Science.gov

Sample records for privacy

  1. Protecting Privacy.

    ERIC Educational Resources Information Center

    Coyle, Karen

    2001-01-01

    Discusses privacy issues related to use of the Internet. Topics include data gathering functions that are built into applications of the World Wide Web; cookies that identify Web site visitors; personal identity information; libraries and privacy, including the need for privacy policies; protecting your privacy; and developing privacy literacy.…

  2. From Data Privacy to Location Privacy

    NASA Astrophysics Data System (ADS)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  3. E-Mail Privacy.

    ERIC Educational Resources Information Center

    Shieh, Jackie; Ballard, Rhea A-L

    1994-01-01

    Examines the relationship between electronic mail (E-mail) and employee privacy rights. Two current course cases involving the privacy issue are summarized; the Electronic Communications Privacy Act of 1986 is explained; proposed legislation is discussed; and suggestions for employee E-mail privacy that can help avoid possible litigation are…

  4. Widening Privacy Concerns.

    ERIC Educational Resources Information Center

    Amidon, Paige

    1992-01-01

    Discusses privacy concerns relating to electronic information media. European privacy initiatives from the European Community are described, including personal data protection, impact on the online industry, and telecommunications privacy; and activities in the United States are examined, including telephone caller privacy, electronic mail…

  5. Privacy and Library Records

    ERIC Educational Resources Information Center

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  6. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  7. Ethics and Privacy.

    ERIC Educational Resources Information Center

    Brewer, Erin; Eastmond, Nick; Geertsen, Reed; Johnson, Doug; Lewandowski, Judith; Yeaman, Andrew R. J.

    2003-01-01

    Contains four articles covering trends and issues on ethics and privacy in instructional technology, including: considerations for assessing ethical issues; what schools must do to develop ethical behaviors in students; a privacy primer for educators; and manufacturing technophopia. Each article contains references. (MES)

  8. Emerging Privacy Issues.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    As the issue of information privacy increases in complexity in terms of the number of organizations involved, the intricacy of the information flows, and the difficulty of conceiving appropriate legal safeguards, it is not certain that the practices and laws that have been developed for current privacy protection can work for new situations.…

  9. Toward practicing privacy

    PubMed Central

    Dwork, Cynthia; Pottenger, Rebecca

    2013-01-01

    Private data analysis—the useful analysis of confidential data—requires a rigorous and practicable definition of privacy. Differential privacy, an emerging standard, is the subject of intensive investigation in several diverse research communities. We review the definition, explain its motivation, and discuss some of the challenges to bringing this concept to practice. PMID:23243088

  10. Information Privacy Revealed

    ERIC Educational Resources Information Center

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  11. Testing Privacy Awareness

    NASA Astrophysics Data System (ADS)

    Bergmann, Mike

    In web-based business processes the disclosure of personal data by the user is an essential part and mandatory for the processes. Privacy policies help to inform the user about his/her rights and to protect the user’s privacy. In this paper we present a test to empirically measure how the user’s privacy awareness changes by presenting specific elements of the privacy policy in close proximity to the required data items. We compare an experimental group using an enhanced interface to a control group using a conventional interface regarding their capability to recall the agreed privacy-related facts. A concrete online survey has been performed. The major results are presented.

  12. EGRP Privacy Policy & Disclaimers

    Cancer.gov

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  13. Inequalities for the quantum privacy

    NASA Astrophysics Data System (ADS)

    Trindade, M. A. S.; Pinto, E.

    2016-02-01

    In this work, we investigate the asymptotic behavior related to the quantum privacy for multipartite systems. In this context, an inequality for quantum privacy was obtained by exploiting of quantum entropy properties. Subsequently, we derive a lower limit for the quantum privacy through the entanglement fidelity. In particular, we show that there is an interval where an increase in entanglement fidelity implies a decrease in quantum privacy.

  14. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  15. Advertising and Invasion of Privacy.

    ERIC Educational Resources Information Center

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  16. Privacy Expectations in Online Contexts

    ERIC Educational Resources Information Center

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  17. What was privacy?

    PubMed

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  18. Computers and Personal Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    Privacy is an issue that arises from the intersection of a demand for improved recordkeeping processes, and computing technology as the response to the demand. Recordkeeping in the United States centers on information about people. Modern day computing technology has the ability to maintain, store, and retrieve records quickly; however, this…

  19. Collaborative Privacy - A Community-Based Privacy Infrastructure

    NASA Astrophysics Data System (ADS)

    Kolter, Jan; Kernchen, Thomas; Pernul, Günther

    The landscape of the World Wide Web with all its versatile services heavily relies on the disclosure of private user information. Service providers collecting more and more of these personal user data pose a growing privacy threat for users. Addressing user concerns privacy-enhancing technologies emerged. One goal of these technologies is to enable users to improve the control over their personal data. A famous representative is the PRIME project that aims for a holistic privacy-enhancing identity management system. However, approaches like the PRIME privacy architecture require service providers to change their server infrastructure and add specific privacy-enhancing components. In the near future, service providers are not expected to alter internal processes. In this paper, we introduce a collaborative privacy community that allows the open exchange of privacy-related information. We lay out the privacy community’s functions and potentials within a user-centric, provider-independent privacy architecture that will help foster the usage and acceptance of privacy-enhancing technologies.

  20. Location Privacy in RFID Applications

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  1. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-18

    ... Federal Register, 73 FR 25594, May 7, 2008. The proposed amendments: (1) Waived all copying fees in..., 73 FR 54595, September 22, 2008, certain portions of BGFRS-37 (Electronic Applications) may be exempt... CFR Part 261a Privacy Act of 1974; Privacy Act Regulation AGENCY: Board of Governors of the...

  2. Privacy Issues and New Technologies.

    ERIC Educational Resources Information Center

    Colman, Sue

    1997-01-01

    Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…

  3. Student Privacy and School Responsibility.

    ERIC Educational Resources Information Center

    Gluckman, Ivan

    1987-01-01

    This pamphlet considers students' right to privacy and the application of this right to the confidentiality of information disclosed to administrators and counselors. Privacy is also considered in regard to special problems associated with counseling students about drugs, contraceptives, sexually transmitted diseases, abortion, and possible threat…

  4. Privacy Law and Print Photojournalism.

    ERIC Educational Resources Information Center

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  5. 76 FR 59073 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-23

    ... From the Federal Register Online via the Government Publishing Office CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency (CIA) has undertaken and completed...

  6. User Privacy in RFID Networks

    NASA Astrophysics Data System (ADS)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  7. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  8. Employee Privacy Rights: A Management Guide.

    ERIC Educational Resources Information Center

    Shepard, Ira Michael; Olsen, Harry

    Employee privacy rights are considered, along with practical problems and permissible parameters of employer activity. Included is a state-by-state analysis of the status of workplace privacy. Definitions are offered of "invasion of privacy," with attention to four types of privacy invasions: (1) placing someone in a "false light," (2) the public…

  9. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  10. Data protection, privacy.

    PubMed

    La Monaca, G; Schiralli, I

    2010-01-01

    The topic of data protection is referred closely to the concept of privacy--characterized by the American political philosophy in order to indicate a sphere recognized as personal, and therefore private or intimate, of the person, which exclude other individuals or society--whose protection has deep roots in the international right. The technological progress in the field of telecommunication has increased the facility of acquisition and spreading of information, the exchange of data, and the possibility of access to confidential information by other people. This made it made necessary the regulation of the management and the transfer of these information in order to protect individual rights and, on the other hand, an easy circulation of data for legitimate and useful goals.

  11. Extensive nonadditivity of privacy.

    PubMed

    Smith, Graeme; Smolin, John A

    2009-09-18

    Quantum information theory establishes the ultimate limits on communication and cryptography in terms of channel capacities for various types of information. The private capacity is particularly important because it quantifies achievable rates of quantum key distribution. We study the power of quantum channels with limited private capacity, focusing on channels that dephase in random bases. These display extensive nonadditivity of private capacity: a channel with 2logd input qubits that has a private capacity less than 2, but when used together with a second channel with zero private capacity, the joint capacity jumps to (1/2)logd. In contrast to earlier work which found nonadditivity vanishing as a fraction of input size or conditional on unproven mathematical assumptions, this provides a natural setting manifesting nonadditivity of privacy of the strongest possible sort. PMID:19792417

  12. MedlinePlus: Privacy Policy

    MedlinePlus

    ... is available at: https://bitly.com/pages/privacy . Facebook NLM has multiple Facebook pages where we share information about NLM news, ... register or provide personal information to view our Facebook pages. The complete list of NLM Facebook pages ...

  13. Biobanking and Privacy in India.

    PubMed

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India.

  14. Biobanking and Privacy in India.

    PubMed

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India. PMID:27256123

  15. Privacy in the Genomic Era

    PubMed Central

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  16. Is Privacy Important in Scoliosis Screening?

    ERIC Educational Resources Information Center

    Quick, Miriam M.; Highriter, Marion E.

    1981-01-01

    In a study done to determine the importance of privacy during scoliosis screening, individual privacy was provided for some children. Results indicated a definite lessening of anxiety for those students screened privately. (JN)

  17. The Constitutional Right of Privacy: An Examination

    ERIC Educational Resources Information Center

    Northwestern University Law Review, 1974

    1974-01-01

    The right of privacy, a personal right protecting the most traditional concepts of privacy and the most tangible qualities of private life, is discussed in relation to many cases, including three involving teachers in secondary schools. (Author/PG)

  18. Fetal privacy and confidentiality.

    PubMed

    Botkin, J R

    1995-01-01

    With the advent of new and better contraceptive methods and the ability to facilitate and manipulate fertilization and gestation, couples will gain greater control over their fertility. Once a pregnancy has been established or an in vitro embryo created, the ability to evaluate the embryo and fetus will increase dramatically with progress in human genetic research. Preconception and preimplantation genetic testing and screening are now possible, and the technology to perform prenatal screening early in gestation is advancing rapidly. Nonsurgical methods facilitate induced abortion with a relatively lower degree of trauma upon the woman undergoing the procedure. These capabilities may all be used to enable and even encourage the genetic selection of future children. Despite the ethical concerns associated with prenatal testing and abortion, these services will continue to be an integral aspect of reproductive medicine. As technology advances, however, it will be possible to test and screen for conditions which do not produce serious defects. Genetic conditions which produce relatively mild impacts upon health will be identifiable in the embryo or fetus, while late-onset conditions and genetic factors which have only a probability of affecting health will also be located in the fetal genome. Prospective parents may therefore soon have the capability of selecting their most desirable embryo in vitro, or terminating all undesirable fetuses in vivo until the preferred child is delivered. The medical profession must take some responsibility for establishing guidelines on the use of reproductive technology. The standards of practice for the medical profession must reflect the results of a broad social debate over competing moral values. The author develops an argument for legal and ethical limitations on the application of prenatal testing and screening technology, suggesting that for some medical conditions, respect for the privacy and confidentiality of the fetus

  19. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  20. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  1. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  2. 75 FR 61994 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-07

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC25 Privacy Act; Implementation AGENCY: Office of Foreign... requirements of the Privacy Act of 1974, as amended, the Department of the Treasury is amending its regulations... records by revising the number and title of the Privacy Act system of records for which an exemption...

  3. 78 FR 69552 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... Department of the Navy 32 CFR Part 701 Privacy Act; Implementation AGENCY: Department of the Navy, DoD... Privacy Act Program by adding the (k)(5) exemption to accurately describe the basis for exempting the... Department of the Navy Privacy Program rules that will exempt applicable Department records and/or...

  4. 76 FR 49661 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... Office of the Secretary 32 CFR Part 323 Privacy Act; Implementation AGENCY: Defense Logistics Agency, DoD... updating the DLA Privacy Act Program Rules by updating the language of the (k)(2) exemption. The update of the exemption will more accurately describe the basis for exempting the records. The Privacy...

  5. 75 FR 37287 - Privacy Act Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-29

    ... April 19, 2010 (75 FR 20298) for a public comment period to end on June 18, 2010. This rule amends the... CFR Part 200 RIN 0430-AA03 Privacy Act Regulations AGENCY: Recovery Accountability and Transparency... regulations implementing the Privacy Act of 1974 (Privacy Act), Public Law 93-579, 5 U.S.C. 552a. This...

  6. 76 FR 71293 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-17

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC37 Privacy Act; Implementation AGENCY: Office of the Secretary, Treasury. ACTION: Proposed rule. SUMMARY: In accordance with the requirements of the Privacy Act... Identification Number Records'' from certain provisions of the Privacy Act. DATES: Comments must be received...

  7. 75 FR 20298 - Privacy Act Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ...,'' pursuant to the Privacy Act, as amended (74 FR 60302, Nov. 20, 2009). The Board received no comments on...; ] RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD 4 CFR Part 200 RIN 0430-AA03 Privacy Act Regulations AGENCY... and Transparency Board (Board) proposes to amend the Board's regulations implementing the Privacy...

  8. 77 FR 57017 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD... proposing to update the DIA Privacy Act Program by adding the (k)(2) exemption to accurately describe the... involves nonsubstantive changes dealing with DoD's management of its Privacy Programs. DoD expects...

  9. Sexiled: Privacy Acquisition Strategies of College Roommates

    ERIC Educational Resources Information Center

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  10. 77 FR 57015 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD... that have been previously claimed for the records in another Privacy Act system of records. DIA is updating the DIA Privacy Act Program by adding the (k)(2) and (k)(5) exemptions to accurately describe...

  11. 75 FR 22577 - Proposed Privacy Policy Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... COMMISSION Proposed Privacy Policy Statement AGENCY: U.S. Election Assistance Commission. ACTION: Notice and request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99-...

  12. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  13. Effective Management of Information Security and Privacy

    ERIC Educational Resources Information Center

    Anderson, Alicia

    2006-01-01

    No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…

  14. Pass the Cookies and Uphold the Privacy.

    ERIC Educational Resources Information Center

    Guenther, Kim

    2001-01-01

    Considers how privacy issues related to online profiling affect library patrons and what librarians should do to protect them. Discusses the need for a privacy policy and provides guidelines from the OECD (Organisation for Economic Cooperation and Development) privacy statement generator that can be adapted for libraries. (LRW)

  15. Privacy and Research with Human Beings

    ERIC Educational Resources Information Center

    Kelman, Herbert C.

    1977-01-01

    This paper explores the psychological significance of preserving privacy, the ways in which different kinds of research may threaten privacy, the requirements for minimizing or counteracting such threats, and the conditions under which research representing a certain degree of invasion of privacy can nevertheless be justified. (Author/AM)

  16. Privacy-enhanced electronic mail

    NASA Astrophysics Data System (ADS)

    Bishop, Matt

    1990-06-01

    The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.

  17. Conformance Verification of Privacy Policies

    NASA Astrophysics Data System (ADS)

    Fu, Xiang

    Web applications are both the consumers and providers of information. To increase customer confidence, many websites choose to publish their privacy protection policies. However, policy conformance is often neglected. We propose a logic based framework for formally specifying and reasoning about the implementation of privacy protection by a web application. A first order extension of computation tree logic is used to specify a policy. A verification paradigm, built upon a static control/data flow analysis, is presented to verify if a policy is satisfied.

  18. The Regulatory Framework for Privacy and Security

    NASA Astrophysics Data System (ADS)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  19. Privacy and Security: A Bibliography.

    ERIC Educational Resources Information Center

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  20. 78 FR 46256 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code...

  1. Facebook: When Education Meets Privacy

    ERIC Educational Resources Information Center

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  2. Comprehensive quantitative analysis on privacy leak behavior.

    PubMed

    Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan

    2013-01-01

    Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects. PMID:24066046

  3. Comprehensive Quantitative Analysis on Privacy Leak Behavior

    PubMed Central

    Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan

    2013-01-01

    Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects. PMID:24066046

  4. PEViD: privacy evaluation video dataset

    NASA Astrophysics Data System (ADS)

    Korshunov, Pavel; Ebrahimi, Touradj

    2013-09-01

    Visual privacy protection, i.e., obfuscation of personal visual information in video surveillance is an important and increasingly popular research topic. However, while many datasets are available for testing performance of various video analytics, little to nothing exists for evaluation of visual privacy tools. Since surveillance and privacy protection have contradictory objectives, the design principles of corresponding evaluation datasets should differ too. In this paper, we outline principles that need to be considered when building a dataset for privacy evaluation. Following these principles, we present new, and the first to our knowledge, Privacy Evaluation Video Dataset (PEViD). With the dataset, we provide XML-based annotations of various privacy regions, including face, accessories, skin regions, hair, body silhouette, and other personal information, and their descriptions. Via preliminary subjective tests, we demonstrate the flexibility and suitability of the dataset for privacy evaluations. The evaluation results also show the importance of secondary privacy regions that contain non-facial personal information for privacy- intelligibility tradeoff. We believe that PEViD dataset is equally suitable for evaluations of privacy protection tools using objective metrics and subjective assessments.

  5. Biobank research and the right to privacy.

    PubMed

    Ursin, Lars Oystein

    2008-01-01

    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants in biobank research might have to privacy, it is argued that their interests should be related to the specific context of the provision and reception of health care that participation in biobank research is connected with. Rather than just granting participants an exclusive right to or ownership of their health information, which must be waived in order to make biobank research possible, the privacy aspect of health information should be viewed in light of the moral rights and duties that accompany any involvement in a research based system of health services.

  6. Privacy information management for video surveillance

    NASA Astrophysics Data System (ADS)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  7. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  8. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Model privacy form and... Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of... content requirements of §§ 160.6 and 160.7 of this part, although use of the model privacy form is...

  9. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  10. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  11. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  12. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  13. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  14. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  15. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  16. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  17. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the...

  18. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  19. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  20. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  1. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  2. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  3. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  4. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  5. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendixA of this part, consistent with the instructions in...

  6. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  7. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  8. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  9. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  10. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  11. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  12. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  13. The Genetic Privacy Act: an analysis of privacy and research concerns.

    PubMed

    Troy, E S

    1997-01-01

    Author argues that the Genetic Privacy Act fails to protect nucleic acid-based information as it relates to individual privacy, yet overburdens medical and scientific research with vague consent standards.

  14. 77 FR 38363 - Office of Privacy, Records, and Disclosure; Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-27

    ... FOR AFGHANISTAN RECONSTRUCTION Office of Privacy, Records, and Disclosure; Privacy Act of 1974, as Amended AGENCY: Special Inspector General for Afghanistan Reconstruction. ACTION: Notice of Proposed... Special Inspector General for Afghanistan Reconstruction (SIGAR) gives notice of the establishment...

  15. Genetic privacy: orthodoxy or oxymoron?

    PubMed Central

    Sommerville, A; English, V

    1999-01-01

    In this paper we question whether the concept of "genetic privacy" is a contradiction in terms. And, if so, whether the implications of such a conclusion, inevitably impact on how society comes to perceive privacy and responsibility generally. Current law and ethical discourse place a high value on self-determination and the rights of individuals. In the medical sphere, the recognition of patient "rights" has resulted in health professionals being given clear duties of candour and frankness. Dilemmas arise, however, when patients decline to know relevant information or, knowing it, refuse to share it with others who may also need to know. This paper considers the notions of interconnectedness and responsibility to others which are brought to the fore in the genetic sphere and which challenge the primacy afforded to personal autonomy. It also explores the extent to which an individual's perceived moral obligations can or should be enforced. PMID:10226920

  16. Privacy issues in personalized medicine.

    PubMed

    Vaszar, Laszlo T; Cho, Mildred K; Raffin, Thomas A

    2003-03-01

    Pharmacogenomics is the emerging study of why individuals respond differently to drugs. It aims to replace the current 'one size fits all' therapeutic approach with 'personalized medicine' that will use pharmacogenomic tests to predict drug response. In a simple conceptualization, these tests challenge privacy as a result of two factors: how comprehensive is the test and how is the access to samples or digital information controlled. Point-of-care tests are likely to be limited in scope, fit seamlessly into medical records and do not raise qualitatively new ethical and privacy challenges. In order to define practically relevant pharmacogenomic predictive patterns however, large-scale clinical trials and research on human specimens will be required, resulting in large databases of genomic information. The genomic scans' magnitude, stability, implications to kin and ease of dissemination together represent a qualitatively different challenge compared to traditional, self-limited and often temporally transient medical information.

  17. Fictional privacy among Facebook users.

    PubMed

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures. PMID:23045871

  18. Fictional privacy among Facebook users.

    PubMed

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  19. Trust and Privacy in Healthcare

    NASA Astrophysics Data System (ADS)

    Singleton, Peter; Kalra, Dipak

    This paper considers issues of trust and privacy in healthcare around increased data-sharing through Electronic Health Records (EHRs). It uses a model structured around different aspects of trust in the healthcare organisation’s reasons for greater data-sharing and their ability to execute EHR projects, particularly any associated confidentiality controls. It reflects the individual’s personal circumstances and attitude to use of health records.

  20. Privacy: after the compliance date.

    PubMed

    Mikels, Debbie

    2004-01-01

    This article reviews successful strategies in preparing for HIPAA Privacy compliance. There are ongoing challenges organizations will face after the compliance date, such as managing research issues, identifying all business associates and managing the accounting of disclosures process. Finally, health information professionals must play an active role in ensuring that patient information is protected, while providing appropriate access as new uses for information are developed.

