Science.gov

Sample records for privacy

  1. Protecting Privacy.

    ERIC Educational Resources Information Center

    Coyle, Karen

    2001-01-01

    Discusses privacy issues related to use of the Internet. Topics include data gathering functions that are built into applications of the World Wide Web; cookies that identify Web site visitors; personal identity information; libraries and privacy, including the need for privacy policies; protecting your privacy; and developing privacy literacy.…

  2. Location Privacy

    NASA Astrophysics Data System (ADS)

    Meng, Xiaofeng; Chen, Jidong

    With rapid development of sensor and wireless mobile devices, it is easy to access mobile users' location information anytime and anywhere. On one hand, LBS is becoming more and more valuable and important. On the other hand, location privacy issues raised by such applications have also gained more attention. However, due to the specificity of location information, traditional privacy-preserving techniques in data publishing cannot be used. In this chapter, we will introduce location privacy, and analyze the challenges of location privacy-preserving, and give a survey of existing work including the system architecture, location anonymity and query processing.

  3. Privacy Act

    EPA Pesticide Factsheets

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  4. From Data Privacy to Location Privacy

    NASA Astrophysics Data System (ADS)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  5. Protecting Children's Online Privacy.

    ERIC Educational Resources Information Center

    Kresses, Mamie

    2001-01-01

    Discuss provisions of new federal Children's Online Privacy Protection Act that principals should know to protect student privacy on the Internet. Also discusses relevant provisions of the Family Educational Rights and Privacy Act. (PKP)

  6. Privacy Act Statement

    EPA Pesticide Factsheets

    Any information you provide to the Environmental Protection Agency’s (EPA) Suspension and Debarment Program will be governed by the Privacy Act and will be included in the EPA Debarment and Suspension Files, a Privacy Act system of records.

  7. Privacy and Library Records

    ERIC Educational Resources Information Center

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  8. Privacy and Library Records

    ERIC Educational Resources Information Center

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  9. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  10. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  11. Privacy Training Program

    EPA Pesticide Factsheets

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  12. Emerging Privacy Issues.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    As the issue of information privacy increases in complexity in terms of the number of organizations involved, the intricacy of the information flows, and the difficulty of conceiving appropriate legal safeguards, it is not certain that the practices and laws that have been developed for current privacy protection can work for new situations.…

  13. Toward practicing privacy

    PubMed Central

    Dwork, Cynthia; Pottenger, Rebecca

    2013-01-01

    Private data analysis—the useful analysis of confidential data—requires a rigorous and practicable definition of privacy. Differential privacy, an emerging standard, is the subject of intensive investigation in several diverse research communities. We review the definition, explain its motivation, and discuss some of the challenges to bringing this concept to practice. PMID:23243088

  14. Historical Perspectives on Privacy.

    ERIC Educational Resources Information Center

    Huttenstine, Marian L.

    A number of court cases involving public disclosure of private information are described in this paper to point to historical trends involving the issue of privacy and to illustrate some of the problems with all aspects of the issue. After noting the conflict between the principle of individual privacy and the principle of free disclosure of…

  15. Children's Online Privacy.

    ERIC Educational Resources Information Center

    Aidman, Amy

    2000-01-01

    The first federal Internet privacy law (the Children's Online Privacy Protection Act) provides safeguards for children by regulating collection of their personal information. Unfortunately, teens are not protected. Legislation is pending to protect children from online marketers such as ZapMe! Interactive technologies require constant vigilance.…

  16. Ethics and Privacy.

    ERIC Educational Resources Information Center

    Brewer, Erin; Eastmond, Nick; Geertsen, Reed; Johnson, Doug; Lewandowski, Judith; Yeaman, Andrew R. J.

    2003-01-01

    Contains four articles covering trends and issues on ethics and privacy in instructional technology, including: considerations for assessing ethical issues; what schools must do to develop ethical behaviors in students; a privacy primer for educators; and manufacturing technophopia. Each article contains references. (MES)

  17. Children's Online Privacy.

    ERIC Educational Resources Information Center

    Aidman, Amy

    2000-01-01

    The first federal Internet privacy law (the Children's Online Privacy Protection Act) provides safeguards for children by regulating collection of their personal information. Unfortunately, teens are not protected. Legislation is pending to protect children from online marketers such as ZapMe! Interactive technologies require constant vigilance.…

  18. Information Privacy Revealed

    ERIC Educational Resources Information Center

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  19. Ethics and Privacy.

    ERIC Educational Resources Information Center

    Brewer, Erin; Eastmond, Nick; Geertsen, Reed; Johnson, Doug; Lewandowski, Judith; Yeaman, Andrew R. J.

    2003-01-01

    Contains four articles covering trends and issues on ethics and privacy in instructional technology, including: considerations for assessing ethical issues; what schools must do to develop ethical behaviors in students; a privacy primer for educators; and manufacturing technophopia. Each article contains references. (MES)

  20. Information Privacy Revealed

    ERIC Educational Resources Information Center

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  1. Legal Protections for Privacy

    ERIC Educational Resources Information Center

    Leslie, David W.

    1977-01-01

    Individual interest in privacy is a multiple legal issue, roughly divided into four parts according to different types of law: constitutional, statutory, administrative, and common law. Policy implications of this issue for institutions are discussed. (Editor/LBH)

  2. EGRP Privacy Policy & Disclaimers

    Cancer.gov

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  3. Summary of the Privacy Act

    EPA Pesticide Factsheets

    The purpose of the Privacy Act is to balance the government's need to maintain information about individuals with the rights of individuals to be protected against unwarranted invasions of their privacy.

  4. Protecting Your Child's Privacy Online

    MedlinePlus

    ... Online Kids and Virtual Worlds Kids, Parents, and Video Games Kids: Texting and Sexting Kids’ Privacy Parental Controls Talk to Your Kids Teens Tweens Young Kids Identity Theft Blog Video & Media Scam Alerts Get privacy and identity updates ...

  5. Inequalities for the quantum privacy

    NASA Astrophysics Data System (ADS)

    Trindade, M. A. S.; Pinto, E.

    2016-02-01

    In this work, we investigate the asymptotic behavior related to the quantum privacy for multipartite systems. In this context, an inequality for quantum privacy was obtained by exploiting of quantum entropy properties. Subsequently, we derive a lower limit for the quantum privacy through the entanglement fidelity. In particular, we show that there is an interval where an increase in entanglement fidelity implies a decrease in quantum privacy.

  6. Privacy Expectations in Online Contexts

    ERIC Educational Resources Information Center

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  7. Advertising and Invasion of Privacy.

    ERIC Educational Resources Information Center

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  8. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  9. Privacy Expectations in Online Contexts

    ERIC Educational Resources Information Center

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  10. What was privacy?

    PubMed

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  11. Privacy Policy | Smokefree 60+

    Cancer.gov

    The National Cancer Institute (NCI) respects the privacy of users of its websites. This is why we have taken the time to disclose our privacy policy and information collection practices. NCI does not disclose, give, sell, or transfer any personal information about visitors unless required to do so by law. NCI automatically collects a limited amount of information about the use of websites for statistical purposes — that is, to measure the numbers of visitors. This information may be helpful when considering changes that improve our websites for future visitors.

  12. Computers and Personal Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    Privacy is an issue that arises from the intersection of a demand for improved recordkeeping processes, and computing technology as the response to the demand. Recordkeeping in the United States centers on information about people. Modern day computing technology has the ability to maintain, store, and retrieve records quickly; however, this…

  13. Privacy Policy | FNLCR

    Cancer.gov

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  14. Computers and Personal Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    Privacy is an issue that arises from the intersection of a demand for improved recordkeeping processes, and computing technology as the response to the demand. Recordkeeping in the United States centers on information about people. Modern day computing technology has the ability to maintain, store, and retrieve records quickly; however, this…

  15. Privacy vs. the Media.

    ERIC Educational Resources Information Center

    Naylor, David T.; Smith, Bruce D.

    1982-01-01

    Describes five learning activities designed to teach secondary students about the right of the public to know and the right of privacy. The activities will help teacher to extract information from Kubek's article and bring it to American history, government, sociology, or journalism classes. (AM)

  16. Privacy Policy | FNLCR Staging

    Cancer.gov

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  17. Toilet privacy in hospital.

    PubMed

    Logan, Karen

    Good practice in toilet management and continence promotion can help hospital patients to maintain their dignity. This article reports on an audit that highlighted the issues important to patients and nurses in terms of improving privacy and dignity for inpatients using the toilet.

  18. Privacy for Cable Services.

    ERIC Educational Resources Information Center

    Eldridge, Frank R.

    Cable television's potential for providing new and attractive types of services will best be realized if the public can be assured of privacy of information transmitted specifically to their terminals and of the right to view any channel without information being gathered as to which channel is being watched at any particular time. It appears that…

  19. Collaborative Privacy - A Community-Based Privacy Infrastructure

    NASA Astrophysics Data System (ADS)

    Kolter, Jan; Kernchen, Thomas; Pernul, Günther

    The landscape of the World Wide Web with all its versatile services heavily relies on the disclosure of private user information. Service providers collecting more and more of these personal user data pose a growing privacy threat for users. Addressing user concerns privacy-enhancing technologies emerged. One goal of these technologies is to enable users to improve the control over their personal data. A famous representative is the PRIME project that aims for a holistic privacy-enhancing identity management system. However, approaches like the PRIME privacy architecture require service providers to change their server infrastructure and add specific privacy-enhancing components. In the near future, service providers are not expected to alter internal processes. In this paper, we introduce a collaborative privacy community that allows the open exchange of privacy-related information. We lay out the privacy community’s functions and potentials within a user-centric, provider-independent privacy architecture that will help foster the usage and acceptance of privacy-enhancing technologies.

  20. Privacy and Data Protection in Japan.

    ERIC Educational Resources Information Center

    Srinivasan, Srinija

    1992-01-01

    Discussion of individual rights and privacy in Japan focuses on the Privacy Protection Act, which acknowledges the threat posed by government databases to the individual's right of privacy. Characteristics of the Japanese legal system are described, origins of privacy in Japanese law are examined, and privacy and government databases are…

  1. Privacy Awareness: A Means to Solve the Privacy Paradox?

    NASA Astrophysics Data System (ADS)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  2. Location Privacy in RFID Applications

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  3. Gaussian operations and privacy

    SciTech Connect

    Navascues, Miguel; Acin, Antonio

    2005-07-15

    We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states.

  4. Child Advocacy and Family Privacy.

    ERIC Educational Resources Information Center

    Feshbach, Seymour; Feshbach, Norma Deitch

    This paper discusses the issues involved in achieving a balance between a child's rights to protection and adequate care and a family's rights to privacy and autonomy. The paper advocates a shift from the current norm of privacy concerning parents' child rearing practices towards increased openness and freer community-family communication. In view…

  5. Privacy Issues and New Technologies.

    ERIC Educational Resources Information Center

    Colman, Sue

    1997-01-01

    Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…

  6. Privacy Law and Print Photojournalism.

    ERIC Educational Resources Information Center

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  7. Student Privacy and School Responsibility.

    ERIC Educational Resources Information Center

    Gluckman, Ivan

    1987-01-01

    This pamphlet considers students' right to privacy and the application of this right to the confidentiality of information disclosed to administrators and counselors. Privacy is also considered in regard to special problems associated with counseling students about drugs, contraceptives, sexually transmitted diseases, abortion, and possible threat…

  8. 76 FR 59073 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-23

    ... From the Federal Register Online via the Government Publishing Office CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency (CIA) has undertaken and completed a...

  9. User Privacy in RFID Networks

    NASA Astrophysics Data System (ADS)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  10. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  11. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  12. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  13. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  14. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  15. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5...

  16. Extensive Nonadditivity of Privacy

    NASA Astrophysics Data System (ADS)

    Smith, Graeme; Smolin, John A.

    2009-09-01

    Quantum information theory establishes the ultimate limits on communication and cryptography in terms of channel capacities for various types of information. The private capacity is particularly important because it quantifies achievable rates of quantum key distribution. We study the power of quantum channels with limited private capacity, focusing on channels that dephase in random bases. These display extensive nonadditivity of private capacity: a channel with 2log⁡d input qubits that has a private capacity less than 2, but when used together with a second channel with zero private capacity, the joint capacity jumps to (1/2)log⁡d. In contrast to earlier work which found nonadditivity vanishing as a fraction of input size or conditional on unproven mathematical assumptions, this provides a natural setting manifesting nonadditivity of privacy of the strongest possible sort.

  17. Extensive nonadditivity of privacy.

    PubMed

    Smith, Graeme; Smolin, John A

    2009-09-18

    Quantum information theory establishes the ultimate limits on communication and cryptography in terms of channel capacities for various types of information. The private capacity is particularly important because it quantifies achievable rates of quantum key distribution. We study the power of quantum channels with limited private capacity, focusing on channels that dephase in random bases. These display extensive nonadditivity of private capacity: a channel with 2logd input qubits that has a private capacity less than 2, but when used together with a second channel with zero private capacity, the joint capacity jumps to (1/2)logd. In contrast to earlier work which found nonadditivity vanishing as a fraction of input size or conditional on unproven mathematical assumptions, this provides a natural setting manifesting nonadditivity of privacy of the strongest possible sort.

  18. Privacy in the Genomic Era

    PubMed Central

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  19. Privacy in the Genomic Era.

    PubMed

    Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W; Fellay, Jacques; Gunter, Carl A; Hubaux, Jean-Pierre; Malin, Bradley A; Wang, Xiaofeng

    2015-09-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.

