DOE Office of Scientific and Technical Information (OSTI.GOV)
None
The Department of Energy and its contractors store and process massive quantities of sensitive information to accomplish national security, energy, science, and environmental missions. Sensitive unclassified data, such as personally identifiable information (PII), official use only, and unclassified controlled nuclear information require special handling and protection to prevent misuse of the information for inappropriate purposes. Industry experts have reported that more than 203 million personal privacy records have been lost or stolen over the past three years, including information maintained by corporations, educational institutions, and Federal agencies. The loss of personal and other sensitive information can result in substantial financialmore » harm, embarrassment, and inconvenience to individuals and organizations. Therefore, strong protective measures, including data encryption, help protect against the unauthorized disclosure of sensitive information. Prior reports involving the loss of sensitive information have highlighted weaknesses in the Department's ability to protect sensitive data. Our report on Security Over Personally Identifiable Information (DOE/IG-0771, July 2007) disclosed that the Department had not fully implemented all measures recommended by the Office of Management and Budget (OMB) and required by the National Institute of Standards and Technology (NIST) to protect PII, including failures to identify and encrypt PII maintained on information systems. Similarly, the Government Accountability Office recently reported that the Department had not yet installed encryption technology to protect sensitive data on the vast majority of laptop computers and handheld devices. Because of the potential for harm, we initiated this audit to determine whether the Department and its contractors adequately safeguarded sensitive electronic information. The Department had taken a number of steps to improve protection of PII. Our review, however, identified opportunities to strengthen the protection of all types of sensitive unclassified electronic information and reduce the risk that such data could fall into the hands of individuals with malicious intent. In particular, for the seven sites we reviewed: (1) Four sites had either not ensured that sensitive information maintained on mobile devices was encrypted. Or, they had improperly permitted sensitive unclassified information to be transmitted unencrypted through email or to offsite backup storage facilities; (2) One site had not ensured that laptops taken on foreign travel, including travel to sensitive countries, were protected against security threats; and, (3) Although required by the OMB since 2003, we learned that programs and sites were still working to complete Privacy Impact Assessments - analyses designed to examine the risks and ramifications of using information systems to collect, maintain, and disseminate personal information. Our testing revealed that the weaknesses identified were attributable, at least in part, to Headquarters programs and field sites that had not implemented existing policies and procedures requiring protection of sensitive electronic information. In addition, a lack of performance monitoring contributed to the inability of the Department and the National Nuclear Security Administration (NNSA) to ensure that measures were in place to fully protect sensitive information. As demonstrated by previous computer intrusion-related data losses throughout the Department, without improvements, the risk or vulnerability for future losses remains unacceptably high. In conducting this audit, we recognized that data encryption and related techniques do not provide absolute assurance that sensitive data is fully protected. For example, encryption will not necessarily protect data in circumstances where organizational access controls are weak or are circumvented through phishing or other malicious techniques. However, as noted by NIST, when used appropriately, encryption is an effective tool that can, as part of an overall risk-management strategy, enhance security over critical personal and other sensitive information. The audit disclosed that Sandia National Laboratories had instituted a comprehensive program to protect laptops taken on foreign travel. In addition, the Department issued policy after our field work was completed that should standardize the Privacy Impact Assessment process, and, in so doing, provide increased accountability. While these actions are positive steps, additional effort is needed to help ensure that the privacy of individuals is adequately protected and that sensitive operational data is not compromised. To that end, our report contains several recommendations to implement a risk-based protection scheme for the protection of sensitive electronic information.« less
Code of Federal Regulations, 2011 CFR
2011-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.13 Marking... document. (b) Protective marking. The protective marking is: SENSITIVE SECURITY INFORMATION. (c... Sensitive Security Information that is controlled under 49 CFR parts 15 and 1520. No part of this record may...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.13 Marking... document. (b) Protective marking. The protective marking is: SENSITIVE SECURITY INFORMATION. (c... Sensitive Security Information that is controlled under 49 CFR parts 15 and 1520. No part of this record may...
48 CFR 8.608 - Protection of classified and sensitive information.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...
48 CFR 8.608 - Protection of classified and sensitive information.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...
48 CFR 8.608 - Protection of classified and sensitive information.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...
48 CFR 8.608 - Protection of classified and sensitive information.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...
48 CFR 8.608 - Protection of classified and sensitive information.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Prison Industries, Inc. 8.608 Protection of classified and sensitive information. Agencies shall not... about any individual private citizen, including information relating to such person's real property...
A guide to unclassified sensitive information protection
DOE Office of Scientific and Technical Information (OSTI.GOV)
Donahue, S.C.
1996-11-14
This document is a reference guide for CIC-Division employees who lead or participate in projects that use and/or produce unclassified sensitive information. It is intended for use on a case by case basis to develop project specific sensitive information handling procedures and standards. It contains criteria for identifying sensitive information and determining levels of sensitivity, and describes cost effective measures for protecting various levels of sensitive information. The goal of this document is to help establish good business practices that benefit both the Laboratory and its customers. Division personnel are encouraged to apply these guidelines.
75 FR 9860 - Release, Handling, and Protection of Restricted Information
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-04
... (FAR) Supplement (NFS) to clarify the policy and procedures regarding the release of [email protected] SUPPLEMENTARY INFORMATION: A. Background Currently the NFS addresses the release of contractors' sensitive information and access to sensitive information in NFS Part 1837, Service Contracting...
Advanced approach to information security management system model for industrial control system.
Park, Sanghyun; Lee, Kyungho
2014-01-01
Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). ISO 27000 series is the international standard ISMS used to protect confidentiality, integrity, and availability of sensitive information. While an ISMS based on ISO 27000 series has no particular flaws for general information systems, it is unfit to manage sensitive information for industrial control systems (ICSs) because the first priority of industrial control is safety of the system. Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. This new ISMS must be mutually exclusive of an ICS. This paper provides a new paradigm of ISMS for ICSs, which will be shown to be more suitable than the existing ISMS.
Advanced Approach to Information Security Management System Model for Industrial Control System
2014-01-01
Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). ISO 27000 series is the international standard ISMS used to protect confidentiality, integrity, and availability of sensitive information. While an ISMS based on ISO 27000 series has no particular flaws for general information systems, it is unfit to manage sensitive information for industrial control systems (ICSs) because the first priority of industrial control is safety of the system. Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. This new ISMS must be mutually exclusive of an ICS. This paper provides a new paradigm of ISMS for ICSs, which will be shown to be more suitable than the existing ISMS. PMID:25136659
Report: Assessing EPA’s Efforts to Protect Sensitive Information
Report #2006-S-00006, September 19, 2006. This is the EPA OIG's completed Data Collection Instrument, as prescribed by the PCIE to use in meeting its requirements under OMB Memo M-06-16, Protection of Sensitive Agency Information.
32 CFR 806b.34 - Protecting records.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Protecting records. 806b.34 Section 806b.34... PROGRAM Protecting and Disposing of Records § 806b.34 Protecting records. Maintaining information privacy... contact with information in identifiable form. Protect information according to its sensitivity level...
32 CFR 806b.34 - Protecting records.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Protecting records. 806b.34 Section 806b.34... PROGRAM Protecting and Disposing of Records § 806b.34 Protecting records. Maintaining information privacy... contact with information in identifiable form. Protect information according to its sensitivity level...
32 CFR 806b.34 - Protecting records.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Protecting records. 806b.34 Section 806b.34... PROGRAM Protecting and Disposing of Records § 806b.34 Protecting records. Maintaining information privacy... contact with information in identifiable form. Protect information according to its sensitivity level...
32 CFR 806b.34 - Protecting records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Protecting records. 806b.34 Section 806b.34... PROGRAM Protecting and Disposing of Records § 806b.34 Protecting records. Maintaining information privacy... contact with information in identifiable form. Protect information according to its sensitivity level...
32 CFR 806b.34 - Protecting records.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Protecting records. 806b.34 Section 806b.34... PROGRAM Protecting and Disposing of Records § 806b.34 Protecting records. Maintaining information privacy... contact with information in identifiable form. Protect information according to its sensitivity level...
Information barrier technology applied to less restrictive environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacArthur, D. W.; Langner, D. C.; Hypes, P. A.
2004-01-01
The information barrier is an important part of any system that allows inspector verification of declared classified materials. In this context, the information barrier must protect classified information while allowing the inspectors to reach correct and independent conclusions concerning the veracity of the declaration. Although other applications may not involve national security, information barrier techniques can still be used to protect information considered sensitive by individuals, commercial entities, or national organizations. Other potential areas of application include homeland security and airport screening, personal information disclosed by modern scanning techniques, nuclear information not considered classified but still sensitive, and industrial secretmore » information that could be compromised during 3rd party acceptance testing. Modern personnel screening devices are limited more by their potential for release of personal information than by technology. Screening systems that could be used in airports and other sensitive areas are often not utilized because the same system that can show the details of weapons carried on a person's body can also reveal potentially embarrassing and sensitive details of the body itself. Much other nuclear information, as well as industrially secret information, while not actually classified, is not appropriate for widespread dissemination. In both cases an inspector may need to verify elements of the manufacturer's or owner's claims, but at the same time not disclose sensitive information to either the inspector or the general public. Thus, information barrier technology, although originally developed for protection of nuclear weapons information, is also directly usable in a number of counter-terrorism and nonproliferation applications. Although these applications may not (or may) require the same level of rigor as the original application to classified items, many of the same techniques can be used in protecting this non-classified, but still sensitive, information.« less
ERIC Educational Resources Information Center
Fazlioglu, Muge
2017-01-01
This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…
49 CFR 1522.125 - Protection of information.
Code of Federal Regulations, 2010 CFR
2010-10-01
... VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program § 1522.125 Protection of information. (a) Sensitive Security Information. Each validation... 49 Transportation 9 2010-10-01 2010-10-01 false Protection of information. 1522.125 Section 1522...
Protecting sensitive systems and data in an open agency
NASA Technical Reports Server (NTRS)
Hunt, Douglas B.; Tompkins, Frederick G.
1987-01-01
This paper focuses on the policy and definitional issues associated with providing adequate and reasonable levels of protection for sensitive systems and data in an agency whose basic charter mandates the open sharing of information and transfer of technology into the market economy. An information model based on current Federal regulatory issuances is presented. A scheme for determining sensitivity levels, based on a categorization taxonomy,is provided.
Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints
ERIC Educational Resources Information Center
Pervaiz, Zahid
2013-01-01
Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…
ERIC Educational Resources Information Center
Johnson, Kenneth T.
2017-01-01
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Protecting Sensitive Information in Directory Services Using Virtual Directories
NASA Astrophysics Data System (ADS)
Claycomb, William; Shin, Dongwan
Directory services are commonly used to store information related to individuals, and often act as a source for security services, such as authentication and access control, in collaborative applications within/across organizations. Hence, there is an urgent need to protect the sensitive information they contain. Existing solutions offer minimal protection against insider attacks, a growing threat to both government and industry data services. In this paper we present a solution for data protection that leverages virtual directories and data encryption to provide a user-centric approach to data protection, delegation, and collaboration. A security architecture is presented, along with the discussion of the benefits and vulnerabilities of our approach. We also discuss a proof-of-concept implementation and performance testing results.
Roche, P A; Annas, G J
2001-05-01
This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.
Government Doublethink: Protection or Suppression in Information.
ERIC Educational Resources Information Center
Drake, Miriam A.
2003-01-01
Discusses regulations and actions related to government withholding, suppressing, and altering information since September 11, 2001. Topics include conflicting goals of an informed citizenry versus national security, science and technology progress versus protection of sensitive information, and public health versus ideology; political pressure;…
4 CFR 21.4 - Protective orders.
Code of Federal Regulations, 2010 CFR
2010-01-01
... the applicant is not involved in competitive decision-making for any firm that could gain a... 4 Accounts 1 2010-01-01 2010-01-01 false Protective orders. 21.4 Section 21.4 Accounts GOVERNMENT... protected information. Such information may include proprietary, confidential, or source-selection-sensitive...
ERIC Educational Resources Information Center
Herman, E.
2004-01-01
The purpose of this paper is to suggest realistic guidelines that balance public access to government information and the need to protect sensitive data. Emphasis is on lessons learned from a 1979 case where the government attempted to prohibit the Progressive Magazine from publishing an article about making a hydrogen bomb and government…
49 CFR 1.27 - Delegations to the General Counsel.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) (Security and research and development activities), as implemented by 49 CFR part 15 (Protection of Sensitive Security Information), relating to the determination that information is Sensitive Security Information, in consultation and coordination with the Office of Intelligence, Security and Emergency Response...
49 CFR 1.27 - Delegations to the General Counsel.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) (Security and research and development activities), as implemented by 49 CFR part 15 (Protection of Sensitive Security Information), relating to the determination that information is Sensitive Security Information, in consultation and coordination with the Office of Intelligence, Security and Emergency Response...
49 CFR 1.27 - Delegations to the General Counsel.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) (Security and research and development activities), as implemented by 49 CFR part 15 (Protection of Sensitive Security Information), relating to the determination that information is Sensitive Security Information, in consultation and coordination with the Office of Intelligence, Security and Emergency Response...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY... of records and information that TSA has determined to be Sensitive Security Information, as defined...
Code of Federal Regulations, 2011 CFR
2011-10-01
... the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.1 Scope. (a... the Secretary of DOT has determined to be Sensitive Security Information, as defined in § 15.5. This... information under section 214 of the Homeland Security Act, the receipt, maintenance, or disclosure of such...
Code of Federal Regulations, 2010 CFR
2010-10-01
... the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.1 Scope. (a... the Secretary of DOT has determined to be Sensitive Security Information, as defined in § 15.5. This... information under section 214 of the Homeland Security Act, the receipt, maintenance, or disclosure of such...
Protecting Vital Records in a Crisis
ERIC Educational Resources Information Center
Carlisle, Van
2005-01-01
The second a student enters kindergarten, a set of vital records is created, and this body of information expands throughout a child's academic career. Vital school records contain highly sensitive, private information, and there is no shortage of laws and policies to govern the handling, management and protection of such information. Schools…
Autonomous Information Unit: Why Making Data Smart Can also Make Data Secured?
NASA Technical Reports Server (NTRS)
Chow, Edward T.
2006-01-01
In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and self-manage. In our approach, we decompose data into smaller pieces and provide individualized protection. We also provide a policy control mechanism to allow 'smart' access control and context based re-assembly of the decomposed data. By combining smart policy with individually protected data, we are able to provide better protection of sensitive information and achieve more flexible access during emergency conditions. As a result, this new fine-grain protection mechanism can enable us to achieve better solutions for problems such as distributed information protection and identity theft.
Data Leakage Prevention: E-Mail Protection via Gateway
NASA Astrophysics Data System (ADS)
Kaur, Kamaljeet; Gupta, Ishu; Singh, Ashutosh Kumar
2018-01-01
Protection of digital assets and intellectual property is becoming a challenge for most of the companies. Due to increasing availability of database services on internet, data may be insecure after passing through precarious networks. To protect intellectual property (IP) is a major concern for today's organizations, because a leakage that compromises IP means, sensitive information of a company is in the hands of biggest competitors. Electronic information processing and communication is replacing paper in many applications increasingly. Instead of paper, an email is being used for communication at workplace and from social media logins to bank accounts. Nowadays an email is becoming a mainstream business tool. An email can be misused to leave company’s sensitive data open to compromise. So, it may be of little surprise that attacks on emails are common. So, here we need an email protection system (EPS) that will protect information to leave organization via mail. In this paper, we developed an algorithm that will offer email protection via gateway during data transfer. This algorithm matches the patterns with the keywords stored in the database and then takes the actions accordingly to protect the data. This paper describes why email protection is important? How companies can protect their confidential information from being leaked by insiders.
Protected interoperability of telecommunications and digital products
NASA Astrophysics Data System (ADS)
Hampel, Viktor E.; Cartier, Gene N.; Craft, James P.
1994-11-01
New federal standards for the protection of sensitive data now make it possible to ensure the authenticity, integrity and confidentiality of digital products, and non-repudiation of digital telecommunications. Under review and comment since 1991, the new Federal standards were confirmed this year and provide standard means for the protection of voice and data communications from accidental and wilful abuse. The standards are initially tailored to protect only `sensitive-but-unclassified' (SBU) data in compliance with the Computer Security Act of 1987. These data represent the majority of transactions in electronic commerce, including sensitive procurement information, trade secrets, financial data, product definitions, and company-proprietary information classified as `intellectual property.' Harmonization of the new standards with international requirements is in progress. In the United States, the confirmation of the basic standards marks the beginning of a long-range program to assure discretionary and mandatory access controls to digital resources. Upwards compatibility into the classified domain with multi-level security is a core requirement of the National Information Infrastructure. In this report we review the powerful capabilities of standard Public-Key-Cryptology, the availability of commercial and Federal products for data protection, and make recommendations for their cost-effective use to assure reliable telecommunications and process controls.
A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining
NASA Astrophysics Data System (ADS)
Tsiafoulis, S.; Zorkadis, V. C.; Karras, D. A.
The increasing use of fast and efficient data mining algorithms in huge collections of personal data, facilitated through the exponential growth of technology, in particular in the field of electronic data storage media and processing power, has raised serious ethical, philosophical and legal issues related to privacy protection. To cope with these concerns, several privacy preserving methodologies have been proposed, classified in two categories, methodologies that aim at protecting the sensitive data and those that aim at protecting the mining results. In our work, we focus on sensitive data protection and compare existing techniques according to their anonymity degree achieved, the information loss suffered and their performance characteristics. The ℓ-diversity principle is combined with k-anonymity concepts, so that background information can not be exploited to successfully attack the privacy of data subjects data refer to. Based on Kohonen Self Organizing Feature Maps (SOMs), we firstly organize data sets in subspaces according to their information theoretical distance to each other, then create the most relevant classes paying special attention to rare sensitive attribute values, and finally generalize attribute values to the minimum extend required so that both the data disclosure probability and the information loss are possibly kept negligible. Furthermore, we propose information theoretical measures for assessing the anonymity degree achieved and empirical tests to demonstrate it.
49 CFR 1520.5 - Sensitive security information.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Sensitive security information. 1520.5 Section 1520.5 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF...