  1. Patient Privacy: A Consumer Protection Approach

    PubMed Central

    Brannigan, Vincent M.

    1983-01-01

    In the United States, a “Constitutional Analysis” of medical data privacy has been so far unsuccessful in obtaining significant protection. Statutory protection has evolved primarily to protect the citizen against the state, not to vindicate the privacy interest of the individual. A “Consumer Protection” approach rather than a right to privacy approach can be used to develop a coherent, practical approach to the needs of various parties in the health care system in the U.S.

  2. Student Privacy versus Campus Safety: Has Recent Legislation Compromised Privacy Rights?

    ERIC Educational Resources Information Center

    van der Kaay, Christopher D.

    This study highlights major legislation addressing campus safety and crime reporting and discusses its impact on a student's right to privacy. The 1974 Family Educational Rights and Privacy Act, commonly referred to as the "Buckley Amendment," was among the first pieces of legislation to address the notion of student privacy and confidentiality.…

  3. Extending SQL to Support Privacy Policies

    NASA Astrophysics Data System (ADS)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  4. Privacy Challenges for Wireless Medical Devices

    SciTech Connect

    Lagesse, Brent J

    2010-01-01

    Implantable medical devices are becoming more pervasive as new technologies increase their reliability and safety. Furthermore, these devices are becoming increasingly reliant on wireless communication for interaction with the device. Such technologies have the potential to leak information that could be utilized by an attacker to threaten the lives of patients. Privacy of patient information is essential; however, this information is not the only privacy issue that must be considered. In this paper, we discuss why information privacy is insufficient for protecting patients from some attacks and how information regarding the presence of individual devices can leak vulnerabilities. Furthermore, we examine existing privacy enhancing algorithms and discuss their applicability to implantable medical devices.

  5. Customer privacy on UK healthcare websites.

    PubMed

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  6. Customer privacy on UK healthcare websites.

    PubMed

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality. PMID:16954055

  7. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 4 2014-10-01 2014-10-01 false Privacy protections. 457.1110 Section 457.1110 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure...

  8. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 4 2012-10-01 2012-10-01 false Privacy protections. 457.1110 Section 457.1110 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure...

  9. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Privacy protections. 457.1110 Section 457.1110 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure...

  10. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 4 2013-10-01 2013-10-01 false Privacy protections. 457.1110 Section 457.1110 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure...

  11. Privacy and Ethics in Undergraduate GIS Curricula

    ERIC Educational Resources Information Center

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  12. Reconsidering the Right to Privacy in Canada

    ERIC Educational Resources Information Center

    Shade, Leslie Regan

    2008-01-01

    This article argues that post-September 11 political debates and legislation around security necessitates a reconsideration of a right to privacy in Canada. It looks at the proposal for a Canadian Charter of Privacy Rights promoted by Senator Sheila Finestone in the late 1990s and the current challenges of emergent material technologies…

  13. 77 FR 19095 - Privacy Act; Implementation; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ... (77 FR 15595-15596), Department of Defense published a direct final rule titled Privacy Act... In the direct final rule (FR Doc. 2012-6170) published on March 16, 2012 (77 FR 15595-15596), make... of the Secretary 32 CFR Part 322 Privacy Act; Implementation; Correction AGENCY: Office of...

  14. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  15. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  16. Privacy-Preserving Location-Based Services

    ERIC Educational Resources Information Center

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  17. Just in Time Research: Privacy Practices

    ERIC Educational Resources Information Center

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  18. Protecting Privacy in Computerized Medical Information.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Office of Technology Assessment.

    This report analyzes the implications of computerized medical information and the challenges it brings to individual privacy. The report examines the nature of the privacy interest in health care information and the current state of the law protecting that information; the nature of proposals to computerize health care information and the…

  19. A Deontological View of the Privacy Debate.

    ERIC Educational Resources Information Center

    Wilson, Alan

    The mass media are at odds with the public on issues concerning privacy, i.e., issues concerning whether private information about a person should be printed in a newspaper or magazine. In a 1982 survey, one journalist/respondent said his or her newspaper "almost always" favored the public's right to know over a person's right to privacy.…

  20. Privacy Questions from Practicing School Nurses

    ERIC Educational Resources Information Center

    Bergren, Martha Dewey

    2004-01-01

    This Question and Answer (Q&A) article addresses practice issues related to school health records and school nursing documentation that were posed by school nurses in the field. Specifically, the questions addressed concern the following: education records, medication privacy issues, sharing of sensitive health information, privacy of individual…

  1. Privacy and the National Information Infrastructure.

    ERIC Educational Resources Information Center

    Rotenberg, Marc

    1994-01-01

    Explains the work of Computer Professionals for Social Responsibility regarding privacy issues in the use of electronic networks; recommends principles that should be adopted for a National Information Infrastructure privacy code; discusses the need for public education; and suggests pertinent legislative proposals. (LRW)

  2. Information Parents Must Know about Online Privacy.

    ERIC Educational Resources Information Center

    Markell, Ginny

    2000-01-01

    Presents four tips to help parents monitor whether website operators are complying with the 1988 Children's Online Privacy Protection Act: look for privacy policies on children's websites; determine if they ask for parental consent to collect personal information; regularly monitor information being sent to children; and determine if web operators…

  3. The Press, Privacy, and Community Mores.

    ERIC Educational Resources Information Center

    Glasser, Theodore L.

    Because of judicial indifference and legislative inaction, the conflict between the right of privacy and the freedom of the press is no closer to a resolution than it was a century ago. William Prosser's reduction of the common law of privacy into four separate torts has not solved the problem. The concept of "newsworthiness" has not been helpful…

  4. 75 FR 54162 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-03

    ... should address comments to: Walter Stone, CMS Privacy Officer, Division of Information Security & Privacy... extended CHAMPVA benefit to age 65 for any beneficiary eligible for Medicare Part A on the basis of... Law 107-14 provided for extending benefit coverage for beneficiaries over the age of 65 years if...

  5. 77 FR 57013 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is updating the Defense Intelligence Agency Privacy Act Program, by adding the (k)(2) exemption to...

  6. 77 FR 15591 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is deleting... makes nonsubstantive changes to the Defense Intelligence Agency Privacy Program rules. These...

  7. Update on patient privacy legislation.

    PubMed

    Maddox, P J

    1998-01-01

    The administrative simplification provisions of HIPAA will establish the first national standards for the electronic transmission of health care transactions with which all federal programs (DOD, Medicare, and Medicaid) and all private health plans must comply. Individuals and organizations should prepare themselves, their systems, and their processes to meet these new administrative and financial data standards and requirements. The benefits of standardized electronic transactions on achieving a single paper-free claims submission to be used by all providers and payers is of obvious benefit. Not so obvious are consequences associated with limiting the access and use of existing data repositories on a variety of clinical, administrative, and research functions. It is critically important in this age of increased accountability for fiscal restraint and improving the outcomes of entire patient populations that clinicians, managers, organizations, and researchers to use data for a variety of clinical, quality improvement/evaluation, and research purposes. Administrative simplification and protecting individual privacy should not be achieved by overly bureaucratic and restrictive responses that impede epidemiologic and health services research, quality improvement activities, and optimization strategies for improving the health of populations. While the health system understands the need for some increased regulation to ensure the privacy of individual patient privacy in the "wired" world solutions must be found and overly restrictive consequences associated with prohibiting access to data must be resolved. More than ever, the entire system requires data to inform every level and type of decision made. Legislation and bureaucratic processes that do not understand and support responsible data-driven decision-making will serve to roll-back, not advance health system improvement. As we prepare ourselves for HIPAA compliance and the expectations of the benefits it will

  8. Protecting privacy in a clinical data warehouse.

    PubMed

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world.

  9. Protecting privacy in a clinical data warehouse.

    PubMed

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. PMID:25301198

  10. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Model privacy form and examples. 1016.2 Section... INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the model... model privacy form is not required. (b) Examples. The examples in this part are not...

  11. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Model privacy form and examples. 1016.2 Section... INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the model... model privacy form is not required. (b) Examples. The examples in this part are not...

  12. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Model privacy form and examples. 1016.2 Section... INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the model... model privacy form is not required. (b) Examples. The examples in this part are not...

  13. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... writing may be sent to: Privacy Act Officer, U.S. Nuclear Waste Technical Review Board, 2300...

  14. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as...

  15. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy...

  16. 43 CFR 2.47 - Records subject to Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Records subject to Privacy Act. 2.47 Section 2.47 Public Lands: Interior Office of the Secretary of the Interior RECORDS AND TESTIMONY; FREEDOM OF INFORMATION ACT Privacy Act § 2.47 Records subject to Privacy Act. The Privacy Act applies to...

  17. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as...

  18. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule....

  19. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  20. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule....

  1. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as...

  2. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy...

  3. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  4. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal...

  5. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a)...

  6. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on...

  7. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part:...

  8. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Privacy Act requests by inmates....

  9. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as...

  10. Privacy Issues of a National Research and Education Network.

    ERIC Educational Resources Information Center

    Katz, James E.; Graveman, Richard F.

    1991-01-01

    Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…

  11. Fourteen Reasons Privacy Matters: A Multidisciplinary Review of Scholarly Literature

    ERIC Educational Resources Information Center

    Magi, Trina J.

    2011-01-01

    Librarians have long recognized the importance of privacy to intellectual freedom. As digital technology and its applications advance, however, efforts to protect privacy may become increasingly difficult. With some users behaving in ways that suggest they do not care about privacy and with powerful voices claiming that privacy is dead, librarians…

  12. Digital Privacy: Toward a New Politics and Discursive Practice.

    ERIC Educational Resources Information Center

    Doty, Philip

    2001-01-01

    Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…

  13. A Model Privacy Statement for Ohio Library Web Sites.

    ERIC Educational Resources Information Center

    Monaco, Michael J.

    The purpose of this research was to develop a model privacy policy statement for library World Wide Web sites. First, standards of privacy protection were identified. These standards were culled from the privacy and confidentiality policies of the American Library Association, the Federal Trade Commission's online privacy reports, the guidelines…

  14. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... writing may be sent to: Privacy Act Officer, U.S. Nuclear Waste Technical Review Board, 2300...

  15. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... writing may be sent to: Privacy Act Officer, U.S. Nuclear Waste Technical Review Board, 2300...

  16. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... writing may be sent to: Privacy Act Officer, U.S. Nuclear Waste Technical Review Board, 2300...

  17. 75 FR 52944 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-30

    ... AGENCY Privacy Act of 1974; System of Records AGENCY: Federal Housing Finance Agency. ACTION: Notice of... Privacy Act of 1974, as amended (Privacy Act), the Federal Housing Finance Agency (FHFA) gives notice of a proposed Privacy Act system of records to replace a system of records issued by FHFA's predecessor...

  18. 78 FR 14290 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD... system of records notice in its existing inventory of records systems subject to the Privacy Act of 1974..., Department of the Air Force Privacy Office, Air Force Privacy Act Office, Office of Warfighting...

  19. 75 FR 25870 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-10

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ] ACTION: Notice of Federal Advisory Committee meeting. SUMMARY: The DHS Data Privacy and.... Instructions: All submissions must include the words ``Department of Homeland Security Data Privacy...

  20. The study on privacy preserving data mining for information security

    NASA Astrophysics Data System (ADS)

    Li, Xiaohui

    2012-04-01

    Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.

  1. Privacy-preserving restricted boltzmann machine.

    PubMed

    Li, Yu; Zhang, Yuan; Ji, Yue

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model. PMID:25101139

  2. Privacy-Preserving Restricted Boltzmann Machine

    PubMed Central

    Li, Yu

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model. PMID:25101139

  3. Routes for breaching and protecting genetic privacy

    PubMed Central

    Erlich, Yaniv; Narayanan, Arvind

    2014-01-01

    We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these datasets is vital for progress in biomedical research. However, one growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, point to the underlying assumptions, and assess its technological complexity and maturation. We then review potential mitigation methods for privacy-preserving dissemination of sensitive data and highlight different cases that are relevant to genetic applications. PMID:24805122

  4. Privacy and the Human Genome Project.

    PubMed

    Wiesenthal, David L; Wiener, Neil I

    1996-01-01

    The Human Genome Project has raised many issues regarding the contributions of genetics to a variety of diseases and societal conditions. With genetic testing now easily conducted with lowered costs in nonmedical domains, a variety of privacy issues must be considered. Such testing will result in the loss of significant privacy rights for the individual. Society must now consider such issues as the ownership of genetic data, confidentiality rights to such information, limits placed on genetic screening, and legislation to control genetic testing and its applications. There is often a conflict between individual rights to privacy and the need for societal protection.

  5. Predicting self-protections of online privacy.

    PubMed

    Yao, Mike Z; Linz, Daniel G

    2008-10-01

    An empirical study was conducted to examine the social psychological processes that may influence an individual's adoption of online privacy protection strategies. Building from the theory of planned behavior, a theoretical model predicting self-protection of online privacy was tested in the present study. This model accounted for nearly a quarter of the variability in actual adoption during a ten-day period immediately after participants completed the initial questionnaire. Overall, the present research provided a strong support for the theoretical utility of psychological factors and processes in online privacy related research.

  6. Privacy-Sensitive Congestion Charging

    NASA Astrophysics Data System (ADS)

    Beresford, Alastair R.; Davies, Jonathan J.; Harle, Robert K.

    National-scale congestion charging schemes are increasingly viewed as the most viable long-term strategy for controlling congestion and maintaining the viability of the road network. In this paper we challenge the widely held belief that enforceable and economically viable congestion charging schemes require drivers to give up their location privacy to the government. Instead we explore an alternative scheme where privately-owned cars enforce congestion charge payments by using an on-board vehicle unit containing a camera and wireless communications. Our solution prevents centralised tracking of vehicle movements but raises an important issue: should we trust our neighbours with a little personal information in preference to entrusting it all to the government?

  7. 49 CFR 1560.103 - Privacy notice.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.103 Privacy notice. (a) Electronic...

  8. 49 CFR 1560.103 - Privacy notice.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.103 Privacy notice. (a) Electronic...

  9. 49 CFR 1560.103 - Privacy notice.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.103 Privacy notice. (a) Electronic...

  10. 49 CFR 1560.103 - Privacy notice.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.103 Privacy notice. (a) Electronic...

  11. 49 CFR 1560.103 - Privacy notice.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.103 Privacy notice. (a) Electronic...

  12. Privacy-preserving Kruskal-Wallis test.

    PubMed

    Guo, Suxin; Zhong, Sheng; Zhang, Aidong

    2013-10-01

    Statistical tests are powerful tools for data analysis. Kruskal-Wallis test is a non-parametric statistical test that evaluates whether two or more samples are drawn from the same distribution. It is commonly used in various areas. But sometimes, the use of the method is impeded by privacy issues raised in fields such as biomedical research and clinical data analysis because of the confidential information contained in the data. In this work, we give a privacy-preserving solution for the Kruskal-Wallis test which enables two or more parties to coordinately perform the test on the union of their data without compromising their data privacy. To the best of our knowledge, this is the first work that solves the privacy issues in the use of the Kruskal-Wallis test on distributed data. PMID:23871682

  13. Understanding privacy in occupational health services.

    PubMed

    Heikkinen, Anne; Wickström, Gustav; Leino-Kilpi, Helena

    2006-09-01

    The aim of this study was to gain a deeper understanding of privacy in occupational health services. Data were collected through in-depth theme interviews with occupational health professionals (n = 15), employees (n = 15) and employers (n = 14). Our findings indicate that privacy, in this context, is a complex and multilayered concept, and that companies as well as individual employees have their own core secrets. Co-operation between the three groups proved challenging: occupational health professionals have to consider carefully in which situations and how much they are entitled to release private information on individual employees for the benefit of the whole company. Privacy is thus not an absolute right of an individual, but involves the idea of sharing responsibility. The findings open up useful new perspectives on ethical questions of privacy and on the development of occupational health practices.

  14. HIPAA privacy: the compliance challenges ahead.

    PubMed

    Rosati, Kristen B

    2002-01-01

    This Article reviews the HIPAA Privacy Standards' impact on healthcare organizations. It discusses whether a healthcare organization is a "Covered Entity" under the regulations, what information the Privacy Standards protect, what restrictions the regulations place on the use and disclosure of protected health information, what individual rights the Privacy Standards create, and what agreements they require between healthcare organizations and their business associates. The author provides relatively extensive guidance to organizations that are embarking upon their voyage of compliance with these broadly applicable regulations, but notes that the full extent of necessary compliance remains unclear, pending DHHS issuance of the next iteration of the rulemaking in this area. The Article was finalized in January 2002, before HHS issued any modifications to the Privacy Standards.

  15. Privacy Legislation--Implications for Employers

    ERIC Educational Resources Information Center

    Murg, Gary E.; Maledon, Marilyn P.

    1977-01-01

    Conflicts between mandated recordkeeping requirements and the ever increasing demands for disclosure of information under the Freedom of Information Act, administrative agency investigations, and law suits are examined. Implications for privacy legislation to protect employee rights are discussed. (LBH)

  16. Technology, Privacy and the Democratic Process.

    ERIC Educational Resources Information Center

    Gandy, Oscar H., Jr.; Simmons, Charles E.

    1986-01-01

    Argues that advances in information technology, especially capacities to collect and combine data for marketing purposes, subvert protections of individual privacy and weaken the influence of the individual in democracy. (MS)

  17. Privacy preserving RBF kernel support vector machine.

    PubMed

    Li, Haoran; Xiong, Li; Ohno-Machado, Lucila; Jiang, Xiaoqian

    2014-01-01

    Data sharing is challenging but important for healthcare research. Methods for privacy-preserving data dissemination based on the rigorous differential privacy standard have been developed but they did not consider the characteristics of biomedical data and make full use of the available information. This often results in too much noise in the final outputs. We hypothesized that this situation can be alleviated by leveraging a small portion of open-consented data to improve utility without sacrificing privacy. We developed a hybrid privacy-preserving differentially private support vector machine (SVM) model that uses public data and private data together. Our model leverages the RBF kernel and can handle nonlinearly separable cases. Experiments showed that this approach outperforms two baselines: (1) SVMs that only use public data, and (2) differentially private SVMs that are built from private data. Our method demonstrated very close performance metrics compared to nonprivate SVMs trained on the private data. PMID:25013805

  18. Location Privacy Protection Act of 2014

    THOMAS, 113th Congress

    Sen. Franken, Al [D-MN

    2014-03-27

    06/04/2014 Committee on the Judiciary Subcommittee on Privacy, Technology and the Law. Hearings held. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Privacy of Student Records: An Update.

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    2003-01-01

    Discusses 2002 U.S. Supreme Court's unanimous opinion in "Owasso Independent School District" (Oklahoma) holding that peer grading does not violate the Family Education Rights and Privacy Act (FERPA). (PKP)

  20. Privacy-preserving Kruskal-Wallis test.

    PubMed

    Guo, Suxin; Zhong, Sheng; Zhang, Aidong

    2013-10-01

    Statistical tests are powerful tools for data analysis. Kruskal-Wallis test is a non-parametric statistical test that evaluates whether two or more samples are drawn from the same distribution. It is commonly used in various areas. But sometimes, the use of the method is impeded by privacy issues raised in fields such as biomedical research and clinical data analysis because of the confidential information contained in the data. In this work, we give a privacy-preserving solution for the Kruskal-Wallis test which enables two or more parties to coordinately perform the test on the union of their data without compromising their data privacy. To the best of our knowledge, this is the first work that solves the privacy issues in the use of the Kruskal-Wallis test on distributed data.

  1. 78 FR 17471 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-21

    ... Privacy Act of 1974, OMB Guidelines on the Conduct of Matching Programs (54 FR 25818, June 19, 1989), OMB... number). FOR FURTHER INFORMATION CONTACT: David Silverman, Management and Program Analyst, IRS Office...

  2. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 1974, as amended (5 U.S.C. 552a), shall comply with the conduct regulations delineated in 31 CFR 1.28(b). ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design,...

  3. Privacy: The Small and Large of It

    SciTech Connect

    NUSBAUM,ANNA W.

    1999-10-22

    The topic of Privacy is complex, multi-faceted, and often emotionally laden. This paper will cover the following topics, in an effort to further understanding of federal regulations and activities, the balancing act that necessarily occurs in business, and what role a records manager can play. The topics are: Definitions; The Privacy Act; ''Private'' companies; Potential areas of concern; Expectations; Corporate responsibilities; Case studies; and Records Manager's role.