  20. Physical underpinnings of privacy

    NASA Astrophysics Data System (ADS)

    Renes, Joseph M.; Boileau, Jean-Christian

    2008-09-01

    One of the remarkable features of quantum mechanics is the ability to ensure secrecy. Private states embody this effect, as they are precisely those multipartite quantum states from which two parties can produce a shared secret that cannot under any circumstances be correlated with an external system. Naturally, these play an important role in quantum key distribution (QKD) and quantum information theory. However, a general distillation method has heretofore been missing. Inspired by Koashi’s complementary control scenario [M. Koashi, e-print arXiv:0704.3661 (2007)], we give a new definition of private states in terms of one party’s potential knowledge of two complementary measurements made on the other and use this to construct a general method of private state distillation using quantum error-correcting codes. The procedure achieves the same key rate as recent, more information-theoretic approaches while demonstrating the physical principles underlying privacy of the key. Additionally, the same approach can be used to establish the hashing inequality for entanglement distillation, as well as the direct quantum coding theorem.

  1. 76 FR 30952 - Published Privacy Impact Assessments on the Web

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-27

    ... SECURITY Office of the Secretary Published Privacy Impact Assessments on the Web AGENCY: Privacy Office, DHS. ACTION: Notice of Publication of Privacy Impact Assessments (PIA). SUMMARY: The Privacy Office of..., the Chief Privacy Officer of the DHS approved and published sixteen Privacy Impact Assessments (PIAs...

  2. 77 FR 15835 - Privacy Act of 1974: Revision of Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... ADMINISTRATION Privacy Act of 1974: Revision of Privacy Act System of Records AGENCY: Small Business Administration (SBA). ACTION: Notice of Revision of Privacy Act Systems of Records. SUMMARY: SBA is revising the Privacy Act Systems of Records for the Loan System, SBA 21 (``SOR 21'') and the Suspension and...

  3. Is Privacy Important in Scoliosis Screening?

    ERIC Educational Resources Information Center

    Quick, Miriam M.; Highriter, Marion E.

    1981-01-01

    In a study done to determine the importance of privacy during scoliosis screening, individual privacy was provided for some children. Results indicated a definite lessening of anxiety for those students screened privately. (JN)

  4. 78 FR 17471 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-21

    .... 552a, 26 U.S.C. 6103, and any other applicable Federal privacy provisions. Legal and Regulatory..., 2013. Veronica Marco, Acting Deputy Assistant Secretary for Privacy, Transparency, and Records. BILLING...

  5. 75 FR 64147 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-19

    ...The Department of the Treasury is adopting, without change, an interim rule that amended its regulations on the Privacy Act of 1974, as Amended, by removing three Privacy Act systems of records from this part, revising the title of the one remaining Privacy Act system of records relating to the functions of the Alcohol and Tobacco Tax and Trade Bureau, and retaining the Privacy Act exemptions for TTB's one remaining system of records.

  6. 39 CFR 262.5 - Systems (Privacy).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 39 Postal Service 1 2014-07-01 2014-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  7. 39 CFR 262.5 - Systems (Privacy).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a... 39 Postal Service 1 2011-07-01 2011-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system...

  8. Privacy-Preserving Distributed Information Sharing

    DTIC Science & Technology

    2006-07-01

    fool other players. Note that our protocol defends against all of these attacks, by provably achieving the properties of owner and data privacy as...instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send...sufficiently efficient protocols for these problems, we define two new privacy properties: owner privacy and data privacy. Protocols that achieve these

  9. On genomics, kin, and privacy

    PubMed Central

    Telenti, Amalio; Ayday, Erman; Hubaux, Jean Pierre

    2014-01-01

    The storage of greater numbers of exomes or genomes raises the question of loss of privacy for the individual and for families if genomic data are not properly protected. Access to genome data may result from a personal decision to disclose, or from gaps in protection. In either case, revealing genome data has consequences beyond the individual, as it compromises the privacy of family members. Increasing availability of genome data linked or linkable to metadata through online social networks and services adds one additional layer of complexity to the protection of genome privacy.  The field of computer science and information technology offers solutions to secure genomic data so that individuals, medical personnel or researchers can access only the subset of genomic information required for healthcare or dedicated studies. PMID:25254097

  10. 39 CFR 262.5 - Systems (Privacy).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION RECORDS AND INFORMATION MANAGEMENT DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system...

  11. Urban forests and parks as privacy refuges

    Treesearch

    William E. Hammitt

    2002-01-01

    Urban forests and parks are forested areas that can serve as refuges for privacy. This article presents a conceptual argument for urban forests and parks as privacy refuges, and data that support the argument. On-site visitors (n = 610) to four Cleveland, Ohio, U.S., Metroparks were surveyed in 1995. Results indicated that considerable amounts of privacy were obtained...

  12. 78 FR 69552 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... Department of the Navy 32 CFR Part 701 Privacy Act; Implementation AGENCY: Department of the Navy, DoD... Privacy Act Program by adding the (k)(5) exemption to accurately describe the basis for exempting the... Department of the Navy Privacy Program rules that will exempt applicable Department records and/or...

  13. 75 FR 22577 - Proposed Privacy Policy Statement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... COMMISSION Proposed Privacy Policy Statement AGENCY: U.S. Election Assistance Commission. ACTION: Notice and request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99-...

  14. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 2 2011-04-01 2011-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  15. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance: Treasury 1 2013-07-01 2013-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  16. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  17. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  18. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 2 2012-04-01 2012-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  19. 75 FR 61994 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-07

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC25 Privacy Act; Implementation AGENCY: Office of Foreign... requirements of the Privacy Act of 1974, as amended, the Department of the Treasury is amending its regulations... records by revising the number and title of the Privacy Act system of records for which an exemption...

  20. 76 FR 71293 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-17

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC37 Privacy Act; Implementation AGENCY: Office of the Secretary, Treasury. ACTION: Proposed rule. SUMMARY: In accordance with the requirements of the Privacy Act... Identification Number Records'' from certain provisions of the Privacy Act. DATES: Comments must be received...

  1. 78 FR 69550 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD... updating the DIA Privacy Act Program by adding the (k)(2) and (k)(5) exemptions to accurately describe the... rules. These changes will allow the Department to add exemption rules to the DIA Privacy Program...

  2. 78 FR 69551 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD... proposing to update the DIA Privacy Act Program by adding the (k)(2) and (k)(5) exemptions to accurately... exemption rules to the DIA Privacy Program rules that will exempt applicable Department records...

  3. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance: Treasury 1 2012-07-01 2012-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  4. Sexiled: Privacy Acquisition Strategies of College Roommates

    ERIC Educational Resources Information Center

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  5. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  6. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 5 2014-04-01 2014-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  7. 75 FR 54162 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-03

    ... Services [CMS Computer Match No. 2010-01; HHS Computer Match No. 1006] Privacy Act of 1974 AGENCY...: Notice of Computer Matching Program (CMP). SUMMARY: In accordance with the requirements of the Privacy.... The Privacy Act provides an opportunity for interested persons to comment on the proposed...

  8. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  9. 77 FR 56771 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-14

    ... Department of the Navy 32 CFR Part 701 Privacy Act; Implementation AGENCY: Department of the Navy, DoD... Privacy Act Program by adding the (k)(2) exemption to accurately describe the basis for exempting the... nonsubstantive changes dealing with DoD's management of its Privacy Programs. DoD expects no opposition to...

  10. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 2 2014-04-01 2014-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  11. 25 CFR 556.2 - Privacy notice.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 2 2013-04-01 2013-04-01 false Privacy notice. 556.2 Section 556.2 Indians NATIONAL... OFFICIALS AND KEY EMPLOYEES § 556.2 Privacy notice. (a) A tribe shall place the following notice on the... applicant: In compliance with the Privacy Act of 1974, the following information is provided:...

  12. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  13. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  14. 77 FR 57015 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD... that have been previously claimed for the records in another Privacy Act system of records. DIA is updating the DIA Privacy Act Program by adding the (k)(2) and (k)(5) exemptions to accurately describe...

  15. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 5 2013-04-01 2013-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  16. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 5 2011-04-01 2011-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  17. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance: Treasury 1 2011-07-01 2011-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  18. 24 CFR 3280.107 - Interior privacy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 5 2012-04-01 2012-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock....

  19. 75 FR 65229 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-22

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC26 Privacy Act; Implementation AGENCY: Departmental... of the Privacy Act of 1974, as amended, the Department of the Treasury is revising the title of an... FURTHER INFORMATION CONTACT: Dale Underwood, Privacy Act officer, Department of the Treasury,...

  20. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy...

  1. 31 CFR 0.216 - Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 1 2014-07-01 2014-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act...

  2. Sexiled: Privacy Acquisition Strategies of College Roommates

    ERIC Educational Resources Information Center

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  3. Pass the Cookies and Uphold the Privacy.

    ERIC Educational Resources Information Center

    Guenther, Kim

    2001-01-01

    Considers how privacy issues related to online profiling affect library patrons and what librarians should do to protect them. Discusses the need for a privacy policy and provides guidelines from the OECD (Organisation for Economic Cooperation and Development) privacy statement generator that can be adapted for libraries. (LRW)

  4. Effective Management of Information Security and Privacy

    ERIC Educational Resources Information Center

    Anderson, Alicia

    2006-01-01

    No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…

  5. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C... operation of a system of records using commercial information technology services or information...

  6. Effective Management of Information Security and Privacy

    ERIC Educational Resources Information Center

    Anderson, Alicia

    2006-01-01

    No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…

  7. Privacy-enhanced electronic mail

    NASA Astrophysics Data System (ADS)

    Bishop, Matt

    1990-06-01

    The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.

  8. Intelligence, Dataveillance, and Information Privacy

    NASA Astrophysics Data System (ADS)

    Mace, Robyn R.

    The extent and scope of intelligence activities are expanding in response to technological and economic transformations of the past decades. Intelligence efforts involving aggregated data from multiple public and private sources combined with past abuses of domestic intelligence functions have generated significant concerns among privacy advocates and citizens about the protection of individual civil liberties and information privacy from corporate and governmental misuse. In the information age, effective regulation and oversight are key components in the legitimacy and success of government domestic intelligence activities.

  9. The Privacy War: Enabling Siblings the Right to Privacy.

    ERIC Educational Resources Information Center

    Sagarese, Margaret; Giannetti, Charlene

    2003-01-01

    Polled adolescents, parents, and teachers to determine where the child's right to privacy ends and the parent's responsibility to protect begins. Results indicate that the worst offenders tend to be siblings. The paper presents a three-pronged strategy to help parents deal with battling children: recognize the breaches, negotiate the truce…

  10. The Regulatory Framework for Privacy and Security

    NASA Astrophysics Data System (ADS)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  11. Comprehensive Quantitative Analysis on Privacy Leak Behavior

    PubMed Central

    Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan

    2013-01-01

    Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects. PMID:24066046

  12. Comprehensive quantitative analysis on privacy leak behavior.

    PubMed

    Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan

    2013-01-01

    Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects.

  13. Protection of privacy and confidentiality.

    PubMed

    Curran, W J; Laska, E M; Kaplan, H; Bank, R

    1973-11-23

    A multistate, cooperative program seeking to develop better methods for the effective and efficient gathering. storing, analyzing, and utilizing of mental patient records has made a comprehensive effort to protect the confidentiality and privacy of these psychiatric patient records. Administrative, technical, and legal safeguards have been implemented. The discussion of legal safeguards involves two areas: the protection of the system itself, located at Rockland State Hospital; and the specific legal environment of confidentiality and privacy of mental health records and information in the group of cooperating jurisdictions. On the whole, adequate legal and administrative protection can be afforded the confidentiality and privacy of an electronic data system in the mental health field, and access to the records can be restricted for the welfare of the patients. At the same time, access to aggregate data in the system can be allowed, under proper standards, for important research and planning purposes. The methods adopted by MSIS to preserve confidentiality and privacy by limiting access to such records could well prove an important model for the development of protective methods in other electronic data programs-not only those in psychiatry, but those in other fields where the data collected are sensitive and confidential.

  14. 78 FR 46256 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code...

  15. Privacy and Security: A Bibliography.

    ERIC Educational Resources Information Center

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  16. Patient privacy and social media.

    PubMed

    Hader, Amy L; Brown, Evan D

    2010-08-01

    Healthcare providers using social media must remain mindful of professional boundaries and patients' privacy rights. Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics.

  17. Facebook: When Education Meets Privacy

    ERIC Educational Resources Information Center

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  18. Panel: RFID Security and Privacy

    NASA Astrophysics Data System (ADS)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  19. Children's Privacy and Children's Copyright

    EPA Pesticide Factsheets

    This document establishes the policy for protecting the privacy of children on the EPA public access website and the EPA Intranet and also establishes policy on copyright issues related to works created by and submitted to EPA by children both online and offline.

  20. The Privacy Act of 1974.

    ERIC Educational Resources Information Center

    O'Reilly, James T.

    This report describes the possible impact of the comprehensive Privacy Act of 1974, which went into effect on 27 September 1975. Specifically, the implications of the act for limitation of disclosure, federal information collection, individual access, private suits; criminal provisions; and exceptions to the provisions of the law are detailed. In…

  1. Personal Privacy and the Archivist.

    ERIC Educational Resources Information Center

    Raaska, Helmi

    This discussion of the protection of privacy as it relates to archival functions draws on the procedures followed by three repositories: the Gerald R. Ford Presidential Library (NLF), the Michigan Historical Collections (MHC) at the University of Michigan, and the Walter P. Reuther Library of Labor and Urban Affairs (Reuther Library) at Wayne…

  2. Facebook: When Education Meets Privacy

    ERIC Educational Resources Information Center

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  3. The Paradoxical Value of Privacy

    DTIC Science & Technology

    2003-03-14

    on occurrence of identity theft correlated with consumer behavior so that probabilities of at least such clear privacy problems could be assigned to...now. And, the market typically needs to learn from experience, so consumer behavior is likely to lag behind any current reality. So one answer is that

  4. College and University Privacy Leadership

    ERIC Educational Resources Information Center

    Showalter, Rodney J.