49 CFR 15.9 - Restrictions on the disclosure of SSI.
Code of Federal Regulations, 2011 CFR
2011-10-01
... information under section 214 of the Homeland Security Act, any covered person who is a Federal employee in... Section 15.9 Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.9 Restrictions on the disclosure of SSI. (a) Duty to protect information. A covered person...
49 CFR 15.9 - Restrictions on the disclosure of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
... information under section 214 of the Homeland Security Act, any covered person who is a Federal employee in... Section 15.9 Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.9 Restrictions on the disclosure of SSI. (a) Duty to protect information. A covered person...
30 CFR 250.216 - What biological, physical, and socioeconomic information must accompany the EP?
Code of Federal Regulations, 2011 CFR
2011-07-01
.... Site-specific information on chemosynthetic communities, federally listed threatened or endangered species, marine mammals protected under the Marine Mammal Protection Act (MMPA), sensitive underwater features, marine sanctuaries, critical habitat designated under the Endangered Species Act (ESA), or other...
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
30 CFR 250.216 - What biological, physical, and socioeconomic information must accompany the EP?
Code of Federal Regulations, 2010 CFR
2010-07-01
... information on chemosynthetic communities, federally listed threatened or endangered species, marine mammals protected under the Marine Mammal Protection Act (MMPA), sensitive underwater features, marine sanctuaries, critical habitat designated under the Endangered Species Act (ESA), or other areas of biological concern...
30 CFR 550.216 - What biological, physical, and socioeconomic information must accompany the EP?
Code of Federal Regulations, 2012 CFR
2012-07-01
... information on chemosynthetic communities, federally listed threatened or endangered species, marine mammals protected under the Marine Mammal Protection Act (MMPA), sensitive underwater features, marine sanctuaries, critical habitat designated under the Endangered Species Act (ESA), or other areas of biological concern...
30 CFR 550.216 - What biological, physical, and socioeconomic information must accompany the EP?
Code of Federal Regulations, 2014 CFR
2014-07-01
... information on chemosynthetic communities, federally listed threatened or endangered species, marine mammals protected under the Marine Mammal Protection Act (MMPA), sensitive underwater features, marine sanctuaries, critical habitat designated under the Endangered Species Act (ESA), or other areas of biological concern...
30 CFR 550.216 - What biological, physical, and socioeconomic information must accompany the EP?
Code of Federal Regulations, 2013 CFR
2013-07-01
... information on chemosynthetic communities, federally listed threatened or endangered species, marine mammals protected under the Marine Mammal Protection Act (MMPA), sensitive underwater features, marine sanctuaries, critical habitat designated under the Endangered Species Act (ESA), or other areas of biological concern...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-06
... public disclosure. Sensitive personal information such as account numbers or Social Security numbers... in person and online? 4. What programs, policies, accommodations, or benefits do financial service... protections and fraud protections. 5. What unique assistance, if any, is currently offered by financial...
10 CFR 95.31 - Protective personnel.
Code of Federal Regulations, 2010 CFR
2010-01-01
... equivalent) if the licensee, certificate holder, or other person possesses information classified... Information. (b) Possess a “Q” access authorization (or CSA equivalent) if the licensee, certificate holder... vulnerability information; and certain particularly sensitive Naval Nuclear Propulsion Program information (e.g...
10 CFR 95.31 - Protective personnel.
Code of Federal Regulations, 2011 CFR
2011-01-01
... equivalent) if the licensee, certificate holder, or other person possesses information classified... Information. (b) Possess a “Q” access authorization (or CSA equivalent) if the licensee, certificate holder... vulnerability information; and certain particularly sensitive Naval Nuclear Propulsion Program information (e.g...
Utility-preserving privacy protection of textual healthcare documents.
Sánchez, David; Batet, Montserrat; Viejo, Alexandre
2014-12-01
The adoption of ITs by medical organisations makes possible the compilation of large amounts of healthcare data, which are quite often needed to be released to third parties for research or business purposes. Many of this data are of sensitive nature, because they may include patient-related documents such as electronic healthcare records. In order to protect the privacy of individuals, several legislations on healthcare data management, which state the kind of information that should be protected, have been defined. Traditionally, to meet with current legislations, a manual redaction process is applied to patient-related documents in order to remove or black-out sensitive terms. This process is costly and time-consuming and has the undesired side effect of severely reducing the utility of the released content. Automatic methods available in the literature usually propose ad-hoc solutions that are limited to protect specific types of structured information (e.g. e-mail addresses, social security numbers, etc.); as a result, they are hardly applicable to the sensitive entities stated in current regulations that do not present those structural regularities (e.g. diseases, symptoms, treatments, etc.). To tackle these limitations, in this paper we propose an automatic sanitisation method for textual medical documents (e.g. electronic healthcare records) that is able to protect, regardless of their structure, sensitive entities (e.g. diseases) and also those semantically related terms (e.g. symptoms) that may disclose the former ones. Contrary to redaction schemes based on term removal, our approach improves the utility of the protected output by replacing sensitive terms with appropriate generalisations retrieved from several medical and general-purpose knowledge bases. Experiments conducted on highly sensitive documents and in coherency with current regulations on healthcare data privacy show promising results in terms of the practical privacy and utility of the protected output. Copyright © 2014 Elsevier Inc. All rights reserved.
Privacy rules for DNA databanks. Protecting coded 'future diaries'.
Annas, G J
1993-11-17
In privacy terms, genetic information is like medical information. But the information contained in the DNA molecule itself is more sensitive because it contains an individual's probabilistic "future diary," is written in a code that has only partially been broken, and contains information about an individual's parents, siblings, and children. Current rules for protecting the privacy of medical information cannot protect either genetic information or identifiable DNA samples stored in DNA databanks. A review of the legal and public policy rationales for protecting genetic privacy suggests that specific enforceable privacy rules for DNA databanks are needed. Four preliminary rules are proposed to govern the creation of DNA databanks, the collection of DNA samples for storage, limits on the use of information derived from the samples, and continuing obligations to those whose DNA samples are in the databanks.
78 FR 46578 - Agency Information Collection Activities: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-01
... , including any personal information provided. Sensitive personal information, such as account numbers or... to understand the impact of bundled products and services on the financial decision- making of... BUREAU OF CONSUMER FINANCIAL PROTECTION [Docket No CFPB-2013-0024] Agency Information Collection...
An Information Policy for the Information Age.
ERIC Educational Resources Information Center
Blake, Virgil; Surprenant, Thomas
1988-01-01
Discusses recent federal information policies that pose a threat to access to information. A short-lived policy for protection of sensitive but unclassified information is criticized, and the Computer Security Act of 1987, currently under consideration in Congress, is described. Involvement by the library and information community in developing…
Code of Federal Regulations, 2012 CFR
2012-07-01
... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...
Code of Federal Regulations, 2010 CFR
2010-07-01
... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...
Code of Federal Regulations, 2011 CFR
2011-07-01
... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...
Code of Federal Regulations, 2014 CFR
2014-07-01
... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...
Code of Federal Regulations, 2013 CFR
2013-07-01
... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-27
... consider a long-term approach that will balance data quality and transparency with the reporting businesses... balances data quality and transparency with the need to protect sensitive business information. When EPA...
Space Shuttle security policies and programs
NASA Astrophysics Data System (ADS)
Keith, E. L.
The Space Shuttle vehicle consists of the orbiter, external tank, and two solid rocket boosters. In dealing with security two major protective categories are considered, taking into account resource protection and information protection. A review is provided of four basic programs which have to be satisfied. Aspects of science and technology transfer are discussed. The restrictions for the transfer of science and technology information are covered under various NASA Management Instructions (NMI's). There were two major events which influenced the protection of sensitive and private information on the Space Shuttle program. The first event was a manned space flight accident, while the second was the enactment of a congressional bill to establish the rights of privacy. Attention is also given to national resource protection and national defense classified operations.
Space Shuttle security policies and programs
NASA Technical Reports Server (NTRS)
Keith, E. L.
1985-01-01
The Space Shuttle vehicle consists of the orbiter, external tank, and two solid rocket boosters. In dealing with security two major protective categories are considered, taking into account resource protection and information protection. A review is provided of four basic programs which have to be satisfied. Aspects of science and technology transfer are discussed. The restrictions for the transfer of science and technology information are covered under various NASA Management Instructions (NMI's). There were two major events which influenced the protection of sensitive and private information on the Space Shuttle program. The first event was a manned space flight accident, while the second was the enactment of a congressional bill to establish the rights of privacy. Attention is also given to national resource protection and national defense classified operations.
78 FR 20900 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-08
....gov , including any personal information provided. Sensitive personal information, such as account... and empowerment programs, and practices that can improve financial decision-making skills and outcomes... BUREAU OF CONSUMER FINANCIAL PROTECTION [Docket No. CFPB-2013-0007] Agency Information Collection...
Critical Infrastructure Protection- Los Alamos National Laboratory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bofman, Ryan K.
Los Alamos National Laboratory (LANL) has been a key facet of Critical National Infrastructure since the nuclear bombing of Hiroshima exposed the nature of the Laboratory’s work in 1945. Common knowledge of the nature of sensitive information contained here presents a necessity to protect this critical infrastructure as a matter of national security. This protection occurs in multiple forms beginning with physical security, followed by cybersecurity, safeguarding of classified information, and concluded by the missions of the National Nuclear Security Administration.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-12
... confidential business information, trade secret information, or other sensitive or protected information... created by a horizontal ladder rung and the top of the mattress, [and] the neck * * * drop[s] into the gap...
78 FR 70046 - Agency Information Collection Activities; Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-22
... Gans, Attorney, Division of Marketing Practices, Bureau of Consumer Protection, Federal Trade... that your comment does not include any sensitive personal information, such as anyone's Social Security...
Lock It Up! Computer Security.
ERIC Educational Resources Information Center
Wodarz, Nan
1997-01-01
The data contained on desktop computer systems and networks pose security issues for virtually every district. Sensitive information can be protected by educating users, altering the physical layout, using password protection, designating access levels, backing up data, reformatting floppy disks, using antivirus software, and installing encryption…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-30
... viewing on http://www.regulations.gov without change. All Personal Identifying Information (for example... Confidential Business Information or otherwise sensitive or protected information. NMFS will accept anonymous... burden-hour estimates or other aspects of the collection-of-information requirements contained in this...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-12
... unless it displays a currently valid OMB control number. No person shall be subject to any penalty for... against public disclosure of proprietary and commercially sensitive information. Such information is... stringent protection of information deemed ``highly confidential.'' As opposed to the confidential data...
Differential Privacy Preserving in Big Data Analytics for Connected Health.
Lin, Chi; Song, Zihao; Song, Houbing; Zhou, Yanhong; Wang, Yi; Wu, Guowei
2016-04-01
In Body Area Networks (BANs), big data collected by wearable sensors usually contain sensitive information, which is compulsory to be appropriately protected. Previous methods neglected privacy protection issue, leading to privacy exposure. In this paper, a differential privacy protection scheme for big data in body sensor network is developed. Compared with previous methods, this scheme will provide privacy protection with higher availability and reliability. We introduce the concept of dynamic noise thresholds, which makes our scheme more suitable to process big data. Experimental results demonstrate that, even when the attacker has full background knowledge, the proposed scheme can still provide enough interference to big sensitive data so as to preserve the privacy.
CD-ROM: Potential and Pitfalls.
ERIC Educational Resources Information Center
Dreiss, L. Jack; Bashir, Shahzad
1990-01-01
Examines issues surrounding CD-ROM as an organizational information management tool: (1) the CD-ROM market; (2) pitfalls, including compatibility, effect on existing information systems, fear of obsolescence, protection of sensitive information, and lack of successful role models; and (3) factors that will fuel growth, including greater…
Rajaei, Mehri; Haghjoo, Mostafa S; Miyaneh, Eynollah Khanjari
2015-01-01
Maintaining privacy in network data publishing is a major challenge. This is because known characteristics of individuals can be used to extract new information about them. Recently, researchers have developed privacy methods based on k-anonymity and l-diversity to prevent re-identification or sensitive label disclosure through certain structural information. However, most of these studies have considered only structural information and have been developed for undirected networks. Furthermore, most existing approaches rely on generalization and node clustering so may entail significant information loss as all properties of all members of each group are generalized to the same value. In this paper, we introduce a framework for protecting sensitive attribute, degree (the number of connected entities), and relationships, as well as the presence of individuals in directed social network data whose nodes contain attributes. First, we define a privacy model that specifies privacy requirements for the above private information. Then, we introduce the technique of Ambiguity in Social Network data (ASN) based on anatomy, which specifies how to publish social network data. To employ ASN, individuals are partitioned into groups. Then, ASN publishes exact values of properties of individuals of each group with common group ID in several tables. The lossy join of those tables based on group ID injects uncertainty to reconstruct the original network. We also show how to measure different privacy requirements in ASN. Simulation results on real and synthetic datasets demonstrate that our framework, which protects from four types of private information disclosure, preserves data utility in tabular, topological and spectrum aspects of networks at a satisfactory level.
Rajaei, Mehri; Haghjoo, Mostafa S.; Miyaneh, Eynollah Khanjari
2015-01-01
Maintaining privacy in network data publishing is a major challenge. This is because known characteristics of individuals can be used to extract new information about them. Recently, researchers have developed privacy methods based on k-anonymity and l-diversity to prevent re-identification or sensitive label disclosure through certain structural information. However, most of these studies have considered only structural information and have been developed for undirected networks. Furthermore, most existing approaches rely on generalization and node clustering so may entail significant information loss as all properties of all members of each group are generalized to the same value. In this paper, we introduce a framework for protecting sensitive attribute, degree (the number of connected entities), and relationships, as well as the presence of individuals in directed social network data whose nodes contain attributes. First, we define a privacy model that specifies privacy requirements for the above private information. Then, we introduce the technique of Ambiguity in Social Network data (ASN) based on anatomy, which specifies how to publish social network data. To employ ASN, individuals are partitioned into groups. Then, ASN publishes exact values of properties of individuals of each group with common group ID in several tables. The lossy join of those tables based on group ID injects uncertainty to reconstruct the original network. We also show how to measure different privacy requirements in ASN. Simulation results on real and synthetic datasets demonstrate that our framework, which protects from four types of private information disclosure, preserves data utility in tabular, topological and spectrum aspects of networks at a satisfactory level. PMID:26110762
DOE Office of Scientific and Technical Information (OSTI.GOV)
Luke, S J
2011-12-20
This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of themore » US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the genetic information associated with the various pathogens. In addition, it has been determined that a suitable information barrier could be applied to this technology when the verification regime has been defined. Finally, the report posits a path forward for additional development of information barriers in a biological weapons verification regime. This path forward has shown that a new analysis approach coined as Information Loss Analysis might need to be pursued so that a numerical understanding of how information can be lost in specific measurement systems can be achieved.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-03
... business information or otherwise sensitive or protected information. NMFS will accept anonymous comments (enter ``N/A'' in the required fields if you wish to remain anonymous). Attachments to electronic...
User Authentication in Smartphones for Telehealth
SMITH, KATHERINE A.; ZHOU, LEMING; WATZLAF, VALERIE J. M.
2017-01-01
Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed. PMID:29238444
User Authentication in Smartphones for Telehealth.
Smith, Katherine A; Zhou, Leming; Watzlaf, Valerie J M
2017-01-01
Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.
Protecting Your Child's Personal Information at School
ERIC Educational Resources Information Center
Federal Trade Commission, 2012
2012-01-01
Back to school--an annual ritual that includes buying new notebooks, packing lunches, coordinating transportation, and filling out forms: registration forms, health forms, permission slips, and emergency contact forms, to name a few. Many school forms require personal and, sometimes, sensitive information. In the wrong hands, this information can…
Code of Federal Regulations, 2012 CFR
2012-07-01
... information must accompany the DPP or DOCD? 550.247 Section 550.247 Mineral Resources BUREAU OF OCEAN ENERGY... information on chemosynthetic communities, federally listed threatened or endangered species, marine mammals protected under the MMPA, sensitive underwater features, marine sanctuaries, critical habitat designated...
Code of Federal Regulations, 2013 CFR
2013-07-01
... information must accompany the DPP or DOCD? 550.247 Section 550.247 Mineral Resources BUREAU OF OCEAN ENERGY... information on chemosynthetic communities, federally listed threatened or endangered species, marine mammals protected under the MMPA, sensitive underwater features, marine sanctuaries, critical habitat designated...
Code of Federal Regulations, 2014 CFR
2014-07-01
... information must accompany the DPP or DOCD? 550.247 Section 550.247 Mineral Resources BUREAU OF OCEAN ENERGY... information on chemosynthetic communities, federally listed threatened or endangered species, marine mammals protected under the MMPA, sensitive underwater features, marine sanctuaries, critical habitat designated...
Meeting the security requirements of electronic medical records in the ERA of high-speed computing.
Alanazi, H O; Zaidan, A A; Zaidan, B B; Kiah, M L Mat; Al-Bakri, S H
2015-01-01
This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.
Kuk's Model Adjusted for Protection and Efficiency
ERIC Educational Resources Information Center
Su, Shu-Ching; Sedory, Stephen A.; Singh, Sarjinder
2015-01-01
In this article, we adjust the Kuk randomized response model for collecting information on a sensitive characteristic for increased protection and efficiency by making use of forced "yes" and forced "no" responses. We first describe Kuk's model and then the proposed adjustment to Kuk's model. Next, by means of a simulation…
Roberts, Laura Weiss; Geppert, Cynthia M A; Warner, Teddy D; Green Hammond, Katherine A; Rogers, Melinda; Smrcka, Julienne; Roberts, Brian B
2005-04-01
The societal use of genetic information raises ethical concerns, and the views of working persons regarding genetic information have received little attention. We performed an empirical project to characterize perspectives of 63 employees at two sites who expressed strong interest in learning about and protecting their personal genetic information. Genetic data were seen as more sensitive than other health data, and disclosure of genetic susceptibility was perceived as having negative consequences. This study suggests the value of exploring the perspectives of key stakeholders most directly affected by genetic applications across diverse societal settings.
How strong are passwords used to protect personal health information in clinical trials?