  4. Privacy and confidentiality in pragmatic clinical trials

    PubMed Central

    McGraw, Deven; Greene, Sarah M.; Miner, Caroline S.; Staman, Karen L.; Welch, Mary Jane; Rubel, Alan

    2015-01-01

    With pragmatic clinical trials (PCTs) an opportunity exists to answer important questions about the relative risks, burdens, and benefits of therapeutic interventions. However, concerns about protecting the privacy of this information are significant and must be balanced with the imperative to learn from the data gathered in routine clinical practice. Traditional privacy protections for research uses of identifiable information rely disproportionately on informed consent or authorizations, based on a presumption that this is necessary to fulfill ethical principles of respect for persons. But frequently the ideal of informed consent is not realized in its implementation. Moreover, the principle of respect for persons,—which encompasses their interests in health information privacy,—can be honored through other mechanisms. Data anonymization also plays a role in protecting privacy but is not suitable for all research, particularly PCTs. In this paper we explore both the ethical foundation and regulatory framework intended to protect privacy in PCTs. We then review examples of novel approaches to respecting persons in research that may have the added benefit of honoring patient privacy considerations. PMID:26374682

  5. Instrumentation for measuring speech privacy in rooms

    NASA Astrophysics Data System (ADS)

    Horrall, Thomas; Pirn, Rein; Markham, Ben

    2003-10-01

    Federal legislation pertaining to oral privacy in healthcare and financial services industries has increased the need for a convenient and economical way to document speech privacy conditions in offices, medical examination rooms, and certain other workspaces. This legislation is embodied in the Health Insurance Portability and Accountability Act (HIPAA) and Gramm-Leach-Bliley Act (GLBA). Both laws require that reasonable measures be put in place to safeguard the oral privacy of patients and clients. While techniques for privacy documentation are known within the acoustical consulting community, it is unlikely that community alone has the capacity to provide the surveys needed to evaluate acoustical conditions and demonstrate compliance with the legislation. A portable computer with integrated soundboard and a suitable amplified loudspeaker and test microphone are all that are needed to perform in situ measurements of articulation index or other accepted indices of speech privacy. Along with modest training, such instrumentation allows technicians to survey a large number of sites economically. Cost-effective components are shown that can meet the requirements for testing in most common environments where oral privacy is likely to be required. Example cases are presented to demonstrate the feasibility of such instrumentation.

  6. Comparative Approaches to Biobanks and Privacy.

    PubMed

    Rothstein, Mark A; Knoppers, Bartha Maria; Harrell, Heather L

    2016-03-01

    Laws in the 20 jurisdictions studied for this project display many similar approaches to protecting privacy in biobank research. Although few have enacted biobank-specific legislation, many countries address biobanking within other laws. All provide for some oversight mechanisms for biobank research, even though the nature of that oversight varies between jurisdictions. Most have some sort of controlled access system in place for research with biobank specimens. While broad consent models facilitate biobanking, countries without national or federated biobanks have been slow to adopt broad consent. International guidelines have facilitated sharing and generally take a proportional risk approach, but many countries have provisions guiding international sharing and a few even limit international sharing. Although privacy laws may not prohibit international collaborations, the multi-prong approach to privacy unique to each jurisdiction can complicate international sharing. These symposium issues can serve as a resource for explaining the sometimes intricate privacy laws in each studied jurisdiction, outlining the key issues with regards to privacy and biobanking, and serving to describe a framework for the process of harmonization of privacy laws. PMID:27256132

  7. Comparative Approaches to Biobanks and Privacy.

    PubMed

    Rothstein, Mark A; Knoppers, Bartha Maria; Harrell, Heather L

    2016-03-01

    Laws in the 20 jurisdictions studied for this project display many similar approaches to protecting privacy in biobank research. Although few have enacted biobank-specific legislation, many countries address biobanking within other laws. All provide for some oversight mechanisms for biobank research, even though the nature of that oversight varies between jurisdictions. Most have some sort of controlled access system in place for research with biobank specimens. While broad consent models facilitate biobanking, countries without national or federated biobanks have been slow to adopt broad consent. International guidelines have facilitated sharing and generally take a proportional risk approach, but many countries have provisions guiding international sharing and a few even limit international sharing. Although privacy laws may not prohibit international collaborations, the multi-prong approach to privacy unique to each jurisdiction can complicate international sharing. These symposium issues can serve as a resource for explaining the sometimes intricate privacy laws in each studied jurisdiction, outlining the key issues with regards to privacy and biobanking, and serving to describe a framework for the process of harmonization of privacy laws.

  8. Dynamic Privacy Management in Pervasive Sensor Networks

    NASA Astrophysics Data System (ADS)

    Gong, Nan-Wei; Laibowitz, Mathew; Paradiso, Joseph A.

    This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created incentive for accepting this network as an extension of people's daily social space. A user study was then conducted to evaluate several privacy management approaches - an active badge system for both online and on-site control, on/off power switches for physically disabling the hardware, and touch screen input control. Results from a user study indicated that an active badge for on-site privacy control is the most preferable method among all provided options. We present a set of results that yield insight into the privacy/benefit tradeoff from various sensing capabilities in pervasive sensor networks and how privacy settings and user behavior relate in these environments.

  9. 78 FR 19745 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-02

    ... From the Federal Register Online via the Government Publishing Office NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and..., National Aeronautics and Space Administration Headquarters, Washington, DC 20546-0001, (202) 358-4787,...

  10. 78 FR 19744 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-02

    ... From the Federal Register Online via the Government Publishing Office NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and... Aeronautics and Space Administration Headquarters, Washington, DC 20546-0001, (202) 358-4787,...

  11. The Privacy Problem: Although School Librarians Seldom Discuss It, Students' Privacy Rights Are under Attack

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2011-01-01

    Every day in school libraries nationwide, students' privacy rights are under attack, but many principals, teachers, parents, and community members do not know much about these rights. Even though school librarians are among the strongest proponents of privacy, the subject is rarely discussed, probably because state and federal laws can be…

  12. The Preference for Privacy: In Search of the Social Locations of Privacy Orientations.

    ERIC Educational Resources Information Center

    Gandy, Oscar H., Jr.

    A study was conducted to develop some understanding of how social experience might be related to public expectations of rights to privacy. A telephone questionnaire was developed which sought information about respondent knowledge, attitudes, and behavior regarding privacy and personal information. A national survey of adults over the age of 18…

  13. Privacy Issues: Journalists Should Balance Need for Privacy with Need to Cover News.

    ERIC Educational Resources Information Center

    Plopper, Bruce

    1998-01-01

    Notes that journalists have to balance their desire to print the news with personal rights to privacy. Argues that a working knowledge of ethics and law helps journalism students resolve such issues. Discusses ethical issues; legal aspects of privacy; and "training" administrators. Offers a list of questions to ask, six notable court cases and…

  14. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... From the Federal Register Online via the Government Publishing Office NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and... Aeronautics and Space Administration is issuing public notice of its proposal to modify its existing system...

  15. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... From the Federal Register Online via the Government Publishing Office NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and... Aeronautics and Space Administration is issuing public notice of its proposal to significantly alter...

  16. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... From the Federal Register Online via the Government Publishing Office NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and... Aeronautics and Space Administration is issuing public notice of its proposal to modify its previously...

  17. Preserving Institutional Privacy in Distributed binary Logistic Regression.

    PubMed

    Wu, Yuan; Jiang, Xiaoqian; Ohno-Machado, Lucila

    2012-01-01

    Privacy is becoming a major concern when sharing biomedical data across institutions. Although methods for protecting privacy of individual patients have been proposed, it is not clear how to protect the institutional privacy, which is many times a critical concern of data custodians. Built upon our previous work, Grid Binary LOgistic REgression (GLORE)1, we developed an Institutional Privacy-preserving Distributed binary Logistic Regression model (IPDLR) that considers both individual and institutional privacy for building a logistic regression model in a distributed manner. We tested our method using both simulated and clinical data, showing how it is possible to protect the privacy of individuals and of institutions using a distributed strategy.

  18. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.

    PubMed

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-09-10

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one.

  19. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees

    PubMed Central

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-01-01

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417

  20. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.

    PubMed

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-01-01

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417

  1. New threats to health data privacy

    PubMed Central

    2011-01-01

    Background Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. Results We study how patient privacy could be compromised with the help of today’s information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. Conclusion We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection. PMID:22168526

  2. Speech privacy: Beyond architectural solutions

    NASA Astrophysics Data System (ADS)

    Mazer, Susan

    2005-09-01

    HIPAA regulations have brought unparalleled pressures on healthcare organizations to protect private and confidential information from reaching third parties. Yet, as this paper explains, often in the middle of noisy corridors and waiting rooms, this same information needs to be quickly transferred from physician to nurse to family member to others for the care of patients. Research and examples are presented that show that when families, patients, staff are participating together, although independently, in the same or adjacent spaces, the ``caf effect'' produces rising noise levels as each person competes to be heard. This threatens the very confidentiality demanded by HIPAA. Solutions to this problem are not easy or completely resolved by engineering or design specifications. This paper makes the case that it is ultimately the culture of a healthcare organization that determines the ``sound'' of a hospital, and any other organization that battles openness with privacy. It presents and discusses proven solutions to address culture in tandem with architectural and acoustic design interventions.

  3. Privacy and Property in the Biobank Context

    PubMed Central

    2010-01-01

    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is all about and aim for a fruitful perspective on the issues of property and privacy rights in the context of biobanking. This paper argues that the limits and handling of private matters is determined in specific social relations. The crucial point is thus to determine which information and activities are or are not the legitimate concern of others. Privacy and property rights should be seen as balanced by duties, that is as inherently relational interests extending into the public sphere, rather than to see these rights as the control of an object—for instance the participant’s biobank material. PMID:20799053

  4. Privacy and confidentiality in pragmatic clinical trials.

    PubMed

    McGraw, Deven; Greene, Sarah M; Miner, Caroline S; Staman, Karen L; Welch, Mary Jane; Rubel, Alan

    2015-10-01

    With pragmatic clinical trials, an opportunity exists to answer important questions about the relative risks, burdens, and benefits of therapeutic interventions. However, concerns about protecting the privacy of this information are significant and must be balanced with the imperative to learn from the data gathered in routine clinical practice. Traditional privacy protections for research uses of identifiable information rely disproportionately on informed consent or authorizations, based on a presumption that this is necessary to fulfill ethical principles of respect for persons. But frequently, the ideal of informed consent is not realized in its implementation. Moreover, the principle of respect for persons—which encompasses their interests in health information privacy—can be honored through other mechanisms. Data anonymization also plays a role in protecting privacy but is not suitable for all research, particularly pragmatic clinical trials. In this article, we explore both the ethical foundation and regulatory framework intended to protect privacy in pragmatic clinical trials. We then review examples of novel approaches to respecting persons in research that may have the added benefit of honoring patient privacy considerations.

  5. Privacy and property in the biobank context.

    PubMed

    Ursin, Lars Oystein

    2010-09-01

    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is all about and aim for a fruitful perspective on the issues of property and privacy rights in the context of biobanking. This paper argues that the limits and handling of private matters is determined in specific social relations. The crucial point is thus to determine which information and activities are or are not the legitimate concern of others. Privacy and property rights should be seen as balanced by duties, that is as inherently relational interests extending into the public sphere, rather than to see these rights as the control of an object--for instance the participant's biobank material.

  6. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-25

    ... compliance fundamentals, privacy and data security, and the privacy compliance life cycle. A learning lunch..., with both the training rooms and restrooms situated on the ground floor. Mary Ellen Callahan,...

  7. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a... record under false pretenses; or (iii) Maintaining a system of records without first meeting the...

  8. 78 FR 47306 - Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-05

    ...In accordance with the Privacy Act of 1974, as amended, the Bureau of Consumer Financial Protection, hereinto referred to as the Consumer Financial Protection Bureau (CFPB or Bureau), gives notice of the establishment of a revised Privacy Act System of...

  9. 76 FR 71327 - Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-17

    ...In accordance with the Privacy Act of 1974, as amended, the Bureau of Consumer Financial Protection, hereinto referred to as the Consumer Financial Protection Bureau (``CFPB'') or the ``Bureau'' gives notice of the establishment of a Privacy Act System of...

  10. 76 FR 79150 - Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-21

    ...In accordance with the Privacy Act of 1974, as amended, the Bureau of Consumer Financial Protection, hereinto referred to as the Consumer Financial Protection Bureau (CFPB), gives notice of the establishment of this updated Privacy Act System of Records.\\1\\...

  11. A Secure and Privacy-Preserving Targeted Ad-System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven M.

    Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.

  12. Individual privacy in an information dependent society

    SciTech Connect

    Clifford, B.P.

    1994-12-31

    The extraordinary technologies and capabilities of the Information Age have vastly improved communication, while allowing executives to have ultra-current information about their companies, subsidiaries, staff, clients, and practically any individual in the world. These advances, however, have stripped the individual of his privacy. Although invasions of privacy do not require a computer, computers have made it much easier to gather and select informatin, which means that it is also much easier to invade privacy. The increased value of information to policy makers leads them to covet information, even when acquiring it invades someone`s pricacy; not only do managers of private companies gather personal data, almost every citizen has files about him in Federal agencies and administrations.

  13. Control use of data to protect privacy.

    PubMed

    Landau, Susan

    2015-01-30

    Massive data collection by businesses and governments calls into question traditional methods for protecting privacy, underpinned by two core principles: (i) notice, that there should be no data collection system whose existence is secret, and (ii) consent, that data collected for one purpose not be used for another without user permission. But notice, designated as a fundamental privacy principle in a different era, makes little sense in situations where collection consists of lots and lots of small amounts of information, whereas consent is no longer realistic, given the complexity and number of decisions that must be made. Thus, efforts to protect privacy by controlling use of data are gaining more attention. I discuss relevant technology, policy, and law, as well as some examples that can illuminate the way.

  14. Patient privacy in the genomic era.

    PubMed

    Raisaro, Jean Louis; Ayday, Erman; Hubaux, Jean-Pierre

    2014-05-01

    According to many scientists and clinicians, genomics is taking on a key role in the field of medicine. Impressive advances in genome sequencing have opened the way to a variety of revolutionary applications in modern healthcare. In particular, the increasing understanding of the human genome, and of its relation to diseases and response to treatments brings promise of improvements in better preventive and personalized medicine. However, this progress raises important privacy and ethical concerns that need to be addressed. Indeed, each genome is the ultimate identifier of its owner and, due to its nature, it contains highly personal and privacy-sensitive data. In this article, after summarizing recent advances in genomics, we discuss some important privacy issues associated with human genomic information and methods put in place to address them.

  15. Privacy policies for health social networking sites

    PubMed Central

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data. PMID:23599228

  16. Valuating Privacy with Option Pricing Theory

    NASA Astrophysics Data System (ADS)

    Berthold, Stefan; Böhme, Rainer

    One of the key challenges in the information society is responsible handling of personal data. An often-cited reason why people fail to make rational decisions regarding their own informational privacy is the high uncertainty about future consequences of information disclosures today. This chapter builds an analogy to financial options and draws on principles of option pricing to account for this uncertainty in the valuation of privacy. For this purpose, the development of a data subject's personal attributes over time and the development of the attribute distribution in the population are modeled as two stochastic processes, which fit into the Binomial Option Pricing Model (BOPM). Possible applications of such valuation methods to guide decision support in future privacy-enhancing technologies (PETs) are sketched.

  17. Safety and Privacy in Vehicular Communications

    NASA Astrophysics Data System (ADS)

    Domingo-Ferrer, Josep; Wu, Qianhong

    Vehicular ad hoc networks (VANETs) will improve traffic safety and efficiency provided that car-to-car communication stays trustworthy. Therefore, it is crucial to ensure that the information conveyed by vehicle-generated messages is reliable. A sensible option is to request that the content of a message originated by a certain vehicle be endorsed by nearby peer vehicles. However, neither message generation nor message endorsement should entail any privacy loss on the part of vehicles co-operating in it. This chapter surveys the available solutions to this security-privacy tension and analyzes their limitations. A new privacy-preserving system is sketched which guarantees message authentication through both a priori and a posteriori countermeasures.

  18. Privacy policies for health social networking sites.

    PubMed

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data.

  19. 77 FR 60131 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-02

    ... will be open to the public. DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The DHS...

  20. 76 FR 58524 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-21

    ... be open to the public. DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The DHS...

  1. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section 332.2 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a)...

  2. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board shall ensure that all persons involved in the design, development, operation, or maintenance of...

  3. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  4. 48 CFR 52.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Privacy Act Notification....224-1 Privacy Act Notification. As prescribed in 24.104, insert the following clause in solicitations... required to accomplish an agency function: Privacy Act Notification (APR 1984) The Contractor will...

  5. 32 CFR 724.811 - Privacy Act information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of...

  6. How Does the Family Rights and Privacy Act Affect You?

    ERIC Educational Resources Information Center

    Toglia, Thomas V.

    2007-01-01

    Enacted in 1974 to oversee the privacy, discharge, and accuracy of educational records, the Family Educational Rights and Privacy Act (FERPA) has significant implications for teachers and administrators, who should stay informed regarding its current policies and practices, and when in doubt seek legal advice regarding the privacy and disclosure…

  7. 48 CFR 52.239-1 - Privacy or Security Safeguards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Privacy or Security....239-1 Privacy or Security Safeguards. As prescribed in 39.107, insert a clause substantially the same as the following: Privacy or Security Safeguards (AUG 1996) (a) The Contractor shall not publish...

  8. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  9. 47 CFR 0.506 - FOIA and Privacy Act requests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false FOIA and Privacy Act requests. 0.506 Section 0... Declassification of National Security Information § 0.506 FOIA and Privacy Act requests. Requests for....461), of the Privacy Act of 1974, (See § 0.554) shall be processed in accordance with the...

  10. 49 CFR 801.56 - Unwarranted invasion of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Unwarranted invasion of personal privacy. 801.56... Unwarranted invasion of personal privacy. Pursuant to 5 U.S.C. 552(b)(6), any personal, medical, or similar... a clearly unwarranted invasion of the person's personal privacy....

  11. 32 CFR 806b.51 - Privacy and the Web.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy and the Web. 806b.51 Section 806b.51 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Disclosing Records to Third Parties § 806b.51 Privacy and the Web. Do not post...

  12. 10 CFR 1008.6 - Procedures for Privacy Act requests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Procedures for Privacy Act requests. 1008.6 Section 1008.6 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) RECORDS MAINTAINED ON INDIVIDUALS (PRIVACY ACT) Requests for Access or Amendment § 1008.6 Procedures for Privacy Act requests. (a) Any individual may— (1)...

  13. Privacy Concerns: The Effects of the Latest FERPA Changes

    ERIC Educational Resources Information Center

    Cossler, Christine

    2010-01-01

    Privacy, something once taken for granted, has again become top-of-mind for public school districts thanks to technology's increasing reach, as well as new changes to privacy laws governing student information. Recently, educators have had to face important changes to the Family Educational Rights and Privacy Act (FERPA), originally signed into…

  14. 5 CFR 1205.4 - Disclosure of Privacy Act records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Disclosure of Privacy Act records. 1205.4 Section 1205.4 Administrative Personnel MERIT SYSTEMS PROTECTION BOARD ORGANIZATION AND PROCEDURES PRIVACY ACT REGULATIONS General Provisions § 1205.4 Disclosure of Privacy Act records. (a) Except as...

  15. 48 CFR 352.224-70 - Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Privacy Act. 352.224-70... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.224-70 Privacy Act. As prescribed in 324.103(b)(2), the Contracting Officer shall insert the following clause: Privacy Act...

  16. 32 CFR 701.119 - Privacy and the web.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy and the web. 701.119 Section 701.119 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web....

  17. Notes on the tension between privacy and surveillance in nursing.

    PubMed

    Johnson, Martin

    2005-05-31

    Given their 24 hour responsibility for care in many settings, nurses are the main arbiters of the privacy afforded or denied to patients. In this article the author delineates four aspects of privacy, namely: bodily privacy, space privacy, information privacy, and privacy of individual behaviour. He draws on a range of recent evidence that points to people's experiences of health care being unsatisfactory in terms of privacy, and offers explanations as to why much patient privacy is impossible. He argues that the patients' need for privacy is to a large extent in competition with the professional need for surveillance, noting that while nurses and others do maintain some patient expectations of privacy, these expectations are artificially low on the part of nurses, who are predisposed to invade privacy as an unconscious aspect of their maintenance of professional power. The author provides a discussion of the theoretical basis of this viewpoint, drawing on important insights from Foucault and Goffman, and concludes that an awareness of these issues can help to re-balance the tension between the need for privacy and the need for surveillance.

  18. 76 FR 37823 - Published Privacy Impact Assessments on the Web

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-28

    ... SECURITY Office of the Secretary Published Privacy Impact Assessments on the Web AGENCY: Privacy Office... assessments were approved and published on the Privacy Office's Web site between March 31, 2011 and May 31, 2011. DATES: The PIAs will be available on the DHS Web site until August 29, 2011, after which they...

  19. 77 FR 46100 - Published Privacy Impact Assessments on the Web

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-02

    ... SECURITY Office of the Secretary Published Privacy Impact Assessments on the Web AGENCY: Privacy Office... Privacy Office's Web site between March 1, 2012 and May 31, 2012. DATES: The PIAs will be available on the DHS Web site until October 1, 2012, after which they may be obtained by contacting the DHS...

  20. 76 FR 78934 - Published Privacy Impact Assessments on the Web

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-20

    ... SECURITY Office of the Secretary Published Privacy Impact Assessments on the Web AGENCY: Privacy Office... approved and published on the Privacy Office's web site between September 1, 2011 and November 30, 2011. DATES: The PIAs will be available on the DHS Web site until February 21, 2012, after which they may...