    2009-01-01

    Beginning in the late 1990s, international corporations began hiring Chief Privacy Officers (CPOs). By 2002, large universities responded to this trend by creating this distinct position or modifying an existing job description to include CPO responsibilities. While not every registrar assumes the role of CPO, increasing practical and legislative…

  5. College and University Privacy Leadership

    ERIC Educational Resources Information Center

    Showalter, Rodney J.

    2009-01-01

    Beginning in the late 1990s, international corporations began hiring Chief Privacy Officers (CPOs). By 2002, large universities responded to this trend by creating this distinct position or modifying an existing job description to include CPO responsibilities. While not every registrar assumes the role of CPO, increasing practical and legislative…

  6. Privacy-protecting video surveillance

    NASA Astrophysics Data System (ADS)

    Wickramasuriya, Jehan; Alhazzazi, Mohanned; Datt, Mahesh; Mehrotra, Sharad; Venkatasubramanian, Nalini

    2005-02-01

    Forms of surveillance are very quickly becoming an integral part of crime control policy, crisis management, social control theory and community consciousness. In turn, it has been used as a simple and effective solution to many of these problems. However, privacy-related concerns have been expressed over the development and deployment of this technology. Used properly, video cameras help expose wrongdoing but typically come at the cost of privacy to those not involved in any maleficent activity. This work describes the design and implementation of a real-time, privacy-protecting video surveillance infrastructure that fuses additional sensor information (e.g. Radio-frequency Identification) with video streams and an access control framework in order to make decisions about how and when to display the individuals under surveillance. This video surveillance system is a particular instance of a more general paradigm of privacy-protecting data collection. In this paper we describe in detail the video processing techniques used in order to achieve real-time tracking of users in pervasive spaces while utilizing the additional sensor data provided by various instrumented sensors. In particular, we discuss background modeling techniques, object tracking and implementation techniques that pertain to the overall development of this system.

  7. The privacy rule that's not.

    PubMed

    Sobel, Richard

    2007-01-01

    HIPAA is often described as a privacy rule. It is not. In fact, HIPAA is a disclosure regulation, and it has effectively dismantled the longstanding moral and legal tradition of patient confidentiality. By permitting broad and easy dissemination of patients' medical information, with no audit trails for most disclosures, it has undermined both medical ethics and the effectiveness of medical care.

  8. Privacy and disclosure in psychoanalysis.

    PubMed

    Kantrowitz, Judy L

    2009-08-01

    The tension between privacy and disclosure in psychoanalysis operates in various ways in analyst, supervisee, and supervisor. Analysts need to maintain the privacy of their patients by keeping their material confidential; they also need to know and share their own internal conscious conflicts to be able to discover unconscious conflicts and their characterological ramifications. Clinical writing is one vehicle for the exploration, discovery, and communication of transference-countertransference issues and other conflicts stimulated by clinical work, but it does not provide the perspective that comes from sharing with another person. Telling a trusted colleague what we think and feel in relation to our patients and ourselves enables us to see our blind spots, as well as providing perspective and affect containment in our work. Mutuality in peer supervision tends to reduce the transference. The special problems of privacy and disclosure in psychoanalytic training are addressed, as are the ways the analyst's belief in maintaining privacy may affect the analytic process and therapeutic relationship.

  9. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy.

    PubMed

    Mulligan, Deirdre K; Koopman, Colin; Doty, Nick

    2016-12-28

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy's disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy's essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy's multiple uses across multiple contexts.This article is part of the themed issue 'The ethical impact of data science'.

  10. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-25

    ... compliance fundamentals, privacy and data security, and the privacy compliance life cycle. A learning lunch... SECURITY Office of the Secretary Public Workshop: Privacy Compliance Workshop AGENCY: Privacy Office, DHS. ACTION: Notice Announcing Public Workshop. SUMMARY: The Department of Homeland Security Privacy...

  11. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  12. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  13. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  14. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  15. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  16. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  17. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  18. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendixA of this part, consistent with the instructions in...

  19. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  20. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the...

  1. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  2. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  3. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  4. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  5. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  6. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  7. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  8. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  9. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  10. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  11. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  12. 6 CFR 1002.4 - Responses to Privacy Act requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Responses to Privacy Act requests. 1002.4 Section 1002.4 Domestic Security PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 1002.4 Responses to Privacy Act requests. (a) Acknowledgement. The Privacy Act...

  13. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  14. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  15. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  16. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Model privacy form and... (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A...

  17. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  18. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 13 Business Credit and Assistance 1 2014-01-01 2014-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  19. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  20. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice...

  1. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in...

  2. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  3. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy...

  4. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  5. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 13 Business Credit and Assistance 1 2013-01-01 2013-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform...

  6. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act...

  7. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in...

  8. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with...

  9. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section 332.2 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form...

  10. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Model privacy form and examples. 160.2 Section 160.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A...

  11. Biobank research and the right to privacy.

    PubMed

    Ursin, Lars Oystein

    2008-01-01

    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants in biobank research might have to privacy, it is argued that their interests should be related to the specific context of the provision and reception of health care that participation in biobank research is connected with. Rather than just granting participants an exclusive right to or ownership of their health information, which must be waived in order to make biobank research possible, the privacy aspect of health information should be viewed in light of the moral rights and duties that accompany any involvement in a research based system of health services.

  12. Quantifying Differential Privacy under Temporal Correlations

    PubMed Central

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-01-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective. PMID:28883711

  13. Privacy Considerations in Awareness Systems: Designing with Privacy in Mind

    NASA Astrophysics Data System (ADS)

    Patil, Sameer; Kobsa, Alfred

    The earlier chapters of this book presented a conceptual understanding of awareness (Eggen and van Mensvoort, 2009, in this volume; Metaxas and Markopoulos, 2009, in this volume). A historical account (Rittenbruch and McEwan, 2009, in this volume) as well as descriptions of various implementations (see Part III) illustrate how various systems have attempted to foster greater awareness. A common challenge faced by all awareness systems is the tension with an individual’s desire for privacy (Hudson and Smith, 1996).

  14. 78 FR 39021 - Privacy Act of 1974; Privacy and Civil Liberties Oversight Board; System of Records Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-28

    ... From the Federal Register Online via the Government Publishing Office PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD Privacy Act of 1974; Privacy and Civil Liberties Oversight Board; System of Records Notice AGENCY: Privacy and Civil Liberties Oversight Board. ACTION: Notice of Privacy Act system of...

  15. 75 FR 44803 - Privacy Act of 1974; Notice of a New Privacy Act System of Records (SORN), Ginnie Mae Master...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-29

    ... URBAN DEVELOPMENT Privacy Act of 1974; Notice of a New Privacy Act System of Records (SORN), Ginnie Mae... Privacy Act SORN. SUMMARY: The Department proposes to establish a new Privacy Act SORN subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. The Ginne Mae Master Subservicer System will be used...

  16. Informational Privacy and the Public's Health: The Model State Public Health Privacy Act

    PubMed Central

    Gostin, Lawrence O.; Hodge, James G.; Valdiserri, Ronald O.

    2001-01-01

    Protecting public health requires the acquisition, use, and storage of extensive health-related information about individuals. The electronic accumulation and exchange of personal data promises significant public health benefits but also threatens individual privacy; breaches of privacy can lead to individual discrimination in employment, insurance, and government programs. Individuals concerned about privacy invasions may avoid clinical or public health tests, treatments, or research. Although individual privacy protections are critical, comprehensive federal privacy protections do not adequately protect public health data, and existing state privacy laws are inconsistent and fragmented. The Model State Public Health Privacy Act provides strong privacy safeguards for public health data while preserving the ability of state and local public health departments to act for the common good. PMID:11527765

  17. Privacy im Social Semantic Web

    NASA Astrophysics Data System (ADS)

    Nagenborg, Michael

    Der Schwerpunkt dieses Beitrages liegt auf dem Design von Infrastrukturen, welche es ermöglichen sollen, private Daten kontrolliert preiszugeben und auszutauschen. Zunächst wird daran erinnert, dass rechtliche und technische Maßnahmen zum Datenschutz stets auch dazu dienen, den Austausch von Daten zu ermöglichen. Die grundlegende Herausforderung besteht darin, der sozialen und politischen Bedeutung des Privaten Rechnung zu tragen. Privatheit wird aus der Perspektive der Informationsethik dabei als ein normatives, handlungsleitendes Konzept verstanden. Als Maßstab für die Gestaltung der entsprechenden Infrastrukturen wird auf Helen Nissenbaums Konzept der privacy as contextual integrity" zurückgegriffen, um u. a. die Ansätze der end-to-end information accountability" [38] und des Privacy Identity Management for Europe"- Projektes zu diskutieren.

  18. [Patients' perception about privacy in the hospital].

    PubMed

    Pupulim, Jussara Simone Lenzi; Sawada, Namie Okino

    2012-01-01

    This qualitative study aimed to describe the hospitalized patient's perception on privacy, using the content analysis. Thirty-four patients, who have been at least three days hospitalized, participated in the study. The analysis of the information was based on the theoretical reference framework of privacy, and evidenced three thematic categories: dignity and respect, autonomy, personal and territorial space. The subjects pointed out behavioral factors, which contribute or not for the protection and maintenance of the privacy in the hospital, highlighting respect as the most important aspect, followed by personal control over situations that violate privacy. Patients believe that privacy is linked to dignity and respect, depends on the demarcation of the personal/territorial space and the autonomy's security; and that these concepts and attitudes are connected and essential to protect privacy in the hospital context.

  19. Fictional privacy among Facebook users.

    PubMed

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  20. Trust and Privacy in Healthcare

    NASA Astrophysics Data System (ADS)

    Singleton, Peter; Kalra, Dipak

    This paper considers issues of trust and privacy in healthcare around increased data-sharing through Electronic Health Records (EHRs). It uses a model structured around different aspects of trust in the healthcare organisation’s reasons for greater data-sharing and their ability to execute EHR projects, particularly any associated confidentiality controls. It reflects the individual’s personal circumstances and attitude to use of health records.

  1. Privacy and security in teleradiology.

    PubMed

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  2. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    PubMed

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  3. Patient Privacy: A Consumer Protection Approach

    PubMed Central

    Brannigan, Vincent M.

    1983-01-01

    In the United States, a “Constitutional Analysis” of medical data privacy has been so far unsuccessful in obtaining significant protection. Statutory protection has evolved primarily to protect the citizen against the state, not to vindicate the privacy interest of the individual. A “Consumer Protection” approach rather than a right to privacy approach can be used to develop a coherent, practical approach to the needs of various parties in the health care system in the U.S.

  4. Social Network Privacy via Evolving Access Control

    NASA Astrophysics Data System (ADS)

    di Crescenzo, Giovanni; Lipton, Richard J.

    We study the problem of limiting privacy loss due to data shared in a social network, where the basic underlying assumptions are that users are interested in sharing data and cannot be assumed to constantly follow appropriate privacy policies. Note that if these two assumptions do not hold, social network privacy is theoretically very easy to achieve; for instance, via some form of access control and confidentiality transformation on the data.

  5. 20 CFR 401.30 - Privacy Act and other responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Officer also ensures the integration of privacy principles into information technology systems... that agency employees and contractors receive appropriate training and education programs regarding the... personal information. (f) Privacy Impact Assessment. In our comprehensive Privacy Impact Assessment...

  6. 20 CFR 401.30 - Privacy Act and other responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Officer also ensures the integration of privacy principles into information technology systems... that agency employees and contractors receive appropriate training and education programs regarding the... personal information. (f) Privacy Impact Assessment. In our comprehensive Privacy Impact Assessment...

  7. 20 CFR 401.30 - Privacy Act and other responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Officer also ensures the integration of privacy principles into information technology systems... that agency employees and contractors receive appropriate training and education programs regarding the... personal information. (f) Privacy Impact Assessment. In our comprehensive Privacy Impact Assessment...

  8. Student Privacy versus Campus Safety: Has Recent Legislation Compromised Privacy Rights?

    ERIC Educational Resources Information Center

    van der Kaay, Christopher D.

    This study highlights major legislation addressing campus safety and crime reporting and discusses its impact on a student's right to privacy. The 1974 Family Educational Rights and Privacy Act, commonly referred to as the "Buckley Amendment," was among the first pieces of legislation to address the notion of student privacy and confidentiality.…

  9. The Need for Privacy and the Application of Privacy to the Day Care Setting.

    ERIC Educational Resources Information Center

    Jacobs, Ellen

    This paper, focusing on young children's need for privacy, describes a study conducted to determine the manner in which children in day care centers resolve the problem of reduced space and time for privacy. A pilot study revealed that children displayed three privacy seeking behaviors: (1) verbal and nonverbal territorial behavior (use or defense…

  10. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... candidates for and recipients of training associated with ] NASA Astronaut and Human Space Flight Programs... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Each...

  11. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... From the Federal Register Online via the Government Publishing Office NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and...: Patti F. Stockman, Privacy Act Officer, Office of the Chief Information Officer, National...