El Emam, Khaled; Moreau, Katherine; Jonker, Elizabeth
2011-02-11
Findings and statements about how securely personal health information is managed in clinical research are mixed. The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices.
How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?
Moreau, Katherine; Jonker, Elizabeth
2011-01-01
Background Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices. PMID:21317106
Mallinder, Jason; Drabwell, Peter
Cyber threats are growing and evolving at an unprecedented rate.Consequently, it is becoming vitally important that organisations share information internally and externally before, during and after incidents they encounter so that lessons can be learned, good practice identified and new cyber resilience capabilities developed. Many organisations are reluctant to share such information for fear of divulging sensitive information or because it may be vague or incomplete. This provides organisations with a complex dilemma: how to share information as openly as possibly about cyber incidents, while protecting their confidentiality and focusing on service recovery from such incidents. This paper explores the dilemma of information sharing versus sensitivity and provides a practical overview of considerations every business continuity plan should address to plan effectively for information sharing in the event of a cyber incident.
A Goal VPN Protection Profile for Protecting Sensitive Information
2000-07-10
security for the systems in which they are used. Nothing could be further from the truth . There are no perfect security solutions, and no...establishment/termination, failures, and errors); • provide for directly connected (local hard -wire connection) and remote (over the network) interfaces... the TOERU is left unattended procedures such as media encryption or secure storage of the hard drive, will be used to insure the protection of stored
Report #16-P-0259, August 10, 2016. The EPA has 30 systems that contain sensitive PII. Safeguarding information and preventing system breaches are essential for ensuring the EPA retains the trust of the American public.
48 CFR 352.239-71 - Standard for encryption language.
Code of Federal Regulations, 2011 CFR
2011-10-01
... language. 352.239-71 Section 352.239-71 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES... Information Processing Standard (FIPS) 140-2-compliant encryption (Security Requirements for Cryptographic Module, as amended) to protect all instances of HHS sensitive information during storage and transmission...
Protecting patient privacy by quantifiable control of disclosures in disseminated databases.
Ohno-Machado, Lucila; Silveira, Paulo Sérgio Panse; Vinterbo, Staal
2004-08-01
One of the fundamental rights of patients is to have their privacy protected by health care organizations, so that information that can be used to identify a particular individual is not used to reveal sensitive patient data such as diagnoses, reasons for ordering tests, test results, etc. A common practice is to remove sensitive data from databases that are disseminated to the public, but this can make the disseminated database useless for important public health purposes. If the degree of anonymity of a disseminated data set could be measured, it would be possible to design algorithms that can assure that the desired level of confidentiality is achieved. Privacy protection in disseminated databases can be facilitated by the use of special ambiguation algorithms. Most of these algorithms are aimed at making one individual indistinguishable from one or more of his peers. However, even in databases considered "anonymous", it may still be possible to obtain sensitive information about some individuals or groups of individuals with the use of pattern recognition algorithms. In this article, we study the problem of determining the degree of ambiguation in disseminated databases and discuss its implications in the development and testing of "anonymization" algorithms.
A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems
Choi, Donghee; Kim, Dohoon; Park, Seog
2015-01-01
Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013
Exploring the concepts of privacy and the sharing of sensitive health information.
Asiri, Eman; Asiri, Hanan; Househ, Mowafa
2014-01-01
People are increasingly sharing their personal information on social networks such as Facebook. Patients, in particular, join online support groups for specific conditions to get support and share their experience with other members of a social media group. Throughout this process, sensitive health information could be shared by group members as a part of this information exchange and privacy concerns can arise as a result. The purpose of this study is to explore various aspects relating to privacy and the sharing of sensitive health information through social media platforms. Our review found that social media such as Facebook already plays a large role in patients' lives as it helps patients to understand their health conditions and gain support from other people who suffer from the same condition. However, there are major concerns for those patients as their privacy and confidentiality can be harmed by improper use of their posted sensitive health information by governments, hospitals or individuals. More importantly, there is an increased need for laws and legislations that protect and empower patients. We recommend that healthcare organizations collaborate with social media software companies and create educational and awareness campaigns on the impacts of sharing sensitive health information through social media.
Associated diacritical watermarking approach to protect sensitive arabic digital texts
NASA Astrophysics Data System (ADS)
Kamaruddin, Nurul Shamimi; Kamsin, Amirrudin; Hakak, Saqib
2017-10-01
Among multimedia content, one of the most predominant medium is text content. There have been lots of efforts to protect and secure text information over the Internet. The limitations of existing works have been identified in terms of watermark capacity, time complexity and memory complexity. In this work, an invisible digital watermarking approach has been proposed to protect and secure the most sensitive text i.e. Digital Holy Quran. The proposed approach works by XOR-ing only those Quranic letters that has certain diacritics associated with it. Due to sensitive nature of Holy Quran, diacritics play vital role in the meaning of the particular verse. Hence, securing letters with certain diacritics will preserve the original meaning of Quranic verses in case of alternation attempt. Initial results have shown that the proposed approach is promising with less memory complexity and time complexity compared to existing approaches.
Certificates of Confidentiality: Protecting Human Subject Research Data in Law and Practice
Patel, Mayank J.; Williams, Brett A.; Austin, Jeffrey L.; Dame, Lauren A.
2014-01-01
Researchers often require and collect sensitive information about individuals to answer important scientific questions that impact individual health and well-being and the public health. Researchers recognize they have a duty to maintain the confidentiality of the data they collect and typically make promises, which are documented in the consent form. The legal interests of others, however, can threaten researchers’ promises of confidentiality, if they seek access to the data through subpoena. Certificates of Confidentiality (Certificates), authorized by federal statute, are an important tool for protecting individually identifiable sensitive research data from compelled disclosure. However, questions persist in the research community about the strength of Certificate protections, and the evidence on which to judge the strength is scant. In this article, we address those questions through a careful examination of the legislation and regulations concerning Certificates and the reported and unreported cases we have identified through our legal research and interviews with legal counsel about their experiences with Certificates. We also analyze other statutes that protect research data to compare them to the Certificate’s protections, and we review other legal strategies available for protecting research data. Based on our analysis, we conclude with recommendations for how to strengthen protection of sensitive research data. PMID:25392705
76 FR 9210 - Draft DOC National Aquaculture Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-16
... confidential business information or otherwise sensitive or protected information. All comments and attachments... and NOAA's Online Privacy Policy, we treat your name, city, state, and any comments you provide as... accusations. You may submit attachments to electronic comments in Microsoft Word, Excel, WordPerfect, or Adobe...
Wright, Caradee Y; Reddy, Tarylee; Mathee, Angela; Street, Renée A
2017-09-28
Informal workers in African market trade have little formal protection against sun exposure. We aimed to examine sun exposure, sun-related symptoms, and sun protection practices in an informal occupational setting. Trained fieldworkers asked 236 workers in the Warwick Junction market about their workplace, skin and eye sensitivity and skin colour, symptoms faced at work during the summer due to heat, and preventive measures. Data were analyzed using univariate logistic regression to assess the effect of gender and the risk of experiencing symptoms to sun exposure in relation to pre-existing diseases and perception of sun exposure as a hazard. Of the 236 participants, 234 were Black African and 141 (59.7%) were female. Portable shade was the most commonly used form of sun protection (69.9%). Glare from the sun (59.7%) and excessive sweating (57.6%) were commonly reported sun-related health symptoms. The use of protective clothing was more prevalent among those who perceived sun exposure as a hazard ( p = 0.003). In an informal occupational setting, sun exposure was high. Protective clothing and portable shade to eliminate heat and bright light were self-implemented. Action by local authorities to protect informal workers should consider sun exposure to support workers in their efforts to cope in hot weather.
49 CFR 15.15 - SSI disclosed by DOT.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.15 SSI... Freedom of Information Act (5 U.S.C. 552), the Privacy Act (5 U.S.C. 552a), and other laws, records... persons without a need to know. (b) Disclosure under the Freedom of Information Act and the Privacy Act...
49 CFR 15.15 - SSI disclosed by DOT.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.15 SSI... Freedom of Information Act (5 U.S.C. 552), the Privacy Act (5 U.S.C. 552a), and other laws, records... persons without a need to know. (b) Disclosure under the Freedom of Information Act and the Privacy Act...
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of...
Klonoff, David C; Price, W Nicholson
2017-03-01
Privacy is an important concern for the Precision Medicine Initiative (PMI) because success of this initiative will require the public to be willing to participate by contributing large amounts of genetic/genomic information and sensor data. This sensitive personal information is intended to be used only for specified research purposes. Public willingness to participate will depend on the public's level of trust that their information will be protected and kept private. Medical devices may constantly provide information. Therefore, assuring privacy for device-generated information may be essential for broad participation in the PMI. Privacy standards for devices should be an important early step in the development of the PMI.
DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)
2016-04-21
collateral, special access program, SCI, and controlled unclassified information ( CUI ) within an overarching DoD Information Security Program...classified, safeguarded, and declassified in accordance with References (c), (d), and DoD Manual 5200.01 (Reference (i)). CUI will be identified...Information will not be classified, continue to be maintained as classified, or fail to be declassified, or be designated CUI under any circumstances in
49 CFR 15.19 - Destruction of SSI.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.19... reconstruction of the information when the covered person no longer needs the SSI to carry out transportation security measures. (2) Exception. Paragraph (b)(1) of this section does not require a State or local...
49 CFR 15.19 - Destruction of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.19... reconstruction of the information when the covered person no longer needs the SSI to carry out transportation security measures. (2) Exception. Paragraph (b)(1) of this section does not require a State or local...
49 CFR 1520.9 - Restrictions on the disclosure of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.9 Restrictions on the disclosure of SSI. (a) Duty to... infrastructure information under section 214 of the Homeland Security Act, any covered person who is a Federal...
Report #16-P-0254, August 1, 2016. CSB has one system that contains sensitive PII. Safeguarding such information in the possession of the government and preventing its breach is essential to ensuring CSB retains the trust of the American public.
Accurate Filtering of Privacy-Sensitive Information in Raw Genomic Data.
Decouchant, Jérémie; Fernandes, Maria; Völp, Marcus; Couto, Francisco M; Esteves-Veríssimo, Paulo
2018-04-13
Sequencing thousands of human genomes has enabled breakthroughs in many areas, among them precision medicine, the study of rare diseases, and forensics. However, mass collection of such sensitive data entails enormous risks if not protected to the highest standards. In this article, we follow the position and argue that post-alignment privacy is not enough and that data should be automatically protected as early as possible in the genomics workflow, ideally immediately after the data is produced. We show that a previous approach for filtering short reads cannot extend to long reads and present a novel filtering approach that classifies raw genomic data (i.e., whose location and content is not yet determined) into privacy-sensitive (i.e., more affected by a successful privacy attack) and non-privacy-sensitive information. Such a classification allows the fine-grained and automated adjustment of protective measures to mitigate the possible consequences of exposure, in particular when relying on public clouds. We present the first filter that can be indistinctly applied to reads of any length, i.e., making it usable with any recent or future sequencing technologies. The filter is accurate, in the sense that it detects all known sensitive nucleotides except those located in highly variable regions (less than 10 nucleotides remain undetected per genome instead of 100,000 in previous works). It has far less false positives than previously known methods (10% instead of 60%) and can detect sensitive nucleotides despite sequencing errors (86% detected instead of 56% with 2% of mutations). Finally, practical experiments demonstrate high performance, both in terms of throughput and memory consumption. Copyright © 2018. Published by Elsevier Inc.
ERIC Educational Resources Information Center
Thaw, David Bernard
2011-01-01
Current scholarly understanding of information security regulation in the United States is limited. Several competing mechanisms exist, many of which are untested in the courts and before state regulators, and new mechanisms are being proposed on a regular basis. Perhaps of even greater concern, the pace at which technology and threats change far…
Privacy and policy for genetic research.
DeCew, Judith Wagner
2004-01-01
I begin with a discussion of the value of privacy and what we lose without it. I then turn to the difficulties of preserving privacy for genetic information and other medical records in the face of advanced information technology. I suggest three alternative public policy approaches to the problem of protecting individual privacy and also preserving databases for genetic research: (1) governmental guidelines and centralized databases, (2) corporate self-regulation, and (3) my hybrid approach. None of these are unproblematic; I discuss strengths and drawbacks of each, emphasizing the importance of protecting the privacy of sensitive medical and genetic information as well as letting information technology flourish to aid patient care, public health and scientific research.
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2014 CFR
2014-10-01
... TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of... issuance of an order requiring retrieval of SSI to remedy unauthorized disclosure or an order to cease...
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2012 CFR
2012-10-01
... TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of... issuance of an order requiring retrieval of SSI to remedy unauthorized disclosure or an order to cease...
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2013 CFR
2013-10-01
... TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of... issuance of an order requiring retrieval of SSI to remedy unauthorized disclosure or an order to cease...
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2011 CFR
2011-10-01
... TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of... issuance of an order requiring retrieval of SSI to remedy unauthorized disclosure or an order to cease...
Sharing the Knowledge: Government-Private Sector Partnerships to Enhance Information Security
2000-05-01
private sector . However, substantial barriers threaten to block information exchanges between the government and private sector . These barriers include concerns over release of sensitive material under Freedom of Information Act requests, antitrust actions, protection of business confidential and other private material, possible liability due to shared information, disclosure of classified information, and burdens entailed with cooperating with law enforcement agencies. There is good cause to believe that the government and private
2006-12-29
access to scientific and technical information (S& T ) for legitimate uses while protecting it from potential terrorists poses difficult policy choices...September 11, 2001 terrorist attacks, controls increasingly have been placed on some unclassified research and S& T information, including that used to...identify SBU information, especially S& T information; how to keep it from terrorists, while allowing access for those who need to use it; and how to
International Space Agency CIO Forum Industrial Control System (ICS) and Cyber
NASA Technical Reports Server (NTRS)
Powell, Robert
2017-01-01
This briefing covers Industrial Control System (ICS) best practices for enhancing cyber protection. The briefing provides a very high-level overview of best practices currently being pursued by NASA as well as by other US government agencies such as NIST and DHS ICS-CERT. All information presented in this slide deck is publicly available and no sensitive information is provided in these slides. These slides will be used to generate discussion around best practices within the international community in the area of ICS cyber protections.
Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components.
Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios
2009-01-01
Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 30 Mineral Resources 2 2011-07-01 2011-07-01 false What biological, physical, and socioeconomic information must accompany the DPP or DOCD? 250.247 Section 250.247 Mineral Resources BUREAU OF OCEAN ENERGY... species, marine mammals protected under the MMPA, sensitive underwater features, marine sanctuaries...
Klonoff, David C.; Price, W. Nicholson
2017-01-01
Privacy is an important concern for the Precision Medicine Initiative (PMI) because success of this initiative will require the public to be willing to participate by contributing large amounts of genetic/genomic information and sensor data. This sensitive personal information is intended to be used only for specified research purposes. Public willingness to participate will depend on the public’s level of trust that their information will be protected and kept private. Medical devices may constantly provide information. Therefore, assuring privacy for device-generated information may be essential for broad participation in the PMI. Privacy standards for devices should be an important early step in the development of the PMI. PMID:27920271
The legal implications of healthcare communications: what every pain physician needs to know.
Shomaker, T S; Ashburn, M A
2000-03-01
Accurate and sensitive communication of health care information is essential to effective patient management in the pain clinic, operating room, other health care settings. However, information relating to the health care status of a patient is sensitive and may be embarrassing or damaging if it falls into the wrong hands. Ethical cannons of medicine and statutory provisions have emphasized the obligation of the physician to safeguard patient confidences. However, threats to the confidentiality of medical information abound and are even more significant in our age of instantaneous communication characterized by the growing use of email, facsimile, and the Internet. This article outlines legal issues relating to communication in three key areas of health care law: confidentiality/breach of privacy, informed consent, and defamation. The major principles of the law in these areas are discussed and case studies are used to illustrate key points and give simple preventive strategies to help steer the delicate balance between sharing important healthcare information and protecting sensitive patient information.
National Counterintelligence Strategy of the United States of America 2016
2015-01-01
including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson...while protecting sensitive information and assets from FIE theft , manipulation, or exploitation; Identify vulnerabilities and threats to...process into supply chain operations to secure the supply chain from exploitation and reduce its vulnerability to disruption; Expand partnerships
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-28
... mt (1,102,311 lbs) of GOA Pacific cod from 1996 through 2000, and the vessel's catch history... submit confidential business information or otherwise sensitive or protected information. NMFS will... allocation of crab QS was based on a qualifying harvest history in a CR Program fishery. Each QS allocation...
Tools for groundwater protection planning: An example from McHenry County, Illinois, USA
Berg, R.C.; Curry, B. Brandon; Olshansky, R.
1999-01-01
This paper presents an approach for producing aquifer sensitivity maps from three-dimensional geologic maps, called stack-unit maps. Stack-unit maps depict the succession of geologic materials to a given depth, and aquifer sensitivity maps interpret the successions according to their ability to transmit potential contaminants. Using McHenry County, Illinois, as a case study, stack-unit maps and an aquifer sensitivity assessment were made to help land-use planners, public health officials, consultants, developers, and the public make informed decisions regarding land use. A map of aquifer sensitivity is important for planning because the county is one of the fastest growing counties in the nation, and highly vulnerable sand and gravel aquifers occur within 6 m of ground surface over 75% of its area. The aquifer sensitivity map can provide guidance to regulators seeking optimal protection of groundwater resources where these resources are particularly vulnerable. In addition, the map can be used to help officials direct waste-disposal and industrial facilities and other sensitive land-use practices to areas where the least damage is likely to occur, thereby reducing potential future liabilities.
Enhancing privacy and data protection in electronic medical environments.
Gritzalis, Stefanos
2004-12-01
Raising awareness and providing guidance to on-line data protection is by all means a crucial issue worldwide. Equally important is the issue of applying privacy-related legislation in a coherent and coordinated way. Both these topics become even more critical when referring to medical environments and thus to the protection of patients' privacy and medical data. Electronic medical transactions require the transmission of personal and medical information over insecure communication channels like the Internet. It is therefore a rather straightforward task to construct "patient profiles " that capture the electronic medical behavior of a patient, or even reveal sensitive information in regard with her/his medical history. Clearly, the consequence from maintaining such profiles is the violation of the patient's privacy. This paper studies medical environments that can support electronic medical transactions or/and the provision of medical information through the Web. Specifically it focuses on the countermeasures that the various actor categories can employ for protecting the privacy of personal and medical data transmitted during electronic medical transactions.