  1. 78 FR 5787 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-28

    ... Secretary of Defense established a new Privacy Act System of Records entitled ``Public Affairs Management Information System.'' This notice responds to comments received on the Privacy Act Systems of Records Notice...) 372-0461. SUPPLEMENTARY INFORMATION: The Privacy Act Systems of Records Notice was published...

  2. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board shall ensure that all persons involved in the design, development, operation, or maintenance of...

  3. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board shall ensure that all persons involved in the design, development, operation, or maintenance of...

  4. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board shall ensure that all persons involved in the design, development, operation, or maintenance of...

  5. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board shall ensure that all persons involved in the design, development, operation, or maintenance of...

  6. Footprints near the Surf: Individual Privacy Decisions in Online Contexts

    ERIC Educational Resources Information Center

    McDonald, Aleecia M.

    2010-01-01

    As more people seek the benefits of going online, more people are exposed to privacy risks from their time online. With a largely unregulated Internet, self-determination about privacy risks must be feasible for people from all walks of life. Yet in many cases decisions are either not obvious or not accessible. As one example, privacy policies are…

  7. 75 FR 53262 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-31

    ... certain provisions of the Privacy Act in order to avoid interference with the national security and... of Privacy and Civil Liberties, National Place Building, 1331 Pennsylvania Ave., NW., Suite 940... Privacy Act in order to avoid interference with the law enforcement, intelligence and...

  8. 32 CFR 701.109 - Privacy Act (PA) appeals.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy Act (PA) appeals. 701.109 Section 701.109 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.109 Privacy Act (PA) appeals....

  9. 75 FR 76784 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-09

    ... (OMB) as required by 5 U.S.C. Section 552a(r) (Privacy Act) and guidelines issued by OMB (65 FR 77677... AFFAIRS Privacy Act of 1974; System of Records AGENCY: Department of Veterans Affairs (VA). ACTION: Notice of Establishment of New System of Records. SUMMARY: The Privacy Act of 1974, (5 U.S.C....

  10. 78 FR 25414 - Privacy Act of 1974, System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-01

    ...; ] AGENCY FOR INTERNATIONAL DEVELOPMENT Privacy Act of 1974, System of Records AGENCY: United States Agency... of records maintained in accordance with the Privacy Act of 1974, (5 U.S.C. 552a), as amended... comments: Paper Comments Fax: (703) 666-1466. Mail: Chief Privacy Officer, United States Agency...

  11. 77 FR 24183 - Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-23

    ... PROTECTION Privacy Act of 1974, as Amended AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice of Proposed Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974, as amended, the Bureau of Consumer Financial Protection, hereinto referred to as the Consumer Financial...

  12. 76 FR 39406 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... Homeland Security Advisory Committees System of Records Notice (October 3, 2008, 73 FR 63181). Effects of... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Request for Applicants for Appointment to the DHS Data Privacy...

  13. 75 FR 8087 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... FR 71659). DHS Authority to Collect This Information: DHS requests that you voluntarily submit this... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The DHS Data Privacy and...

  14. 77 FR 37685 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-22

    ... Department of Homeland Security Advisory Committees System of Records Notice (October 3, 2008, 73 FR 63181... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Request for Applicants for Appointment to the DHS Data Privacy...

  15. 78 FR 55088 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-09

    ... 3, 2008, 73 FR 63181). Effects of Not Providing Information: You may choose not to provide the... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Request for Applicants for Appointment to the DHS Data Privacy...

  16. 75 FR 52769 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... Lists System of Records Notice (November 25, 2008, 73 FR 71659). Effects of Not Providing Information... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Notice of Federal Advisory Committee meeting. SUMMARY: The DHS Data Privacy and...

  17. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a..., disclose any nonpublic personal information about a consumer to a nonaffiliated third party other than...

  18. 78 FR 51197 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-20

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The DHS Data.... Instructions: All submissions must include the words ``Department of Homeland Security Data Privacy...

  19. Legislation for Personal Privacy: Its Impact on Transborder Data Flow.

    ERIC Educational Resources Information Center

    Mendelsohn, L. D.

    1987-01-01

    This description of the development of privacy protection laws in several developed nations identifies possible motivations for such legislation other than protection of citizens' privacy, including economic factors and national sovereignty. The impact of privacy legislation on international trade is discussed. (20 references) (CLB)

  20. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a... creating new IT systems or when initiating new electronic collections of IIF. See DOD Memo of 28 Oct...

  1. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a... creating new IT systems or when initiating new electronic collections of IIF. See DOD Memo of 28 Oct...

  2. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a... creating new IT systems or when initiating new electronic collections of IIF. See DOD Memo of 28 Oct...

  3. Privacy Preserving Publication of Moving Object Data

    NASA Astrophysics Data System (ADS)

    Bonchi, Francesco

    The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise, and actionable knowledge is the key step. However, the analysis of mobility data is a critic task by the privacy point of view: in fact, the peculiar nature of location data might enable intrusive inferences in the life of the individuals whose data is analyzed. It is thus important to develop privacy-preserving techniques for the publication and the analysis of mobility data.

  4. The Genetic Privacy Act and commentary

    SciTech Connect

    Annas, G.J.; Glantz, L.H.; Roche, P.A.

    1995-02-28

    The Genetic Privacy Act is a proposal for federal legislation. The Act is based on the premise that genetic information is different from other types of personal information in ways that require special protection. Therefore, to effectively protect genetic privacy unauthorized collection and analysis of individually identifiable DNA must be prohibited. As a result, the premise of the Act is that no stranger should have or control identifiable DNA samples or genetic information about an individual unless that individual specifically authorizes the collection of DNA samples for the purpose of genetic analysis, authorized the creation of that private information, and has access to and control over the dissemination of that information.

  5. Location Privacy Protection on Social Networks

    NASA Astrophysics Data System (ADS)

    Zhan, Justin; Fang, Xing

    Location information is considered as private in many scenarios. Protecting location information on mobile ad-hoc networks has attracted much research in past years. However, location information protection on social networks has not been paid much attention. In this paper, we present a novel location privacy protection approach on the basis of user messages in social networks. Our approach grants flexibility to users by offering them multiple protecting options. To the best of our knowledge, this is the first attempt to protect social network users' location information via text messages. We propose five algorithms for location privacy protection on social networks.

  6. Privacy Preservation over Untrusted Mobile Networks

    NASA Astrophysics Data System (ADS)

    Ardagna, Claudio A.; Jajodia, Sushil; Samarati, Pierangela; Stavrou, Angelos

    The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile network operators. These operators are typically assumed to be trusted and to manage the information they collect in a privacy-preserving way. Such information, however, is extremely sensitive and coveted by many companies, which may use it to improve their business. In this context, safeguarding the users’ privacy against the prying eyes of the network operators is an emerging requirement.

  7. Privacy issues in second stage genomics.

    PubMed

    Robertson, J A

    1999-01-01

    Research that identifies genes useful in the prevention and treatment of disease will require access to biologic samples and medical records protected by traditional notions of privacy and confidentiality. Resolving conflicts between privacy and genomic research will require articulating the ethical rules that should govern such practices and then implementing those rules in the national, regional, or local health systems in which the data of interest exists. As consensus develops about the ethical rules that should govern such research, attention will shift to the practical and political problems of installing and implementing those rules in the agencies and institutions where such research will occur.

  8. Privacy protection: implications for public health researchers.

    PubMed

    Lane, Margaret J

    Recent privacy legislation and other existing controls on medical research in Australia have raised a number of issues for instituional ethics committees and medical researchers. Some legislation, such as the federal electoral laws, has made it increasingly difficult for researchers to engage in community-based case-control studies. One proposal to alleviate this difficulty is to give a body such as the Australian Institute of Health wider access to health information. This proposal is consistent with public opinion regarding privacy in the context of medical research.

  9. Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection.

    PubMed

    Chen, Hsuan-Ting; Chen, Wenghong

    2015-01-01

    Sampling 515 college students, this study investigates how privacy protection, including profile visibility, self-disclosure, and friending, are influenced by privacy concerns and efficacy regarding one's own ability to manage privacy settings, a factor that researchers have yet to give a great deal of attention to in the context of social networking sites (SNSs). The results of this study indicate an inconsistency in adopting strategies to protect privacy, a disconnect from limiting profile visibility and friending to self-disclosure. More specifically, privacy concerns lead SNS users to limit their profile visibility and discourage them from expanding their network. However, they do not constrain self-disclosure. Similarly, while self-efficacy in privacy management encourages SNS users to limit their profile visibility, it facilitates self-disclosure. This suggests that if users are limiting their profile visibility and constraining their friending behaviors, it does not necessarily mean they will reduce self-disclosure on SNSs because these behaviors are predicted by different factors. In addition, the study finds an interaction effect between privacy concerns and self-efficacy in privacy management on friending. It points to the potential problem of increased risk-taking behaviors resulting from high self-efficacy in privacy management and low privacy concerns.

  10. Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection.

    PubMed

    Chen, Hsuan-Ting; Chen, Wenghong

    2015-01-01

    Sampling 515 college students, this study investigates how privacy protection, including profile visibility, self-disclosure, and friending, are influenced by privacy concerns and efficacy regarding one's own ability to manage privacy settings, a factor that researchers have yet to give a great deal of attention to in the context of social networking sites (SNSs). The results of this study indicate an inconsistency in adopting strategies to protect privacy, a disconnect from limiting profile visibility and friending to self-disclosure. More specifically, privacy concerns lead SNS users to limit their profile visibility and discourage them from expanding their network. However, they do not constrain self-disclosure. Similarly, while self-efficacy in privacy management encourages SNS users to limit their profile visibility, it facilitates self-disclosure. This suggests that if users are limiting their profile visibility and constraining their friending behaviors, it does not necessarily mean they will reduce self-disclosure on SNSs because these behaviors are predicted by different factors. In addition, the study finds an interaction effect between privacy concerns and self-efficacy in privacy management on friending. It points to the potential problem of increased risk-taking behaviors resulting from high self-efficacy in privacy management and low privacy concerns. PMID:25584726

  11. 78 FR 39021 - Privacy Act of 1974; Privacy and Civil Liberties Oversight Board; System of Records Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-28

    ... Request Files''. DATES: Written comments should be submitted on or before July 29, 2013. This new system... proposed creation of a system of records for FOIA and Privacy Act case files. SYSTEM OF RECORDS PCLOB--1, Freedom of Information Act and Privacy Act Files. SYSTEM NAME: Privacy and Civil Liberties Oversight...

  12. Does privacy matter? Former patients discuss their perceptions of privacy in shared hospital rooms.

    PubMed

    Malcolm, Helen A

    2005-03-01

    As a relative concept, privacy is difficult to define in universal terms. In the New Zealand setting recent legislation aims to protect patients' privacy but anecdotal evidence suggests that these policies are not well understood by some providers and recipients of health care. This qualitative study set out to identify some of the issues by exploring former patients' perceptions of privacy in shared hospital rooms. The findings suggest a conditional acceptance of a loss of privacy in an environment dictated by architectural structure and by fiscal and time constraints. Participants indicated an awareness that personal information could be overheard and that their preference for a choice of setting for serious discussions was desirable. Some enjoyed the support offered in shared rooms, while, for others, overhearing another person's health issues caused unnecessary distress. The participants suggested that knowing they could be overheard constrained information disclosure. This withholding of information has implications for health professionals' ability to diagnose and treat patients appropriately.

  13. 77 FR 15835 - Privacy Act of 1974: Revision of Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... amending its Privacy Act System of Records Notice, which was previously published at 74 FR 14890 (April 1..., Madison, WI 53715. Springfield Branch Office 330 Ginger Creek Road, Suite B, Springfield, IL 62711....

  14. Differential Privacy Preserving in Big Data Analytics for Connected Health.

    PubMed

    Lin, Chi; Song, Zihao; Song, Houbing; Zhou, Yanhong; Wang, Yi; Wu, Guowei

    2016-04-01

    In Body Area Networks (BANs), big data collected by wearable sensors usually contain sensitive information, which is compulsory to be appropriately protected. Previous methods neglected privacy protection issue, leading to privacy exposure. In this paper, a differential privacy protection scheme for big data in body sensor network is developed. Compared with previous methods, this scheme will provide privacy protection with higher availability and reliability. We introduce the concept of dynamic noise thresholds, which makes our scheme more suitable to process big data. Experimental results demonstrate that, even when the attacker has full background knowledge, the proposed scheme can still provide enough interference to big sensitive data so as to preserve the privacy.

  15. Privacy and human behavior in the age of information.

    PubMed

    Acquisti, Alessandro; Brandimarte, Laura; Loewenstein, George

    2015-01-30

    This Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and behavioral sciences: people's uncertainty about the consequences of privacy-related behaviors and their own preferences over those consequences; the context-dependence of people's concern, or lack thereof, about privacy; and the degree to which privacy concerns are malleable—manipulable by commercial and governmental interests. Organizing our discussion by these themes, we offer observations concerning the role of public policy in the protection of privacy in the information age.

  16. The role of privacy protection in healthcare information systems adoption.

    PubMed

    Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui

    2013-10-01

    Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.

  17. Ethical and Privacy Principles for Learning Analytics

    ERIC Educational Resources Information Center

    Pardo, Abelardo; Siemens, George

    2014-01-01

    The massive adoption of technology in learning processes comes with an equally large capacity to track learners. Learning analytics aims at using the collected information to understand and improve the quality of a learning experience. The privacy and ethical issues that emerge in this context are tightly interconnected with other aspects such as…

  18. Information Security and Privacy in Network Environments.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Office of Technology Assessment.

    The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…

  19. 77 FR 28478 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-15

    ... on July 26, 2011, at 76 FR 44656 adopting the Privacy Act systems of records formerly maintained by...' Office of Chief Counsel as published on November 15, 2011, at 76 FR 70640, as well as, the final rule published on January 11, 2012, at 77 FR 1632 regarding records maintained by Treasury's Office of...

  20. 75 FR 65229 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-22

    ... Register at 71 FR 69613 to amend the title to ``Enrolled Agents and Resigned Enrolled Agents.'' A... FURTHER INFORMATION CONTACT: Dale Underwood, Privacy Act officer, Department of the Treasury, 1500....underwood@do.treas.gov . SUPPLEMENTARY INFORMATION: The Department of the Treasury is publishing...

  1. Security and Privacy at a Public University.

    ERIC Educational Resources Information Center

    Bomzer, Herbert W.

    The data center and the user offices at a public university have a responsibility to maintain security and to protect the privacy of the individuals whose data they process. This persists even though much personal data are accessible in libraries. How to identify "private" data, what security precautions to take to protect these data from being…

  2. Privacy commission report contains serious flaws.

    PubMed

    Murphy, S S

    1979-01-01

    Few will argue that confidentiality of the patient medical record is a real concern, particularly at a time when demands for information from the medical record are numerous and constantly increasing. However, the recommendations of the Privacy Protection Study Commission, if implemented, could cause severe problems for hospitals. The author discusses those recommendations and why they cause concern.

  3. 77 FR 15585 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... Register (76 FR 56-57). During the comment period, two public comments were received. The first commenter... specific answers submitted and the answer key. Releasing this information to the individual will compromise... answer keys should be at the discretion of the test taker, i.e., U.S. citizens.'' The Privacy...

  4. Privacy and the Private Eye in Space.

    ERIC Educational Resources Information Center

    Smith, William E.

    Land remote-sensing satellites are developing as a commercial communications technology after years under a government monopoly. The shift to the private sector and improving quality of the pictures produced have given rise to increased concerns about the potential for violations of privacy rights. Although satellites can currently photograph only…

  5. The ABCs of Privacy Practices for Educators

    ERIC Educational Resources Information Center

    Dark, Melissa J.; McPherson, Clewin; Troutner, Joanne

    2008-01-01

    Over the last year, the number of reported cases of confidential information lost because of stolen laptops, lost USB flash drives, misplaced PDAs, and simple human error has significantly increased. These trends have school districts concerned with issues of violating private information. Laws such as the Family Educational Rights and Privacy Act…

  6. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 5 2013-04-01 2013-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued) OFFICE OF ASSISTANT SECRETARY FOR HOUSING-FEDERAL HOUSING COMMISSIONER, DEPARTMENT OF HOUSING AND...

  7. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 5 2012-04-01 2012-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued) OFFICE OF ASSISTANT SECRETARY FOR HOUSING-FEDERAL HOUSING COMMISSIONER, DEPARTMENT OF HOUSING AND...

  8. 77 FR 59548 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-28

    ... 14, 2010, beginning at 75 FR 2086. The final rule exempting Treasury/DO .220--SIGTARP Hotline Database was published on June 28, 2010, at 75 FR 36536. This regulation is being published as a final rule... Office of the Secretary 31 CFR Part 1 RIN 1505-AC32 Privacy Act; Implementation AGENCY: Office of...

  9. Human Flesh Search Engine and Online Privacy.

    PubMed

    Zhang, Yang; Gao, Hong

    2016-04-01

    Human flesh search engine can be a double-edged sword, bringing convenience on the one hand and leading to infringement of personal privacy on the other hand. This paper discusses the ethical problems brought about by the human flesh search engine, as well as possible solutions.

  10. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 5 2014-04-01 2014-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued) OFFICE OF ASSISTANT SECRETARY FOR HOUSING-FEDERAL HOUSING COMMISSIONER, DEPARTMENT OF HOUSING AND......

  11. Technology and Privacy in the Academic Library.

    ERIC Educational Resources Information Center

    Fifarek, Aimee

    2002-01-01

    Describes potential situations where patron privacy can be endangered by the presence of information technology and how academic librarians can protect patron information and prepare patrons for safe information seeking in the online world. Discusses the USA PATRIOT Act, search warrants, and acceptable use policy. (Author/LRW)

  12. 76 FR 25409 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... System-VA'' (97VA105) as set forth in the Federal Register 72 FR 46130-46133 dated August 16, 2007. VA is... and Budget (OMB) as required by 5 U.S.C. 552a(r) (Privacy Act) and guidelines issued by OMB (65 FR... compensation, pension, education and rehabilitation benefits, information related to incarceration in a...

  13. 77 FR 4645 - Privacy Act Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-31

    ... regulation. See 76 FR 51869 (Aug. 19, 2011). The revised Privacy Act regulation (12 CFR part 1204) provided...-day public comment period for the interim final regulation closed on October 18, 2011. See 76 FR 51869... interim final regulation amending 12 CFR part 1204 that was published in the Federal Register at 76...

  14. 78 FR 18473 - Army Privacy Act Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-27

    ... Register (71 FR 46052), the Department of the Army issued a final rule. This final rule corrects the... Department of the Army 32 CFR Part 505 Army Privacy Act Program AGENCY: Department of the Army, DoD. ACTION: Final rule. SUMMARY: The Department of the Army is amending its rule on notification of the...

  15. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Privacy protections. 1314.45 Section 1314.45 Food... Administration and to State and local law enforcement agencies. (b) The information in the logbooks shall not be... releases information in a logbook to Federal, State, or local law enforcement authorities is immune...

  16. 77 FR 56914 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-14

    ... related to drug abuse, alcoholism or alcohol abuse, sickle cell anemia or infection with the human... abuse, sickle cell anemia or infection with the human immunodeficiency virus, that information cannot be... Management and Budget (OMB) as required by 5 U.S.C. 552a(r) (Privacy Act) and guidelines issued by OMB (65...

  17. Privacy Issues and Personnel Information Systems.

    ERIC Educational Resources Information Center

    Grenard, Nancy C.

    1982-01-01

    Records management policy and clear guidelines, communicated campus-wide, are needed so that requests for personnel information are handled consistently and with respect for the privacy of employees. Suggestions for policy formation and current efforts on campuses are outlined. (MSE)

  18. Privacy protection schemes for fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  19. Commercial Use Without Consent: Privacy or Property?

    ERIC Educational Resources Information Center

    Riley, Sam G.; Shandle, Jack

    The question of whether protection against unauthorized use of a person's name of likeness for commercial gain is subsumed under property rights or the right to privacy remains unsettled. The thesis of this article is that either area may be appropriate, depending on the plaintiff's motivation in bringing the action. The case of Lugosi v.…

  20. Measuring and Modeling Security and Privacy Laws

    ERIC Educational Resources Information Center

    Romanosky, Sasha

    2012-01-01

    This manuscript presents empirical and analytical analysis and discussion of security and privacy laws. The introduction, together with the three substantive chapters each represent separate research papers written as partial fulfillment of my PhD dissertation in the Heinz College, Carnegie Mellon University. Chapter 2 is an abbreviated version of…

  1. Job Specific Behavioral & Environmental Privacy Regulation.

    ERIC Educational Resources Information Center

    Werner, Carol; Haggard, Lois

    The findings from a study of 42 administrators in a large metropolitan school district supported the hypothesis that the use of privacy regulation mechanisms is deliberate and dynamic. The researchers considered the age and sex of the administrators, the length of time they'd held their current jobs, their tendencies toward Type A or Type B…

  2. 78 FR 69551 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is..., Safety, Health, and Environmental Management Records. This direct final rule makes...