  12. The Need for Privacy and the Application of Privacy to the Day Care Setting.

    ERIC Educational Resources Information Center

    Jacobs, Ellen

    This paper, focusing on young children's need for privacy, describes a study conducted to determine the manner in which children in day care centers resolve the problem of reduced space and time for privacy. A pilot study revealed that children displayed three privacy seeking behaviors: (1) verbal and nonverbal territorial behavior (use or defense…

  13. The Dimensions of Privacy: A National Opinion Research Survey of Attitudes Toward Privacy.

    ERIC Educational Resources Information Center

    Westin, Alan F.; And Others

    This report of a Louis Harris poll on national opinions toward privacy includes the questions asked of each respondent and the responses given in categories related to age, sex, employment, income, and other factors. There are chapters on privacy and the individual; personal privacy in relation to governmental and business institutions; privacy…

  14. 77 FR 65206 - Privacy Act of 1974; Amendment of Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-25

    ... BOARD Privacy Act of 1974; Amendment of Privacy Act System of Records AGENCY: Merit Systems Protection... maintains subject to the Privacy Act of 1974 (5 U.S.C. 552a). MSPB/ GOVT-1, ``Appeals and Case Records,'' is being amended to reflect that its location is in the Office of the Clerk of the Board. Also, the...

  15. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of proposed revisions to an existing Privacy Act system of... Aeronautics and Space Administration is issuing public notice of its proposal to significantly alter a...

  16. Privacy Challenges for Wireless Medical Devices

    SciTech Connect

    Lagesse, Brent J

    2010-01-01

    Implantable medical devices are becoming more pervasive as new technologies increase their reliability and safety. Furthermore, these devices are becoming increasingly reliant on wireless communication for interaction with the device. Such technologies have the potential to leak information that could be utilized by an attacker to threaten the lives of patients. Privacy of patient information is essential; however, this information is not the only privacy issue that must be considered. In this paper, we discuss why information privacy is insufficient for protecting patients from some attacks and how information regarding the presence of individual devices can leak vulnerabilities. Furthermore, we examine existing privacy enhancing algorithms and discuss their applicability to implantable medical devices.

  17. Extending SQL to Support Privacy Policies

    NASA Astrophysics Data System (ADS)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  18. Customer privacy on UK healthcare websites.

    PubMed

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  19. 49 CFR 1560.103 - Privacy notice.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Secure Flight Passenger Data for Watch List Matching § 1560.103 Privacy notice. (a) Electronic collection... the Intelligence Reform and Terrorism Prevention Act of 2004. Providing this information is voluntary... intelligence agencies or others under its published system of records notice. For more on TSA Privacy policies...

  20. 49 CFR 1560.103 - Privacy notice.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Secure Flight Passenger Data for Watch List Matching § 1560.103 Privacy notice. (a) Electronic collection... the Intelligence Reform and Terrorism Prevention Act of 2004. Providing this information is voluntary... intelligence agencies or others under its published system of records notice. For more on TSA Privacy policies...

  1. Privacy-Preserving Location-Based Services

    ERIC Educational Resources Information Center

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  2. Just in Time Research: Privacy Practices

    ERIC Educational Resources Information Center

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  3. Privacy Questions from Practicing School Nurses

    ERIC Educational Resources Information Center

    Bergren, Martha Dewey

    2004-01-01

    This Question and Answer (Q&A) article addresses practice issues related to school health records and school nursing documentation that were posed by school nurses in the field. Specifically, the questions addressed concern the following: education records, medication privacy issues, sharing of sensitive health information, privacy of…

  4. The Law, Computers, and Student Privacy.

    ERIC Educational Resources Information Center

    Curran, Robert

    1988-01-01

    The problem with privacy and computers is not technology but lack of systematic value education in those who use, teach, and learn about computers. A deeper issue than updating the law to the age of computers is integrating computers and the right to privacy into the world of education. (MSE)

  5. 21 CFR 1314.45 - Privacy protections.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy of... accessed, used, or shared for any purpose other than to ensure compliance with this title or to facilitate a product recall to protect public health and safety. (c) A regulated seller who in good...

  6. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 4 2013-10-01 2013-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  7. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 1 2014-10-01 2014-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  8. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  9. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  10. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  11. 49 CFR 10.13 - Privacy Officer.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Privacy Officer. 10.13 Section 10.13... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title...

  12. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 4 2012-10-01 2012-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  13. 42 CFR 457.1110 - Privacy protections.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the...

  14. Technology, Privacy, and Electronic Freedom of Speech.

    ERIC Educational Resources Information Center

    McDonald, Frances M.

    1986-01-01

    Explores five issues related to technology's impact on privacy and access to information--regulation and licensing of the press, electronic surveillance, invasion of privacy, copyright, and policy-making and regulation. The importance of First Amendment rights and civil liberties in forming a coherent national information policy is stressed.…

  15. Reconsidering the Right to Privacy in Canada

    ERIC Educational Resources Information Center

    Shade, Leslie Regan

    2008-01-01

    This article argues that post-September 11 political debates and legislation around security necessitates a reconsideration of a right to privacy in Canada. It looks at the proposal for a Canadian Charter of Privacy Rights promoted by Senator Sheila Finestone in the late 1990s and the current challenges of emergent material technologies…

  16. Privacy and the National Information Infrastructure.

    ERIC Educational Resources Information Center

    Rotenberg, Marc

    1994-01-01

    Explains the work of Computer Professionals for Social Responsibility regarding privacy issues in the use of electronic networks; recommends principles that should be adopted for a National Information Infrastructure privacy code; discusses the need for public education; and suggests pertinent legislative proposals. (LRW)

  17. Privacy and Psychosomatic Stress: An Empirical Analysis.

    ERIC Educational Resources Information Center

    Webb, Stephen D.

    1978-01-01

    Examines the supposition that insufficient privacy is stressful to the individual. Data were obtained from urban centers in New Zealand. Findings support the hypothesis that a percieved lack of privacy is associated with psychosomatic stress. The relationship is specified by measures of stress and sex of respondents. (Author)

  18. Contemporary Privacy Theory Contributions to Learning Analytics

    ERIC Educational Resources Information Center

    Heath, Jennifer

    2014-01-01

    With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems…

  19. Privacy-Preserving Location-Based Services

    ERIC Educational Resources Information Center

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  20. Reconsidering the Right to Privacy in Canada

    ERIC Educational Resources Information Center

    Shade, Leslie Regan

    2008-01-01

    This article argues that post-September 11 political debates and legislation around security necessitates a reconsideration of a right to privacy in Canada. It looks at the proposal for a Canadian Charter of Privacy Rights promoted by Senator Sheila Finestone in the late 1990s and the current challenges of emergent material technologies…

  1. The Press, Privacy, and Community Mores.

    ERIC Educational Resources Information Center

    Glasser, Theodore L.

    Because of judicial indifference and legislative inaction, the conflict between the right of privacy and the freedom of the press is no closer to a resolution than it was a century ago. William Prosser's reduction of the common law of privacy into four separate torts has not solved the problem. The concept of "newsworthiness" has not been helpful…

  2. Just in Time Research: Privacy Practices

    ERIC Educational Resources Information Center

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  3. Privacy and Ethics in Undergraduate GIS Curricula

    ERIC Educational Resources Information Center

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  4. 77 FR 15594 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is deleting... makes nonsubstantive changes to the Defense Intelligence Agency Privacy Program rules. These changes...

  5. 77 FR 15590 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is.... This direct final rule makes nonsubstantive changes to the Defense Intelligence Agency (DIA) Privacy...

  6. 77 FR 57013 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is updating the Defense Intelligence Agency Privacy Act Program, by adding the (k)(2) exemption to accurately...

  7. 77 FR 15591 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is deleting... makes nonsubstantive changes to the Defense Intelligence Agency Privacy Program rules. These changes...

  8. 76 FR 49658 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is deleting... makes nonsubstantive changes to the Defense Intelligence Agency Privacy Program rules. These changes...

  9. Privacy and Ethics in Undergraduate GIS Curricula

    ERIC Educational Resources Information Center

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  10. 76 FR 25409 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... AFFAIRS Privacy Act of 1974 AGENCY: Department of Veterans Affairs (VA). ACTION: Notice of Amendment to System of Records. SUMMARY: The Privacy Act of 1974 (5 U.S.C. 552a(e)(4)) requires that all agencies... amending the system by revising the System Location, Categories of Records in the System, Purpose,...

  11. Privacy Systems for Telecommunication Networks,

    DTIC Science & Technology

    1974-09-01

    has existed verse transformation ‘r ( K ) ’1 and recovers from the days of antiquity and , indeed . (decrypts , deciphers) the original the ancient ... Greeks and Romans deserve a message M. The degree of protection pro- great deal of credit for furthering the vided by such a privacy system depends on art...number of symbols as theS • N, using the vocabulary , syntax , grammar , segment in . and the symbols used in e mayp and alphabet A, of a natural or

  12. Privacy Preservation in Distributed Subgradient Optimization Algorithms.

    PubMed

    Lou, Youcheng; Yu, Lean; Wang, Shouyang; Yi, Peng

    2017-07-31

    In this paper, some privacy-preserving features for distributed subgradient optimization algorithms are considered. Most of the existing distributed algorithms focus mainly on the algorithm design and convergence analysis, but not the protection of agents' privacy. Privacy is becoming an increasingly important issue in applications involving sensitive information. In this paper, we first show that the distributed subgradient synchronous homogeneous-stepsize algorithm is not privacy preserving in the sense that the malicious agent can asymptotically discover other agents' subgradients by transmitting untrue estimates to its neighbors. Then a distributed subgradient asynchronous heterogeneous-stepsize projection algorithm is proposed and accordingly its convergence and optimality is established. In contrast to the synchronous homogeneous-stepsize algorithm, in the new algorithm agents make their optimization updates asynchronously with heterogeneous stepsizes. The introduced two mechanisms of projection operation and asynchronous heterogeneous-stepsize optimization can guarantee that agents' privacy can be effectively protected.

  13. Protecting privacy in a clinical data warehouse.

    PubMed

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world.

  14. HIPAA privacy standards raise complex implementation issues.

    PubMed

    DeMuro, P R; Gantt, W A

    2001-01-01

    In November 1999, under the mandate of the Health Insurance Portability and Accountability Act (HIPAA) of 1996, HHS issued proposed standards to protect the privacy of electronically transmitted personal health information. With publication of the final standards due soon, healthcare organizations must prepare to implement new processes and information systems to comply with the HIPAA requirements. The privacy standards are intended to accomplish three broad objectives: define the circumstances in which protected health information may be used and disclosed, establish certain individual rights regarding protected health information, and require that administrative safeguards be adopted to ensure the privacy of protected health information. Among the required administrative safeguards are designation of a privacy officer, implementation of compliance training programs for all applicable staff, establishment of a complaint system, and implementation of appropriate sanctions for violations of privacy requirements.

  15. Digital Privacy: Toward a New Politics and Discursive Practice.

    ERIC Educational Resources Information Center

    Doty, Philip

    2001-01-01

    Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…

  16. 76 FR 39406 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Request for Applicants for Appointment to the DHS Data Privacy and... applicants for appointment to the DHS Data Privacy and Integrity Advisory Committee. DATES: Applications for...

  17. 75 FR 52769 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Notice of Federal Advisory Committee meeting. SUMMARY: The DHS Data Privacy and Integrity... public. DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on Tuesday, September 28...

  18. 78 FR 55088 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-09

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Request for Applicants for Appointment to the DHS Data Privacy and... applicants for appointment to the DHS Data Privacy and Integrity Advisory Committee. DATES: Applications for...

  19. 75 FR 8087 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The DHS Data Privacy and Integrity.... DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on Thursday, March 18, 2010, from...

  20. 77 FR 37685 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-22

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Request for Applicants for Appointment to the DHS Data Privacy and... applicants for appointment to the DHS Data Privacy and Integrity Advisory Committee. ] DATES: Applications...

  1. 76 FR 8754 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Notice of Federal Advisory Committee meeting. SUMMARY: The DHS Data Privacy and Integrity.... DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on Wednesday, March 9, 2011, from...

  2. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... writing may be sent to: Privacy Act Officer, U.S. Nuclear Waste Technical Review Board, 2300...

  3. Fourteen Reasons Privacy Matters: A Multidisciplinary Review of Scholarly Literature

    ERIC Educational Resources Information Center

    Magi, Trina J.

    2011-01-01

    Librarians have long recognized the importance of privacy to intellectual freedom. As digital technology and its applications advance, however, efforts to protect privacy may become increasingly difficult. With some users behaving in ways that suggest they do not care about privacy and with powerful voices claiming that privacy is dead, librarians…

  4. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  5. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 4 Accounts 1 2013-01-01 2013-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy...

  6. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR...

  7. 48 CFR 52.224-2 - Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 2 2011-10-01 2011-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act...

  8. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR...

  9. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as...

  10. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as...

  11. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect...

  12. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as...

  13. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except...

  14. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as...

  15. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR...

  16. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except...

  17. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as...

  18. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part:...

  19. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule....

  20. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except...

  1. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule....

  2. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 4 Accounts 1 2012-01-01 2012-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on...

  3. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals....

  4. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR...

  5. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 4 Accounts 1 2014-01-01 2013-01-01 true Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy...

  6. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a)...

  7. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 2 2014-04-01 2014-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as...

  8. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  9. 48 CFR 52.224-2 - Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 2 2012-10-01 2012-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act...

  10. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 4 Accounts 1 2011-01-01 2011-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on...

  11. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act....

  12. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  13. 43 CFR 2.47 - Records subject to Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 1 2011-10-01 2011-10-01 false Records subject to Privacy Act. 2.47 Section 2.47 Public Lands: Interior Office of the Secretary of the Interior RECORDS AND TESTIMONY; FREEDOM OF INFORMATION ACT Privacy Act § 2.47 Records subject to Privacy Act. The Privacy Act applies to...

  14. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 4 Accounts 1 2014-01-01 2013-01-01 true Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on...

  15. 43 CFR 2.222 - Records subject to Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 43 Public Lands: Interior 1 2013-10-01 2013-10-01 false Records subject to Privacy Act. 2.222 Section 2.222 Public Lands: Interior Office of the Secretary of the Interior FREEDOM OF INFORMATION ACT; RECORDS AND TESTIMONY Privacy Act § 2.222 Records subject to Privacy Act. The Privacy Act applies to...