Knowledge management for the protection of information in electronic medical records.
Lea, Nathan; Hailes, Stephen; Austin, Tony; Kalra, Dipak
2008-01-01
This paper describes foundational work investigating the protection requirements of sensitive medical information, which is being stored more routinely in repository systems for electronic medical records. These systems have increasingly powerful sharing capabilities at the point of clinical care, in medical research and for clinical and managerial audit. The potential for sharing raises concerns about the protection of individual patient privacy and challenges the duty of confidentiality by which medical practitioners are ethically and legally bound. By analysing the protection requirements and discussing the need to apply policy-based controls to discrete items of medical information in a record, this paper suggests that this is a problem for which existing privacy management solutions are not sufficient or appropriate to the protection requirements. It proposes that a knowledge management approach is required and it introduces a new framework based on the knowledge management techniques now being used to manage electronic medical record data. The background, existing work in this area, initial investigation methods, results to date and discussion are presented, and the paper is concluded with the authors' comments on the ramifications of the work.
Protecting Patient Records from Unwarranted Access
NASA Astrophysics Data System (ADS)
Gardner, Ryan; Garera, Sujata; Rubin, Aviel D.; Rajan, Anand; Rozas, Carlos V.; Sastry, Manoj
Securing access to medical information is vital to protecting patient privacy. However, Electronic Patient Record (EPR) systems are vulnerable to a number of inside and outside threats. Adversaries can compromise EPR client machines to obtain a variety of highly sensitive information including valid EPR login credentials, without detection. Furthermore, medical staff can covertly view records of their choosing for personal interest or more malicious purposes. In particular, we observe that the lack of integrity measurement and auditability in these systems creates a potential threat to the privacy of patient information. We explore the use of virtualization and trusted computing hardware to address these problems. We identify open problems and encourage further research in the area.
Self-Protecting Security for Assured Information Sharing
2015-08-29
by Author Sophia Novitzky (Senior), Virginia Tech Mahalia Sapp (Senior), Virginia Tech Performance Sensitivity in Vertical Geothermal Energy...Harvesting Systems 9:15 AM, Annapolis Room, Student Center Residential geothermal energy systems have the potential to provide a cost-effective, low
49 CFR 1520.7 - Covered persons.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...
49 CFR 1520.7 - Covered persons.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...
49 CFR 1520.7 - Covered persons.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...
49 CFR 1520.7 - Covered persons.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...
49 CFR 1520.7 - Covered persons.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.7 Covered persons. Persons subject to the requirements of part 1520 are: (a...
Piloting a Deceased Subject Integrated Data Repository and Protecting Privacy of Relatives
Huser, Vojtech; Kayaalp, Mehmet; Dodd, Zeyno A.; Cimino, James J.
2014-01-01
Use of deceased subject Electronic Health Records can be an important piloting platform for informatics or biomedical research. Existing legal framework allows such research under less strict de-identification criteria; however, privacy of non-decedent must be protected. We report on creation of the decease subject Integrated Data Repository (dsIDR) at National Institutes of Health, Clinical Center and a pilot methodology to remove secondary protected health information or identifiable information (secondary PxI; information about persons other than the primary patient). We characterize available structured coded data in dsIDR and report the estimated frequencies of secondary PxI, ranging from 12.9% (sensitive token presence) to 1.1% (using stricter criteria). Federating decedent EHR data from multiple institutions can address sample size limitations and our pilot study provides lessons learned and methodology that can be adopted by other institutions. PMID:25954378
Piloting a deceased subject integrated data repository and protecting privacy of relatives.
Huser, Vojtech; Kayaalp, Mehmet; Dodd, Zeyno A; Cimino, James J
2014-01-01
Use of deceased subject Electronic Health Records can be an important piloting platform for informatics or biomedical research. Existing legal framework allows such research under less strict de-identification criteria; however, privacy of non-decedent must be protected. We report on creation of the decease subject Integrated Data Repository (dsIDR) at National Institutes of Health, Clinical Center and a pilot methodology to remove secondary protected health information or identifiable information (secondary PxI; information about persons other than the primary patient). We characterize available structured coded data in dsIDR and report the estimated frequencies of secondary PxI, ranging from 12.9% (sensitive token presence) to 1.1% (using stricter criteria). Federating decedent EHR data from multiple institutions can address sample size limitations and our pilot study provides lessons learned and methodology that can be adopted by other institutions.
Raisaro, Jean-Louis; McLaren, Paul J; Fellay, Jacques; Cavassini, Matthias; Klersy, Catherine; Hubaux, Jean-Pierre
2018-03-01
Protecting patient privacy is a major obstacle for the implementation of genomic-based medicine. Emerging privacy-enhancing technologies can become key enablers for managing sensitive genetic data. We studied physicians' attitude toward this kind of technology in order to derive insights that might foster their future adoption for clinical care. We conducted a questionnaire-based survey among 55 physicians of the Swiss HIV Cohort Study who tested the first implementation of a privacy-preserving model for delivering genomic test results. We evaluated their feedback on three different aspects of our model: clinical utility, ability to address privacy concerns and system usability. 38/55 (69%) physicians participated in the study. Two thirds of them acknowledged genetic privacy as a key aspect that needs to be protected to help building patient trust and deploy new-generation medical information systems. All of them successfully used the tool for evaluating their patients' pharmacogenomics risk and 90% were happy with the user experience and the efficiency of the tool. Only 8% of physicians were unsatisfied with the level of information and wanted to have access to the patient's actual DNA sequence. This survey, although limited in size, represents the first evaluation of privacy-preserving models for genomic-based medicine. It has allowed us to derive unique insights that will improve the design of these new systems in the future. In particular, we have observed that a clinical information system that uses homomorphic encryption to provide clinicians with risk information based on sensitive genetic test results can offer information that clinicians feel sufficient for their needs and appropriately respectful of patients' privacy. The ability of this kind of systems to ensure strong security and privacy guarantees and to provide some analytics on encrypted data has been assessed as a key enabler for the management of sensitive medical information in the near future. Providing clinically relevant information to physicians while protecting patients' privacy in order to comply with regulations is crucial for the widespread use of these new technologies. Copyright © 2017. Published by Elsevier Inc.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.13 Marking SSI. (a) Marking of paper records. In the case of paper records...
49 CFR 1520.19 - Destruction of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.19 Destruction of SSI. (a) DHS. Subject to the requirements of the Federal...
Access Control in Location-Based Services
NASA Astrophysics Data System (ADS)
Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.
Legal issues concerning electronic health information: privacy, quality, and liability.
Hodge, J G; Gostin, L O; Jacobson, P D
1999-10-20
Personally identifiable health information about individuals and general medical information is increasingly available in electronic form in health databases and through online networks. The proliferation of electronic data within the modern health information infrastructure presents significant benefits for medical providers and patients, including enhanced patient autonomy, improved clinical treatment, advances in health research and public health surveillance, and modern security techniques. However, it also presents new legal challenges in 3 interconnected areas: privacy of identifiable health information, reliability and quality of health data, and tortbased liability. Protecting health information privacy (by giving individuals control over health data without severely restricting warranted communal uses) directly improves the quality and reliability of health data (by encouraging individual uses of health services and communal uses of data), which diminishes tort-based liabilities (by reducing instances of medical malpractice or privacy invasions through improvements in the delivery of health care services resulting in part from better quality and reliability of clinical and research data). Following an analysis of the interconnectivity of these 3 areas and discussing existing and proposed health information privacy laws, recommendations for legal reform concerning health information privacy are presented. These include (1) recognizing identifiable health information as highly sensitive, (2) providing privacy safeguards based on fair information practices, (3) empowering patients with information and rights to consent to disclosure (4) limiting disclosures of health data absent consent, (5) incorporating industry-wide security protections, (6) establishing a national data protection authority, and (7) providing a national minimal level of privacy protections.
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram
2017-04-01
Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.
77 FR 31894 - Portable Gauge Licenses
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-30
... include safety culture, security of radioactive materials, protection of sensitive information, a revised... draft NUREG and is especially interested in receiving comments on the examples and pictures used in... following questions regarding the examples and pictures in Appendix G: 1. Do the examples for two...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-05
... otherwise sensitive or protected information. NMFS will accept anonymous comments (enter N/A in the required fields, if you wish to remain anonymous). You may submit attachments to electronic comments in Microsoft...
Using macroinvertebrate response to inform sediment criteria development in mountain streams
The phrase biologically-based sediment criterion indicates that biological data is used to develop regional sediment criteria that will protect and maintain self-sustaining populations of native sediment-sensitive biota. To develop biologically-based sediment criteria we must qua...
WILLINGNESS TO PAY FOR HEALTH PROTECTION: INADEQUATE SENSITIVITY TO PROBABILITY? (R825312)
The perspectives, information and conclusions conveyed in research project abstracts, progress reports, final reports, journal abstracts and journal publications convey the viewpoints of the principal investigator and may not represent the views and policies of ORD and EPA. Concl...
Conti, Adelaide; Delbon, Paola; Laffranchi, Laura; Paganelli, Corrado; De Ferrari, Francesco
2012-06-01
The processing of sensitive information in the health field is subject to rigorous standards that guarantee the protection of information confidentiality. Recently, the Italian Data Protection Authority (Garante per la Protezione dei Dati Personali) stated their formal opinion on a standard procedure in dental offices involving the submission of a questionnaire that includes the patient's health status. HIV infection status is included on the form. The Authority has stated that all health data collection must be in accordance with the current Italian normative framework for personal data protection and respect the patient's freedom. This freedom allows the patient to decide, in a conscious and responsible way, whether to share health information with health personnel without experiencing any prejudice in the provision of healthcare requested. Moreover, data collection must be relevant and cannot exceed the principles of treatment goals with reference to the specific care of the concerned person. However, the need for recording information regarding HIV infection at the first appointment, regardless of the clinical intervention or therapeutic plan that needs to be conducted, should not alter the standard protection measures of the healthcare staff. In fact, these measures are adopted for every patient.
49 CFR 15.11 - Persons with a need to know.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.11... circumstances: (1) When the person requires access to specific SSI to carry out transportation security... training to carry out transportation security activities approved, accepted, funded, recommended, or...
49 CFR 15.11 - Persons with a need to know.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.11... circumstances: (1) When the person requires access to specific SSI to carry out transportation security... training to carry out transportation security activities approved, accepted, funded, recommended, or...
A Tamper-Resistant and Portable Healthcare Folder
Anciaux, Nicolas; Berthelot, Morgane; Braconnier, Laurent; Bouganim, Luc; De la Blache, Martine; Gardarin, Georges; Kesmarszky, Philippe; Lartigue, Sophie; Navarre, Jean-François; Pucheral, Philippe; Vandewalle, Jean-Jacques; Zeitouni, Karine
2008-01-01
Electronic health record (EHR) projects have been launched in most developed countries to increase the quality of healthcare while decreasing its cost. The benefits provided by centralizing the healthcare information in database systems are unquestionable in terms of information quality, availability, and protection against failure. Yet, patients are reluctant to give to a distant server the control over highly sensitive data (e.g., data revealing a severe or shameful disease). This paper capitalizes on a new hardware portable device, associating the security of a smart card to the storage capacity of a USB key, to give back to the patient the control over his medical data. This paper shows how this device can complement a traditional EHR server to (1) protect and share highly sensitive data among trusted parties and (2) provide a seamless access to the data even in disconnected mode. The proposed architecture is experimented in the context of a medicosocial network providing medical care and social services at home for elderly people. PMID:18615200
Spectral Anonymization of Data
Lasko, Thomas A.; Vinterbo, Staal A.
2011-01-01
The goal of data anonymization is to allow the release of scientifically useful data in a form that protects the privacy of its subjects. This requires more than simply removing personal identifiers from the data, because an attacker can still use auxiliary information to infer sensitive individual information. Additional perturbation is necessary to prevent these inferences, and the challenge is to perturb the data in a way that preserves its analytic utility. No existing anonymization algorithm provides both perfect privacy protection and perfect analytic utility. We make the new observation that anonymization algorithms are not required to operate in the original vector-space basis of the data, and many algorithms can be improved by operating in a judiciously chosen alternate basis. A spectral basis derived from the data’s eigenvectors is one that can provide substantial improvement. We introduce the term spectral anonymization to refer to an algorithm that uses a spectral basis for anonymization, and we give two illustrative examples. We also propose new measures of privacy protection that are more general and more informative than existing measures, and a principled reference standard with which to define adequate privacy protection. PMID:21373375
Prevention of Information Leakage by Photo-Coupling in Smart Card
NASA Astrophysics Data System (ADS)
Shen, Sung-Shiou; Chiu, Jung-Hui
Advances in smart card technology encourages smart card use in more sensitive applications, such as storing important information and securing application. Smart cards are however vulnerable to side channel attacks. Power consumption and electromagnetic radiation of the smart card can leak information about the secret data protected by the smart card. Our paper describes two possible hardware countermeasures that protect against side channel information leakage. We show that power analysis can be prevented by adopting photo-coupling techniques. This method involves the use of LED with photovoltaic cells and photo-couplers on the power, reset, I/O and clock lines of the smart card. This method reduces the risk of internal data bus leakage on the external data lines. Moreover, we also discuss the effectiveness of reducing electromagnetic radiation by using embedded metal plates.
Privacy, consent, and the electronic mental health record: The Person vs. the System.
Clemens, Norman A
2012-01-01
As electronic health record systems become widely adopted and proposals are advanced to integrate mental health with general health systems, there is mounting pressure to include mental health information on the same basis as general health information without any requirement for active, individual patient consent to do so. A prime example is the current effort to change the Mental Health Information Act of the District of Columbia, which has, up till now, stood as a model for protection of the privacy of patients with mental illness, the requirement of informed consent for disclosure of health information, and delimitation of minimum necessary disclosure. Mental health information is exceptionally sensitive and potentially damaging if privacy is breached, which makes patients reluctant to seek treatment if they cannot be assured of confidentiality. In addition, there have been spectacular breaches of the security of large electronic health record databases. A subtle but more likely threat is the possibility that mental health information in networks could be fully accessible to all of the patient's providers in a network, not just those for whom it would be necessary to the patient's care. In the 1996 Supreme Court decision in Jaffee v. Redmond, the high court recognized that confidentiality is essential for patients to engage in effective psychotherapy, and HIPAA maintains that special status in the protection of psychotherapy notes as well as explicitly stating that it defers to state laws that are more protective of confidentiality than is HIPAA itself. Highly sensitive information also exists in mental health records aside from psychotherapy notes. Any change in the laws that govern informed consent for disclosure of mental health information must take these factors into account. Specifically, the author opposes any change that would assume tacit consent to release mental health information through an electronic health information exchange in the absence of a patient-initiated request to "opt out"; the requirement that the patient give active, informed and non-coerced consent to disclose information--"opt in"--must be preserved.
32 CFR 767.7 - Conditions of permits.
Code of Federal Regulations, 2010 CFR
2010-07-01
... GUIDELINES FOR ARCHEOLOGICAL RESEARCH PERMITS ON SHIP AND AIRCRAFT WRECKS UNDER THE JURISDICATION OF THE... to submit to NHC a working and diving log listing days spent in field research, activities pursued... protect all sensitive information regarding the location and character of the wreck site that could...
49 CFR 1520.11 - Persons with a need to know.
Code of Federal Regulations, 2010 CFR
2010-10-01
....11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.11 Persons with a need to know. (a) In general. A person has a need to...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
Kankara, R S; Arockiaraj, S; Prabhu, K
2016-05-15
Integration of oil spill modeling with coastal resource information could be useful for protecting the coastal environment from oil spills. A scenario-based risk assessment and sensitivity indexing were performed for the Chennai coast by integrating a coastal resource information system and an oil spill trajectory model. The fate analysis of spilled oil showed that 55% of oil out of a total volume of 100m(3) remained in the water column, affecting 800m of the shoreline. The seasonal scenarios show major impact during the southwest (SW) and northeast (NE) monsoons and more fatal effects on marine pelagic organisms during SW monsoon. The Oil Spill Risk Assessment Modeler tool was constructed in a geographic information systems (GIS) platform to analyze the risks, sensitivity mapping, and priority indexing of resources that are likely to be affected by oil spills along the Chennai coast. The results of sensitivity mapping and the risk assessment results can help organizations take measures to combat oil spills in a timely manner. Copyright © 2016 Elsevier Ltd. All rights reserved.
Performance evaluation of various K- anonymity techniques
NASA Astrophysics Data System (ADS)
Maheshwarkar, Nidhi; Pathak, Kshitij; Chourey, Vivekanand
2011-12-01
Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked with the private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. This paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. This paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.
School Violence: Getting the Records.
ERIC Educational Resources Information Center
Stiff, Carol Wilcox
When violence involving students erupts at school, journalists generally are faced with obtaining important records to substantiate their stories. To do that, they must cope with privacy laws that protect student records from abuse, state laws that prohibit the release of information about juveniles involved in crime, and the sensitive nature of…
75 FR 4569 - Government-Owned Inventions; Availability for Licensing
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-28
... [email protected] for more information. Imaging of Extracellular Proteases in Cells Using Mutant.... Fortunately, this is one of the least deadly cancers; the percentage of people living at least 5 years after... and sensitive methods for in vivo, in vitro, or ex vivo imaging of specific extracellular protease...
78 FR 17943 - Draft Program-Specific Guidance About Fixed Gauge Licenses
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-25
... is requesting public comment on draft NUREG-1556, Volume 4, Revision 1, ``Consolidated Guidance About... sensitive information, and changes in regulatory policies and practices. This document is intended for use...-415- 4737, or by email to [email protected] . The draft NUREG-1556, Volume 4, Revision 1, is...
32 CFR Appendix C to Part 290 - For Official Use Only
Code of Federal Regulations, 2011 CFR
2011-07-01
... limited within the FAO to one protected office copy. (3) Storage. (i) All Field Detachment sensitive... container controlled by the FAO manager. (ii) Permanent files currently maintained by regular DCAA offices, which are available to all FAO personnel, should not contain any detailed information on Field...