  3. 77 FR 56771 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-14

    ... rule makes non-substantive changes to the Department of the Navy's Program rules. This will improve the... change, including any personal identifiers or contact information. FOR FURTHER INFORMATION CONTACT: Ms... nonsubstantive changes dealing with DoD's management of its Privacy Programs. DoD expects no opposition to...

  4. 78 FR 69291 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... administrative enforcement requirements. This direct final rule makes non-substantive changes to the NGA Program rules. These changes will allow the Department to add exemption rules to the NGA Privacy Program rules....regulations.gov as they are received without change, including any personal identifiers or contact...

  5. 78 FR 69289 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... administrative enforcement requirements. This direct final rule makes non-substantive changes to the NGA Program rules. These changes will allow the Department to add exemption rules to the NGA Privacy Program rules....regulations.gov as they are received without change, including any personal identifiers or contact...

  6. New Technology "Clouds" Student Data Privacy

    ERIC Educational Resources Information Center

    Krueger, Keith R.; Moore, Bob

    2015-01-01

    As technology has leaped forward to provide valuable learning tools, parents and policy makers have begun raising concerns about the privacy of student data that schools and systems have. Federal laws are intended to protect students and their families but they have not and will never be able to keep up with rapidly evolving technology. School…

  7. 76 FR 51869 - Privacy Act Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-19

    ... regulation on the Privacy Act at 12 CFR part 1204 (74 FR 33907 (July 14, 2009)). The final regulation... America or an alien lawfully admitted for permanent residence. Maintain includes collect, use, disseminate... Act) about a record or to retrieve a record shipped offsite for storage. If you submit your...

  8. 76 FR 22613 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-22

    ... Management System'' from subsections (c)(3); (d)(1), (2), (3), (4); (e)(1) and (e)(4)(G), (H), (I); and (f... security or foreign policy information. (B) From subsections (d)(1), (2), (3) and (4) (record subject's...), (2), (3), and (4); (e)(1) and (e)(4)(G), (H), and (I); and (f) of the Privacy Act pursuant to 5...

  9. Towards Practical Privacy-Preserving Internet Services

    ERIC Educational Resources Information Center

    Wang, Shiyuan

    2012-01-01

    Today's Internet offers people a vast selection of data centric services, such as online query services, the cloud, and location-based services, etc. These internet services bring people a lot of convenience, but at the same time raise privacy concerns, e.g., sensitive information revealed by the queries, sensitive data being stored and…

  10. 77 FR 15593 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency (DIA) is... the Defense Intelligence Agency Program rules. These changes will allow the Department to...

  11. 77 FR 15594 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ..., ``Foreign Intelligence and Counterintelligence Operation Records'' (June 15, 2010, 75 FR 33791). This will... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is...

  12. 76 FR 49658 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ..., ``Investigations and Complaints'' (July 19, 2006, 71 FR 41006). This will improve the efficiency and effectiveness... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is...

  13. 76 FR 49659 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency (DIA) is... the Defense Intelligence Agency Program rules. These changes will allow the Department to...

  14. 75 FR 34634 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-18

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE National Geospatial-Intelligence Agency 32 CFR Part 320 Privacy Act; Implementation CFR Correction In Title... (b)(2), revise ``NIMA'' to read ``NGA''. PART 320--NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY...

  15. 77 FR 15592 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency (DIA) is... rule makes nonsubstantive changes to the Defense Intelligence Agency Program rules. This will...

  16. 77 FR 15590 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is.... This direct final rule makes nonsubstantive changes to the Defense Intelligence Agency (DIA)...

  17. 77 FR 57016 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is... Intelligence Agency Program rules. These changes will allow the Department to add exemption rules to the...

  18. Stratospheric Transparency: Perspectives on Internet Privacy

    ERIC Educational Resources Information Center

    Hauck, Rita M.

    2009-01-01

    As a parent of teenagers in the 1980s, I recall a concern of the intrusion by MTV into our home. After futile attempts to block the program, my spouse and I set out to convince our sons of its intrusion. Our challenge was miniscule when compared to the Internet privacy issues of today. This paper addresses such challenges and proposes some…

  19. Randomization Based Privacy Preserving Categorical Data Analysis

    ERIC Educational Resources Information Center

    Guo, Ling

    2010-01-01

    The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves sensitive information of individuals, the public has expressed a deep concern about their privacy.…

  20. 28 CFR 22.23 - Privacy certification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... STATISTICAL INFORMATION § 22.23 Privacy certification. (a) Each applicant for BJA, OJJDP, BJS, NIJ, or OJP... approval of a grant application or contract proposal which has a research or statistical project component... revealed for research or statistical purposes and that compliance with requests for information is...

  1. 28 CFR 22.23 - Privacy certification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... STATISTICAL INFORMATION § 22.23 Privacy certification. (a) Each applicant for BJA, OJJDP, BJS, NIJ, or OJP... approval of a grant application or contract proposal which has a research or statistical project component... revealed for research or statistical purposes and that compliance with requests for information is...

  2. 28 CFR 22.23 - Privacy certification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... STATISTICAL INFORMATION § 22.23 Privacy certification. (a) Each applicant for BJA, OJJDP, BJS, NIJ, or OJP... approval of a grant application or contract proposal which has a research or statistical project component... revealed for research or statistical purposes and that compliance with requests for information is...

  3. 28 CFR 22.23 - Privacy certification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... STATISTICAL INFORMATION § 22.23 Privacy certification. (a) Each applicant for BJA, OJJDP, BJS, NIJ, or OJP... approval of a grant application or contract proposal which has a research or statistical project component... revealed for research or statistical purposes and that compliance with requests for information is...

  4. HIPAA privacy implementation issues in Pennsylvania healthcare facilities.

    PubMed

    Firouzan, Patricia Anania; McKinnon, James

    2004-04-30

    A 20-question survey was sent in the mail to HIM directors in Pennsylvania healthcare facilities to solicit feedback regarding implementation issues of the HIPAA privacy rule requirements. Questions focused on gathering basic demographic data, information on HIM involvement with the privacy rule requirements, the procedures whereby facilities were meeting the privacy rule requirements, occurrences of confidentiality breaches, and respondents' perceptions about the privacy rule. Findings suggested that HIM professionals continue to be involved with many areas of the privacy rule and have taken on new responsibilities with this involvement. Findings also suggested that respondents did not think the privacy rule would prevent future confidentiality breaches. Only half of respondents thought that the privacy regulations were even necessary. Many respondents felt their level of importance within their facility increased.

  5. Personalized privacy-preserving frequent itemset mining using randomized response.

    PubMed

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy.

  6. Privacy preserving index for encrypted electronic medical records.

    PubMed

    Chen, Yu-Chi; Horng, Gwoboa; Lin, Yi-Jheng; Chen, Kuo-Chang

    2013-12-01

    With the development of electronic systems, privacy has become an important security issue in real-life. In medical systems, privacy of patients' electronic medical records (EMRs) must be fully protected. However, to combine the efficiency and privacy, privacy preserving index is introduced to preserve the privacy, where the EMR can be efficiently accessed by this patient or specific doctor. In the literature, Goh first proposed a secure index scheme with keyword search over encrypted data based on a well-known primitive, Bloom filter. In this paper, we propose a new privacy preserving index scheme, called position index (P-index), with keyword search over the encrypted data. The proposed index scheme is semantically secure against the adaptive chosen keyword attack, and it also provides flexible space, lower false positive rate, and search privacy. Moreover, it does not rely on pairing, a complicate computation, and thus can search over encrypted electronic medical records from the cloud server efficiently.

  7. Personalized Privacy-Preserving Frequent Itemset Mining Using Randomized Response

    PubMed Central

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy. PMID:25143989

  8. Privacy preserving interactive record linkage (PPIRL)

    PubMed Central

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Objective Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human–machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. Methods In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. Results We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Conclusions Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human–machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility. PMID:24201028

  9. More Than Defense in Daily Experience of Privacy: The Functions of Privacy in Digital and Physical Environments.

    PubMed

    Lombardi, Debora Benedetta; Ciceri, Maria Rita

    2016-02-01

    The purpose of the current study was to investigate the experience of privacy, focusing on its functional role in personal well-being. A sample (N = 180) comprised subjects between 18 and 50 years of age were asked to spontaneously provide accounts of their experiences with privacy and answer close-ended questions to acquire a description of a daily experience of privacy. The results showed the importance attributed to the function of privacy related to the "defense from social threats", and the twofold function of privacy related to an "achieved state of privacy", in the terms of both "system maintenance" and "system development". The results also shed light on the role of the environment in shaping one's experience of privacy. Specifically, the participants recognized more easily the function of defense from threats related to seeking privacy while interacting in digital environments, whereas they seemed to benefit from positive functions related to an achieved state of privacy in physical environments. The findings sustain the notion of privacy as a supportive condition for some psychological processes involved in the positive human functioning and confirm previous studies conducted on the role of privacy in human well-being.

  10. Disentangling privacy from property: toward a deeper understanding of genetic privacy.

    PubMed

    Suter, Sonia M

    2004-04-01

    With the mapping of the human genome, genetic privacy has become a concern to many. People care about genetic privacy because genes play an important role in shaping us--our genetic information is about us, and it is deeply connected to our sense of ourselves. In addition, unwanted disclosure of our genetic information, like a great deal of other personal information, makes us vulnerable to unwanted exposure, stigmatization, and discrimination. One recent approach to protecting genetic privacy is to create property rights in genetic information. This Article argues against that approach. Privacy and property are fundamentally different concepts. At heart, the term "property" connotes control within the marketplace and over something that is disaggregated or alienable from the self. "Privacy," in contrast, connotes control over access to the self as well as things close to, intimately connected to, and about the self. Given these different meanings, a regime of property rights in genetic information would impoverish our understanding of that information, ourselves, and the relationships we hope will be built around and through its disclosure. This Article explores our interests in genetic information in order to deepen our understanding of the ongoing discourse about the distinction between property and privacy. It develops a conception of genetic privacy with a strong relational component. We ordinarily share genetic information in the context of relationships in which disclosure is important to the relationship--family, intimate, doctor-patient, researcher-participant, employer-employee, and insurer-insured relationships. Such disclosure makes us vulnerable to and dependent on the person to whom we disclose it. As a result, trust is essential to the integrity of these relationships and our sharing of genetic information. Genetic privacy can protect our vulnerability in these relationships and enhance the trust we hope to have in them. Property, in contrast, by

  11. 17 CFR 160.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Annual privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during...

  12. 17 CFR 160.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Delivering privacy and opt out... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out...

  13. 17 CFR 160.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... privacy notices. 160.6 Section 160.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy notices that...

  14. 17 CFR 160.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Initial privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual...

  15. 16 CFR 313.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Delivering privacy and opt out notices. 313... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt...

  16. 12 CFR 216.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Delivering privacy and opt out notices. 216.9... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt...

  17. 12 CFR 716.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Delivering privacy and opt out notices. 716.9... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out...

  18. 32 CFR 806b.11 - When to give Privacy Act Statements (PAS).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.11 When to give Privacy Act Statements... information. Give a copy of the Privacy Act Statement if asked. Do not ask the person to sign the Privacy Act Statement. (b) A Privacy Act Statement must include four items: (1) Authority: The legal authority, that...

  19. More Than Defense in Daily Experience of Privacy: The Functions of Privacy in Digital and Physical Environments

    PubMed Central

    Lombardi, Debora Benedetta; Ciceri, Maria Rita

    2016-01-01

    The purpose of the current study was to investigate the experience of privacy, focusing on its functional role in personal well-being. A sample (N = 180) comprised subjects between 18 and 50 years of age were asked to spontaneously provide accounts of their experiences with privacy and answer close-ended questions to acquire a description of a daily experience of privacy. The results showed the importance attributed to the function of privacy related to the “defense from social threats”, and the twofold function of privacy related to an “achieved state of privacy”, in the terms of both “system maintenance” and “system development”. The results also shed light on the role of the environment in shaping one’s experience of privacy. Specifically, the participants recognized more easily the function of defense from threats related to seeking privacy while interacting in digital environments, whereas they seemed to benefit from positive functions related to an achieved state of privacy in physical environments. The findings sustain the notion of privacy as a supportive condition for some psychological processes involved in the positive human functioning and confirm previous studies conducted on the role of privacy in human well-being. PMID:27247696

  20. Locating Biobanks in the Canadian Privacy Maze.

    PubMed

    Saulnier, Katie M; Joly, Yann

    2016-03-01

    Although Canada has not yet enacted any biobanking-specific privacy law, guidance and oversight are provided via various federal and provincial health and privacy-related laws as well as via ethics and policy documents. The primary policy document governing health research, the Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans, provides the framework for the strong role of Research Ethics Boards in Canada, and limits research funding from Canada's three main federal funding agencies to those who agree to adhere to its policies. The broad consent model is gaining traction in Canada, although lack of legal and constitutional precedence for the broad consent or opt-out options makes this an evolving issue. In general, data is required to be coded; more specific security measures are outlined in guidelines that may be implemented by local policy. International sharing is allowed, and Canada meets the European Union's standards for receipt of data and samples. PMID:27256119

  1. Redefining Genomic Privacy: Trust and Empowerment

    PubMed Central

    Erlich, Yaniv; Williams, James B.; Glazer, David; Yocum, Kenneth; Farahany, Nita; Olson, Maynard; Narayanan, Arvind; Stein, Lincoln D.; Witkowski, Jan A.; Kain, Robert C.

    2014-01-01

    Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we introduce three principles that facilitate trust in genetic research and outline one possible framework built upon those principles. Our hope is that such trust-centric frameworks provide a sustainable solution that reconciles genetic privacy with data sharing and facilitates genetic research. PMID:25369215

  2. Redefining genomic privacy: trust and empowerment.

    PubMed

    Erlich, Yaniv; Williams, James B; Glazer, David; Yocum, Kenneth; Farahany, Nita; Olson, Maynard; Narayanan, Arvind; Stein, Lincoln D; Witkowski, Jan A; Kain, Robert C

    2014-11-01

    Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we introduce three principles that facilitate trust in genetic research and outline one possible framework built upon those principles. Our hope is that such trust-centric frameworks provide a sustainable solution that reconciles genetic privacy with data sharing and facilitates genetic research. PMID:25369215

  3. Redefining genomic privacy: trust and empowerment.

    PubMed

    Erlich, Yaniv; Williams, James B; Glazer, David; Yocum, Kenneth; Farahany, Nita; Olson, Maynard; Narayanan, Arvind; Stein, Lincoln D; Witkowski, Jan A; Kain, Robert C

    2014-11-01

    Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we introduce three principles that facilitate trust in genetic research and outline one possible framework built upon those principles. Our hope is that such trust-centric frameworks provide a sustainable solution that reconciles genetic privacy with data sharing and facilitates genetic research.

  4. Regulating Privacy and Biobanks in the Netherlands.

    PubMed

    Hendriks, Aart C; van Hellemondt, Rachèl E

    2016-03-01

    The Netherlands does not have any specific legislation pertaining to human biological materials and data collection by biobanks. Instead, these issues are governed by a patchwork of laws, codes of practices, and other ethical instruments, where special emphasis is given to the right to privacy and self-determination. While draft legislation for biobanking was scheduled to enter into force in 2007, as of mid-2015 such legislation was still under consideration, with the intent that it would focus particularly on individual self-determination, the interests of research, the use of bodily materials collected by biobanks for criminal law purposes, and dilemmas around results that are clinically relevant for biobank participants. Under the current framework, the amount of privacy protection afforded to data is linked to its level of identifiability. International sharing of personal data to non-EU/European Economic Area countries is allowed if these countries provide adequate protection.

  5. Simple Peer-to-Peer SIP Privacy

    NASA Astrophysics Data System (ADS)

    Koskela, Joakim; Tarkoma, Sasu

    In this paper, we introduce a model for enhancing privacy in peer-to-peer communication systems. The model is based on data obfuscation, preventing intermediate nodes from tracking calls, while still utilizing the shared resources of the peer network. This increases security when moving between untrusted, limited and ad-hoc networks, when the user is forced to rely on peer-to-peer schemes. The model is evaluated using a Host Identity Protocol-based prototype on mobile devices, and is found to provide good privacy, especially when combined with a source address hiding scheme. The contribution of this paper is to present the model and results obtained from its use, including usability considerations.

  6. Regulating Privacy and Biobanks in the Netherlands.

    PubMed

    Hendriks, Aart C; van Hellemondt, Rachèl E

    2016-03-01

    The Netherlands does not have any specific legislation pertaining to human biological materials and data collection by biobanks. Instead, these issues are governed by a patchwork of laws, codes of practices, and other ethical instruments, where special emphasis is given to the right to privacy and self-determination. While draft legislation for biobanking was scheduled to enter into force in 2007, as of mid-2015 such legislation was still under consideration, with the intent that it would focus particularly on individual self-determination, the interests of research, the use of bodily materials collected by biobanks for criminal law purposes, and dilemmas around results that are clinically relevant for biobank participants. Under the current framework, the amount of privacy protection afforded to data is linked to its level of identifiability. International sharing of personal data to non-EU/European Economic Area countries is allowed if these countries provide adequate protection. PMID:27256125

  7. Biobanking and Privacy Law in Brazil.

    PubMed

    Dallari, Sueli Gandolfi; Castellaro, Felipe Angel Bocchi; Guerriero, Iara Coelho Zito

    2015-01-01

    This article analyzes the current regulatory framework for biobanking, genomic research, and protection of privacy in Brazil. It is divided in four parts. The first describes the biobanking context in Brazil and its evolution in recent years. In the second, the entire regulatory framework on biobanking and genomic research is analyzed. The third part focuses on the critical evaluation of this regulatory framework, specifically on some major ethical dilemmas in biobanking. The fourth part describes the characteristics of the Brazilian biobanking and human research governance system, known as the CEP/CONEP system. Finally, the conclusion summarizes the information in the article and its contribution to the study of the biobanking ethical challenges, especially the protection of privacy. It is highlighted that biobanking regulatory harmonization among countries is necessary, since it increases scientific possibilities that can come from broader cooperation among biobanks and several research centers on the national and international levels. PMID:26711412

  8. The ultimate physical limits of privacy

    NASA Astrophysics Data System (ADS)

    Ekert, Artur; Renner, Renato

    2014-03-01

    Among those who make a living from the science of secrecy, worry and paranoia are just signs of professionalism. Can we protect our secrets against those who wield superior technological powers? Can we trust those who provide us with tools for protection? Can we even trust ourselves, our own freedom of choice? Recent developments in quantum cryptography show that some of these questions can be addressed and discussed in precise and operational terms, suggesting that privacy is indeed possible under surprisingly weak assumptions.

  9. The ultimate physical limits of privacy.

    PubMed

    Ekert, Artur; Renner, Renato

    2014-03-27

    Among those who make a living from the science of secrecy, worry and paranoia are just signs of professionalism. Can we protect our secrets against those who wield superior technological powers? Can we trust those who provide us with tools for protection? Can we even trust ourselves, our own freedom of choice? Recent developments in quantum cryptography show that some of these questions can be addressed and discussed in precise and operational terms, suggesting that privacy is indeed possible under surprisingly weak assumptions.

  10. Protecting patient privacy in clinical data mining.

    PubMed

    Goodwin, Linda K; Prather, Jonathan C

    2002-01-01

    This paper investigates whether HIPAA de-identification requirements--as well as proposed AAMC de-identification standards--were met in a large clinical data mining study (1997-2001) conducted at Duke University prior to the publication of the final rule. While HIPAA has improved de-identification standards, the study also shows that privacy issues may persist even in de-identified large clinical databases.

  11. Preserving Institutional Privacy in Distributed Binary Logistic Regression

    PubMed Central

    Wu, Yuan; Jiang, Xiaoqian; Ohno-Machado, Lucila

    2012-01-01

    Privacy is becoming a major concern when sharing biomedical data across institutions. Although methods for protecting privacy of individual patients have been proposed, it is not clear how to protect the institutional privacy, which is many times a critical concern of data custodians. Built upon our previous work, Grid Binary LOgistic REgression (GLORE) 1 , we developed an Institutional Privacy-preserving Distributed binary Logistic Regression model (IPDLR) that considers both individual and institutional privacy for building a logistic regression model in a distributed manner. We tested our method using both simulated and clinical data, showing how it is possible to protect the privacy of individuals and of institutions using a distributed strategy. PMID:23304425

  12. Achieving network level privacy in Wireless Sensor Networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2010-01-01

    Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.

  13. Modelling information dissemination under privacy concerns in social media

    NASA Astrophysics Data System (ADS)

    Zhu, Hui; Huang, Cheng; Lu, Rongxing; Li, Hui

    2016-05-01

    Social media has recently become an important platform for users to share news, express views, and post messages. However, due to user privacy preservation in social media, many privacy setting tools are employed, which inevitably change the patterns and dynamics of information dissemination. In this study, a general stochastic model using dynamic evolution equations was introduced to illustrate how privacy concerns impact the process of information dissemination. Extensive simulations and analyzes involving the privacy settings of general users, privileged users, and pure observers were conducted on real-world networks, and the results demonstrated that user privacy settings affect information differently. Finally, we also studied the process of information diffusion analytically and numerically with different privacy settings using two classic networks.