  16. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal...

  17. 43 CFR 2.47 - Records subject to Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Records subject to Privacy Act. 2.47 Section 2.47 Public Lands: Interior Office of the Secretary of the Interior RECORDS AND TESTIMONY; FREEDOM OF INFORMATION ACT Privacy Act § 2.47 Records subject to Privacy Act. The Privacy Act applies to...

  18. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as...

  19. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect...

  20. 32 CFR 505.3 - Privacy Act systems of records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privacy Act systems of records. 505.3 Section 505... AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.3 Privacy Act systems of records. (a) Systems of... assigned to an individual. (2) Privacy Act systems of records must be— (i) Authorized by Federal statute...

  1. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 2 2013-04-01 2013-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as...

  2. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a)...

  3. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 4 Accounts 1 2011-01-01 2011-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy...

  4. 32 CFR 505.3 - Privacy Act systems of records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Privacy Act systems of records. 505.3 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.3 Privacy Act systems of records. (a) Systems... assigned to an individual. (2) Privacy Act systems of records must be— (i) Authorized by Federal statute...

  5. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Model privacy form and examples. 1016.2 Section 1016.2 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  6. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 4 Accounts 1 2012-01-01 2012-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy...

  7. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy...

  8. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule....

  9. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part:...

  10. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR...

  11. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect...

  12. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  13. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as...

  14. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as...

  15. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy...

  16. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal...

  17. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 2 2011-04-01 2011-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as...

  18. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule....

  19. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a)...

  20. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act....

  1. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  2. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  3. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the...

  4. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals....

  5. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act....

  6. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  7. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the...

  8. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal...

  9. 47 CFR 64.1601 - Delivery requirements and privacy restrictions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 3 2011-10-01 2011-10-01 false Delivery requirements and privacy restrictions... Number; Privacy § 64.1601 Delivery requirements and privacy restrictions. (a) Delivery. Except as... party number (CPN) associated with an interstate call to interconnecting carriers. (b) Privacy....

  10. 48 CFR 52.224-2 - Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 2 2013-10-01 2013-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act...

  11. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals....

  12. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy...

  13. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the...

  14. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule....

  15. 47 CFR 64.1601 - Delivery requirements and privacy restrictions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Delivery requirements and privacy restrictions... Number; Privacy § 64.1601 Delivery requirements and privacy restrictions. (a) Delivery. Except as... party number (CPN) associated with an interstate call to interconnecting carriers. (b) Privacy....

  16. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the...

  17. 48 CFR 52.224-2 - Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act...

  18. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as...

  19. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy...

  20. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  1. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule....

  2. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  3. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect...

  4. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Model privacy form and examples. 1016.2 Section 1016.2 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  5. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal...

  6. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 2 2012-04-01 2012-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as...

  7. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as...

  8. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the...

  9. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule....

  10. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal...

  11. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals....

  12. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as...

  13. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 4 Accounts 1 2013-01-01 2013-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on...

  14. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Model privacy form and examples. 1016.2 Section 1016.2 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the...

  15. 6 CFR 1002.3 - Privacy Act requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Privacy Act requests. 1002.3 Section 1002.3 Domestic Security PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 1002.3 Privacy Act requests. (a) Requests to determine if you are the subject of a record. You...

  16. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy...

  17. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a)...

  18. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act....

  19. A Model Privacy Statement for Ohio Library Web Sites.

    ERIC Educational Resources Information Center

    Monaco, Michael J.

    The purpose of this research was to develop a model privacy policy statement for library World Wide Web sites. First, standards of privacy protection were identified. These standards were culled from the privacy and confidentiality policies of the American Library Association, the Federal Trade Commission's online privacy reports, the guidelines…

  20. 76 FR 58524 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-21

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office... Privacy and Integrity Advisory Committee will meet on October 5, 2011, in Arlington, VA. The meeting will be open to the public. DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on...

  1. 77 FR 60131 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-02

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office... Privacy and Integrity Advisory Committee will meet on November 7, 2012, in Washington, DC. The meeting will be open to the public. DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on...

  2. 78 FR 51197 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-20

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office... Privacy and Integrity Advisory Committee will meet on September 12, 2013, in Washington, DC. The meeting will be open to the public. DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on...

  3. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... the request and on the front of the envelope and directed to the Privacy Act Officer. (c) Requests...

  4. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... the request and on the front of the envelope and directed to the Privacy Act Officer. (c) Requests...

  5. Digital Privacy: Toward a New Politics and Discursive Practice.

    ERIC Educational Resources Information Center

    Doty, Philip

    2001-01-01

    Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…

  6. 78 FR 61345 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-03

    ... at the Defense Privacy and Civil Liberties Office Web site http://dpclo.defense.gov/privacy/SORNs...). Changes: System location: Delete entry and replace with ``Defense Privacy and Civil Liberties Office, 241... with ``10 U.S.C. 113, Secretary of Defense; 42 U.S.C. 2000ee-1, Privacy and Civil Liberties...

  7. 77 FR 58105 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-19

    .... Juanita Gaines, Freedom of Information and Privacy Office, Defense Threat Reduction Agency, 8725 John J... privacy program; 32 CFR 318; or may be obtained from the Chief, Freedom of Information and Privacy Office...: * * * * * System manager(s) and address: Delete and replace with ``Chief, Freedom of Information and Privacy...

  8. 43 CFR 2.47 - Records subject to Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 43 Public Lands: Interior 1 2012-10-01 2011-10-01 true Records subject to Privacy Act. 2.47 Section 2.47 Public Lands: Interior Office of the Secretary of the Interior RECORDS AND TESTIMONY; FREEDOM OF INFORMATION ACT Privacy Act § 2.47 Records subject to Privacy Act. The Privacy Act applies to...

  9. Fourteen Reasons Privacy Matters: A Multidisciplinary Review of Scholarly Literature

    ERIC Educational Resources Information Center

    Magi, Trina J.

    2011-01-01

    Librarians have long recognized the importance of privacy to intellectual freedom. As digital technology and its applications advance, however, efforts to protect privacy may become increasingly difficult. With some users behaving in ways that suggest they do not care about privacy and with powerful voices claiming that privacy is dead, librarians…

  10. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  11. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  12. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  13. 43 CFR 2.222 - Records subject to Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 1 2014-10-01 2014-10-01 false Records subject to Privacy Act. 2.222 Section 2.222 Public Lands: Interior Office of the Secretary of the Interior FREEDOM OF INFORMATION ACT; RECORDS AND TESTIMONY Privacy Act § 2.222 Records subject to Privacy Act. The Privacy Act applies to...

  14. 78 FR 14292 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... Department of the Air Force Privacy Act of 1974; System of Records AGENCY: Department of the Air Force, DoD... system of records notice in its existing inventory of records systems subject to the Privacy Act of 1974..., Department of the Air Force Privacy Office, Air Force Privacy Act Office, Office of Warfighting...

  15. 32 CFR 505.3 - Privacy Act systems of records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privacy Act systems of records. 505.3 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.3 Privacy Act systems of records. (a) Systems... assigned to an individual. (2) Privacy Act systems of records must be— (i) Authorized by Federal statute...

  16. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a...) Inquiries by mail may be sent to: Privacy Act Officer, Recovery Accountability and Transparency Board, 1717...

  17. Privacy-preserving heterogeneous health data sharing

    PubMed Central

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-01-01

    Objective Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. Methods The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. Results We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. Limitation The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Conclusions Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis. PMID:23242630

  18. New threats to health data privacy.

    PubMed

    Li, Fengjun; Zou, Xukai; Liu, Peng; Chen, Jake Y

    2011-11-24

    Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.

  19. Privacy by design in personal health monitoring.

    PubMed

    Nordgren, Anders

    2015-06-01

    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted.

  20. Privacy-preserving heterogeneous health data sharing.

    PubMed

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-05-01

    Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis.

  1. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this...

  2. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Model privacy form and examples. 216.2 Section 216.2 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form...

  3. The study on privacy preserving data mining for information security

    NASA Astrophysics Data System (ADS)

    Li, Xiaohui

    2012-04-01

    Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.

  4. Designing for speech privacy in offices

    NASA Astrophysics Data System (ADS)

    Roy, Kenneth P.

    2002-11-01

    Speech privacy is an important component of the building interior environment, as it affects the satisfaction and performance of the occupants and thus their productivity. Privacy, both in terms of the confidentiality of conversations and relative to distractions and annoyance, needs to be considered. Field measurements of interzone attenuation, S/N ratio, and privacy calculations will be presented for various open and closed office designs from evaluations in several buildings. Field sound measurement techniques, and electronic masking system design and tuning will be discussed.

  5. Predicting self-protections of online privacy.

    PubMed

    Yao, Mike Z; Linz, Daniel G

    2008-10-01

    An empirical study was conducted to examine the social psychological processes that may influence an individual's adoption of online privacy protection strategies. Building from the theory of planned behavior, a theoretical model predicting self-protection of online privacy was tested in the present study. This model accounted for nearly a quarter of the variability in actual adoption during a ten-day period immediately after participants completed the initial questionnaire. Overall, the present research provided a strong support for the theoretical utility of psychological factors and processes in online privacy related research.

  6. Privacy-preserving restricted boltzmann machine.

    PubMed

    Li, Yu; Zhang, Yuan; Ji, Yue

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model.

  7. Privacy-Preserving Restricted Boltzmann Machine

    PubMed Central

    Li, Yu

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model. PMID:25101139

  8. Routes for breaching and protecting genetic privacy

    PubMed Central

    Erlich, Yaniv; Narayanan, Arvind

    2014-01-01

    We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these datasets is vital for progress in biomedical research. However, one growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, point to the underlying assumptions, and assess its technological complexity and maturation. We then review potential mitigation methods for privacy-preserving dissemination of sensitive data and highlight different cases that are relevant to genetic applications. PMID:24805122

  9. Property rights and privacy principles.

    PubMed

    Knapp, T R; Walter, J; Renaudin, C P

    2000-01-01

    Healthcare consumers own their medical information. As paper medical folders become digital, protection of this private and confidential information falls to information specialists rather than the traditional care givers. On the basis of a nationwide market assessment study, the authors identify the key issues regarding protecting this personal digital property and outline the federal requirements stemming from the Health Insurance Portability and Accountability Act (HIPAA). Consumer informed consent over the use of specific medical data is a basic requirement, and is a concept supported by physicians and care givers who rely on consent to approve surgeries and treatment. The article concludes with a solution outline that places the patient in control of his or her personal information, meets security and privacy concerns, and facilitates the critical exchange of patient information among care givers.

  10. Privacy-Sensitive Congestion Charging

    NASA Astrophysics Data System (ADS)

    Beresford, Alastair R.; Davies, Jonathan J.; Harle, Robert K.

    National-scale congestion charging schemes are increasingly viewed as the most viable long-term strategy for controlling congestion and maintaining the viability of the road network. In this paper we challenge the widely held belief that enforceable and economically viable congestion charging schemes require drivers to give up their location privacy to the government. Instead we explore an alternative scheme where privately-owned cars enforce congestion charge payments by using an on-board vehicle unit containing a camera and wireless communications. Our solution prevents centralised tracking of vehicle movements but raises an important issue: should we trust our neighbours with a little personal information in preference to entrusting it all to the government?

  11. Identity management and privacy languages technologies: Improving user control of data privacy

    NASA Astrophysics Data System (ADS)

    García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz

    The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.

  12. Location Privacy Protection Act of 2014

    THOMAS, 113th Congress

    Sen. Franken, Al [D-MN

    2014-03-27

    Senate - 06/04/2014 Committee on the Judiciary Subcommittee on Privacy, Technology and the Law. Hearings held. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Privacy preserving RBF kernel support vector machine.

    PubMed

    Li, Haoran; Xiong, Li; Ohno-Machado, Lucila; Jiang, Xiaoqian

    2014-01-01

    Data sharing is challenging but important for healthcare research. Methods for privacy-preserving data dissemination based on the rigorous differential privacy standard have been developed but they did not consider the characteristics of biomedical data and make full use of the available information. This often results in too much noise in the final outputs. We hypothesized that this situation can be alleviated by leveraging a small portion of open-consented data to improve utility without sacrificing privacy. We developed a hybrid privacy-preserving differentially private support vector machine (SVM) model that uses public data and private data together. Our model leverages the RBF kernel and can handle nonlinearly separable cases. Experiments showed that this approach outperforms two baselines: (1) SVMs that only use public data, and (2) differentially private SVMs that are built from private data. Our method demonstrated very close performance metrics compared to nonprivate SVMs trained on the private data.

  14. Design variables for speech privacy in offices

    NASA Astrophysics Data System (ADS)

    Lewitz, Joel A.

    2002-11-01

    Open plan office environments have a lower potential for speech privacy and freedom from distraction than conventional enclosed offices. The three areas of concern for the acoustical designer are the source, path and listener environments. Given a source spectrum, level and directivity, design elements, which influence attenuation paths, will be addressed with evaluations of their relative importance. The spectrum, level, uniformity and incoherence of background sound at the listener are critical to establishing adequate signal-to-noise ratio for high privacy criteria. Case studies will be addressed comparing challenges, solutions, and results for various open and closed plan spaces. These will be compared to a computer model, which evaluates the relative contribution to privacy of the most important open plan office design variables. Sound masking was shown to be the most powerful and cost effective design tool for establishing acoustical environments with varying privacy criteria.