Privacy preserving data anonymization of spontaneous ADE reporting system dataset.
Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng
2016-07-18
To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three different threshold settings for sensitive value, our method can successively prevent the disclosure of sensitive values (nearly all observed DRs are zeros) without sacrificing too much of data utility. With non-uniform threshold setting, level-wise or frequency-based, our MS(k, θ (*))-bounding exhibits the best data utility and the least privacy risk among all the models. The experiments conducted on selected ADR signals from MedWatch show that only very small difference on signal strength (PRR or ROR) were observed. The results show that our method can effectively prevent the disclosure of patient sensitive information without sacrificing data utility for ADR signal detection. We propose a new privacy model for protecting SRS data that possess some characteristics overlooked by contemporary models and an anonymization algorithm to sanitize SRS data in accordance with the proposed model. Empirical evaluation on the real SRS dataset, i.e., FAERS, shows that our method can effectively solve the privacy problem in SRS data without influencing the ADR signal strength.
Approach to spatial information security based on digital certificate
NASA Astrophysics Data System (ADS)
Cong, Shengri; Zhang, Kai; Chen, Baowen
2005-11-01
With the development of the online applications of geographic information systems (GIS) and the spatial information services, the spatial information security becomes more important. This work introduced digital certificates and authorization schemes into GIS to protect the crucial spatial information combining the techniques of the role-based access control (RBAC), the public key infrastructure (PKI) and the privilege management infrastructure (PMI). We investigated the spatial information granularity suited for sensitivity marking and digital certificate model that fits the need of GIS security based on the semantics analysis of spatial information. It implements a secure, flexible, fine-grained data access based on public technologies in GIS in the world.
Diergaarde, Brenda; Bowen, Deborah J; Ludman, Evette J; Culver, Julie O; Press, Nancy; Burke, Wylie
2007-03-15
Genetic information is used increasingly in health care. Some experts have argued that genetic information is qualitatively different from other medical information and, therefore, raises unique social issues. This view, called "genetic exceptionalism," has importantly influenced recent policy efforts. Others have argued that genetic information is like other medical information and that treating it differently may actually result in unintended disparities. Little is known about how the general public views genetic information. To identify opinions about implications of genetic and other medical information among the general population, we conducted a series of focus groups in Seattle, WA. Participants were women and men between ages 18 and 74, living within 30 miles of Seattle and members of the Group Health Cooperative. A structured discussion guide was used to ensure coverage of all predetermined topics. Sessions lasted approximately 2 hr; were audio taped and transcribed. The transcripts formed the basis of the current analysis. Key findings included the theme that genetic information was much like other medical information and that all sensitive medical information should be well protected. Personal choice (i.e., the right to choose whether to know health risk information and to control who else knows) was reported to be of crucial importance. Participants had an understanding of the tensions involved in protecting privacy versus sharing medical information to help another person. These data may guide future research and policy concerning the use and protection of medical information, including genetic information. (c) 2007 Wiley-Liss, Inc.
[Ethical considerations in genomic cohort study].
Choi, Eun Kyung; Kim, Ock-Joo
2007-03-01
During the last decade, genomic cohort study has been developed in many countries by linking health data and genetic data in stored samples. Genomic cohort study is expected to find key genetic components that contribute to common diseases, thereby promising great advance in genome medicine. While many countries endeavor to build biobank systems, biobank-based genome research has raised important ethical concerns including genetic privacy, confidentiality, discrimination, and informed consent. Informed consent for biobank poses an important question: whether true informed consent is possible in population-based genomic cohort research where the nature of future studies is unforeseeable when consent is obtained. Due to the sensitive character of genetic information, protecting privacy and keeping confidentiality become important topics. To minimize ethical problems and achieve scientific goals to its maximum degree, each country strives to build population-based genomic cohort research project, by organizing public consultation, trying public and expert consensus in research, and providing safeguards to protect privacy and confidentiality.
Sparling, Alica Stubnova; Martin, David W; Posey, Lillian B
2017-06-14
Citing a lack of information, the U.S. Environmental Protection Agency prudently did not account for the benefits of averting many chronic diseases in analyzing the Worker Protection Standards (WPS) revisions. We demonstrate that sufficient information can exist, using the example of the benefits to agricultural workers of reduced Parkinson's disease (PD) due to reduced pesticide exposure. We define the benefits as the monetary value gained by improving quality of lives of people who would otherwise develop PD, plus the value of medical care cost averted and income not lost due to being healthy. For estimation, we use readily available parameters and obtain odds ratios of developing PD by conducting a meta-analysis of studies linking pesticide exposure to PD. The sensitivity analysis varies the number of agricultural workers affected by the regulation, the probability of being diagnosed with PD, the measurement and the timing of the benefits. Our initial assessment is that the reduced PD benefits would be a small fraction of the total WPS revision costs. However, if we define benefits as the common environmental economics willingness to pay to avoid PD incidence, then they become a substantial fraction of the costs. Our analysis demonstrates that the benefits of averting PD from the WPS revisions can be estimated using existing information, and that the results are most sensitive to the choice of valuation of benefits to the worker. We encourage other researchers to extend our framework to other chronic ailments.
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services
NASA Astrophysics Data System (ADS)
Khoshgozaran, Ali; Shahabi, Cyrus
The ubiquity of smartphones and other location-aware hand-held devices has resulted in a dramatic increase in popularity of location-based services (LBS) tailored to user locations. The comfort of LBS comes with a privacy cost. Various distressing privacy violations caused by sharing sensitive location information with potentially malicious services have highlighted the importance of location privacy research aiming to protect user privacy while interacting with LBS.
Parental overprotection increases interpersonal sensitivity in healthy subjects.
Otani, Koichi; Suzuki, Akihito; Matsumoto, Yoshihiko; Kamata, Mitsuhiro
2009-01-01
The effect of parental rearing on interpersonal sensitivity was studied in 469 Japanese volunteers. Perceived parental rearing was assessed by the Parental Bonding Instrument, which consists of the factors of care and protection, and interpersonal sensitivity was measured by the Interpersonal Sensitivity Measure (IPSM). In male subjects, higher IPSM scores were related to higher scores of paternal protection (P < .01) and maternal protection (P < .05). In female subjects, higher IPSM scores were related to higher scores of maternal protection (P < .001). The present study suggests that in both males and females, interpersonal sensitivity is increased by high protection of the same-sex parents and that in males there is an additional effect of high maternal protection.
Wildlife studies on the Hanford site: 1994 Highlights report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cadwell, L.L.
The purposes of the project are to monitor and report trends in wildlife populations; conduct surveys to identify, record, and map populations of threatened, endangered, and sensitive plant and animal species; and cooperate with Washington State and federal and private agencies to help ensure the protection afforded by law to native species and their habitats. Census data and results of surveys and special study topics are shared freely among cooperating agencies. Special studies are also conducted as needed to provide additional information that may be required to assess, protect, or manage wildlife resources at Hanford. This report describes highlights ofmore » wildlife studies on the Site in 1994. Redd counts of fall chinook salmon in the Hanford Reach suggest that harvest restrictions directed at protecting Snake River salmon may have helped Columbia River stocks as well. The 1994 count (5619) was nearly double that of 1993 and about 63% of the 1989 high of approximately 9000. A habitat map showing major vegetation and land use cover types for the Hanford Site was completed in 1993. During 1994, stochastic simulation was used to estimate shrub characteristics (height, density, and canopy cover) across the previously mapped Hanford landscape. The information provided will be available for use in determining habitat quality for sensitive wildlife species. Mapping Site locations of plant species of concern continued during 1994. Additional sensitive plant species data from surveys conducted by TNC were archived. The 10 nesting pairs of ferruginous hawks that used the Hanford Site in 1993 represented approximately 25% of the Washington State population.« less
Kabir, Muhammad N.; Alginahi, Yasser M.
2014-01-01
This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247
NASA Astrophysics Data System (ADS)
Aldeen Yousra, S.; Mazleena, Salleh
2018-05-01
Recent advancement in Information and Communication Technologies (ICT) demanded much of cloud services to sharing users’ private data. Data from various organizations are the vital information source for analysis and research. Generally, this sensitive or private data information involves medical, census, voter registration, social network, and customer services. Primary concern of cloud service providers in data publishing is to hide the sensitive information of individuals. One of the cloud services that fulfill the confidentiality concerns is Privacy Preserving Data Mining (PPDM). The PPDM service in Cloud Computing (CC) enables data publishing with minimized distortion and absolute privacy. In this method, datasets are anonymized via generalization to accomplish the privacy requirements. However, the well-known privacy preserving data mining technique called K-anonymity suffers from several limitations. To surmount those shortcomings, I propose a new heuristic anonymization framework for preserving the privacy of sensitive datasets when publishing on cloud. The advantages of K-anonymity, L-diversity and (α, k)-anonymity methods for efficient information utilization and privacy protection are emphasized. Experimental results revealed the superiority and outperformance of the developed technique than K-anonymity, L-diversity, and (α, k)-anonymity measure.
Gritzalis, Stefanos; Lambrinoudakis, Costas; Lekkas, Dimitrios; Deftereos, Spyros
2005-09-01
Raising awareness and providing guidance to on-line data protection is undoubtedly a crucial issue worldwide. Equally important is the issue of applying privacy-related legislation in a coherent and coordinated way. Both these topics gain extra attention when referring to medical environments and, thus, to the protection of patients' privacy and medical data. Electronic medical transactions require the transmission of personal and medical information over insecure communication channels like the Internet. It is, therefore, a rather straightforward task to capture the electronic medical behavior of a patient, thus constructing "patient profiles," or reveal sensitive information related to a patient's medical history. The consequence is clearly a potential violation of the patient's privacy. We performed a risk analysis study for a Greek shared care environment for the treatment of patients suffering from beta-thalassemia, an empirically embedded scenario that is representative of many other electronic medical environments; we capitalized on its results to provide an assessment of the associated risks, focusing on the description of countermeasures, in the form of technical guidelines that can be employed in such medical environments for protecting the privacy of personal and medical information.
A qualitative study of women's views on medical confidentiality
Jenkins, G; Merz, J; Sankar, P
2005-01-01
Context: The need to reinvigorate medical confidentiality protections is recognised as an important objective in building patient trust necessary for successful health outcomes. Little is known about patient understanding and expectations from medical confidentiality. Objective: To identify and describe patient views of medical confidentiality and to assess provisionally the range of these views. Design: Qualitative study using indepth, open ended face-to-face interviews. Setting: Southeastern Pennsylvania and southern New Jersey, USA. Participants: A total of 85 women interviewed at two clinical sites and three community/research centres. Main outcome measures: Subjects' understanding of medical confidentiality, beliefs about the handling of confidential information and concerns influencing disclosure of information to doctors. Results: The subjects defined medical confidentiality as the expectation that something done or said would be kept "private" but differed on what information was confidential and the basis and methods for protecting information. Some considered all medical information as confidential and thought confidentiality protections functioned to limit its circulation to medical uses and reimbursement needs. Others defined only sensitive or potentially stigmatising information as confidential. Many of these also defined medical confidentiality as a strict limit prohibiting information release, although some noted that specific permission or urgent need could override this limit. Conclusions: Patients share a basic understanding of confidentiality as protection of information, but some might have expectations that are likely not met by current practice nor anticipated by doctors. Doctors should recognise that patients might have their own medical confidentiality models. They should address divergences from current practice and provide support to those who face emotional or practical obstacles to self-revelation. PMID:16131550
Privacy-Preserving and Usable Data Publishing and Analysis
ERIC Educational Resources Information Center
Shen, Entong
2013-01-01
In the current digital world, data is becoming an increasingly valuable resource and the demand for sharing or releasing data has never been higher. Organizations need to make available versions of the data they collected for business or legal reasons and at the same time they are under strong obligation to protect sensitive information about…
49 CFR 1520.15 - SSI disclosed by TSA or the Coast Guard.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.15 SSI disclosed by TSA or the Coast Guard. (a) In... allegations contained in a legal enforcement action document issued by TSA or the Coast Guard. (2) Security...
76 FR 61670 - Receipt of an Application for Incidental Take Permit (16230)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-05
... sensitive or protected information. NMFS will accept anonymous comments (enter ``N/A'' in the required... incidental to, and not the purpose of, otherwise lawful activities. Section 10(a)(1)(B) of the ESA provides... species are included in the conservation plan and Permit application: Loggerhead (Caretta caretta), green...
Logistic Map for Cancellable Biometrics
NASA Astrophysics Data System (ADS)
Supriya, V. G., Dr; Manjunatha, Ramachandra, Dr
2017-08-01
This paper presents design and implementation of secured biometric template protection system by transforming the biometric template using binary chaotic signals and 3 different key streams to obtain another form of template and demonstrating its efficiency by the results and investigating on its security through analysis including, key space analysis, information entropy and key sensitivity analysis.
CLARUS as a Cloud Security Framework: e-Health Use Case.
Vidal, David; Iriso, Santiago; Mulero, Rafael
2017-01-01
Maintaining Passive Medical Health Records (PMHR) is an increasing cost and resource consumption problem. Moving to the cloud is the clearest solution to solve the problem as it offers a high amount of space and computation power. But the cloud is not safe enough when dealing with this kind of information because it can be easily accessed by attackers. The European Commission funded research project CLARUS contributes to protect healthcare-sensitive information in a secure way.
Certificates of Confidentiality: Protecting Human Subject Research Data in Law and Practice.
Wolf, Leslie E; Patel, Mayank J; Williams Tarver, Brett A; Austin, Jeffrey L; Dame, Lauren A; Beskow, Laura M
2015-01-01
The federal Certificate of Confidentiality plays an important role in research on sensitive topics by authorizing researchers to refuse to disclose identifiable research data in response to subpoenas in any legal setting. However, there is little known about how effective Certificates are in practice. This article draws on our legal and empirical research on this topic to fill this information gap. It includes a description of the purpose of Certificates, their legislative and regulatory history, and a summary of the few reported and unreported cases that have dealt with Certificates. In addition, we outline other statutory confidentiality protections, compare them to the Certificate's protections, and analyze some of the vulnerabilities of a Certificate's protections. This analysis allows us to make specific recommendations for strengthening the protections afforded to research data. © 2015 American Society of Law, Medicine & Ethics, Inc.
Routes for breaching and protecting genetic privacy
Erlich, Yaniv; Narayanan, Arvind
2014-01-01
We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these datasets is vital for progress in biomedical research. However, one growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, point to the underlying assumptions, and assess its technological complexity and maturation. We then review potential mitigation methods for privacy-preserving dissemination of sensitive data and highlight different cases that are relevant to genetic applications. PMID:24805122
Routes for breaching and protecting genetic privacy.
Erlich, Yaniv; Narayanan, Arvind
2014-06-01
We are entering an era of ubiquitous genetic information for research, clinical care and personal curiosity. Sharing these data sets is vital for progress in biomedical research. However, a growing concern is the ability to protect the genetic privacy of the data originators. Here, we present an overview of genetic privacy breaching strategies. We outline the principles of each technique, indicate the underlying assumptions, and assess their technological complexity and maturation. We then review potential mitigation methods for privacy-preserving dissemination of sensitive data and highlight different cases that are relevant to genetic applications.
CFD Analysis of Flexible Thermal Protection System Shear Configuration Testing in the LCAT Facility
NASA Technical Reports Server (NTRS)
Ferlemann, Paul G.
2014-01-01
This paper documents results of computational analysis performed after flexible thermal protection system shear configuration testing in the LCAT facility. The primary objectives were to predict the shear force on the sample and the sensitivity of all surface properties to the shape of the sample. Bumps of 0.05, 0.10,and 0.15 inches were created to approximate the shape of some fabric samples during testing. A large amount of information was extracted from the CFD solutions for comparison between runs and also current or future flight simulations.
Lightning protection: challenges, solutions and questionable steps in the 21st century
NASA Astrophysics Data System (ADS)
Berta, István
2011-06-01
Besides the special primary lightning protection of extremely high towers, huge office and governmental buildings, large industrial plants and resident parks most of the challenges were connected to the secondary lightning protection of sensitive devices in Information and Communication Technology. The 70 year history of Budapest School of Lightning Protection plays an important role in the research and education of lightning and development of lightning protection. Among results and solutions the Rolling Sphere designing method (RS) and the Probability Modulated Attraction Space (PMAS) theory are detailed. As a new field Preventive Lightning Protection (PLP) has been introduced. The PLP method means the use of special preventive actions only for the duration of the thunderstorm. Recently several non-conventional lightning protection techniques have appeared as competitors of the air termination systems formed of conventional Franklin rods. The questionable steps, non-conventional lightning protection systems reported in the literature are the radioactive lightning rods, Early Streamer Emission (ESE) rods and Dissipation Arrays (sometimes called Charge Transfer Systems).
Basis of the Massachusetts reference dose and drinking water standard for perchlorate.
Zewdie, Tsedash; Smith, C Mark; Hutcheson, Michael; West, Carol Rowan
2010-01-01
Perchlorate inhibits the uptake of iodide in the thyroid. Iodide is required to synthesize hormones critical to fetal and neonatal development. Many water supplies and foods are contaminated with perchlorate. Exposure standards are needed but controversial. Here we summarize the basis of the Massachusetts (MA) perchlorate reference dose (RfD) and drinking water standard (DWS), which are considerably lower and more health protective than related values derived by several other agencies. We also review information regarding perchlorate risk assessment and policy. MA Department of Environmental Protection (DEP) scientists, with input from a science advisory committee, assessed a wide range of perchlorate risk and exposure information. Health outcomes associated with iodine insufficiency were considered, as were data on perchlorate in drinking water disinfectants. We used a weight-of-the-evidence approach to evaluate perchlorate risks, paying particular attention to sensitive life stages. A health protective RfD (0.07 microg/kg/day) was derived using an uncertainty factor approach with perchlorate-induced iodide uptake inhibition as the point of departure. The MA DWS (2 microg/L) was based on risk management decisions weighing information on perchlorate health risks and its presence in certain disinfectant solutions used to treat drinking water for pathogens. Current data indicate that perchlorate exposures attributable to drinking water in individuals at sensitive life stages should be minimized and support the MA DEP perchlorate RfD and DWS. Widespread exposure to perchlorate and other thyroid toxicants in drinking water and foods suggests that more comprehensive policies to reduce overall exposures and enhance iodine nutrition are needed.