  14. Privacy enhanced group communication in clinical environment

    NASA Astrophysics Data System (ADS)

    Li, Mingyan; Narayanan, Sreeram; Poovendran, Radha

    2005-04-01

    Privacy protection of medical records has always been an important issue and is mandated by the recent Health Insurance Portability and Accountability Act (HIPAA) standards. In this paper, we propose security architectures for a tele-referring system that allows electronic group communication among professionals for better quality treatments, while protecting patient privacy against unauthorized access. Although DICOM defines the much-needed guidelines for confidentiality of medical data during transmission, there is no provision in the existing medical security systems to guarantee patient privacy once the data has been received. In our design, we address this issue by enabling tracing back to the recipient whose received data is disclosed to outsiders, using watermarking technique. We present security architecture design of a tele-referring system using a distributed approach and a centralized web-based approach. The resulting tele-referring system (i) provides confidentiality during the transmission and ensures integrity and authenticity of the received data, (ii) allows tracing of the recipient who has either distributed the data to outsiders or whose system has been compromised, (iii) provides proof of receipt or origin, and (iv) can be easy to use and low-cost to employ in clinical environment.

  15. The Genetic Privacy Act and commentary

    SciTech Connect

    Annas, G.J.; Glantz, L.H.; Roche, P.A.

    1995-02-28

    The Genetic Privacy Act is a proposal for federal legislation. The Act is based on the premise that genetic information is different from other types of personal information in ways that require special protection. The DNA molecule holds an extensive amount of currently indecipherable information. The major goal of the Human Genome Project is to decipher this code so that the information it contains is accessible. The privacy question is, accessible to whom? The highly personal nature of the information contained in DNA can be illustrated by thinking of DNA as containing an individual`s {open_quotes}future diary.{close_quotes} A diary is perhaps the most personal and private document a person can create. It contains a person`s innermost thoughts and perceptions, and is usually hidden and locked to assure its secrecy. Diaries describe the past. The information in one`s genetic code can be thought of as a coded probabilistic future diary because it describes an important part of a unique and personal future. This document presents an introduction to the proposal for federal legislation `the Genetic Privacy Act`; a copy of the proposed act; and comment.

  16. Medical information and the right to privacy

    SciTech Connect

    Drell, D.

    1994-06-01

    This report is a compilation of submitted abstracts of papers presented at the DOE-supported workshop on medical information and the right to privacy held at the National Academy of Sciences in Washington, DC, on June 9 and 10, 1994. The aim of this meeting is to provide a forum to discuss the legal, ethical and practical issues related to the computerization and use of medical data, as well as the potential impact the use of these data may have on an individual`s privacy. Topical areas include an overview of the Federal and legal requirements to collect medical data, historical experiences with worker screening programs, currently available medical surveillance technologies (both biomedical and computer technologies) and their limitations. In addition, an-depth assessment of the needs and interests of a wide spectrum of parties as they relate to the use of medical data from both a legal and privacy perspective is provided. The needs of the individual, the public (e.g., blood and tissue banks), private enterprises (e.g., industry and insurance carriers), and the government (e.g., FBI) are discussed. Finally, the practical and legal issues relating to the use of computers to carry, store and transmit this information are also examined. The abstracts are presented in the intended order of presentation as indicated in the agenda for the meeting.

  17. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Model privacy form and examples. 573.2 Section... FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model... compliance with the notice content requirements of §§ 573.6 and 573.7 of this part, although use of the...

  18. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Model privacy form and examples. 40.2 Section... FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model... compliance with the notice content requirements of §§ 40.6 and 40.7 of this part, although use of the...

  19. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Model privacy form and examples. 573.2 Section... FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model... compliance with the notice content requirements of §§ 573.6 and 573.7 of this part, although use of the...

  20. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Model privacy form and examples. 573.2 Section... FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model... compliance with the notice content requirements of §§ 573.6 and 573.7 of this part, although use of the...

  1. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Model privacy form and examples. 573.2 Section... FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model... compliance with the notice content requirements of §§ 573.6 and 573.7 of this part, although use of the...

  2. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Model privacy form and examples. 40.2 Section... FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model... compliance with the notice content requirements of §§ 40.6 and 40.7 of this part, although use of the...

  3. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Model privacy form and examples. 40.2 Section... FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model... compliance with the notice content requirements of §§ 40.6 and 40.7 of this part, although use of the...

  4. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Model privacy form and examples. 40.2 Section... FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model... compliance with the notice content requirements of §§ 40.6 and 40.7 of this part, although use of the...

  5. 77 FR 46067 - Multistakeholder Meetings To Develop Consumer Data Privacy Code of Conduct Concerning Mobile...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-02

    ... how companies providing applications and interactive services for mobile devices handle personal data... Data Privacy Code of Conduct Concerning Mobile Application Transparency AGENCY: National... Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in...

  6. 76 FR 31350 - Public Workshop; Privacy Compliance Basics and 2011 Developments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-31

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop; Privacy Compliance Basics and 2011 Developments AGENCY... Security Privacy Office will host a public workshop, ``Privacy Compliance Basics and 2011...

  7. Enhancing Privacy in Participatory Sensing Applications with Multidimensional Data

    SciTech Connect

    Forrest, Stephanie; He, Wenbo; Groat, Michael; Edwards, Benjamin; Horey, James L

    2013-01-01

    Participatory sensing applications rely on individuals to share personal data to produce aggregated models and knowledge. In this setting, privacy concerns can discourage widespread adoption of new applications. We present a privacy-preserving participatory sensing scheme based on negative surveys for both continuous and multivariate categorical data. Without relying on encryption, our algorithms enhance the privacy of sensed data in an energy and computation efficient manner. Simulations and implementation on Android smart phones illustrate how multidimensional data can be aggregated in a useful and privacy-enhancing manner.

  8. Acoustic assessment of speech privacy curtains in two nursing units

    PubMed Central

    Pope, Diana S.; Miller-Klein, Erik T.

    2016-01-01

    Hospitals have complex soundscapes that create challenges to patient care. Extraneous noise and high reverberation rates impair speech intelligibility, which leads to raised voices. In an unintended spiral, the increasing noise may result in diminished speech privacy, as people speak loudly to be heard over the din. The products available to improve hospital soundscapes include construction materials that absorb sound (acoustic ceiling tiles, carpet, wall insulation) and reduce reverberation rates. Enhanced privacy curtains are now available and offer potential for a relatively simple way to improve speech privacy and speech intelligibility by absorbing sound at the hospital patient's bedside. Acoustic assessments were performed over 2 days on two nursing units with a similar design in the same hospital. One unit was built with the 1970s’ standard hospital construction and the other was newly refurbished (2013) with sound-absorbing features. In addition, we determined the effect of an enhanced privacy curtain versus standard privacy curtains using acoustic measures of speech privacy and speech intelligibility indexes. Privacy curtains provided auditory protection for the patients. In general, that protection was increased by the use of enhanced privacy curtains. On an average, the enhanced curtain improved sound absorption from 20% to 30%; however, there was considerable variability, depending on the configuration of the rooms tested. Enhanced privacy curtains provide measureable improvement to the acoustics of patient rooms but cannot overcome larger acoustic design issues. To shorten reverberation time, additional absorption, and compact and more fragmented nursing unit floor plate shapes should be considered. PMID:26780959

  9. Acoustic assessment of speech privacy curtains in two nursing units.

    PubMed

    Pope, Diana S; Miller-Klein, Erik T

    2016-01-01

    Hospitals have complex soundscapes that create challenges to patient care. Extraneous noise and high reverberation rates impair speech intelligibility, which leads to raised voices. In an unintended spiral, the increasing noise may result in diminished speech privacy, as people speak loudly to be heard over the din. The products available to improve hospital soundscapes include construction materials that absorb sound (acoustic ceiling tiles, carpet, wall insulation) and reduce reverberation rates. Enhanced privacy curtains are now available and offer potential for a relatively simple way to improve speech privacy and speech intelligibility by absorbing sound at the hospital patient's bedside. Acoustic assessments were performed over 2 days on two nursing units with a similar design in the same hospital. One unit was built with the 1970s' standard hospital construction and the other was newly refurbished (2013) with sound-absorbing features. In addition, we determined the effect of an enhanced privacy curtain versus standard privacy curtains using acoustic measures of speech privacy and speech intelligibility indexes. Privacy curtains provided auditory protection for the patients. In general, that protection was increased by the use of enhanced privacy curtains. On an average, the enhanced curtain improved sound absorption from 20% to 30%; however, there was considerable variability, depending on the configuration of the rooms tested. Enhanced privacy curtains provide measureable improvement to the acoustics of patient rooms but cannot overcome larger acoustic design issues. To shorten reverberation time, additional absorption, and compact and more fragmented nursing unit floor plate shapes should be considered. PMID:26780959

  10. Acoustic assessment of speech privacy curtains in two nursing units.

    PubMed

    Pope, Diana S; Miller-Klein, Erik T

    2016-01-01

    Hospitals have complex soundscapes that create challenges to patient care. Extraneous noise and high reverberation rates impair speech intelligibility, which leads to raised voices. In an unintended spiral, the increasing noise may result in diminished speech privacy, as people speak loudly to be heard over the din. The products available to improve hospital soundscapes include construction materials that absorb sound (acoustic ceiling tiles, carpet, wall insulation) and reduce reverberation rates. Enhanced privacy curtains are now available and offer potential for a relatively simple way to improve speech privacy and speech intelligibility by absorbing sound at the hospital patient's bedside. Acoustic assessments were performed over 2 days on two nursing units with a similar design in the same hospital. One unit was built with the 1970s' standard hospital construction and the other was newly refurbished (2013) with sound-absorbing features. In addition, we determined the effect of an enhanced privacy curtain versus standard privacy curtains using acoustic measures of speech privacy and speech intelligibility indexes. Privacy curtains provided auditory protection for the patients. In general, that protection was increased by the use of enhanced privacy curtains. On an average, the enhanced curtain improved sound absorption from 20% to 30%; however, there was considerable variability, depending on the configuration of the rooms tested. Enhanced privacy curtains provide measureable improvement to the acoustics of patient rooms but cannot overcome larger acoustic design issues. To shorten reverberation time, additional absorption, and compact and more fragmented nursing unit floor plate shapes should be considered.

  11. Achieving Optimal Privacy in Trust-Aware Social Recommender Systems

    NASA Astrophysics Data System (ADS)

    Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail

    Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.

  12. HealthConnect and privacy: a policy conundrum.

    PubMed

    Paterson, Moira

    2004-08-01

    A shared electronic health record is intrinsically privacy-invasive because it creates a comprehensive record for information-sharing. The author explains the significance of information privacy and why it is that health information warrants special protection. She also provides an overview of the existing regulatory framework and an evaluation of suggested options and proposals for addressing privacy-related issues. Her analysis of suggested consent models suggests that they ultimately involve a trade-off between privacy and the broader benefits promised by HealthConnect and that obtaining the right balance is essential if HealthConnect is to achieve optimal health outcomes.

  13. Space Partitioning for Privacy Enabled 3D City Models

    NASA Astrophysics Data System (ADS)

    Filippovska, Y.; Wichmann, A.; Kada, M.

    2016-10-01

    Due to recent technological progress, data capturing and processing of highly detailed (3D) data has become extensive. And despite all prospects of potential uses, data that includes personal living spaces and public buildings can also be considered as a serious intrusion into people's privacy and a threat to security. It becomes especially critical if data is visible by the general public. Thus, a compromise is needed between open access to data and privacy requirements which can be very different for each application. As privacy is a complex and versatile topic, the focus of this work particularly lies on the visualization of 3D urban data sets. For the purpose of privacy enabled visualizations of 3D city models, we propose to partition the (living) spaces into privacy regions, each featuring its own level of anonymity. Within each region, the depicted 2D and 3D geometry and imagery is anonymized with cartographic generalization techniques. The underlying spatial partitioning is realized as a 2D map generated as a straight skeleton of the open space between buildings. The resulting privacy cells are then merged according to the privacy requirements associated with each building to form larger regions, their borderlines smoothed, and transition zones established between privacy regions to have a harmonious visual appearance. It is exemplarily demonstrated how the proposed method generates privacy enabled 3D city models.

  14. A multimethod approach to examining usability of Web privacy polices and user agents for specifying privacy preferences.

    PubMed

    Proctor, Robert W; Vu, Kim-Phuong L

    2007-05-01

    Because all research methods have strengths and weaknesses, a multimethod approach often provides the best way to understand human behavior in applied settings. We describe how a multimethod approach was employed in a series of studies designed to examine usability issues associated with two aspects of online privacy: comprehension of privacy policies and configuration of privacy preferences for an online user agent. Archival research, user surveys, data mining, quantitative observations, and controlled experiments each yielded unique findings that, together, contributed to increased understanding of online-privacy issues for users. These findings were used to evaluate the accessibility of Web privacy policies to computer-literate users, determine whether people can configure user agents to achieve specific privacy goals, and discover ways in which the usability of those agents can be improved.

  15. Australian standards for privacy and confidentiality of health records in research: implications of the Commonwealth Privacy Act.

    PubMed

    Berglund, C A

    1990-06-18

    The current Australian legal, administrative and professional standards for individual rights to confidentiality and privacy of health records are examined and guidance is offered for the use of personal information in research. The implications of recently introduced privacy legislation for the conduct of research in Australia are discussed. Acquired immunodeficiency syndrome (AIDS) is cited as an example of the complex issues which face researchers and administrative bodies in balancing the privacy rights of individuals and the broader public interest.

  16. 76 FR 34650 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... expected to include the following items: --Cloud Security and Privacy Panel discussion on addressing security and privacy for different types of cloud computing, --Presentation from National Strategy...

  17. 77 FR 38218 - Office of Privacy, Records, and Disclosure; Privacy Act of 1974; Proposed Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-27

    ... record by individuals who are citizens of the United States or aliens lawfully admitted for permanent residence. In as much as the Privacy Act rights are personal and apply only to U.S. citizens or an alien... investigation will often alert that individual to the existence of an investigation, thereby affording...

  18. 76 FR 19307 - Privacy Act of 1974; Amendment of Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-07

    ... U.S. Department of Agriculture (USDA) is amending an existing Forest Service Privacy Act system of records, USDA/FS-3, Uniform Allowance System. DATES: Comments must be received in writing, on or before May 9, 2011. The System of Records USDA/FS-3 Uniform Allowance is amended, without further notice,...

  19. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... From the Federal Register Online via the Government Publishing Office NATIONAL AERONAUTICS AND... Aeronautics and Space Administration (NASA). ACTION: Revisions of NASA Appendices to Privacy Act System of... Aeronautics and Space Administration Headquarters, Washington, DC 20546-0001, (202) 358-4787,...

  20. 75 FR 12001 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-12

    ... ``Non-VA Fee Basis Records--VA (23VA163), as set forth in 74 FR 44905- 44911, August 31, 2009. VA... CONTACT: Shonta Wright MBA, CIPP, CIPP/G, Information Access and Privacy Office, VHA Privacy Specialist, (727) 321-2038. Correction In FR Doc. E9-20917, published on August 31, 2009, at 74 FR 44905, make...

  1. 12 CFR 741.220 - Privacy of consumer financial information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Privacy of consumer financial information. 741.220 Section 741.220 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING... Privacy of consumer financial information. Any credit union which is insured pursuant to Title II of...

  2. Availability and quality of mobile health app privacy policies.

    PubMed

    Sunyaev, Ali; Dehling, Tobias; Taylor, Patrick L; Mandl, Kenneth D

    2015-04-01

    Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35,000 mHealth apps are available for iOS and Android. Of the 600 most commonly used apps, only 183 (30.5%) had privacy policies. Average policy length was 1755 (SD 1301) words with a reading grade level of 16 (SD 2.9). Two thirds (66.1%) of privacy policies did not specifically address the app itself. Our findings show that currently mHealth developers often fail to provide app privacy policies. The privacy policies that are available do not make information privacy practices transparent to users, require college-level literacy, and are often not focused on the app itself. Further research is warranted to address why privacy policies are often absent, opaque, or irrelevant, and to find a remedy. PMID:25147247

  3. 77 FR 61275 - Privacy Act of 1974: Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-09

    ... published on July 10, 2012, at 77 FR 40539. The Department received one comment from a member of the public... rule for the new Federal Bureau of Investigation (FBI) Privacy Act system of records titled FBI Data Warehouse System, JUSTICE/FBI- 022. This system is being exempted from the subsections of the Privacy...

  4. Student Data Privacy Is Cloudy Today, Clearer Tomorrow

    ERIC Educational Resources Information Center

    Trainor, Sonja

    2015-01-01

    An introduction to the big picture conversation on student data privacy and the norms that are coming out of it. The author looks at the current state of federal law, and ahead to proposed legislation at the federal level. The intent is to help educators become familiar with the key issues regarding student data privacy in education so as to…

  5. 48 CFR 352.224-70 - Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Privacy Act. 352.224-70 Section 352.224-70 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.224-70 Privacy Act....

  6. Towards a New Privacy: Totalitarianism, Emotion and Management Discourse

    ERIC Educational Resources Information Center

    Hanley, Christopher

    2013-01-01

    This article reviews some leadership and management literature dealing with emotional demands in professional contexts. An image of the "real self", requiring emotional privacy, is highly valued by individuals subjected to intense emotional demands. It is argued that the "real self" and emotional privacy ought to be defended…

  7. Tweens' Conceptions of Privacy Online: Implications for Educators

    ERIC Educational Resources Information Center

    Davis, Katie; James, Carrie

    2013-01-01

    There is considerable debate about young people's concern for privacy today, given their frequent use of social media to share information and other content about themselves and others. While researchers have investigated the online privacy practices of teens and emerging adults, relatively little is known about the attitudes and behaviors of…

  8. 76 FR 22807 - Privacy Act of 1974; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-25

    ... of the Secretary 32 CFR Part 321 Privacy Act of 1974; Implementation AGENCY: Defense Security Service, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Security Service is... makes nonsubstantive changes to the Defense ] Security Service Privacy Program rules. These changes...

  9. 75 FR 64403 - Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-19

    ... Internal Revenue Service Privacy Act of 1974, as Amended AGENCY: Internal Revenue Service, Treasury. ACTION... requirements of the Privacy Act of 1974, as amended, the Department of the Treasury, Internal Revenue Service..., Miscellaneous Records, and Information Management Records; Treasury/IRS 37.007, Practitioner...

  10. 25 CFR 273.54 - Privacy Act requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... system of records without prior approval of the Department of Interior and the Office of Management and... Privacy Act requirements. (a) When a contractor operates a system of records to accomplish a Bureau function, the contractor shall comply with subpart D of 43 CFR part 2 which implements the Privacy Act (5...

  11. 25 CFR 273.54 - Privacy Act requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... system of records without prior approval of the Department of Interior and the Office of Management and... Privacy Act requirements. (a) When a contractor operates a system of records to accomplish a Bureau function, the contractor shall comply with subpart D of 43 CFR part 2 which implements the Privacy Act (5...

  12. 25 CFR 273.54 - Privacy Act requirements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... system of records without prior approval of the Department of Interior and the Office of Management and... Privacy Act requirements. (a) When a contractor operates a system of records to accomplish a Bureau function, the contractor shall comply with subpart D of 43 CFR part 2 which implements the Privacy Act (5...

  13. 25 CFR 273.54 - Privacy Act requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... system of records without prior approval of the Department of Interior and the Office of Management and... Privacy Act requirements. (a) When a contractor operates a system of records to accomplish a Bureau function, the contractor shall comply with subpart D of 43 CFR part 2 which implements the Privacy Act (5...

  14. 46 CFR 14.105 - Disclosure and privacy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF MERCHANT MARINERS General § 14.105 Disclosure and privacy. The Coast Guard makes information available to the public in accordance with 49 CFR part 7, including appendix B. ... 46 Shipping 1 2010-10-01 2010-10-01 false Disclosure and privacy. 14.105 Section 14.105...

  15. 32 CFR 865.119 - Privacy Act information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... CFR part 286a will be observed throughout the processing of a request for review of discharge or... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act...

  16. Data Privacy Laws Follow Lead of Oklahoma and California

    ERIC Educational Resources Information Center

    Vance, Amelia

    2016-01-01

    Oklahoma's Student Data Accessibility, Transparency, and Accountability Act (known as the Student DATA Act) arose just as privacy concerns about student data were beginning to surface. According to Linnette Attai, founder of education technology compliance consultancy PlayWell LLC, "When this climate of data privacy first emerged in its…

  17. Availability and quality of mobile health app privacy policies.

    PubMed

    Sunyaev, Ali; Dehling, Tobias; Taylor, Patrick L; Mandl, Kenneth D

    2015-04-01

    Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35,000 mHealth apps are available for iOS and Android. Of the 600 most commonly used apps, only 183 (30.5%) had privacy policies. Average policy length was 1755 (SD 1301) words with a reading grade level of 16 (SD 2.9). Two thirds (66.1%) of privacy policies did not specifically address the app itself. Our findings show that currently mHealth developers often fail to provide app privacy policies. The privacy policies that are available do not make information privacy practices transparent to users, require college-level literacy, and are often not focused on the app itself. Further research is warranted to address why privacy policies are often absent, opaque, or irrelevant, and to find a remedy.