  15. Location Privacy Protection Act of 2014

    THOMAS, 113th Congress

    Sen. Franken, Al [D-MN

    2014-03-27

    06/04/2014 Committee on the Judiciary Subcommittee on Privacy, Technology and the Law. Hearings held. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Privacy Preserving RBF Kernel Support Vector Machine

    PubMed Central

    Xiong, Li; Ohno-Machado, Lucila

    2014-01-01

    Data sharing is challenging but important for healthcare research. Methods for privacy-preserving data dissemination based on the rigorous differential privacy standard have been developed but they did not consider the characteristics of biomedical data and make full use of the available information. This often results in too much noise in the final outputs. We hypothesized that this situation can be alleviated by leveraging a small portion of open-consented data to improve utility without sacrificing privacy. We developed a hybrid privacy-preserving differentially private support vector machine (SVM) model that uses public data and private data together. Our model leverages the RBF kernel and can handle nonlinearly separable cases. Experiments showed that this approach outperforms two baselines: (1) SVMs that only use public data, and (2) differentially private SVMs that are built from private data. Our method demonstrated very close performance metrics compared to nonprivate SVMs trained on the private data. PMID:25013805

  17. 78 FR 8538 - Privacy Act of 1974

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-06

    ... information outside the agency, and how individual record subjects can exercise their rights under the Privacy... subject individual's name (woman's maiden name, if applicable), and SSN (furnishing the SSN is voluntary...

  18. Privacy-preserving backpropagation neural network learning.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2009-10-01

    With the development of distributed computing environment , many learning problems now have to deal with distributed input data. To enhance cooperations in learning, it is important to address the privacy concern of each data holder by extending the privacy preservation notion to original learning algorithms. In this paper, we focus on preserving the privacy in an important learning model, multilayer neural networks. We present a privacy-preserving two-party distributed algorithm of backpropagation which allows a neural network to be trained without requiring either party to reveal her data to the other. We provide complete correctness and security analysis of our algorithms. The effectiveness of our algorithms is verified by experiments on various real world data sets.

  19. Understanding privacy in occupational health services.

    PubMed

    Heikkinen, Anne; Wickström, Gustav; Leino-Kilpi, Helena

    2006-09-01

    The aim of this study was to gain a deeper understanding of privacy in occupational health services. Data were collected through in-depth theme interviews with occupational health professionals (n = 15), employees (n = 15) and employers (n = 14). Our findings indicate that privacy, in this context, is a complex and multilayered concept, and that companies as well as individual employees have their own core secrets. Co-operation between the three groups proved challenging: occupational health professionals have to consider carefully in which situations and how much they are entitled to release private information on individual employees for the benefit of the whole company. Privacy is thus not an absolute right of an individual, but involves the idea of sharing responsibility. The findings open up useful new perspectives on ethical questions of privacy and on the development of occupational health practices.

  20. Location Privacy Protection Act of 2014

    THOMAS, 113th Congress

    Sen. Franken, Al [D-MN

    2014-03-27

    06/04/2014 Committee on the Judiciary Subcommittee on Privacy, Technology and the Law. Hearings held. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. An overview of human genetic privacy.

    PubMed

    Shi, Xinghua; Wu, Xintao

    2017-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed, not only for individuals but also for their families. In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data. We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions. © 2016 New York Academy of Sciences.

  2. 76 FR 62297 - Privacy Act: Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ...;having general applicability and legal effect, most of which are keyed #0;to and codified in the Code of... pertinent system. Signed: September 12, 2011. Veronica Marco, Acting Deputy Assistant Secretary for Privacy...

  3. Privacy: The Small and Large of It

    SciTech Connect

    NUSBAUM,ANNA W.

    1999-10-22

    The topic of Privacy is complex, multi-faceted, and often emotionally laden. This paper will cover the following topics, in an effort to further understanding of federal regulations and activities, the balancing act that necessarily occurs in business, and what role a records manager can play. The topics are: Definitions; The Privacy Act; ''Private'' companies; Potential areas of concern; Expectations; Corporate responsibilities; Case studies; and Records Manager's role.

  4. CARAVAN: Providing Location Privacy for VANET

    DTIC Science & Technology

    2005-01-01

    vehicles. However, many challenges including the security and privacy issues remain to be addressed [ 4 ], [5], [6]. The unique requirements of maintaining...REPORT TYPE 3. DATES COVERED 00-00-2005 to 00-00-2005 4 . TITLE AND SUBTITLE CARAVAN: Providing Location Privacy for VANET 5a. CONTRACT NUMBER...pseudonym update, it is still possible to link the new and old pseudonyms of a node using temporal and spatial relation between the new and old locations of

  5. Location Privacy Issues in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Kůr, Jiří; Stetsko, Andriy

    We discuss location privacy issues in wireless sensor networks. We consider sensor nodes with more responsible roles and the need to protect locations of such nodes. Available countermeasures against various types of traffic analysis attacks are examined and their problems are identified. We do not propose new traffic analysis resistance technique. Instead, we draw attention to blanks in current situation and identify several open questions, which should be answered in order to ensure location privacy of nodes.

  6. Dynamic Privacy Management in Pervasive Sensor Networks

    NASA Astrophysics Data System (ADS)

    Gong, Nan-Wei; Laibowitz, Mathew; Paradiso, Joseph A.

    This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created incentive for accepting this network as an extension of people's daily social space. A user study was then conducted to evaluate several privacy management approaches - an active badge system for both online and on-site control, on/off power switches for physically disabling the hardware, and touch screen input control. Results from a user study indicated that an active badge for on-site privacy control is the most preferable method among all provided options. We present a set of results that yield insight into the privacy/benefit tradeoff from various sensing capabilities in pervasive sensor networks and how privacy settings and user behavior relate in these environments.

  7. Users or Students? Privacy in University MOOCS.

    PubMed

    Jones, Meg Leta; Regner, Lucas

    2016-10-01

    Two terms, student privacy and Massive Open Online Courses, have received a significant amount of attention recently. Both represent interesting sites of change in entrenched structures, one educational and one legal. MOOCs represent something college courses have never been able to provide: universal access. Universities not wanting to miss the MOOC wave have started to build MOOC courses and integrate them into the university system in various ways. However, the design and scale of university MOOCs create tension for privacy laws intended to regulate information practices exercised by educational institutions. Are MOOCs part of the educational institutions these laws and policies aim to regulate? Are MOOC users students whose data are protected by aforementioned laws and policies? Many university researchers and faculty members are asked to participate as designers and instructors in MOOCs but may not know how to approach the issues proposed. While recent scholarship has addressed the disruptive nature of MOOCs, student privacy generally, and data privacy in the K-12 system, we provide an in-depth description and analysis of the MOOC phenomenon and the privacy laws and policies that guide and regulate educational institutions today. We offer privacy case studies of three major MOOC providers active in the market today to reveal inconsistencies among MOOC platform and the level and type of legal uncertainty surrounding them. Finally, we provide a list of organizational questions to pose internally to navigate the uncertainty presented to university MOOC teams.

  8. Privacy and confidentiality in pragmatic clinical trials

    PubMed Central

    McGraw, Deven; Greene, Sarah M.; Miner, Caroline S.; Staman, Karen L.; Welch, Mary Jane; Rubel, Alan

    2015-01-01

    With pragmatic clinical trials (PCTs) an opportunity exists to answer important questions about the relative risks, burdens, and benefits of therapeutic interventions. However, concerns about protecting the privacy of this information are significant and must be balanced with the imperative to learn from the data gathered in routine clinical practice. Traditional privacy protections for research uses of identifiable information rely disproportionately on informed consent or authorizations, based on a presumption that this is necessary to fulfill ethical principles of respect for persons. But frequently the ideal of informed consent is not realized in its implementation. Moreover, the principle of respect for persons,—which encompasses their interests in health information privacy,—can be honored through other mechanisms. Data anonymization also plays a role in protecting privacy but is not suitable for all research, particularly PCTs. In this paper we explore both the ethical foundation and regulatory framework intended to protect privacy in PCTs. We then review examples of novel approaches to respecting persons in research that may have the added benefit of honoring patient privacy considerations. PMID:26374682

  9. Instrumentation for measuring speech privacy in rooms

    NASA Astrophysics Data System (ADS)

    Horrall, Thomas; Pirn, Rein; Markham, Ben

    2003-10-01

    Federal legislation pertaining to oral privacy in healthcare and financial services industries has increased the need for a convenient and economical way to document speech privacy conditions in offices, medical examination rooms, and certain other workspaces. This legislation is embodied in the Health Insurance Portability and Accountability Act (HIPAA) and Gramm-Leach-Bliley Act (GLBA). Both laws require that reasonable measures be put in place to safeguard the oral privacy of patients and clients. While techniques for privacy documentation are known within the acoustical consulting community, it is unlikely that community alone has the capacity to provide the surveys needed to evaluate acoustical conditions and demonstrate compliance with the legislation. A portable computer with integrated soundboard and a suitable amplified loudspeaker and test microphone are all that are needed to perform in situ measurements of articulation index or other accepted indices of speech privacy. Along with modest training, such instrumentation allows technicians to survey a large number of sites economically. Cost-effective components are shown that can meet the requirements for testing in most common environments where oral privacy is likely to be required. Example cases are presented to demonstrate the feasibility of such instrumentation.

  10. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-27

    ... biometric technology may be used; such a system will release information only to authorized individuals... for verification and computer matching purposes. (9) FNS will disclose information from these systems... Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the...

  11. The Privacy Problem: Although School Librarians Seldom Discuss It, Students' Privacy Rights Are under Attack

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2011-01-01

    Every day in school libraries nationwide, students' privacy rights are under attack, but many principals, teachers, parents, and community members do not know much about these rights. Even though school librarians are among the strongest proponents of privacy, the subject is rarely discussed, probably because state and federal laws can be…

  12. Privacy and Security of Criminal History Information. An Analysis of Privacy Issues.

    ERIC Educational Resources Information Center

    Trubow, George B.

    Policies and issues associated with the privacy and security of criminal history information are presented. The first chapter discusses general concepts regarding privacy and security of criminal justice information, including definitions of basic terms, considerations of interests requiring attention when developing policy, relevance of fair…

  13. The Privacy Problem: Although School Librarians Seldom Discuss It, Students' Privacy Rights Are under Attack

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2011-01-01

    Every day in school libraries nationwide, students' privacy rights are under attack, but many principals, teachers, parents, and community members do not know much about these rights. Even though school librarians are among the strongest proponents of privacy, the subject is rarely discussed, probably because state and federal laws can be…

  14. The Preference for Privacy: In Search of the Social Locations of Privacy Orientations.

    ERIC Educational Resources Information Center

    Gandy, Oscar H., Jr.

    A study was conducted to develop some understanding of how social experience might be related to public expectations of rights to privacy. A telephone questionnaire was developed which sought information about respondent knowledge, attitudes, and behavior regarding privacy and personal information. A national survey of adults over the age of 18…

  15. Preserving Institutional Privacy in Distributed binary Logistic Regression.

    PubMed

    Wu, Yuan; Jiang, Xiaoqian; Ohno-Machado, Lucila

    2012-01-01

    Privacy is becoming a major concern when sharing biomedical data across institutions. Although methods for protecting privacy of individual patients have been proposed, it is not clear how to protect the institutional privacy, which is many times a critical concern of data custodians. Built upon our previous work, Grid Binary LOgistic REgression (GLORE)1, we developed an Institutional Privacy-preserving Distributed binary Logistic Regression model (IPDLR) that considers both individual and institutional privacy for building a logistic regression model in a distributed manner. We tested our method using both simulated and clinical data, showing how it is possible to protect the privacy of individuals and of institutions using a distributed strategy.

  16. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees

    PubMed Central

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-01-01

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417

  17. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.

    PubMed

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-09-10

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one.

  18. Speech privacy: Beyond architectural solutions

    NASA Astrophysics Data System (ADS)

    Mazer, Susan

    2005-09-01

    HIPAA regulations have brought unparalleled pressures on healthcare organizations to protect private and confidential information from reaching third parties. Yet, as this paper explains, often in the middle of noisy corridors and waiting rooms, this same information needs to be quickly transferred from physician to nurse to family member to others for the care of patients. Research and examples are presented that show that when families, patients, staff are participating together, although independently, in the same or adjacent spaces, the ``caf effect'' produces rising noise levels as each person competes to be heard. This threatens the very confidentiality demanded by HIPAA. Solutions to this problem are not easy or completely resolved by engineering or design specifications. This paper makes the case that it is ultimately the culture of a healthcare organization that determines the ``sound'' of a hospital, and any other organization that battles openness with privacy. It presents and discusses proven solutions to address culture in tandem with architectural and acoustic design interventions.

  19. Privacy, Individual Liberty, and the Public Interest. Looking at the Law.

    ERIC Educational Resources Information Center

    Ryan, John Paul

    2000-01-01

    Explores the issue of privacy focusing on informational privacy and how it could be jeopardized by new technologies. Provides contexts of privacy and discusses privacy and celebrity in U.S. culture, privacy abuses, and privacy as a common value. Includes teaching activities by Michelle Parrini and Jennifer Kittlaus. (CMK)

  20. Privacy and confidentiality in pragmatic clinical trials.

    PubMed

    McGraw, Deven; Greene, Sarah M; Miner, Caroline S; Staman, Karen L; Welch, Mary Jane; Rubel, Alan

    2015-10-01

    With pragmatic clinical trials, an opportunity exists to answer important questions about the relative risks, burdens, and benefits of therapeutic interventions. However, concerns about protecting the privacy of this information are significant and must be balanced with the imperative to learn from the data gathered in routine clinical practice. Traditional privacy protections for research uses of identifiable information rely disproportionately on informed consent or authorizations, based on a presumption that this is necessary to fulfill ethical principles of respect for persons. But frequently, the ideal of informed consent is not realized in its implementation. Moreover, the principle of respect for persons—which encompasses their interests in health information privacy—can be honored through other mechanisms. Data anonymization also plays a role in protecting privacy but is not suitable for all research, particularly pragmatic clinical trials. In this article, we explore both the ethical foundation and regulatory framework intended to protect privacy in pragmatic clinical trials. We then review examples of novel approaches to respecting persons in research that may have the added benefit of honoring patient privacy considerations. © The Author(s) 2015.