[Fitness of workers with particular sensitivity to non-ionizing radiation].
Moccaldi, R; Grandi, C
2011-01-01
Chapter IV and V of Title VIII of D.Lgs 81/2008, implementing the Directives 2004/40/EC respectively (protection of workers exposed to electromagnetic fields) and 2006/25/EC (protection of workers exposed to artificial optical radiation), make frequent reference to the workers as "at particular risk" namely those workers who, by their biological or pathological characteristics, lifestyles, multiple exposure to other risk factors, may be more susceptible to the effects of electromagnetic fields or optical radiation. The identification of workers with particular sensitivity is essential for health surveillance, in particular regarding the determination of fitness. The operational guidance on Title VIII of D.Lgs 81/2008 drafted by the Italian Technical Coordination for Safety in the workplace of Regions and Autonomous Provinces (Document No. 1-2009), in collaboration with ISPESL and ISS, includes a preliminary identification of the categories of workers considered most susceptible to the risk from exposure to electromagnetic fields and optical radiation. On the basis of this information the authors identified more focused and structured classes of workers to be considered as "particularly sensitive to risk", it is not only related to a specific wavelength, but based on a comprehensive risk assessment in individual exposure situation, with regard to the exposure levels, any multiple exposures, the possibility of adequate personal protection.
Wiener, Judith A; Gilliland, Anne T
2011-01-01
The investigation provides recommendations for establishing institutional collection guidelines and policies that protect the integrity of the historical record, while upholding the privacy and confidentiality of those who are protected by Health Insurance Portability and Accountability Act (HIPAA) or professional ethical standards. The authors completed a systematic historical investigation of the concepts of collection integrity, privacy, and confidentiality in the formal and informal legal and professional ethics literature and applied these standards to create best practices for institutional policies in these areas. Through an in-depth examination of the historical concepts of privacy and confidentiality in the legal and professional ethics literature, the authors were able to create recommendations that would allow institutions to provide access to important, yet sensitive, materials, while complying with the standards set by HIPAA regulations and professional ethical expectations. With thoughtful planning, it is possible to balance the integrity of and access to the historical record of sensitive documents, while supporting the privacy protections of HIPAA and professional ethical standards. Although it is theorized that collection development policies of institutions have changed due to HIPAA legislation, additional research is suggested to see how various legal interpretations have affected the integrity of the historical record in actuality.
Hsueh, Kuei-Hsiang; Bachman, Jean A; Richardson, Lloyd I; Cheng, Wen-Yung; Zimmerman, Rick S
2014-04-01
In this study, we explored the role of reciprocal filial values in protecting the wellbeing of Chinese adult-child caregivers in the US. Using survey data obtained from 137 Chinese adult-child caregivers living in seven US cities, we tested a latent variable model using structural equation modeling. In this model, informed by role theory, social exchange theory and stress-coping theory, reciprocal filial values affect caregiver wellbeing in the face of caregiver role strain, both directly and indirectly through protective effects of role rewards and coping. In the final model, reciprocal filial values had both direct and indirect protective effects on caregivers' wellbeing, offering evidence to address culturally sensitive issues in family caregivers with similar filial values. © 2014 Wiley Periodicals, Inc.
40 CFR 766.18 - Method sensitivity.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 32 2012-07-01 2012-07-01 false Method sensitivity. 766.18 Section 766.18 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS General Provisions § 766.18 Method sensitivity. The target level of...
40 CFR 766.18 - Method sensitivity.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 31 2011-07-01 2011-07-01 false Method sensitivity. 766.18 Section 766.18 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS General Provisions § 766.18 Method sensitivity. The target level of...
40 CFR 766.18 - Method sensitivity.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 32 2013-07-01 2013-07-01 false Method sensitivity. 766.18 Section 766.18 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS General Provisions § 766.18 Method sensitivity. The target level of...
40 CFR 766.18 - Method sensitivity.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 31 2014-07-01 2014-07-01 false Method sensitivity. 766.18 Section 766.18 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS General Provisions § 766.18 Method sensitivity. The target level of...
40 CFR 766.18 - Method sensitivity.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Method sensitivity. 766.18 Section 766.18 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS General Provisions § 766.18 Method sensitivity. The target level of...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Philippe, Sebastien
A system that can compare physical objects while potentially protecting sensitive information about the objects themselves has been demonstrated experimentally at the U.S. Department of Energy’s (DOE) Princeton Plasma Physics Laboratory (PPPL). This work, by researchers at Princeton University and PPPL, marks an initial confirmation of the application of a powerful cryptographic technique in the physical world. Graduate student Sébastien Philippe discusses the experiment.
The effect of public disclosure laws on biomedical research.
Cardon, Andrew D; Bailey, Matthew R; Bennett, B Taylor
2012-05-01
The Freedom of Information Act (FOIA) and state 'open-records' laws govern access to records in the possession of federal agencies and state entities, such as public universities. Although these laws are intended to promote 'open government' and to assure the existence of an informed citizenry capable of holding government officials accountable for their decisions, an inherent tension exists between the public's access to information and biomedical research institutions' need to ensure the confidentiality of proprietary records and to protect the personal safety of employees. Recognizing these and other conflicts, the federal FOIA and state public-disclosure laws contain express exemptions to protect sensitive information from disclosure. Although some state open-records laws are modeled after the federal FOIA, important differences exist based on the language used by the state law, court interpretations, and exemptions. Two specific types of exemptions are particularly relevant to research facilities: exemptions for research information and exemptions for personal information. Responding to FOIA and state open-records requests requires knowledge of relevant laws and the involvement of all interested parties to facilitate a coordinated and orderly response.
Gerard, Perry; Kapadia, Neil; Acharya, Jay; Chang, Patricia T; Lefkovitz, Zvi
2013-12-01
The purpose of this article is to review the steps that can be taken to ensure secure transfer of information over public and home networks, given the increasing utilization of mobile devices in radiology. With the rapid technologic developments in radiology, knowledge of various technical aspects is crucial for any practicing radiologist. Utilization of mobile devices, such as laptops, tablets, and even cellular phones, for reading radiologic studies has become increasingly prevalent. With such usage comes a need to ensure that both the user's and the patient's private information is protected. There are several steps that can be taken to protect sensitive information while using public networks. These steps include being diligent in reviewing the networks to which one connects, ensuring encrypted connections to web-sites, using strong passwords, and using a virtual private network and a firewall. As the role of information technology in modern radiology practice becomes more critical, these safety mechanisms must be addressed when viewing studies on any mobile device.
Geomasking sensitive health data and privacy protection: an evaluation using an E911 database.
Allshouse, William B; Fitch, Molly K; Hampton, Kristen H; Gesink, Dionne C; Doherty, Irene A; Leone, Peter A; Serre, Marc L; Miller, William C
2010-10-01
Geomasking is used to provide privacy protection for individual address information while maintaining spatial resolution for mapping purposes. Donut geomasking and other random perturbation geomasking algorithms rely on the assumption of a homogeneously distributed population to calculate displacement distances, leading to possible under-protection of individuals when this condition is not met. Using household data from 2007, we evaluated the performance of donut geomasking in Orange County, North Carolina. We calculated the estimated k-anonymity for every household based on the assumption of uniform household distribution. We then determined the actual k-anonymity by revealing household locations contained in the county E911 database. Census block groups in mixed-use areas with high population distribution heterogeneity were the most likely to have privacy protection below selected criteria. For heterogeneous populations, we suggest tripling the minimum displacement area in the donut to protect privacy with a less than 1% error rate.
Geomasking sensitive health data and privacy protection: an evaluation using an E911 database
Allshouse, William B; Fitch, Molly K; Hampton, Kristen H; Gesink, Dionne C; Doherty, Irene A; Leone, Peter A; Serre, Marc L; Miller, William C
2010-01-01
Geomasking is used to provide privacy protection for individual address information while maintaining spatial resolution for mapping purposes. Donut geomasking and other random perturbation geomasking algorithms rely on the assumption of a homogeneously distributed population to calculate displacement distances, leading to possible under-protection of individuals when this condition is not met. Using household data from 2007, we evaluated the performance of donut geomasking in Orange County, North Carolina. We calculated the estimated k-anonymity for every household based on the assumption of uniform household distribution. We then determined the actual k-anonymity by revealing household locations contained in the county E911 database. Census block groups in mixed-use areas with high population distribution heterogeneity were the most likely to have privacy protection below selected criteria. For heterogeneous populations, we suggest tripling the minimum displacement area in the donut to protect privacy with a less than 1% error rate. PMID:20953360
Protection of microelectronic devices during packaging
Peterson, Kenneth A.; Conley, William R.
2002-01-01
The present invention relates to a method of protecting a microelectronic device during device packaging, including the steps of applying a water-insoluble, protective coating to a sensitive area on the device; performing at least one packaging step; and then substantially removing the protective coating, preferably by dry plasma etching. The sensitive area can include a released MEMS element. The microelectronic device can be disposed on a wafer. The protective coating can be a vacuum vapor-deposited parylene polymer, silicon nitride, metal (e.g. aluminum or tungsten), a vapor deposited organic material, cynoacrylate, a carbon film, a self-assembled monolayered material, perfluoropolyether, hexamethyldisilazane, or perfluorodecanoic carboxylic acid, silicon dioxide, silicate glass, or combinations thereof. The present invention also relates to a method of packaging a microelectronic device, including: providing a microelectronic device having a sensitive area; applying a water-insoluble, protective coating to the sensitive area; providing a package; attaching the device to the package; electrically interconnecting the device to the package; and substantially removing the protective coating from the sensitive area.
Temporary coatings for protection of microelectronic devices during packaging
Peterson, Kenneth A.; Conley, William R.
2005-01-18
The present invention relates to a method of protecting a microelectronic device during device packaging, including the steps of applying a water-insoluble, temporary protective coating to a sensitive area on the device; performing at least one packaging step; and then substantially removing the protective coating, preferably by dry plasma etching. The sensitive area can include a released MEMS element. The microelectronic device can be disposed on a wafer. The protective coating can be a vacuum vapor-deposited parylene polymer, silicon nitride, metal (e.g. aluminum or tungsten), a vapor deposited organic material, cynoacrylate, a carbon film, a self-assembled monolayered material, perfluoropolyether, hexamethyldisilazane, or perfluorodecanoic carboxylic acid, silicon dioxide, silicate glass, or combinations thereof. The present invention also relates to a method of packaging a microelectronic device, including: providing a microelectronic device having a sensitive area; applying a water-insoluble, protective coating to the sensitive area; providing a package; attaching the device to the package; electrically interconnecting the device to the package; and substantially removing the protective coating from the sensitive area.
Sun Protection Belief Clusters: Analysis of Amazon Mechanical Turk Data.
Santiago-Rivas, Marimer; Schnur, Julie B; Jandorf, Lina
2016-12-01
This study aimed (i) to determine whether people could be differentiated on the basis of their sun protection belief profiles and individual characteristics and (ii) explore the use of a crowdsourcing web service for the assessment of sun protection beliefs. A sample of 500 adults completed an online survey of sun protection belief items using Amazon Mechanical Turk. A two-phased cluster analysis (i.e., hierarchical and non-hierarchical K-means) was utilized to determine clusters of sun protection barriers and facilitators. Results yielded three distinct clusters of sun protection barriers and three distinct clusters of sun protection facilitators. Significant associations between gender, age, sun sensitivity, and cluster membership were identified. Results also showed an association between barrier and facilitator cluster membership. The results of this study provided a potential alternative approach to developing future sun protection promotion initiatives in the population. Findings add to our knowledge regarding individuals who support, oppose, or are ambivalent toward sun protection and inform intervention research by identifying distinct subtypes that may best benefit from (or have a higher need for) skin cancer prevention efforts.
Image Hashes as Templates for Verification
DOE Office of Scientific and Technical Information (OSTI.GOV)
Janik, Tadeusz; Jarman, Kenneth D.; Robinson, Sean M.
2012-07-17
Imaging systems can provide measurements that confidently assess characteristics of nuclear weapons and dismantled weapon components, and such assessment will be needed in future verification for arms control. Yet imaging is often viewed as too intrusive, raising concern about the ability to protect sensitive information. In particular, the prospect of using image-based templates for verifying the presence or absence of a warhead, or of the declared configuration of fissile material in storage, may be rejected out-of-hand as being too vulnerable to violation of information barrier (IB) principles. Development of a rigorous approach for generating and comparing reduced-information templates from images,more » and assessing the security, sensitivity, and robustness of verification using such templates, are needed to address these concerns. We discuss our efforts to develop such a rigorous approach based on a combination of image-feature extraction and encryption-utilizing hash functions to confirm proffered declarations, providing strong classified data security while maintaining high confidence for verification. The proposed work is focused on developing secure, robust, tamper-sensitive and automatic techniques that may enable the comparison of non-sensitive hashed image data outside an IB. It is rooted in research on so-called perceptual hash functions for image comparison, at the interface of signal/image processing, pattern recognition, cryptography, and information theory. Such perceptual or robust image hashing—which, strictly speaking, is not truly cryptographic hashing—has extensive application in content authentication and information retrieval, database search, and security assurance. Applying and extending the principles of perceptual hashing to imaging for arms control, we propose techniques that are sensitive to altering, forging and tampering of the imaged object yet robust and tolerant to content-preserving image distortions and noise. Ensuring that the information contained in the hashed image data (available out-of-IB) cannot be used to extract sensitive information about the imaged object is of primary concern. Thus the techniques are characterized by high unpredictability to guarantee security. We will present an assessment of the performance of our techniques with respect to security, sensitivity and robustness on the basis of a methodical and mathematically precise framework.« less
Use and disclosure of health information and protection of patient privacy in Taiwan.
Liu, Han-Hsi
2010-03-01
This paper examines Taiwan's current regulatory system for the use of healthcare information from the viewpoint of patient privacy protection. The author proposes a patient-centered, cooperative system centered on the "traffic light theory", as a solution to the potential conflict between the use of healthcare information and the protection of patient privacy. Taiwan, a country with a national healthcare insurance program and state-of-the-art electronic technology, takes a distinctive approach to the protection of patient privacy. On January 1st, 2004, the Bureau of National Health Insurance (BNHI) implemented a comprehensive embedded integrated circuit (IC) card, which puts the wide-ranging health information of its 22 million beneficiaries online to facilitate review of use and disclosure. It is well understood that healthcare information is of a personal and sensitive nature, demanding stringent privacy protection. Nevertheless, there is no denying the potential benefit of using personal health information (PHI) to achieve public good, especially in the area of cost containment. The comprehensive e-health system in Taiwan greatly facilitates copying, transmission, and use of PHI, but does the regulatory system provide enough safeguards for patient privacy? Because the law in Taiwan does not provide clear standards for the use and disclosure of healthcare information, healthcare providers are either too conservative or too aggressive. While most healthcare providers keep their oath of confidentiality, some rogue members severely abuse patient privacy. This paper proposes a "traffic-light system" to remedy this situation. Flashing yellow lights allow aggressive drivers to ignore others, while causing overly cautious drivers to be too hesitant. The author contends that clear standards should have been established for healthcare providers. Like car drivers, healthcare providers need red and green traffic signals. The law should indicate, through workable privacy regulations and guidelines, when the light is red or green-when to stop or to advance.
40 CFR Table 1 to Subpart A of... - Detection Sensitivity Levels (grams per hour)
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 10 2014-07-01 2014-07-01 false Detection Sensitivity Levels (grams per hour) 1 Table 1 to Subpart A of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Levels (grams per hour) Monitoring frequency per subpart a Detection sensitivity level Bi-Monthly 60 Semi...
40 CFR Table 1 to Subpart A of... - Detection Sensitivity Levels (grams per hour)
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 10 2012-07-01 2012-07-01 false Detection Sensitivity Levels (grams per hour) 1 Table 1 to Subpart A of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Levels (grams per hour) Monitoring frequency per subpart a Detection sensitivity level Bi-Monthly 60 Semi...
40 CFR Table 1 to Subpart A of... - Detection Sensitivity Levels (grams per hour)
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Detection Sensitivity Levels (grams per hour) 1 Table 1 to Subpart A of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Levels (grams per hour) Monitoring frequency per subpart a Detection sensitivity level Bi-Monthly 60 Semi...
40 CFR Table 1 to Subpart A of... - Detection Sensitivity Levels (grams per hour)
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 9 2011-07-01 2011-07-01 false Detection Sensitivity Levels (grams per hour) 1 Table 1 to Subpart A of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Levels (grams per hour) Monitoring frequency per subpart a Detection sensitivity level Bi-Monthly 60 Semi...
40 CFR Table 1 to Subpart A of... - Detection Sensitivity Levels (grams per hour)
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 10 2013-07-01 2013-07-01 false Detection Sensitivity Levels (grams per hour) 1 Table 1 to Subpart A of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Levels (grams per hour) Monitoring frequency per subpart a Detection sensitivity level Bi-Monthly 60 Semi...
Protect sensitive data with lightweight memory encryption
NASA Astrophysics Data System (ADS)
Zhou, Hongwei; Yuan, Jinhui; Xiao, Rui; Zhang, Kai; Sun, Jingyao
2018-04-01
Since current commercial processor is not able to deal with the data in the cipher text, the sensitive data have to be exposed in the memory. It leaves a window for the adversary. To protect the sensitive data, a direct idea is to encrypt the data when the processor does not access them. On the observation, we have developed a lightweight memory encryption, called LeMe, to protect the sensitive data in the application. LeMe marks the sensitive data in the memory with the page table entry, and encrypts the data in their free time. LeMe is built on the Linux with a 3.17.6 kernel, and provides four user interfaces as dynamic link library. Our evaluations show LeMe is effective to protect the sensitive data and incurs an acceptable performance overhead.
