to the GUID system. Objective The goal of our study was to explore a method of checking questionable entry of PII in this context without using or sending any portion of PII while registering a subject. Methods According to the principle of GUID system, all possible combination patterns of PII fields were analyzed and used to generate hash codes, which were stored on the GUID server. Based on the matching rules of the GUID system, an error-checking algorithm was developed using set theory to check PII entry errors. We selected 200,000 simulated individuals with randomly-planted errors to evaluate the proposed algorithm. These errors were placed in the required PII fields or optional PII fields. The performance of the proposed algorithm was also tested in the registering system of study subjects. Results There are 127,700 error-planted subjects, of which 114,464 (89.64%) can still be identified as the previous one and remaining 13,236 (10.36%, 13,236/127,700) are discriminated as new subjects. As expected, 100% of nonidentified subjects had errors within the required PII fields. The possibility that a subject is identified is related to the count and the type of incorrect PII field. For all identified subjects, their errors can be found by the proposed algorithm. The scope of questionable PII fields is also associated with the count and the type of the incorrect PII field. The best situation is to precisely find the exact incorrect PII fields, and the worst situation is to shrink the questionable scope only to a set of 13 PII fields. In the application, the proposed algorithm can

  12. Informing cancer patient in relation to his type of personality: the dependent (oral) patient.

    PubMed

    Kallergis, G

    2011-01-01

    When a doctor has to break bad news to the cancer patient, he knows that the news will put a strain on his relationship with the patient. Bad news is any information that changes a person's view of the future in a negative way. The questions: "Do you tell the diagnosis or not? How much information do you reveal? Who do you inform about the diagnosis and/or what do you tell" are very frequent during scientific discussions. Must the patients know or do they also have the right not to know? Is it possible to determine who should be told what, when and how? The aim of this paper was to describe the dependent character or type of personality, so that a therapist can make a diagnosis in order to determine the informative approach.

  13. [Personal e-cards for military personnel and military-medical information system].

    PubMed

    Kalachev, O V; Stolyar, V P; Kuandykov, M G; Papkov, A Yu

    2015-08-01

    The article presents main directions of activities of the medical service, dealing with implementation of personal electronic cards for military personnel, organizing the process of automation of medical service management, military and medical organizations and health care departments. The given article, reveals the on-going activity, concerning creation of the military-medical information system, which will unite all medical units, organizations, and governments into one information space.

  14. 32 CFR Appendix A to Part 310 - Safeguarding Personally Identifiable Information (PII)

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (PII) A Appendix A to Part 310 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Pt. 310, App. A Appendix A to Part 310—Safeguarding Personally Identifiable Information (PII) (See § 310.13 of Subpart B) A. General 1. The...

  15. 16 CFR 312.7 - Prohibition against conditioning a child's participation on collection of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Prohibition against conditioning a child's... Prohibition against conditioning a child's participation on collection of personal information. An operator is prohibited from conditioning a child's participation in a game, the offering of a prize, or another...

  16. 16 CFR 312.7 - Prohibition against conditioning a child's participation on collection of personal information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Prohibition against conditioning a child's... Prohibition against conditioning a child's participation on collection of personal information. An operator is prohibited from conditioning a child's participation in a game, the offering of a prize, or another...

  17. 22 CFR 1101.3 - General policy: Collection and use of personal information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 2 2011-04-01 2009-04-01 true General policy: Collection and use of personal information. 1101.3 Section 1101.3 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.3 General policy: Collection and...

  18. 12 CFR 4.37 - Persons and entities with access to OCC information; prohibition on dissemination.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... § 4.37 Persons and entities with access to OCC information; prohibition on dissemination. (a) Current... by this subpart or otherwise by the OCC, no current or or former OTS employee or agent may, in any.... Any current or or former OTS employee or agent subpoenaed or otherwise requested to...

  19. 22 CFR 1101.3 - General policy: Collection and use of personal information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true General policy: Collection and use of personal information. 1101.3 Section 1101.3 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.3 General policy: Collection and...

  20. Vestiges of "Nous" and the 1st Person Plural Verb in Informal Spoken French.

    ERIC Educational Resources Information Center

    Coveney, Aidan

    2000-01-01

    Aims to find the extent to which subject clitic "nous" and 4th person verbs in French are used in a corpus of informal spoken language and to identify factors that may account for the productive use of nous +4p verb. (Author/VWL)