  18. 22 CFR 51.73 - Privacy of hearing.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Privacy of hearing. 51.73 Section 51.73 Foreign Relations DEPARTMENT OF STATE NATIONALITY AND PASSPORTS PASSPORTS Procedures for Review of Certain Denials and Revocations § 51.73 Privacy of hearing. Only the person requesting the hearing, his or...

  19. 25 CFR 273.54 - Privacy Act requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... function, the contractor shall comply with subpart D of 43 CFR part 2 which implements the Privacy Act (5 U.... 43 CFR 2.56 lists exceptions to this procedure. (4) To establish a procedure to account for access... 25 Indians 1 2010-04-01 2010-04-01 false Privacy Act requirements. 273.54 Section 273.54...

  20. 75 FR 81454 - Privacy Act of 1974; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-28

    ... (40 FR 45113), the Joint Board published its proposed Privacy Act regulations, designating such... FR 1493), the Joint Board published its final Privacy Act regulations as 20 CFR part 903 and in the... exempt certain systems of records: On August 27, 1975 (40 FR 39387), the Joint Board published a...

  1. 37 CFR 251.23 - FOIA and Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false FOIA and Privacy Act. 251.23 Section 251.23 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT... Access to and Inspection of Records § 251.23 FOIA and Privacy Act. Freedom of Information Act and...

  2. 78 FR 12337 - Published Privacy Impact Assessments on the Web

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-22

    ... of Records Notice, 77 FR 30297 (May 22, 2012). System: DHS/CBP/PIA-010 Analytical Framework for... SECURITY Office of the Secretary Published Privacy Impact Assessments on the Web AGENCY: Privacy Office...'s Web ] site between June 1, 2012, and November 30, 2012. DATES: The PIA will be available on...

  3. 76 FR 47299 - Privacy Act of 1974: Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-04

    ... AFFAIRS Privacy Act of 1974: Computer Matching Program AGENCY: Department of Veterans Affairs. ACTION: Notice of Computer Match Program. SUMMARY: Pursuant to 5 U.S.C. 552a, the Privacy Act of 1974, as amended... is hereby given that the Department of Veterans Affairs (VA) intends to conduct a computer...

  4. 78 FR 15734 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-12

    ... Privacy Protection Act of 1988, 54 FR 25818 (June 19, 1989); and OMB Circular A-130, Appendix I, 65 FR..., 76 FR 58525 (September 21, 2011). ] MA-DUA will provide the following to DHS/USCIS: MA-DUA records... SECURITY Office of the Secretary Privacy Act of 1974; Computer Matching Program AGENCY: Department...

  5. 78 FR 50146 - Privacy Act of 1974: Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-16

    ... AFFAIRS Privacy Act of 1974: Computer Matching Program AGENCY: Department of Veterans Affairs. ACTION: Notice of Computer Match Program. SUMMARY: Pursuant to 5 U.S.C. 552a, the Privacy Act of 1974, as amended... is hereby given that the Department of Veterans Affairs (VA) intends to conduct a computer...

  6. 78 FR 21713 - Privacy Act of 1974: Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-11

    ... AFFAIRS Privacy Act of 1974: Computer Matching Program AGENCY: Department of Veterans Affairs. ACTION: Notice of Computer Match Program. SUMMARY: Pursuant to 5 U.S.C. 552a, the Privacy Act of 1974, as amended... is hereby given that the Department of Veterans Affairs (VA) intends to conduct a computer...

  7. 77 FR 56824 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-14

    ... Act of 1988, 54 FR 25818 (June 19, 1989); and OMB Circular A-130, Appendix I, 65 FR 77677 (December 12... Privacy Act of 1974; Computer Matching Program AGENCY: Department of Education. ACTION: Notice. Overview Information: Privacy Act of 1974; Computer Matching Program between the U.S. Department of Education and...

  8. 75 FR 54966 - Privacy Act of 1974: Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-09

    ... AFFAIRS Privacy Act of 1974: Computer Matching Program AGENCY: Department of Veterans Affairs. ACTION: Notice of Computer Match Program. SUMMARY: Pursuant to 5 U.S.C. 552a, the Privacy Act of 1974, as amended... is hereby given that the Department of Veterans Affairs (VA) intends to conduct a computer...

  9. 78 FR 76986 - Children's Online Privacy Protection Rule

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-20

    ... CFR Part 312 RIN 3084-AB20 Children's Online Privacy Protection Rule AGENCY: Federal Trade Commission... the Children's Online Privacy Protection Rule on January 17, 2013 to update the requirements set forth...., Washington, DC 20580. SUPPLEMENTARY INFORMATION: This document makes a technical correction in the...

  10. The Right of Privacy of Public School Employees.

    ERIC Educational Resources Information Center

    Bullock, Angela; Faber, Charles F.

    A nationwide controversy over the right of privacy has arisen as a result of companies probing into their workers' habits and health through such means as mandatory drug tests, electronic databases, and lie detector tests. The legal claims arising from these civil suits against employers for invasion of privacy have established precedents that are…

  11. Preserving Differential Privacy in Degree-Correlation based Graph Generation

    PubMed Central

    Wang, Yue; Wu, Xintao

    2014-01-01

    Enabling accurate analysis of social network data while preserving differential privacy has been challenging since graph features such as cluster coefficient often have high sensitivity, which is different from traditional aggregate functions (e.g., count and sum) on tabular data. In this paper, we study the problem of enforcing edge differential privacy in graph generation. The idea is to enforce differential privacy on graph model parameters learned from the original network and then generate the graphs for releasing using the graph model with the private parameters. In particular, we develop a differential privacy preserving graph generator based on the dK-graph generation model. We first derive from the original graph various parameters (i.e., degree correlations) used in the dK-graph model, then enforce edge differential privacy on the learned parameters, and finally use the dK-graph model with the perturbed parameters to generate graphs. For the 2K-graph model, we enforce the edge differential privacy by calibrating noise based on the smooth sensitivity, rather than the global sensitivity. By doing this, we achieve the strict differential privacy guarantee with smaller magnitude noise. We conduct experiments on four real networks and compare the performance of our private dK-graph models with the stochastic Kronecker graph generation model in terms of utility and privacy tradeoff. Empirical evaluations show the developed private dK-graph generation models significantly outperform the approach based on the stochastic Kronecker generation model. PMID:24723987

  12. 78 FR 21600 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-11

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: National Geospatial-Intelligence Agency, DoD. ACTION: Notice to delete a System of Records. SUMMARY: The National Geospatial-Intelligence... questions please contact: NGA Privacy Office, National Geospatial-Intelligence Agency, 7500 GEOINT...

  13. 78 FR 14291 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ..., Department of the Air Force Privacy Office, Air Force Privacy Act Office, Office of Warfighting Integration... Action Notification (January 12, 2009, 74 FR 1183) Reason: Records that document these actions are covered by System of Records Notices (SORNs) F036 AF PC Q, Personnel Data System (PDS) (June 11, 1997,...

  14. 77 FR 56633 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ..., Department of the Air Force Privacy Office, Air Force Privacy Act Office, Office of Warfighting Integration... System (June 11, 1997, 62 FR 31793). Reason: Records are no longer required to be maintained by any... (AFPC). Information is accessed through the Military Personnel Data System (MilPDS). Therefore,...

  15. 77 FR 5234 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-02

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF COMMERCE Privacy Act of 1974; System of Records AGENCY: Office of Inspector General (OIG), Department of Commerce... Inspection Records--COMMERCE/DEPT-12.'' SUMMARY: In accordance with the Privacy Act of 1974, as amended, 5...

  16. 32 CFR 505.3 - Privacy Act systems of records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ....3 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.3 Privacy Act systems of records. (a) Systems of... the Army Freedom of Information Act Program. (4) The existence of a statute or Executive...

  17. 76 FR 17997 - Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... Therapeutic Discovery Program pursuant to The Patient Protection and Affordable Care Act (Pub. L. 111-148), as... Internal Revenue Service Privacy Act of 1974, as Amended AGENCY: Internal Revenue Service, Treasury. ACTION: Notice of Proposed New Privacy Act System of Records. SUMMARY: In accordance with the requirements of...

  18. 78 FR 37799 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-24

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Finance and Accounting...: The Defense Finance and Accounting Service systems of records notices subject to the Privacy Act...

  19. 76 FR 81909 - Abolishment of Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ..., USDA. ACTION: Notice of abolishment of records systems. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Agriculture (USDA) is abolishing an existing Forest Service Privacy Act system of records. A review of USDA/FS-35 Congressional Correspondence has concluded that the records in...

  20. Privacy in the Home: A Developmental and Situational Analysis.

    ERIC Educational Resources Information Center

    Sawin, Douglas B.; And Others

    This report presents descriptive data on developmental and situational factors related to children's use of privacy rules and privacy makers in their homes. Subjects were 112 children ranging in age from 2 to 17 years from 48 middle-class families. Data related to the use and regulation of bedrooms and bathrooms by specified family members was…

  1. E-Commerce and Privacy: Conflict and Opportunity.

    ERIC Educational Resources Information Center

    Farah, Badie N.; Higby, Mary A.

    2001-01-01

    Electronic commerce has intensified conflict between businesses' need to collect data and customers' desire to protect privacy. Web-based privacy tools and legislation could add to the costs of e-commerce and reduce profitability. Business models not based on profiling customers may be needed. (SK)

  2. 75 FR 36642 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a system of records. SUMMARY: The National Security Agency... National Security Agency/Central Security Service notices for systems of records subject to the Privacy...

  3. 76 FR 59803 - Children's Online Privacy Protection Rule

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-27

    ....10; Children's Online Privacy Protection Rule, 64 FR 59888, 59906, 59908, 59915 (Nov. 3, 1999.... 6507; 16 CFR 312.11. \\5\\ See Children's Online Privacy Protection Rule, 71 FR 13247 (Mar. 15, 2006... Protection Rule (``2010 Rule Review''), 75 FR 17089 (Apr. 5, 2010). \\8\\ Id. \\9\\ Information about the June...

  4. Role Management in a Privacy-Enhanced Collaborative Environment

    ERIC Educational Resources Information Center

    Lorenz, Anja; Borcea-Pfitzmann, Katrin

    2010-01-01

    Purpose: Facing the dilemma between collaboration and privacy is a continual challenge for users. In this setting, the purpose of this paper is to discuss issues of a highly flexible role management integrated in a privacy-enhanced collaborative environment (PECE). Design/methodology/approach: The general framework was provided by former findings…

  5. 75 FR 57740 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-22

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Information Systems Agency, DoD. ACTION: Notice to add a system of records. SUMMARY: The Defense Information Systems Agency is... INFORMATION: The Defense Information Systems Agency system of records notices subject to the Privacy Act...

  6. Anonymizer-Enabled Security and Privacy for RFID

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-based systems are becoming a widely deployed pervasive technology that is more and more used in applications where privacy-sensitive information is entrusted to RFID tags. Thus, a careful analysis in appropriate security and privacy models is needed before deployment to practice.

  7. Student-Privacy Rules Show a Renewed Trust in Colleges

    ERIC Educational Resources Information Center

    Lake, Peter

    2009-01-01

    New regulations for the Family Rights and Privacy Act (Ferpa), which governs the privacy of student records, become effective this month. Announced by the Department of Education in December 2008, the regulations empower colleges to act appropriately and decisively to protect the health and safety of students and others. They also signify a new…

  8. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... 102.36 Section 102.36 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION RECORD DISCLOSURE....36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its... of an authorized law enforcement activity; (h) When required by the Privacy Act, maintain...

  9. Enhancing Privacy Education with a Technical Emphasis in IT Curriculum

    ERIC Educational Resources Information Center

    Peltsverger, Svetlana; Zheng, Guangzhi

    2016-01-01

    The paper describes the development of four learning modules that focus on technical details of how a person's privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning…

  10. 76 FR 68395 - Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-04

    ...; ] BUREAU OF CONSUMER FINANCIAL PROTECTION Privacy Act of 1974, as Amended AGENCY: Bureau of Consumer... the Privacy Act of 1974, as amended, the Bureau of Consumer Financial Protection, hereinto referred to as the Consumer Financial Protection Bureau (``CFPB'') or the ``Bureau'', gives notice of...

  11. A Practitioner's Response to the New Health Privacy Regulations

    ERIC Educational Resources Information Center

    Yang, Julia A.; Kombarakaran, Francis A.

    2006-01-01

    The established professional practice requiring informed consent for the disclosure of personal health information with its implied right to privacy suffered a serious setback with the first federal privacy initiative of the Bush administration. The new Health Insurance Portability and Accountability Act (HIPAA) of 1996 (P.L. 104-191) privacy…

  12. 76 FR 22611 - Privacy Act of 1974; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-22

    ... identity of a confidential source. This direct final rule makes nonsubstantive changes to the Office of the Secretary Privacy Program rules. These changes will allow the Department to add an exemption rule to the... and/or material from certain portions of the Privacy Act. This change will allow the Department...

  13. 76 FR 77472 - Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-13

    ..., the inquiry control number, or some combination thereof. Safeguards: Access to electronic records is... notification and access to any record contained in this system of records, or seeking to contest its content... Proposed Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, as...

  14. 78 FR 60264 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-01

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary of Defense, DoD. ACTION: Notice to add a new System of Records. SUMMARY: The Office of the Secretary of Defense proposes to add a new system of records in its inventory of record systems subject to the Privacy Act...

  15. 78 FR 75930 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-13

    ... (November 25, 2008, 73 FR 71659). Effects of Not Providing Information: You may choose not to provide the... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The DHS...

  16. 76 FR 35459 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-17

    ... System of Records Notice (November 25, 2008, 73 FR 71659). Effects of Not Providing Information: You may... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The DHS...

  17. 76 FR 25361 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ..., 2008, 73 FR 71659). Effects of Not Providing Information: You may choose not to provide the requested... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting SUMMARY: The DHS...

  18. Target-Based Maintenance of Privacy Preserving Association Rules

    ERIC Educational Resources Information Center

    Ahluwalia, Madhu V.

    2011-01-01

    In the context of association rule mining, the state-of-the-art in privacy preserving data mining provides solutions for categorical and Boolean association rules but not for quantitative association rules. This research fills this gap by describing a method based on discrete wavelet transform (DWT) to protect input data privacy while preserving…

  19. 77 FR 70136 - Privacy Act of 1974, System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-23

    ... ``USAID-33, Phoenix Financial Management System''. This action is necessary to meet the requirements of..., Arlington, Va. 22202. Email: privacy@usaid.gov . SUPPLEMENTARY INFORMATION: The Phoenix Financial Management... store personal data requiring protection under the Privacy Act. It is USAID's core financial...

  20. 76 FR 70815 - Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-15

    ... these systems of records were most recently published at 73 FR 13349-13363 (March 12, 2008). As...: Notice of Proposed Alterations to Privacy Act Systems of Records. SUMMARY: In accordance with the... Revenue Service, gives notice of the proposed consolidation of twelve Privacy Act systems of...

  1. 78 FR 76897 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-19

    ... AFFAIRS Privacy Act of 1974; System of Records AGENCY: Department of Veterans Affairs (VA). ACTION: Notice of Amendment to System of Records. SUMMARY: As required by the Privacy Act of 1974, 5 U.S.C. 552a(e), notice is hereby given that the Department of Veterans Affairs (VA) is amending the system of...

  2. 77 FR 22632 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-16

    ... forth in the Federal Register 74 FR 11185-11186 dated March 16, 2009. VA is amending the System Name... AFFAIRS Privacy Act of 1974; System of Records AGENCY: Department of Veterans Affairs (VA). ACTION: Notice of Amendment to System of Records. SUMMARY: As required by the Privacy Act of 1974, 5 U.S.C....

  3. Preserving Differential Privacy in Degree-Correlation based Graph Generation.

    PubMed

    Wang, Yue; Wu, Xintao

    2013-08-01

    Enabling accurate analysis of social network data while preserving differential privacy has been challenging since graph features such as cluster coefficient often have high sensitivity, which is different from traditional aggregate functions (e.g., count and sum) on tabular data. In this paper, we study the problem of enforcing edge differential privacy in graph generation. The idea is to enforce differential privacy on graph model parameters learned from the original network and then generate the graphs for releasing using the graph model with the private parameters. In particular, we develop a differential privacy preserving graph generator based on the dK-graph generation model. We first derive from the original graph various parameters (i.e., degree correlations) used in the dK-graph model, then enforce edge differential privacy on the learned parameters, and finally use the dK-graph model with the perturbed parameters to generate graphs. For the 2K-graph model, we enforce the edge differential privacy by calibrating noise based on the smooth sensitivity, rather than the global sensitivity. By doing this, we achieve the strict differential privacy guarantee with smaller magnitude noise. We conduct experiments on four real networks and compare the performance of our private dK-graph models with the stochastic Kronecker graph generation model in terms of utility and privacy tradeoff. Empirical evaluations show the developed private dK-graph generation models significantly outperform the approach based on the stochastic Kronecker generation model.

  4. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false General policies-Privacy Act. 503.2 Section 503.2 Public Welfare Regulations Relating to Public Welfare (Continued) FOREIGN CLAIMS SETTLEMENT COMMISSION OF... provided under the Privacy Act only where an important public policy use for the exemption has...

  5. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false General policies-Privacy Act. 503.2 Section 503.2 Public Welfare Regulations Relating to Public Welfare (Continued) FOREIGN CLAIMS SETTLEMENT COMMISSION OF... provided under the Privacy Act only where an important public policy use for the exemption has...

  6. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false General policies-Privacy Act. 503.2 Section 503.2 Public Welfare Regulations Relating to Public Welfare (Continued) FOREIGN CLAIMS SETTLEMENT COMMISSION OF... provided under the Privacy Act only where an important public policy use for the exemption has...

  7. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false General policies-Privacy Act. 503.2 Section 503.2 Public Welfare Regulations Relating to Public Welfare (Continued) FOREIGN CLAIMS SETTLEMENT COMMISSION OF... provided under the Privacy Act only where an important public policy use for the exemption has...

  8. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false General policies-Privacy Act. 503.2 Section 503.2 Public Welfare Regulations Relating to Public Welfare (Continued) FOREIGN CLAIMS SETTLEMENT COMMISSION OF... provided under the Privacy Act only where an important public policy use for the exemption has...

  9. Federal Restrictions on Educational Research: Privacy Protection Study Commission Hearings

    ERIC Educational Resources Information Center

    Michael, John; Weinberg, JoAnn

    1977-01-01

    The Privacy Protection Study Commission (PPSC) held public hearings on personal data record-keeping policies and practices in educational institutions in Los Angeles in October and in Washington, D.C. in November, 1976. Under consideration were the protections afforded parents and students by the Family Educational Rights and Privacy Act.…

  10. Privacy in the Digital Environment--Issues for Libraries.

    ERIC Educational Resources Information Center

    Gorman, Michael

    This paper discusses issues for libraries related to privacy in the digital environment. The first section defines the meaning of privacy. The second section discusses the impact of technology and the use of technology, including principles issued by the U.S. Department of Health, Education, and Welfare in 1973 that still provide a basis for…

  11. Privacy Vulnerability of Published Anonymous Mobility Traces

    SciTech Connect

    Ma, Chris Y. T.; Yau, David K. Y.; Yip, Nung Kwan; Rao, Nageswara S. V.

    2013-06-01

    Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes’ location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers, or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes’ privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces. For instance, an adversary is able to identify the trace of 30%-50% of the victims when she has collected 10 pieces of side information about a victim.

  12. Privacy Vulnerability of Published Anonymous Mobility Traces

    DOE PAGES

    Ma, Chris Y. T.; Yau, David K. Y.; Yip, Nung Kwan; Rao, Nageswara S. V.

    2013-06-01

    Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes’ location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers,more » or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes’ privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces. For instance, an adversary is able to identify the trace of 30%-50% of the victims when she has collected 10 pieces of side information about a victim.« less

  13. Evaluating the privacy properties of telephone metadata.

    PubMed

    Mayer, Jonathan; Mutchler, Patrick; Mitchell, John C

    2016-05-17

    Since 2013, a stream of disclosures has prompted reconsideration of surveillance law and policy. One of the most controversial principles, both in the United States and abroad, is that communications metadata receives substantially less protection than communications content. Several nations currently collect telephone metadata in bulk, including on their own citizens. In this paper, we attempt to shed light on the privacy properties of telephone metadata. Using a crowdsourcing methodology, we demonstrate that telephone metadata is densely interconnected, can trivially be reidentified, and can be used to draw sensitive inferences. PMID:27185922

  14. The ultimate physical limits of privacy.

    PubMed

    Ekert, Artur; Renner, Renato

    2014-03-27

    Among those who make a living from the science of secrecy, worry and paranoia are just signs of professionalism. Can we protect our secrets against those who wield superior technological powers? Can we trust those who provide us with tools for protection? Can we even trust ourselves, our own freedom of choice? Recent developments in quantum cryptography show that some of these questions can be addressed and discussed in precise and operational terms, suggesting that privacy is indeed possible under surprisingly weak assumptions. PMID:24670761

  15. Setting core standards: privacy, identity & interoperability.

    PubMed

    Manning, B; Benton, S

    2010-01-01

    This position paper focuses on strategic developments and underlying concepts emerging out of the standards and associated domains. It addresses the issue of personal privacy in the wider context of interoperability across an ever-growing range of e-health and social care support systems and processes. These will increasingly be driven by major growth in the elderly segment of national populations where unambiguous identification of both patients and care staff both in hospitals and the community will become significant issues. This is particularly so where remote patient monitoring and access control to personal data is concerned, and is further complicated where racial, cultural and linguistic barriers are prevalent. PMID:20543336

  16. Evaluating the privacy properties of telephone metadata

    PubMed Central

    Mayer, Jonathan; Mutchler, Patrick; Mitchell, John C.