Jung, Alesia M; Dennis, Leslie K; Jacobs, Elizabeth T; Wondrak, Georg T
2018-06-11
Sun sensitivity, a confounder between sun exposure and sun protection, is often overlooked. We examined how sun exposure and sun protection behaviors among indoor workers varied by sun sensitivity. Sun exposure and sun protection diaries over a 45-day period from Midwestern United States indoor workers were examined. We categorized sun sensitivity (fair and non-fair complexion) using tanning inability and sunburn tendency. Total exposure (sunrise to sunset) and peak exposure (10 am and 4 pm) lasting at least 60 minutes were examined. Percentages of time using sun protection were reported. We determined associations between fair complexion, mean sun exposure and mean sun protection times with logistic regression. Fair individuals spent less time in the sun than non-fair individuals, but a greater proportion of time using sun protection behaviors, including sunscreen with SPF 30+ (odds ratio (OR)=1.36; 95% confidence interval (95% CI) =0.98, 1.87)), or wearing long-sleeved shirts (OR=2.89; 95% CI=1.24, 6.73). Fair individuals spent less time in the sun and practiced more sun protective behaviors than non-fair individuals. This complex association between sun sensitivity, sun protection and sun exposure has not consistently been addressed in studies of skin cancer. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
International regulatory requirements for skin sensitization testing.
Daniel, Amber B; Strickland, Judy; Allen, David; Casati, Silvia; Zuang, Valérie; Barroso, João; Whelan, Maurice; Régimbald-Krnel, M J; Kojima, Hajime; Nishikawa, Akiyoshi; Park, Hye-Kyung; Lee, Jong Kwon; Kim, Tae Sung; Delgado, Isabella; Rios, Ludmila; Yang, Ying; Wang, Gangli; Kleinstreuer, Nicole
2018-06-01
Skin sensitization test data are required or considered by chemical regulation authorities around the world. These data are used to develop product hazard labeling for the protection of consumers or workers and to assess risks from exposure to skin-sensitizing chemicals. To identify opportunities for regulatory uses of non-animal replacements for skin sensitization tests, the needs and uses for skin sensitization test data must first be clarified. Thus, we reviewed skin sensitization testing requirements for seven countries or regions that are represented in the International Cooperation on Alternative Test Methods (ICATM). We noted the type of skin sensitization data required for each chemical sector and whether these data were used in a hazard classification, potency classification, or risk assessment context; the preferred tests; and whether alternative non-animal tests were acceptable. An understanding of national and regional regulatory requirements for skin sensitization testing will inform the development of ICATM's international strategy for the acceptance and implementation of non-animal alternatives to assess the health hazards and risks associated with potential skin sensitizers. Copyright © 2018 Elsevier Inc. All rights reserved.
Basis of the Massachusetts Reference Dose and Drinking Water Standard for Perchlorate
Zewdie, Tsedash; Smith, C. Mark; Hutcheson, Michael; West, Carol Rowan
2010-01-01
Objective Perchlorate inhibits the uptake of iodide in the thyroid. Iodide is required to synthesize hormones critical to fetal and neonatal development. Many water supplies and foods are contaminated with perchlorate. Exposure standards are needed but controversial. Here we summarize the basis of the Massachusetts (MA) perchlorate reference dose (RfD) and drinking water standard (DWS), which are considerably lower and more health protective than related values derived by several other agencies. We also review information regarding perchlorate risk assessment and policy. Data sources MA Department of Environmental Protection (DEP) scientists, with input from a science advisory committee, assessed a wide range of perchlorate risk and exposure information. Health outcomes associated with iodine insufficiency were considered, as were data on perchlorate in drinking water disinfectants. Data synthesis We used a weight-of-the-evidence approach to evaluate perchlorate risks, paying particular attention to sensitive life stages. A health protective RfD (0.07 μg/kg/day) was derived using an uncertainty factor approach with perchlorate-induced iodide uptake inhibition as the point of departure. The MA DWS (2 μg/L) was based on risk management decisions weighing information on perchlorate health risks and its presence in certain disinfectant solutions used to treat drinking water for pathogens. Conclusions Current data indicate that perchlorate exposures attributable to drinking water in individuals at sensitive life stages should be minimized and support the MA DEP perchlorate RfD and DWS. Widespread exposure to perchlorate and other thyroid toxicants in drinking water and foods suggests that more comprehensive policies to reduce overall exposures and enhance iodine nutrition are needed. PMID:20056583
Waite, L.A.; Thomson, Kenneth C.
1993-01-01
A geographic information system data base was developed for Greene County, Missouri, to provide data for use in the protection of water resources. The geographic information system data base contains the following map layers: geology, cave entrances and passages, county and quadrangle boundary, dye traces, faults, geographic names, hypsography, hydrography, lineaments, Ozark aquifer potentio- metric surface, public land survey system, sink- holes, soils, springs, and transportation. Several serious incidents of ground-water contamination have been reported in the karst terrane developed in soluble carbonate rocks in Greene County. Karst terranes are environmentally sensitive because any contaminant carried by surface runoff has the potential for rapid transport through solution enlarged fractures to the ground-water system. In the karst terrane in Greene County, about 2,500 sinkholes have been located; these sinkholes are potential access points for contamination to the ground-water system. Recent examples of ground-water contamination by sewage, fertilizers, and hydrocarbon chemicals have demonstrated the sensitivity of ground water in the Greene County karst terrane to degradation. The ground-water system is a major source of drinking water for Greene County. The population in Greene County, which includes Springfield, the third largest city in Missouri, is rapidly increasing and the protection of the water resources of Greene County is an increasing concern.
40 CFR Table 1 to Subpart A of... - Detection Sensitivity Levels (grams per hour)
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 7 2014-07-01 2014-07-01 false Detection Sensitivity Levels (grams per hour) 1 Table 1 to Subpart A of Part 60 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Pt. 60, Subpt. A, Table 1 Table 1 to Subpart A of Part 60-Detection Sensitivity Levels (grams per...
40 CFR Table 3 to Subpart A of... - Detection Sensitivity Levels (grams per hour)
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 16 2013-07-01 2013-07-01 false Detection Sensitivity Levels (grams per hour) 3 Table 3 to Subpart A of Part 65 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... 3 Table 3 to Subpart A of Part 65—Detection Sensitivity Levels (grams per hour) Monitoring Frequency...
40 CFR Table 3 to Subpart A of... - Detection Sensitivity Levels (grams per hour)
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 16 2014-07-01 2014-07-01 false Detection Sensitivity Levels (grams per hour) 3 Table 3 to Subpart A of Part 65 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... 3 Table 3 to Subpart A of Part 65—Detection Sensitivity Levels (grams per hour) Monitoring Frequency...
40 CFR Table 3 to Subpart A of... - Detection Sensitivity Levels (grams per hour)
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 15 2011-07-01 2011-07-01 false Detection Sensitivity Levels (grams per hour) 3 Table 3 to Subpart A of Part 65 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... 3 Table 3 to Subpart A of Part 65—Detection Sensitivity Levels (grams per hour) Monitoring Frequency...
40 CFR Table 3 to Subpart A of... - Detection Sensitivity Levels (grams per hour)
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 16 2012-07-01 2012-07-01 false Detection Sensitivity Levels (grams per hour) 3 Table 3 to Subpart A of Part 65 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... 3 Table 3 to Subpart A of Part 65—Detection Sensitivity Levels (grams per hour) Monitoring Frequency...
40 CFR Table 1 to Subpart A of... - Detection Sensitivity Levels (grams per hour)
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 7 2013-07-01 2013-07-01 false Detection Sensitivity Levels (grams per hour) 1 Table 1 to Subpart A of Part 60 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Pt. 60, Subpt. A, Table 1 Table 1 to Subpart A of Part 60-Detection Sensitivity Levels (grams per...
40 CFR Table 3 to Subpart A of... - Detection Sensitivity Levels (grams per hour)
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 15 2010-07-01 2010-07-01 false Detection Sensitivity Levels (grams per hour) 3 Table 3 to Subpart A of Part 65 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... 3 Table 3 to Subpart A of Part 65—Detection Sensitivity Levels (grams per hour) Monitoring Frequency...
Gilliland, Anne T
2011-01-01
Objective: The investigation provides recommendations for establishing institutional collection guidelines and policies that protect the integrity of the historical record, while upholding the privacy and confidentiality of those who are protected by Health Insurance Portability and Accountability Act (HIPAA) or professional ethical standards. Methods: The authors completed a systematic historical investigation of the concepts of collection integrity, privacy, and confidentiality in the formal and informal legal and professional ethics literature and applied these standards to create best practices for institutional policies in these areas. Results: Through an in-depth examination of the historical concepts of privacy and confidentiality in the legal and professional ethics literature, the authors were able to create recommendations that would allow institutions to provide access to important, yet sensitive, materials, while complying with the standards set by HIPAA regulations and professional ethical expectations. Conclusion: With thoughtful planning, it is possible to balance the integrity of and access to the historical record of sensitive documents, while supporting the privacy protections of HIPAA and professional ethical standards. Although it is theorized that collection development polices of institutions have changed due to HIPAA legislation, additional research is suggested to see how various legal interpretations have affected the integrity of the historical record in actuality. PMID:21243051
1989-01-01
This Act amends the French Family and Social Aid Code to insert provisions designed to prevent the mistreatment of minors. It provides that childhood social aid services are to have the additional objectives of preventing mistreatment and collecting information on the mistreatment of minors and are to inform and sensitize the public at large, as well as concerned persons, about the conditions of mistreated minors. The Act requires the president of each local general council to establish a system for collection of information, require the collaboration of professionals and associations dealing with the protection of the family and children, and notify legal authorities when a minor has or appears to have been mistreated and it is impossible to evaluate the situation or the family refuses to cooperate. The Act also creates a free telephone service to respond at any time of the day to requests for information or advice on minors who are or appear to be mistreated and to convey to the presidents of local general councils information and recommendations about these minors. In addition, all physicians, medical and paramedical personnel, magistrates, teachers, and police are to receive initial and continuing training to allow them to respond to cases of mistreated children and take actions necessary to prevent mistreatment and protect children.
Efficient and secure outsourcing of genomic data storage.
Sousa, João Sá; Lefebvre, Cédric; Huang, Zhicong; Raisaro, Jean Louis; Aguilar-Melchor, Carlos; Killijian, Marc-Olivier; Hubaux, Jean-Pierre
2017-07-26
Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing sensitive information, such as genomic data, comes with important concerns related to privacy and security. This calls for new sophisticated techniques that ensure data protection from untrusted cloud providers and that still enable researchers to obtain useful information. We present a novel privacy-preserving algorithm for fully outsourcing the storage of large genomic data files to a public cloud and enabling researchers to efficiently search for variants of interest. In order to protect data and query confidentiality from possible leakage, our solution exploits optimal encoding for genomic variants and combines it with homomorphic encryption and private information retrieval. Our proposed algorithm is implemented in C++ and was evaluated on real data as part of the 2016 iDash Genome Privacy-Protection Challenge. Results show that our solution outperforms the state-of-the-art solutions and enables researchers to search over millions of encrypted variants in a few seconds. As opposed to prior beliefs that sophisticated privacy-enhancing technologies (PETs) are unpractical for real operational settings, our solution demonstrates that, in the case of genomic data, PETs are very efficient enablers.
The Operational Manager - Enemy or Hero of Secure Business Practice?
NASA Astrophysics Data System (ADS)
Goucher, Wendy
This paper will investigate the role of the non-IT manager in information security. He can, for example, be the reason why sensitive work is carried out on the move and security focused spending is given a low priority in the budget. Alternatively, he can also be the driving force behind empowering the team to have a dynamic attitude to protecting data both at work and at home. Now is the time for managers to stop pushing information security issues away from their desk and into the in-tray of the IT department.
Tan, Chun Kiat; Ng, Jason Changwei; Xu, Xiaotian; Poh, Chueh Loo; Guan, Yong Liang; Sheah, Kenneth
2011-06-01
Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent patient information are transmitted across public networks, such as the Internet. Health mandates such as the Health Insurance Portability and Accountability Act require healthcare providers to adhere to security measures in order to protect sensitive patient information. This paper presents a fully reversible, dual-layer watermarking scheme with tamper detection capability for medical images. The scheme utilizes concepts of public-key cryptography and reversible data-hiding technique. The scheme was tested using medical images in DICOM format. The results show that the scheme is able to ensure image authenticity and integrity, and to locate tampered regions in the images.
Falk, Magnus
2014-02-01
Fitzpatrick's classification is the most common way of assessing skin UV sensitivity. The study aim was to investigate how self-estimated and actual UV sensitivity, as measured by phototest, are associated with attitudes towards sunbathing and the propensity to increase sun protection, as well as the correlation between self-estimated and actual UV sensitivity. A total of 166 primary healthcare patients filled-out a questionnaire investigating attitudes towards sunbathing and the propensity to increase sun protection. They reported their skin type according to Fitzpatrick, and a UV sensitivity phototest was performed. Self-rated low UV sensitivity (skin type III-VI) was associated with a more positive attitude towards sunbathing and a lower propensity to increase sun protection, compared to high UV sensitivity. The correlation between the two methods was weak. The findings might indicate that individuals with a perceived low but in reality high UV sensitivity do not seek adequate sun protection with regard to skin cancer risk. Furthermore, the poor correlation between self-reported and actual UV sensitivity, measured by phototest, makes the clinical use of Fitzpatrick's classification questionable.
Information Leakage Analysis by Abstract Interpretation
NASA Astrophysics Data System (ADS)
Zanioli, Matteo; Cortesi, Agostino
Protecting the confidentiality of information stored in a computer system or transmitted over a public network is a relevant problem in computer security. The approach of information flow analysis involves performing a static analysis of the program with the aim of proving that there will not be leaks of sensitive information. In this paper we propose a new domain that combines variable dependency analysis, based on propositional formulas, and variables' value analysis, based on polyhedra. The resulting analysis is strictly more accurate than the state of the art abstract interpretation based analyses for information leakage detection. Its modular construction allows to deal with the tradeoff between efficiency and accuracy by tuning the granularity of the abstraction and the complexity of the abstract operators.
Acute toxicity prediction to threatened and endangered ...
Evaluating contaminant sensitivity of threatened and endangered (listed) species and protectiveness of chemical regulations often depends on toxicity data for commonly tested surrogate species. The U.S. EPA’s Internet application Web-ICE is a suite of Interspecies Correlation Estimation (ICE) models that can extrapolate species sensitivity to listed taxa using least-squares regressions of the sensitivity of a surrogate species and a predicted taxon (species, genus, or family). Web-ICE was expanded with new models that can predict toxicity to over 250 listed species. A case study was used to assess protectiveness of genus and family model estimates derived from either geometric mean or minimum taxa toxicity values for listed species. Models developed from the most sensitive value for each chemical were generally protective of the most sensitive species within predicted taxa, including listed species, and were more protective than geometric means models. ICE model estimates were compared to HC5 values derived from Species Sensitivity Distributions for the case study chemicals to assess protectiveness of the two approaches. ICE models provide robust toxicity predictions and can generate protective toxicity estimates for assessing contaminant risk to listed species. Reporting on the development and optimization of ICE models for listed species toxicity estimation
Willming, Morgan M; Lilavois, Crystal R; Barron, Mace G; Raimondo, Sandy
2016-10-04
Evaluating contaminant sensitivity of threatened and endangered (listed) species and protectiveness of chemical regulations often depends on toxicity data for commonly tested surrogate species. The U.S. EPA's Internet application Web-ICE is a suite of Interspecies Correlation Estimation (ICE) models that can extrapolate species sensitivity to listed taxa using least-squares regressions of the sensitivity of a surrogate species and a predicted taxon (species, genus, or family). Web-ICE was expanded with new models that can predict toxicity to over 250 listed species. A case study was used to assess protectiveness of genus and family model estimates derived from either geometric mean or minimum taxa toxicity values for listed species. Models developed from the most sensitive value for each chemical were generally protective of the most sensitive species within predicted taxa, including listed species, and were more protective than geometric means models. ICE model estimates were compared to HC5 values derived from Species Sensitivity Distributions for the case study chemicals to assess protectiveness of the two approaches. ICE models provide robust toxicity predictions and can generate protective toxicity estimates for assessing contaminant risk to listed species.
Physical cryptographic verification of nuclear warheads
Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.
2016-01-01
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times. PMID:27432959
Physical cryptographic verification of nuclear warheads
NASA Astrophysics Data System (ADS)
Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.
2016-08-01
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.
Physical cryptographic verification of nuclear warheads.
Kemp, R Scott; Danagoulian, Areg; Macdonald, Ruaridh R; Vavrek, Jayson R
2016-08-02
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 23 2014-07-01 2014-07-01 false How does the identification of ground water protection areas and other sensitive ground water areas affect me? 144.87 Section 144.87 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER PROGRAMS (CONTINUED) UNDERGROUND INJECTION CONTROL PROGRAM Requirements for...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 24 2013-07-01 2013-07-01 false How does the identification of ground water protection areas and other sensitive ground water areas affect me? 144.87 Section 144.87 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER PROGRAMS (CONTINUED) UNDERGROUND INJECTION CONTROL PROGRAM Requirements for...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 22 2010-07-01 2010-07-01 false How does the identification of ground water protection areas and other sensitive ground water areas affect me? 144.87 Section 144.87 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER PROGRAMS (CONTINUED) UNDERGROUND INJECTION CONTROL PROGRAM Requirements for...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 23 2011-07-01 2011-07-01 false How does the identification of ground water protection areas and other sensitive ground water areas affect me? 144.87 Section 144.87 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER PROGRAMS (CONTINUED) UNDERGROUND INJECTION CONTROL PROGRAM Requirements for...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 24 2012-07-01 2012-07-01 false How does the identification of ground water protection areas and other sensitive ground water areas affect me? 144.87 Section 144.87 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER PROGRAMS (CONTINUED) UNDERGROUND INJECTION CONTROL PROGRAM Requirements for...
A comprehensive review on privacy preserving data mining.
Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Razzaque, Mohammad Abdur
2015-01-01
Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated unwillingness of various information providers towards the reliability protection of data from disclosure often results utter rejection in data sharing or incorrect information sharing. This article provides a panoramic overview on new perspective and systematic interpretation of a list published literatures via their meticulous organization in subcategories. The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses. Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory.
The links between protected areas, faiths, and sacred natural sites.