  1. Privacy and Property in the Biobank Context

    PubMed Central

    2010-01-01

    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is all about and aim for a fruitful perspective on the issues of property and privacy rights in the context of biobanking. This paper argues that the limits and handling of private matters is determined in specific social relations. The crucial point is thus to determine which information and activities are or are not the legitimate concern of others. Privacy and property rights should be seen as balanced by duties, that is as inherently relational interests extending into the public sphere, rather than to see these rights as the control of an object—for instance the participant’s biobank material. PMID:20799053

  2. Will the new Australian health privacy law provide adequate protection?

    PubMed

    Bomba, David; Hallit, George

    2002-01-01

    Amendments to the original Privacy Act (1988) come at a key point in time, as a national medical record system looms on the Australian horizon. Changes to The Privacy Act have the potential to define a level of information privacy prior to the implementation of such a system. We have therefore collected expert opinions on the ability of the Health Privacy Guidelines (enacted in December 2001 under The Privacy Act and hereafter more specifically known as Health Privacy Legislation) to ensure the privacy and security of patient information. We conclude that the legislation is flawed in its capacity to withstand an increasingly corporatised health sector. Deficiencies in consent requirements, together with feeble enforcement capabilities, mean The Legislation cannot effectively ensure that personally identifiable information will not end up in corporate third party hands. To significantly bolster the new legislation, we argue that it should be supplemented with explicit health data legislation and privacy auditing.

  3. 77 FR 26580 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-04

    ..., Attn: Privacy Analyst, Office of Privacy and Civil Liberties, Department of Justice, National Place... Liberties, United States Department of Justice, 1331 Pennsylvania Ave. NW., Suite 1000, National Place... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF...

  4. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a... record under false pretenses; or (iii) Maintaining a system of records without first meeting the...

  5. 17 CFR Appendix A to Part 160 - Model Privacy Form

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Model Privacy Form A Appendix A to Part 160 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF... Part 160—Model Privacy Form A. The Model Privacy Form ER28DE12.003 ER28DE12.004 ER28DE12.005 ER28DE12...

  6. Implementing your privacy program: putting theory into practice.

    PubMed

    Seaton, Brendan

    2004-01-01

    Healthcare organizations across Canada are challenged with the new spectre of information privacy. While security and confidentiality have long been part of our culture in healthcare, privacy is a surprisingly new issue. With the introduction of privacy legislation and codes based on the CSA Model Code for the Protection of Personal Information (CSA Privacy Code), healthcare providers are subject to new obligations, and patients now enjoy new rights.

  7. 12 CFR Appendix to Part 1016 - Model Privacy Form

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Model Privacy Form Appendix to Part 1016 Banks... (REGULATION P) Pt. 1016, App. Appendix to Part 1016—Model Privacy Form A. The Model Privacy Form ER21DE11.058.... How the Model Privacy Form Is Used (a) The model form may be used, at the option of a...

  8. 12 CFR Appendix to Part 1016 - Model Privacy Form

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Model Privacy Form Appendix to Part 1016 Banks... (REGULATION P) Pt. 1016, App. Appendix to Part 1016—Model Privacy Form A. The Model Privacy Form ER21DE11.058.... How the Model Privacy Form Is Used (a) The model form may be used, at the option of a...

  9. A Secure and Privacy-Preserving Targeted Ad-System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven M.

    Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.

  10. Valuating Privacy with Option Pricing Theory

    NASA Astrophysics Data System (ADS)

    Berthold, Stefan; Böhme, Rainer

    One of the key challenges in the information society is responsible handling of personal data. An often-cited reason why people fail to make rational decisions regarding their own informational privacy is the high uncertainty about future consequences of information disclosures today. This chapter builds an analogy to financial options and draws on principles of option pricing to account for this uncertainty in the valuation of privacy. For this purpose, the development of a data subject's personal attributes over time and the development of the attribute distribution in the population are modeled as two stochastic processes, which fit into the Binomial Option Pricing Model (BOPM). Possible applications of such valuation methods to guide decision support in future privacy-enhancing technologies (PETs) are sketched.

  11. Individual privacy in an information dependent society

    SciTech Connect

    Clifford, B.P.

    1994-12-31

    The extraordinary technologies and capabilities of the Information Age have vastly improved communication, while allowing executives to have ultra-current information about their companies, subsidiaries, staff, clients, and practically any individual in the world. These advances, however, have stripped the individual of his privacy. Although invasions of privacy do not require a computer, computers have made it much easier to gather and select informatin, which means that it is also much easier to invade privacy. The increased value of information to policy makers leads them to covet information, even when acquiring it invades someone`s pricacy; not only do managers of private companies gather personal data, almost every citizen has files about him in Federal agencies and administrations.

  12. Toward privacy-preserving JPEG image retrieval

    NASA Astrophysics Data System (ADS)

    Cheng, Hang; Wang, Jingyue; Wang, Meiqing; Zhong, Shangping

    2017-07-01

    This paper proposes a privacy-preserving retrieval scheme for JPEG images based on local variance. Three parties are involved in the scheme: the content owner, the server, and the authorized user. The content owner encrypts JPEG images for privacy protection by jointly using permutation cipher and stream cipher, and then, the encrypted versions are uploaded to the server. With an encrypted query image provided by an authorized user, the server may extract blockwise local variances in different directions without knowing the plaintext content. After that, it can calculate the similarity between the encrypted query image and each encrypted database image by a local variance-based feature comparison mechanism. The authorized user with the encryption key can decrypt the returned encrypted images with plaintext content similar to the query image. The experimental results show that the proposed scheme not only provides effective privacy-preserving retrieval service but also ensures both format compliance and file size preservation for encrypted JPEG images.

  13. Exercising privacy rights in medical science.

    PubMed

    Hillmer, Michael; Redelmeier, Donald A

    2007-12-04

    Privacy laws are intended to preserve human well-being and improve medical outcomes. We used the Sportstats website, a repository of competitive athletic data, to test how easily these laws can be circumvented. We designed a haphazard, unrepresentative case-series analysis and applied unscientific methods based on an Internet connection and idle time. We found it both feasible and titillating to breach anonymity, stockpile personal information and generate misquotations. We extended our methods to snoop on celebrities, link to outside databases and uncover refusal to participate. Throughout our study, we evaded capture and public humiliation despite violating these 6 privacy fundamentals. We suggest that the legitimate principle of safeguarding personal privacy is undermined by the natural human tendency toward showing off.

  14. Control use of data to protect privacy.

    PubMed

    Landau, Susan

    2015-01-30

    Massive data collection by businesses and governments calls into question traditional methods for protecting privacy, underpinned by two core principles: (i) notice, that there should be no data collection system whose existence is secret, and (ii) consent, that data collected for one purpose not be used for another without user permission. But notice, designated as a fundamental privacy principle in a different era, makes little sense in situations where collection consists of lots and lots of small amounts of information, whereas consent is no longer realistic, given the complexity and number of decisions that must be made. Thus, efforts to protect privacy by controlling use of data are gaining more attention. I discuss relevant technology, policy, and law, as well as some examples that can illuminate the way. Copyright © 2015, American Association for the Advancement of Science.

  15. Exercising privacy rights in medical science

    PubMed Central

    Hillmer, Michael; Redelmeier, Donald A.

    2007-01-01

    Privacy laws are intended to preserve human well-being and improve medical outcomes. We used the Sportstats website, a repository of competitive athletic data, to test how easily these laws can be circumvented. We designed a haphazard, unrepresentative case-series analysis and applied unscientific methods based on an Internet connection and idle time. We found it both feasible and titillating to breach anonymity, stockpile personal information and generate misquotations. We extended our methods to snoop on celebrities, link to outside databases and uncover refusal to participate. Throughout our study, we evaded capture and public humiliation despite violating these 6 privacy fundamentals. We suggest that the legitimate principle of safeguarding personal privacy is undermined by the natural human tendency toward showing off. PMID:18056619

  16. Privacy policies for health social networking sites.

    PubMed

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data.

  17. Patient privacy in the genomic era.

    PubMed

    Raisaro, Jean Louis; Ayday, Erman; Hubaux, Jean-Pierre

    2014-05-07

    According to many scientists and clinicians, genomics is taking on a key role in the field of medicine. Impressive advances in genome sequencing have opened the way to a variety of revolutionary applications in modern healthcare. In particular, the increasing understanding of the human genome, and of its relation to diseases and response to treatments brings promise of improvements in better preventive and personalized medicine. However, this progress raises important privacy and ethical concerns that need to be addressed. Indeed, each genome is the ultimate identifier of its owner and, due to its nature, it contains highly personal and privacy-sensitive data. In this article, after summarizing recent advances in genomics, we discuss some important privacy issues associated with human genomic information and methods put in place to address them.

  18. Privacy policies for health social networking sites

    PubMed Central

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data. PMID:23599228

  19. Footprints near the Surf: Individual Privacy Decisions in Online Contexts

    ERIC Educational Resources Information Center

    McDonald, Aleecia M.

    2010-01-01

    As more people seek the benefits of going online, more people are exposed to privacy risks from their time online. With a largely unregulated Internet, self-determination about privacy risks must be feasible for people from all walks of life. Yet in many cases decisions are either not obvious or not accessible. As one example, privacy policies are…

  20. 75 FR 28051 - Public Workshop: Pieces of Privacy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... Agreements. A case study will be used to illustrate a step-by-step approach to researching, preparing, and... SECURITY Office of the Secretary Public Workshop: Pieces of Privacy AGENCY: Privacy Office, DHS. ACTION: Notice announcing public workshop. SUMMARY: The Department of Homeland Security Privacy Office will...

  1. Private -- Keep Out: Preliminary Notes on Biosocial Functions of Privacy.

    ERIC Educational Resources Information Center

    Langman, Lauren; Natalini, Adrian

    This report presents and evaluates a simple thesis: that privacy, a manifestation of human territoriality, is a fundamental bio-social need. Aggression can serve to insure privacy. Privacy, then, allows one the freedom to explore the environment. It permits intimacy with others, and it fosters access to one's own inner feelings and experiences, a…

  2. 76 FR 70464 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-14

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The DHS Data... will be open to the public. DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on...

  3. 76 FR 79660 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-22

    ... deleting one system of records notices in its existing inventory of record systems subject to the Privacy... proposes to delete a system of records notice from its inventory of record systems subject to the Privacy... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Information Systems...

  4. 32 CFR 701.119 - Privacy and the web.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Privacy and the web. 701.119 Section 701.119... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON activities shall consult SECNAVINST 5720.47B for guidance on what may be posted on a Navy Web site....

  5. 32 CFR 701.119 - Privacy and the web.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy and the web. 701.119 Section 701.119... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON activities shall consult SECNAVINST 5720.47B for guidance on what may be posted on a Navy Web site....

  6. Invited Papers on Privacy: Law, Ethics, and Technology.

    ERIC Educational Resources Information Center

    American Federation of Information Processing Societies, Montvale, NJ.

    These four papers were presented as background at a national symposium exploring the relationships among law, ethics, and technology as they relate to the individual's informational privacy. George B. Trubow's "The Development and Status of 'Informational Privacy' Law and Policy in the United States" discusses privacy as it relates to the…

  7. 32 CFR 701.119 - Privacy and the web.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Privacy and the web. 701.119 Section 701.119... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON activities shall consult SECNAVINST 5720.47B for guidance on what may be posted on a Navy Web site....

  8. 32 CFR 701.119 - Privacy and the web.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Privacy and the web. 701.119 Section 701.119... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON activities shall consult SECNAVINST 5720.47B for guidance on what may be posted on a Navy Web site....

  9. 32 CFR 701.119 - Privacy and the web.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Privacy and the web. 701.119 Section 701.119... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON activities shall consult SECNAVINST 5720.47B for guidance on what may be posted on a Navy Web site....

  10. 76 FR 25361 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting SUMMARY: The DHS Data... open to the public. DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on Thursday...

  11. 78 FR 75930 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-13

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The DHS Data... will be open to the public. DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on...

  12. 76 FR 35459 - DHS Data Privacy and Integrity Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-17

    ... SECURITY Office of the Secretary DHS Data Privacy and Integrity Advisory Committee AGENCY: Privacy Office, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The DHS Data... be open to the public. DATES: The DHS Data Privacy and Integrity Advisory Committee will meet on...

  13. 75 FR 25856 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-10

    ... From the Federal Register Online via the Government Publishing Office FEDERAL HOUSING FINANCE AGENCY Privacy Act of 1974; System of Records AGENCY: Federal Housing Finance Agency. ACTION: Notice of... Privacy Act of 1974, as amended (Privacy Act), the Federal Housing Finance Agency (FHFA) gives notices of...

  14. 78 FR 5787 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-28

    ... Secretary of Defense established a new Privacy Act System of Records entitled ``Public Affairs Management Information System.'' This notice responds to comments received on the Privacy Act Systems of Records Notice...) 372-0461. SUPPLEMENTARY INFORMATION: The Privacy Act Systems of Records Notice was published...

  15. 77 FR 16846 - Published Privacy Impact Assessments on the Web

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-22

    ... SECURITY Office of the Secretary Published Privacy Impact Assessments on the Web AGENCY: Privacy Office... approved and published on the Privacy Office's Web site between December 1, 2011 and February 29, 2012. DATES: The PIAs will be available on the DHS Web site until May 21, 2012, after which they may be...