    2016-01-01

    Since 2013, a stream of disclosures has prompted reconsideration of surveillance law and policy. One of the most controversial principles, both in the United States and abroad, is that communications metadata receives substantially less protection than communications content. Several nations currently collect telephone metadata in bulk, including on their own citizens. In this paper, we attempt to shed light on the privacy properties of telephone metadata. Using a crowdsourcing methodology, we demonstrate that telephone metadata is densely interconnected, can trivially be reidentified, and can be used to draw sensitive inferences. PMID:27185922

  17. Privacy, confidentiality, and electronic medical records.

    PubMed Central

    Barrows, R C; Clayton, P D

    1996-01-01

    The enhanced availability of health information in an electronic format is strategic for industry-wide efforts to improve the quality and reduce the cost of health care, yet it brings a concomitant concern of greater risk for loss of privacy among health care participants. The authors review the conflicting goals of accessibility and security for electronic medical records and discuss nontechnical and technical aspects that constitute a reasonable security solution. It is argued that with guiding policy and current technology, an electronic medical record may offer better security than a traditional paper record. PMID:8653450

  18. Privacy Enhancements for Inexact Biometric Templates

    NASA Astrophysics Data System (ADS)

    Ratha, Nalini; Chikkerur, Sharat; Connell, Jonathan; Bolle, Ruud

    Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns.

  19. Security and privacy issues of personal health.

    PubMed

    Blobel, Bernd; Pharow, Peter

    2007-01-01

    While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.

  20. From genetic privacy to open consent.

    PubMed

    Lunshof, Jeantine E; Chadwick, Ruth; Vorhaus, Daniel B; Church, George M

    2008-05-01

    Recent advances in high-throughput genomic technologies are showing concrete results in the form of an increasing number of genome-wide association studies and in the publication of comprehensive individual genome-phenome data sets. As a consequence of this flood of information the established concepts of research ethics are stretched to their limits, and issues of privacy, confidentiality and consent for research are being re-examined. Here, we show the feasibility of the co-development of scientific innovation and ethics, using the open-consent framework that was implemented in the Personal Genome Project as an example.

  1. Developing Privacy Solutions for Sharing and Analyzing Healthcare Data

    PubMed Central

    Motiwalla, Luvai; Li, Xiao-Bai

    2013-01-01

    The extensive use of electronic health data has increased privacy concerns. While most healthcare organizations are conscientious in protecting their data in their databases, very few organizations take enough precautions to protect data that is shared with third party organizations. Recently the regulatory environment has tightened the laws to enforce privacy protection. The goal of this research is to explore the application of data masking solutions for protecting patient privacy when data is shared with external organizations for research, analysis and other similar purposes. Specifically, this research project develops a system that protects data without removing sensitive attributes. Our application allows high quality data analysis with the masked data. Dataset-level properties and statistics remain approximately the same after data masking; however, individual record-level values are altered to prevent privacy disclosure. A pilot evaluation study on large real-world healthcare data shows the effectiveness of our solution in privacy protection. PMID:24285983

  2. Differential Privacy Preserving in Big Data Analytics for Connected Health.

    PubMed

    Lin, Chi; Song, Zihao; Song, Houbing; Zhou, Yanhong; Wang, Yi; Wu, Guowei

    2016-04-01

    In Body Area Networks (BANs), big data collected by wearable sensors usually contain sensitive information, which is compulsory to be appropriately protected. Previous methods neglected privacy protection issue, leading to privacy exposure. In this paper, a differential privacy protection scheme for big data in body sensor network is developed. Compared with previous methods, this scheme will provide privacy protection with higher availability and reliability. We introduce the concept of dynamic noise thresholds, which makes our scheme more suitable to process big data. Experimental results demonstrate that, even when the attacker has full background knowledge, the proposed scheme can still provide enough interference to big sensitive data so as to preserve the privacy. PMID:26872779

  3. How do patients respond to violation of their information privacy?

    PubMed

    Kuo, Kuang-Ming; Ma, Chen-Chung; Alexander, Judith W

    2014-01-01

    The introduction of electronic medical records (EMRs) can expose patients to the risk of infringement of their privacy. The purpose of this study was to explore the relationship between patients' concerns about information privacy and their protective responses. A questionnaire survey conducted in a Taiwanese hospital revealed that, regarding information privacy, patients' concerns about the collection of information about themselves, the secondary use of this information and the possibility of errors in the recorded information were associated with their information privacy-protective responses, while concern for unauthorised access to their information by other staff in the medical facility was not. Medical facilities should devote every effort to alleviate patients' concerns about the invasion of their information privacy to avoid eroding the reputation of medical facilities and impeding the promotion of EMRs.

  4. Obtaining P3P privacy policies for composite services.

    PubMed

    Sun, Yi; Huang, Zhiqiu; Ke, Changbo

    2014-01-01

    With the development of web services technology, web services have changed from single to composite services. Privacy protection in composite services is becoming an important issue. P3P (platform for privacy preferences) is a privacy policy language which was designed for single web services. It enables service providers to express how they will deal with the privacy information of service consumers. In order to solve the problem that P3P cannot be applied to composite services directly, we propose a method to obtain P3P privacy policies for composite services. In this method, we present the definitions of Purpose, Recipient, and Retention elements as well as Optional and Required attributes for P3P policies of composite services. We also provide an instantiation to illustrate the feasibility of the method.

  5. Privacy Factors in Video-Based Media Spaces

    NASA Astrophysics Data System (ADS)

    Boyle, Michael; Neustaedter, Carman; Greenberg, Saul

    Media space research is accompanied by a long-standing debate on the value of awareness leading to casual interaction versus its potential for intended or unintended privacy invasion. This is not just a matter of technology: the trade-off between the two depends very much on the social makeup of the people using the space, how cameras are actually situated, the kinds of activities that typically happen in the space, and so on. This chapter offers a framework — a descriptive theory — that defines how one can think of privacy while analyzing media spaces and their expected or actual use. The framework outlines existing perspectives on privacy and then decomposes privacy into three normative controls for regula ting interpersonal boundaries in an embodied dialectic: solitude, confidentiality, and autonomy. By considering the nuances of these controls, this theory yields a powerful vocabulary of terms that disambiguate the many interrelated and subtle meanings of “privacy.”

  6. Privacy, technology, and norms: the case of Smart Meters.

    PubMed

    Horne, Christine; Darras, Brice; Bean, Elyse; Srivastava, Anurag; Frickel, Scott

    2015-05-01

    Norms shift and emerge in response to technological innovation. One such innovation is Smart Meters - components of Smart Grid energy systems capable of minute-to-minute transmission of consumer electricity use information. We integrate theory from sociological research on social norms and privacy to examine how privacy threats affect the demand for and expectations of norms that emerge in response to new technologies, using Smart Meters as a test case. Results from three vignette experiments suggest that increased threats to privacy created by Smart Meters are likely to provoke strong demand for and expectations of norms opposing the technology and that the strength of these normative rules is at least partly conditional on the context. Privacy concerns vary little with actors' demographic characteristics. These findings contribute to theoretical understanding of norm emergence and have practical implications for implementing privacy protections that effectively address concerns of electricity users.

  7. Privacy, technology, and norms: the case of Smart Meters.

    PubMed

    Horne, Christine; Darras, Brice; Bean, Elyse; Srivastava, Anurag; Frickel, Scott

    2015-05-01

    Norms shift and emerge in response to technological innovation. One such innovation is Smart Meters - components of Smart Grid energy systems capable of minute-to-minute transmission of consumer electricity use information. We integrate theory from sociological research on social norms and privacy to examine how privacy threats affect the demand for and expectations of norms that emerge in response to new technologies, using Smart Meters as a test case. Results from three vignette experiments suggest that increased threats to privacy created by Smart Meters are likely to provoke strong demand for and expectations of norms opposing the technology and that the strength of these normative rules is at least partly conditional on the context. Privacy concerns vary little with actors' demographic characteristics. These findings contribute to theoretical understanding of norm emergence and have practical implications for implementing privacy protections that effectively address concerns of electricity users. PMID:25769852

  8. Obtaining P3P privacy policies for composite services.

    PubMed

    Sun, Yi; Huang, Zhiqiu; Ke, Changbo

    2014-01-01

    With the development of web services technology, web services have changed from single to composite services. Privacy protection in composite services is becoming an important issue. P3P (platform for privacy preferences) is a privacy policy language which was designed for single web services. It enables service providers to express how they will deal with the privacy information of service consumers. In order to solve the problem that P3P cannot be applied to composite services directly, we propose a method to obtain P3P privacy policies for composite services. In this method, we present the definitions of Purpose, Recipient, and Retention elements as well as Optional and Required attributes for P3P policies of composite services. We also provide an instantiation to illustrate the feasibility of the method. PMID:25126609

  9. Privacy-preserving health data collection for preschool children.

    PubMed

    Guan, Shaopeng; Zhang, Yuan; Ji, Yue

    2013-01-01

    With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol. PMID:24285984

  10. Privacy-preserving health data collection for preschool children.

    PubMed

    Guan, Shaopeng; Zhang, Yuan; Ji, Yue

    2013-01-01

    With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol.

  11. Not All Adware Is Badware: Towards Privacy-Aware Advertising

    NASA Astrophysics Data System (ADS)

    Haddadi, Hamed; Guha, Saikat; Francis, Paul

    Online advertising is a major economic force in the Internet today. A basic goal of any advertising system is to accurately target the ad to the recipient audience. While Internet technology brings the promise of extremely well-targeted ad placement, there have always been serious privacy concerns surrounding personalization. Today there is a constant battle between privacy advocates and advertisers, where advertisers try to push new personalization technologies, and privacy advocates try to stop them. As long as privacy advocates, however, are unable to propose an alternative personalization system that is private, this is a battle they are destined to lose. This paper presents the framework for such an alternative system, the Private Verifiable Advertising (Privad). We describe the privacy issues associated with today’s advertising systems, describe Privad, and discuss its pros and cons and the challenges that remain.

  12. Development and Analyses of Privacy Management Models in Online Social Networks Based on Communication Privacy Management Theory

    ERIC Educational Resources Information Center

    Lee, Ki Jung

    2013-01-01

    Online social networks (OSNs), while serving as an emerging means of communication, promote various issues of privacy. Users of OSNs encounter diverse occasions that lead to invasion of their privacy, e.g., published conversation, public revelation of their personally identifiable information, and open boundary of distinct social groups within…

  13. Data privacy considerations in Intensive Care Grids.

    PubMed

    Luna, Jesus; Dikaiakos, Marios D; Kyprianou, Theodoros; Bilas, Angelos; Marazakis, Manolis

    2008-01-01

    Novel eHealth systems are being designed to provide a citizen-centered health system, however the even demanding need for computing and data resources has required the adoption of Grid technologies. In most of the cases, this novel Health Grid requires not only conveying patient's personal data through public networks, but also storing it into shared resources out of the hospital premises. These features introduce new security concerns, in particular related with privacy. In this paper we survey current legal and technological approaches that have been taken to protect a patient's personal data into eHealth systems, with a particular focus in Intensive Care Grids. However, thanks to a security analysis applied over the Intensive Care Grid system (ICGrid) we show that these security mechanisms are not enough to provide a comprehensive solution, mainly because the data-at-rest is still vulnerable to attacks coming from untrusted Storage Elements where an attacker may directly access them. To cope with these issues, we propose a new privacy-oriented protocol which uses a combination of encryption and fragmentation to improve data's assurance while keeping compatibility with current legislations and Health Grid security mechanisms.

  14. Disassociation for electronic health record privacy.

    PubMed

    Loukides, Grigorios; Liagouris, John; Gkoulalas-Divanis, Aris; Terrovitis, Manolis

    2014-08-01

    The dissemination of Electronic Health Record (EHR) data, beyond the originating healthcare institutions, can enable large-scale, low-cost medical studies that have the potential to improve public health. Thus, funding bodies, such as the National Institutes of Health (NIH) in the U.S., encourage or require the dissemination of EHR data, and a growing number of innovative medical investigations are being performed using such data. However, simply disseminating EHR data, after removing identifying information, may risk privacy, as patients can still be linked with their record, based on diagnosis codes. This paper proposes the first approach that prevents this type of data linkage using disassociation, an operation that transforms records by splitting them into carefully selected subsets. Our approach preserves privacy with significantly lower data utility loss than existing methods and does not require data owners to specify diagnosis codes that may lead to identity disclosure, as these methods do. Consequently, it can be employed when data need to be shared broadly and be used in studies, beyond the intended ones. Through extensive experiments using EHR data, we demonstrate that our method can construct data that are highly useful for supporting various types of clinical case count studies and general medical analysis tasks.

  15. Rare disease research: Breaking the privacy barrier.

    PubMed

    Mascalzoni, Deborah; Paradiso, Angelo; Hansson, Matts

    2014-06-01

    Due to the few patients affected, rare disease research has to count on international registries to exist in order to produce significant research outputs. Data sharing of registries is therefore a unique resource to allow rare disease research to flourish and any lost data will jeopardize the quality of an already extremely difficult research. The rules usually applied to research such as the right to withdraw or the need for specific consent for every use of data can be detrimental in order to get effective results. Privacy rights regulated through traditional informed consent mechanisms have been regarded as a major barrier in order to effectively share data worldwide. Some authors argue that this barrier hampers results that could be beneficial to the patients so that another right will be overstated: the right to quality healthcare. We argue in this paper that privacy has been often interpreted just one-sided as the right to secrecy but it can entail another meaning: the right to manage one's own private sphere. Managing it pertains, not only to the right to deny access, but also to the right to grant access. At the same time research on patient participation and transparency shows that new forms of IT-based informed consent can provide a good balance between the right of individuals to be in control of their data and the opportunity for science to pursue international research. PMID:27275410

  16. 17 CFR 248.2 - Model privacy form: rule of construction.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Model privacy form: rule of... Safeguarding Personal Information § 248.2 Model privacy form: rule of construction. (a) Model privacy form. Use of the model privacy form in appendix A to subpart A of this part, consistent with the...

  17. 17 CFR 248.2 - Model privacy form: rule of construction.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Model privacy form: rule of... Safeguarding Personal Information § 248.2 Model privacy form: rule of construction. (a) Model privacy form. Use of the model privacy form in appendix A to subpart A of this part, consistent with the...

  18. 17 CFR 248.2 - Model privacy form: rule of construction.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Model privacy form: rule of... Safeguarding Personal Information § 248.2 Model privacy form: rule of construction. (a) Model privacy form. Use of the model privacy form in appendix A to subpart A of this part, consistent with the...

  19. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Evaluating information systems for Privacy Act... systems for Privacy Act compliance. Information system owners and developers must address Privacy Act... cycle of the information system. This is accomplished with a Privacy Impact Assessment. (a) The...

  20. 32 CFR Appendix E to Part 806b - Privacy Impact Assessment

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Impact Assessment E Appendix E to Part... PRIVACY ACT PROGRAM Pt. 806b, App. E Appendix E to Part 806b—Privacy Impact Assessment Section A... implement citizen-centered e-Government. Privacy issues must be addressed when systems are being...

  1. 12 CFR 1204.7 - Are there any exemptions from the Privacy Act?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... PRIVACY ACT IMPLEMENTATION § 1204.7 Are there any exemptions from the Privacy Act? (a) What is a Privacy Act exemption? The Privacy Act allows the Director to exempt records or information in a system of... necessary. (b) How do I know if the records or information I want are exempt? (1) Each notice of a system...

  2. 32 CFR Appendix E to Part 806b - Privacy Impact Assessment

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Impact Assessment E Appendix E to Part... PRIVACY ACT PROGRAM Pt. 806b, App. E Appendix E to Part 806b—Privacy Impact Assessment Section A... implement citizen-centered e-Government. Privacy issues must be addressed when systems are being...

  3. 38 CFR 20.1200 - Rule 1200. Privacy Act request-appeal pending.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Rule 1200. Privacy Act... VETERANS AFFAIRS (CONTINUED) BOARD OF VETERANS' APPEALS: RULES OF PRACTICE Privacy Act § 20.1200 Rule 1200. Privacy Act request—appeal pending. When a Privacy Act request is filed under § 1.577 of this chapter...

  4. 17 CFR 248.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Initial privacy notice to... COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.4 Initial privacy notice to...

  5. 12 CFR 573.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Delivering privacy and opt out notices. 573.9 Section 573.9 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.9 Delivering privacy and opt out...

  6. 12 CFR 40.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Delivering privacy and opt out notices. 40.9 Section 40.9 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.9 Delivering privacy and opt out notices. (a) How...

  7. Perspectives on Privacy and Terrorism: All Is not Lost--Yet.

    ERIC Educational Resources Information Center

    Gellman, Robert

    2002-01-01

    Discusses implications of the U.S.A. Patriot Act, antiterrorism legislation that was passed after the September 11 attacks, regarding privacy issues. Highlights include information privacy; privacy and government, including increases in the surveillance powers of government; privacy and the private sector; and future possibilities. (Author/LRW)

  8. 32 CFR Appendix G to Part 323 - Privacy Act Enforcement Actions

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Privacy Act Enforcement Actions G Appendix G to... (CONTINUED) PRIVACY PROGRAM DEFENSE LOGISTICS AGENCY PRIVACY PROGRAM Pt. 323, App. G Appendix G to Part 323... feels certain provisions of the Privacy Act have been violated (see 5 U.S.C. 552a(g), reference (b).)...

  9. 36 CFR 1008.4 - Standards for maintenance of records subject to the Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... records subject to the Privacy Act. 1008.4 Section 1008.4 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.4 Standards for maintenance of records subject to the Privacy Act. (a) Content of records. Records subject to the Privacy Act shall contain only...

  10. 36 CFR 1008.3 - Records subject to the Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Privacy Act. 1008.3 Section 1008.3 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.3 Records subject to the Privacy Act. The Privacy Act applies to all records which the Presidio Trust maintains in a system of records....

  11. 36 CFR 1008.3 - Records subject to the Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Privacy Act. 1008.3 Section 1008.3 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.3 Records subject to the Privacy Act. The Privacy Act applies to all records which the Presidio Trust maintains in a system of records....

  12. 36 CFR 1008.4 - Standards for maintenance of records subject to the Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... records subject to the Privacy Act. 1008.4 Section 1008.4 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.4 Standards for maintenance of records subject to the Privacy Act. (a) Content of records. Records subject to the Privacy Act shall contain only...

  13. 36 CFR 1008.3 - Records subject to the Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Records subject to the Privacy Act. 1008.3 Section 1008.3 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.3 Records subject to the Privacy Act. The Privacy Act applies to all records which...

  14. 36 CFR 1008.3 - Records subject to the Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Privacy Act. 1008.3 Section 1008.3 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.3 Records subject to the Privacy Act. The Privacy Act applies to all records which the Presidio Trust maintains in a system of records....

  15. 36 CFR 1008.4 - Standards for maintenance of records subject to the Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... records subject to the Privacy Act. 1008.4 Section 1008.4 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.4 Standards for maintenance of records subject to the Privacy Act. (a) Content of records. Records subject to the Privacy Act shall contain only...

  16. 36 CFR 1008.4 - Standards for maintenance of records subject to the Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... records subject to the Privacy Act. 1008.4 Section 1008.4 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.4 Standards for maintenance of records subject to the Privacy Act. (a) Content of records. Records subject to the Privacy Act shall contain only...

  17. 36 CFR 1008.4 - Standards for maintenance of records subject to the Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... records subject to the Privacy Act. 1008.4 Section 1008.4 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.4 Standards for maintenance of records subject to the Privacy Act. (a) Content of records. Records subject to the Privacy Act shall contain only...

  18. 36 CFR 1008.3 - Records subject to the Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Privacy Act. 1008.3 Section 1008.3 Parks, Forests, and Public Property PRESIDIO TRUST REQUESTS UNDER THE PRIVACY ACT § 1008.3 Records subject to the Privacy Act. The Privacy Act applies to all records which the Presidio Trust maintains in a system of records....

  19. 12 CFR 332.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.9 Delivering... not, however, reasonably expect that a consumer will receive actual notice of your privacy policies... advertisements of your privacy policies and practices; or (ii) Send the notice via electronic mail to a...

  20. 76 FR 60510 - DHS Data Privacy and Integrity Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ... in the Federal Register at 76 FR 58524 that the Data Privacy and ] Integrity Advisory Committee would... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee; Meeting AGENCY: Privacy.... DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on Wednesday, October 5,...