  16. 78 FR 12337 - Published Privacy Impact Assessments on the Web

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-22

    ... SECURITY Office of the Secretary Published Privacy Impact Assessments on the Web AGENCY: Privacy Office...'s Web ] site between June 1, 2012, and November 30, 2012. DATES: The PIA will be available on the DHS Web site until April 23, 2013, after which they may be obtained by contacting the DHS Privacy...

  17. 76 FR 78934 - Published Privacy Impact Assessments on the Web

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-20

    ... SECURITY Office of the Secretary Published Privacy Impact Assessments on the Web AGENCY: Privacy Office... approved and published on the Privacy Office's web site between September 1, 2011 and November 30, 2011. DATES: The PIAs will be available on the DHS Web site until February 21, 2012, after which they may be...

  18. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a... creating new IT systems or when initiating new electronic collections of IIF. See DOD Memo of 28 Oct 05...

  19. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board shall ensure that all persons involved in the design, development, operation, or maintenance of...

  20. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a... creating new IT systems or when initiating new electronic collections of IIF. See DOD Memo of 28 Oct 05...

  1. 20 CFR 401.30 - Privacy Act and other responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Officer also ensures the integration of privacy principles into information technology systems... directly into the development of certain Information Technology projects. Our review examines the risks and... OFFICIAL RECORDS AND INFORMATION The Privacy Act § 401.30 Privacy Act and other responsibilities. (a...

  2. The Secret Life of Your Classmates: Understanding Communication Privacy Management

    ERIC Educational Resources Information Center

    Nodulman, Jessica A.

    2011-01-01

    This article presents an activity that combines this popular website, Postsecret.com, with college students' love for the internet, and course content on privacy boundaries and theory, disclosure, communicative control, and privacy rule development. By taking part in this activity, students practice privacy disclosure and are able to examine their…

  3. 47 CFR 0.506 - FOIA and Privacy Act requests.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false FOIA and Privacy Act requests. 0.506 Section 0... Declassification of National Security Information § 0.506 FOIA and Privacy Act requests. Requests for....461), of the Privacy Act of 1974, (See § 0.554) shall be processed in accordance with the...

  4. 47 CFR 0.506 - FOIA and Privacy Act requests.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false FOIA and Privacy Act requests. 0.506 Section 0... Declassification of National Security Information § 0.506 FOIA and Privacy Act requests. Requests for....461), of the Privacy Act of 1974, (See § 0.554) shall be processed in accordance with the...

  5. 5 CFR 1205.4 - Disclosure of Privacy Act records.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Disclosure of Privacy Act records. 1205.4 Section 1205.4 Administrative Personnel MERIT SYSTEMS PROTECTION BOARD ORGANIZATION AND PROCEDURES PRIVACY ACT REGULATIONS General Provisions § 1205.4 Disclosure of Privacy Act records. (a) Except as...

  6. 49 CFR 801.56 - Unwarranted invasion of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 7 2013-10-01 2013-10-01 false Unwarranted invasion of personal privacy. 801.56... Unwarranted invasion of personal privacy. Pursuant to 5 U.S.C. 552(b)(6), any personal, medical, or similar... a clearly unwarranted invasion of the person's personal privacy....

  7. 76 FR 4816 - Privacy Act of 1974; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-27

    ... Office of the Secretary 31 CFR Part 1 RIN 1505-AC27 Privacy Act of 1974; Implementation AGENCY: Departmental Offices, Treasury. ACTION: Final rule. SUMMARY: In accordance with the requirements of the Privacy Act of 1974, the Department of the Treasury gives notice of an amendment to update its Privacy...

  8. 48 CFR 52.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 2 2012-10-01 2012-10-01 false Privacy Act Notification....224-1 Privacy Act Notification. As prescribed in 24.104, insert the following clause in solicitations... required to accomplish an agency function: Privacy Act Notification (APR 1984) The Contractor will...

  9. 48 CFR 352.224-70 - Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Privacy Act. 352.224-70... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.224-70 Privacy Act. As prescribed in 324.103(b)(2), the Contracting Officer shall insert the following clause: Privacy Act...

  10. 32 CFR 865.119 - Privacy Act information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of...

  11. 49 CFR 801.56 - Unwarranted invasion of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 7 2012-10-01 2012-10-01 false Unwarranted invasion of personal privacy. 801.56... Unwarranted invasion of personal privacy. Pursuant to 5 U.S.C. 552(b)(6), any personal, medical, or similar... a clearly unwarranted invasion of the person's personal privacy....

  12. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  13. 32 CFR 724.811 - Privacy Act information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of...

  14. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  15. 32 CFR 724.811 - Privacy Act information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of...

  16. 32 CFR 724.811 - Privacy Act information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of...

  17. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  18. 32 CFR 724.811 - Privacy Act information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of...

  19. 48 CFR 52.239-1 - Privacy or Security Safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 2 2013-10-01 2013-10-01 false Privacy or Security....239-1 Privacy or Security Safeguards. As prescribed in 39.107, insert a clause substantially the same as the following: Privacy or Security Safeguards (AUG 1996) (a) The Contractor shall not publish...

  20. 5 CFR 1205.4 - Disclosure of Privacy Act records.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Disclosure of Privacy Act records. 1205.4 Section 1205.4 Administrative Personnel MERIT SYSTEMS PROTECTION BOARD ORGANIZATION AND PROCEDURES PRIVACY ACT REGULATIONS General Provisions § 1205.4 Disclosure of Privacy Act records. (a) Except as...

  1. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices §...

  2. 25 CFR 273.54 - Privacy Act requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Privacy Act requirements. 273.54 Section 273.54 Indians... Privacy Act requirements. (a) When a contractor operates a system of records to accomplish a Bureau function, the contractor shall comply with subpart D of 43 CFR part 2 which implements the Privacy Act (5...

  3. 32 CFR 701.109 - Privacy Act (PA) appeals.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Privacy Act (PA) appeals. 701.109 Section 701.109 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.109 Privacy Act (PA) appeals....

  4. 48 CFR 52.239-1 - Privacy or Security Safeguards.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Privacy or Security....239-1 Privacy or Security Safeguards. As prescribed in 39.107, insert a clause substantially the same as the following: Privacy or Security Safeguards (AUG 1996) (a) The Contractor shall not publish...

  5. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  6. 25 CFR 273.54 - Privacy Act requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Privacy Act requirements. 273.54 Section 273.54 Indians... Privacy Act requirements. (a) When a contractor operates a system of records to accomplish a Bureau function, the contractor shall comply with subpart D of 43 CFR part 2 which implements the Privacy Act (5...

  7. 5 CFR 1205.4 - Disclosure of Privacy Act records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Disclosure of Privacy Act records. 1205.4 Section 1205.4 Administrative Personnel MERIT SYSTEMS PROTECTION BOARD ORGANIZATION AND PROCEDURES PRIVACY ACT REGULATIONS General Provisions § 1205.4 Disclosure of Privacy Act records. (a) Except as...

  8. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices §...

  9. 32 CFR 865.119 - Privacy Act information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of...

  10. 48 CFR 352.224-70 - Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Privacy Act. 352.224-70... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.224-70 Privacy Act. As prescribed in 324.103(b)(2), the Contracting Officer shall insert the following clause: Privacy Act...

  11. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  12. 47 CFR 0.506 - FOIA and Privacy Act requests.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false FOIA and Privacy Act requests. 0.506 Section 0... Declassification of National Security Information § 0.506 FOIA and Privacy Act requests. Requests for....461), of the Privacy Act of 1974, (See § 0.554) shall be processed in accordance with the...

  13. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Protection of personal privacy... personal privacy. (a) Any of the following personnel, medical, or similar records is within the statutory... personal privacy: (1) Personnel and background records personal to any officer or employee of...

  14. 10 CFR 1008.6 - Procedures for Privacy Act requests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Procedures for Privacy Act requests. 1008.6 Section 1008.6 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) RECORDS MAINTAINED ON INDIVIDUALS (PRIVACY ACT) Requests for Access or Amendment § 1008.6 Procedures for Privacy Act requests. (a) Any individual may— (1)...

  15. 5 CFR 1205.4 - Disclosure of Privacy Act records.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Disclosure of Privacy Act records. 1205.4 Section 1205.4 Administrative Personnel MERIT SYSTEMS PROTECTION BOARD ORGANIZATION AND PROCEDURES PRIVACY ACT REGULATIONS General Provisions § 1205.4 Disclosure of Privacy Act records. (a) Except as...

  16. 48 CFR 52.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Privacy Act Notification....224-1 Privacy Act Notification. As prescribed in 24.104, insert the following clause in solicitations... required to accomplish an agency function: Privacy Act Notification (APR 1984) The Contractor will...

  17. 25 CFR 273.54 - Privacy Act requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Privacy Act requirements. 273.54 Section 273.54 Indians... Privacy Act requirements. (a) When a contractor operates a system of records to accomplish a Bureau function, the contractor shall comply with subpart D of 43 CFR part 2 which implements the Privacy Act (5...

  18. 48 CFR 352.224-70 - Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Privacy Act. 352.224-70... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.224-70 Privacy Act. As prescribed in 324.103(b)(2), the Contracting Officer shall insert the following clause: Privacy Act...

  19. 5 CFR 1205.4 - Disclosure of Privacy Act records.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Disclosure of Privacy Act records. 1205.4 Section 1205.4 Administrative Personnel MERIT SYSTEMS PROTECTION BOARD ORGANIZATION AND PROCEDURES PRIVACY ACT REGULATIONS General Provisions § 1205.4 Disclosure of Privacy Act records. (a) Except as...

  20. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  1. 48 CFR 52.239-1 - Privacy or Security Safeguards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 2 2011-10-01 2011-10-01 false Privacy or Security....239-1 Privacy or Security Safeguards. As prescribed in 39.107, insert a clause substantially the same as the following: Privacy or Security Safeguards (AUG 1996) (a) The Contractor shall not publish...

  2. 47 CFR 0.506 - FOIA and Privacy Act requests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false FOIA and Privacy Act requests. 0.506 Section 0... Declassification of National Security Information § 0.506 FOIA and Privacy Act requests. Requests for....461), of the Privacy Act of 1974, (See § 0.554) shall be processed in accordance with the...

  3. 48 CFR 52.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Privacy Act Notification....224-1 Privacy Act Notification. As prescribed in 24.104, insert the following clause in solicitations... required to accomplish an agency function: Privacy Act Notification (APR 1984) The Contractor will...

  4. 48 CFR 52.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 2 2013-10-01 2013-10-01 false Privacy Act Notification....224-1 Privacy Act Notification. As prescribed in 24.104, insert the following clause in solicitations... required to accomplish an agency function: Privacy Act Notification (APR 1984) The Contractor will...

  5. 48 CFR 352.224-70 - Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Privacy Act. 352.224-70... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.224-70 Privacy Act. As prescribed in 324.103(b)(2), the Contracting Officer shall insert the following clause: Privacy Act...

  6. 32 CFR 865.119 - Privacy Act information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of...

  7. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  8. 22 CFR 212.22 - Protection of personal privacy.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying...

  9. 48 CFR 352.224-70 - Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Privacy Act. 352.224-70... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.224-70 Privacy Act. As prescribed in 324.103(b)(2), the Contracting Officer shall insert the following clause: Privacy Act...

  10. 36 CFR 902.56 - Protection of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or...

  11. 25 CFR 273.54 - Privacy Act requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Privacy Act requirements. 273.54 Section 273.54 Indians... Privacy Act requirements. (a) When a contractor operates a system of records to accomplish a Bureau function, the contractor shall comply with subpart D of 43 CFR part 2 which implements the Privacy Act (5...

  12. 32 CFR 724.811 - Privacy Act information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Privacy Act information. 724.811 Section 724.811... BOARD Procedures of Naval Discharge Review Board § 724.811 Privacy Act information. Information protected under the Privacy Act is involved in the discharge review functions. The provisions of...

  13. 32 CFR 865.119 - Privacy Act information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act information. 865.119 Section 865.119...-GENERAL PERSONNEL REVIEW BOARDS Air Force Discharge Review Board § 865.119 Privacy Act information. Information protected under the Privacy Act is involved in discharge review functions. The provisions of...

  14. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt...

  15. 48 CFR 52.239-1 - Privacy or Security Safeguards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Privacy or Security....239-1 Privacy or Security Safeguards. As prescribed in 39.107, insert a clause substantially the same as the following: Privacy or Security Safeguards (AUG 1996) (a) The Contractor shall not publish...

  16. 48 CFR 52.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 2 2011-10-01 2011-10-01 false Privacy Act Notification....224-1 Privacy Act Notification. As prescribed in 24.104, insert the following clause in solicitations... required to accomplish an agency function: Privacy Act Notification (APR 1984) The Contractor will...

  17. 32 CFR 701.109 - Privacy Act (PA) appeals.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Privacy Act (PA) appeals. 701.109 Section 701.109 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.109 Privacy Act (PA) appeals....

  18. 49 CFR 801.56 - Unwarranted invasion of personal privacy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Unwarranted invasion of personal privacy. 801.56... Unwarranted invasion of personal privacy. Pursuant to 5 U.S.C. 552(b)(6), any personal, medical, or similar... a clearly unwarranted invasion of the person's personal privacy....

  19. 48 CFR 52.239-1 - Privacy or Security Safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 2 2012-10-01 2012-10-01 false Privacy or Security....239-1 Privacy or Security Safeguards. As prescribed in 39.107, insert a clause substantially the same as the following: Privacy or Security Safeguards (AUG 1996) (a) The Contractor shall not publish...

  20. 49 CFR 801.56 - Unwarranted invasion of personal privacy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false Unwarranted invasion of personal privacy. 801.56... Unwarranted invasion of personal privacy. Pursuant to 5 U.S.C. 552(b)(6), any personal, medical, or similar... a clearly unwarranted invasion of the person's personal privacy....