Dudley, Nigel; Higgins-Zogib, Liza; Mansourian, Stephanie
2009-06-01
Most people follow and are influenced by some kind of spiritual faith. We examined two ways in which religious faiths can in turn influence biodiversity conservation in protected areas. First, biodiversity conservation is influenced through the direct and often effective protection afforded to wild species in sacred natural sites and in seminatural habitats around religious buildings. Sacred natural sites are almost certainly the world's oldest form of habitat protection. Although some sacred natural sites exist inside official protected areas, many thousands more form a largely unrecognized "shadow" conservation network in many countries throughout the world, which can be more stringently protected than state-run reserves. Second, faiths have a profound impact on attitudes to protection of the natural world through their philosophy, teachings, investment choices, approaches to land they control, and religious-based management systems. We considered the interactions between faiths and protected areas with respect to all 11 mainstream faiths and to a number of local belief systems. The close links between faiths and habitat protection offer major conservation opportunities, but also pose challenges. Bringing a sacred natural site into a national protected-area system can increase protection for the site, but may compromise some of its spiritual values or even its conservation values. Most protected-area managers are not trained to manage natural sites for religious purposes, but many sacred natural sites are under threat from cultural changes and habitat degradation. Decisions about whether or not to make a sacred natural site an "official" protected area therefore need to be made on a case-by-case basis. Such sites can play an important role in conservation inside and outside official protected areas. More information about the conservation value of sacred lands is needed as is more informed experience in integrating these into wider conservation strategies. In addition, many protected-area staff need training in how to manage sensitive issues relating to faiths where important faith sites occur in protected areas. ©2009 Society for Conservation Biology.
Lu, Chunling; Liu, Kai; Li, Lingling; Yang, Yuhong
2017-04-01
Reliable and comparable information on households with catastrophic health expenditure (HCHE) is crucial for monitoring and evaluating our progress towards achieving universal financial risk protection. This study aims to investigate the sensitivity of measuring the progress in financial risk protection to survey design and its socioeconomic and demographic determinants. Using the Rwanda Integrated Living Conditions Survey in 2005 and 2010/2011, we derived the level and trend of the percentage of the HCHE using out-of-pocket health spending data derived from (1) a health module with a two-week recall period and six (2005)/seven (2010/2011) survey questions (Method 1) and (2) a consumption module with a four-week/ten-/12-month recall period and 11(2005)/24 (2010/2011) questions (Method 2). Using multilevel logistic regression analysis, we investigated the household socioeconomic and demographic characteristics that affected the sensitivity of estimating the HCHE to survey design. We found that Method 1 generated a significantly higher HCHE estimate (9.2%, 95% confidence interval 8.4%-10.0%) than Method2 (7.4%, 6.6%-8.1%) in 2005 and lower estimate (5.6%, 5.2%-6.1%) than Method 2 (8.2%, 7.6%-8.7%) in 2010/2011. The estimated trends of the HCHE using the two methods were not consistent between the two years. A household's size, its income quintile, having no under-five children, and educational level of its head were positively associated with the consistency of its HCHE status when using the two survey methods. Estimates of the progress in financial risk protection, especially among the most vulnerable households, are sensitive to survey design. These results are robust to various thresholds of catastrophic health spending. Future work must focus on mitigating survey effects through the development of statistical tools. Copyright © 2017 Elsevier Ltd. All rights reserved.
Lu, Chunling; Liu, Kai; Li, Lingling; Yang, Yuhong
2017-01-01
Reliable and comparable information on households with catastrophic health expenditure (HCHE) is crucial for monitoring and evaluating our progress towards achieving universal financial risk protection. This study aims to investigate the sensitivity of measuring the progress in financial risk protection to survey design and its socioeconomic and demographic determinants. Using the Rwanda Integrated Living Conditions Survey in 2005 and 2010/2011, we derived the level and trend of the percentage of the HCHE using out-of-pocket health spending data derived from (1) a health module with a two-week recall period and six (2005)/seven (2010/2011) survey questions (Method 1) and (2) a consumption module with a four-week/ten-/12-month recall period and 11(2005)/24 (2010/2011) questions (Method 2). Using multilevel logistic regression analysis, we investigated the household socioeconomic and demographic characteristics that affected the sensitivity of estimating the HCHE to survey design. We found that Method 1 generated a significantly higher HCHE estimate (9.2%, 95% confidence interval 8.4%–10.0%) than Method2 (7.4%, 6.6%–8.1%) in 2005 and lower estimate (5.6%, 5.2%–6.1%) than Method 2 (8.2%, 7.6% –8.7%) in 2010/2011. The estimated trends of the HCHE using the two methods were not consistent between the two years. A household's size, its income quintile, having no under-five children, and educational level of its head were positively associated with the consistency of its HCHE status when using the two survey methods. Estimates of the progress in financial risk protection, especially among the most vulnerable households, are sensitive to survey design. These results are robust to various thresholds of catastrophic health spending. Future work must focus on mitigating survey effects through the development of statistical tools. PMID:28189819
Attacker-defender game from a network science perspective
NASA Astrophysics Data System (ADS)
Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun
2018-05-01
Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dobranich, P.R.; Widney, T.W.; Goolsby, P.T.
The on-site inspection provisions in many current and proposed arms control agreements require extensive preparation and training on the part of both the Inspected Party and the Inspection Team. Current training techniques include table-top inspections and practice inspections. The Augmented Computer Exercise for Inspection Training (ACE-IT), an interactive computer training tool, increases the utility of table-top inspections. ACE-IT has been designed to provide training for a hypothetical challenge inspection under the Chemical Weapons Convention (CWC); however, this training tool can be modified for other inspection regimes. Although ACE-IT provides training from notification of an inspection through post-inspection activities, the primarymore » emphasis of ACE-IT is in the inspection itself--particularly with the concept of managed access. ACE-IT also demonstrates how inspection provisions impact compliance determination and the protection of sensitive information. The Exercise Manual supplements the ACE-IT software by providing general information on on-site inspections and detailed information for the CWC challenge inspection exercise. The detailed information includes the pre-inspection briefing, maps, list of sensitive items, medical records, and shipping records.« less
Hsu, Justine; Flores, Gabriela; Evans, David; Mills, Anne; Hanson, Kara
2018-05-31
Monitoring financial protection against catastrophic health expenditures is important to understand how health financing arrangements in a country protect its population against high costs associated with accessing health services. While catastrophic health expenditures are generally defined to be when household expenditures for health exceed a given threshold of household resources, there is no gold standard with several methods applied to define the threshold and household resources. These different approaches to constructing the indicator might give different pictures of a country's progress towards financial protection. In order for monitoring to effectively provide policy insight, it is critical to understand the sensitivity of measurement to these choices. This paper examines the impact of varying two methodological choices by analysing household expenditure data from a sample of 47 countries. We assess sensitivity of cross-country comparisons to a range of thresholds by testing for restricted dominance. We further assess sensitivity of comparisons to different methods for defining household resources (i.e. total expenditure, non-food expenditure and non-subsistence expenditure) by conducting correlation tests of country rankings. We found country rankings are robust to the choice of threshold in a tenth to a quarter of comparisons within the 5-85% threshold range and this increases to half of comparisons if the threshold is restricted to 5-40%, following those commonly used in the literature. Furthermore, correlations of country rankings using different methods to define household resources were moderate to high; thus, this choice makes less difference from a measurement perspective than from an ethical perspective as different definitions of available household resources reflect varying concerns for equity. Interpreting comparisons from global monitoring based on a single threshold should be done with caution as these may not provide reliable insight into relative country progress. We therefore recommend financial protection against catastrophic health expenditures be measured across a range of thresholds using a catastrophic incidence curve as shown in this paper. We further recommend evaluating financial protection in relation to a country's health financing system arrangements in order to better understand the extent of protection and better inform future policy changes.
Blum, Oleg; Didyk, Nataliya; Pavluchenko, Nataliya; Godzik, Barbara
2011-01-01
Some modern agrochemicals with antioxidant potential were tested for their protective effect against ozone injury using clover and tobacco ozone-sensitive cultivars as model plants subjected to ambient ozone at two sites (Kyiv city in Ukraine and Szarów village in Poland). All used agrochemicals showed partial protective effects against ozone injury on clover and tobacco. Conducted studies confirmed the effectiveness of modern fungicides belonging to strobilurin group as protectants of sensitive crops against ozone damage. The effectiveness of new growth regulators "Emistym C" and "Agrostymulin" was showed for the first time. Out of the studied agrochemicals, fungicide "Strobi" and natural growth regulator "Emistym C" demonstrated the best protective effects. These agrochemicals present promise for further studies of their possible utilization for enhancement of ozone tolerance of sensitive crops.
Planned Parenthood of Southern Arizona v. Lawall.
2002-01-01
Court Decision: 307 Federal Reporter, 3d Series 783; 2002 Oct 9 (date of decision). The U.S. Court of Appeals for the Ninth Circuit agreed with the lower court that Arizona's parental consent abortion law was constitutional because it adequately protected a minor's right to choose and privacy interests. Planned Parenthood brought an action contesting the constitutionality of Arizona's parental consent abortion law because it claimed the confidentiality provision did not comport with anonymity requirements upheld by the Supreme Court and a woman's informational privacy rights. The Ninth Circuit held that the confidentiality provision satisfied the required standard for anonymity because it took reasonable steps to prevent the public from learning the minor's identity. The court noted that complete anonymity was not required and, for this reason, the confidentiality provision did not unduly burden a woman's right to choose. The court also held that the law did not violate a woman's right of "informational" privacy (a privacy interest in avoiding disclosure of sensitive personal information) because the information was used in a manner that advanced a legitimate state interest, the law was sufficiently tailored to meet state interests, and the law provided adequate protection against unauthorized disclosure of personal information.
Falk, Magnus; Anderson, Chris
2008-01-01
The high skin cancer incidence in western society, and its known association with sun exposure habits, makes the area an important target for prevention. We investigated, in a primary healthcare setting, differentiated levels of prevention efforts directed at the propensity of the patient to change his/her sun habits, sun protection behaviour, and attitudes, after information intervention. Additionally, the impact of the performance of a phototest to determine individual sun sensitivity was evaluated. 308 patients visiting a primary healthcare centre in southern Sweden completed a questionnaire concerning sun habits, sun protection behaviour, and attitudes, and were randomized into one of three groups, representing increasing levels of prevention effort in terms of resources. Feedback on their questionnaire and general preventive sun protection advice was given, in the first group by means of a letter, and in the second and third groups by a doctor's consultation. Group 3 also underwent a phototest, with a self-reading assessment and a written follow-up of the phototest result. Change of sun habits, behaviour, and attitudes, based on the Transtheoretical Model of Behaviour Change and on Likert scale scorings, was evaluated after 6 months, by a repeated questionnaire. Prevention mediated by a doctor's consultation had a clearly better impact on the subjects. The addition of a phototest did not further reinforce this effect in the group as a whole, but it did for a subgroup of individuals with high ultraviolet (UV) sensitivity, as determined by the phototest itself, suggesting that this might actually be a tool to improve outcome in this high-risk group. A personal doctor's consultation is a valuable tool in the effective delivery of preventive information in the general practice setting. In individuals with high UV-sensitivity and thus high risk for skin cancer the performance of a photo-test reinforces a positive outcome in habits, behaviour and attitudes.
Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K
2000-05-01
The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.
Sebastien Philippe Discusses the Zero-Knowledge Protocol
Philippe, Sebastien
2018-06-12
A system that can compare physical objects while potentially protecting sensitive information about the objects themselves has been demonstrated experimentally at the U.S. Department of Energyâs (DOE) Princeton Plasma Physics Laboratory (PPPL). This work, by researchers at Princeton University and PPPL, marks an initial confirmation of the application of a powerful cryptographic technique in the physical world. Graduate student Sébastien Philippe discusses the experiment.
Analysis of the sensitivity of soils to the leaching of agricultural pesticides in Ohio
Schalk, C.W.
1998-01-01
Pesticides have not been found frequently in the ground waters of Ohio even though large amounts of agricultural pesticides are applied to fields in Ohio every year. State regulators, including representatives from Ohio Environmental Protection Agency and Departments of Agriculture, Health, and Natural Resources, are striving to limit the presence of pesticides in ground water at a minimum. A proposed pesticide management plan for the State aims at protecting Ohio's ground water by assessing pesticide-leaching potential using geographic information system (GIS) technology and invoking a monitoring plan that targets aquifers deemed most likely to be vulnerable to pesticide leaching. The U.S. Geological Survey, in cooperation with Ohio Department of Agriculture, assessed the sensitivity of mapped soil units in Ohio to pesticide leaching. A soils data base (STATSGO) compiled by U.S. Department of Agriculture was used iteratively to estimate soil units as being of high to low sensitivity on the basis of soil permeability, clay content, and organic-matter content. Although this analysis did not target aquifers directly, the results can be used as a first estimate of areas most likely to be subject to pesticide contamination from normal agricultural practices. High-sensitivity soil units were found in lakefront areas and former lakefront beach ridges, buried valleys in several river basins, and parts of central and south- central Ohio. Medium-high-sensitivity soil units were found in other river basins, along Lake Erie in north-central Ohio, and in many of the upland areas of the Muskingum River Basin. Low-sensitivity map units dominated the northwestern quadrant of Ohio.
NASA Astrophysics Data System (ADS)
Gunawardena, Ajith; Fernando, Tamasha; Takeuchi, Wataru; Wickramasinghe, Chathura H.; Samarakoon, Lal
2014-06-01
Sri Lanka is an island consists of numerous wetlands and many of these ecosystems have been indiscriminately exploited for a commercial, agricultural, residential and industrial development and waste dumping. Eastern River Basin Region in Sri Lanka is rapidly urbanizing, which leads more threats to the surrounding wetland ecosystems considerably. Therefore, it is important to identify and designated them as reserved areas where necessary in order to protect them under the National Environmental Act of Sri Lanka. Mapping and change detection of wetlands in the selected region is a key requirement to fulfill the above task. GIS and Remote Sensing techniques were used to identify and analyze the wetland eco systems. In this study Landsat ETM+, ALOS-AVNIR2, ALOS-PALSAR images were analyzed for identifying and change detection of wetlands. The secondary information and data were collected through a questionnaire survey to recognize the possible threats and benefits. The collected data and information were incorporated in identification, analyzing and ranking the wetlands. The final outcome of the project is to correlate the satellite data with the field observations to quantify the highly sensitive wetlands to declare as Environmental Protection Areas under the National Environment Act of Sri Lanka.
Caruso, Ronald D
2004-01-01
Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004
Lauss, Georg; Schröder, Christina; Dabrock, Peter; Eder, Johann; Hamacher, Kay; Kuhn, Klaus A; Gottweis, Herbert
2013-10-01
The creation of socially and technically robust biobank privacy regimes presupposes knowledge of and compliance with legal rules, professional standards of the biomedical community, and state-of-the-art data safety and security measures. The strategies in privacy management and data protection presented in this review show a trend that goes beyond searching for compromises or efforts of balancing scientific demands for efficiency and societal demands for effective privacy regimes. They focus on developing synergies that facilitate cooperative use of biomaterials and data and enhance sample search efficiency for researchers on the one hand, and protect rights and interests of donors and citizens on the other hand. Among the issues covered are: a) ethical sensitivities and public perceptions on privacy in biobanking b) tools and procedures that allow maintenance of the rights and dignity of donors, without jeopardizing legitimate information needs of researchers and autonomy of biobanks, and c) a privacy sensitive framework for sharing of data and biomaterials in the research context.
Regulating genetic privacy in the online health information era.
Magnusson, Roger S
As the clinical implications of the genetic components of disease come to be better understood, there is likely to be a significant increase in the volume of genetic information held within clinical records. As patient health care records, in turn, come on-line as part of broader health information networks, there is likely to be considerable pressure in favour of special laws protecting genetic privacy. This paper reviews some of the privacy challenges posed by electronic health records, some government initiatives in this area, and notes the impact that developments in genetic testing will have upon the 'genetic content' of e-health records. Despite the sensitivity of genetic information, the paper argues against a policy of 'genetic exceptionalism', and its implications for genetic privacy laws.
Mathur, Shawn; Schmidt, Christian
2007-01-01
Sovereign power is retained and shared by the citizens of a country. Using electoral tools, governing structures are formed to ensure protection of national interests. As with any institution, proper control of the government guarantees its adherence to the tasks delegated to it by its citizens. In turn, citizens have to be provided with, and are encouraged to access and evaluate, information generated by the government. On the other hand, governments generate sensitive information (e.g., intelligence, internal reports, etc) that are required for self-evaluation and defense against threats to the nation. Governments are granted a privilege to collect, store and use such information to perform necessary tasks. How far does governmental privilege go relative tothe intrinsic right of citizens to access and evaluate information? PMID:17608934
Wang, Zhen; Kwok, Kevin W H; Lui, Gilbert C S; Zhou, Guang-Jie; Lee, Jae-Seong; Lam, Michael H W; Leung, Kenneth M Y
2014-06-01
Due to a lack of saltwater toxicity data in tropical regions, toxicity data generated from temperate or cold water species endemic to North America and Europe are often adopted to derive water quality guidelines (WQG) for protecting tropical saltwater species. If chemical toxicity to most saltwater organisms increases with water temperature, the use of temperate species data and associated WQG may result in under-protection to tropical species. Given the differences in species composition and environmental attributes between tropical and temperate saltwater ecosystems, there are conceivable uncertainties in such 'temperate-to-tropic' extrapolations. This study aims to compare temperate and tropical saltwater species' acute sensitivity to 11 chemicals through a comprehensive meta-analysis, by comparing species sensitivity distributions (SSDs) between the two groups. A 10 percentile hazardous concentration (HC10) is derived from each SSD, and then a temperate-to-tropic HC10 ratio is computed for each chemical. Our results demonstrate that temperate and tropical saltwater species display significantly different sensitivity towards all test chemicals except cadmium, although such differences are small with the HC10 ratios ranging from 0.094 (un-ionised ammonia) to 2.190 (pentachlorophenol) only. Temperate species are more sensitive to un-ionised ammonia, chromium, lead, nickel and tributyltin, whereas tropical species are more sensitive to copper, mercury, zinc, phenol and pentachlorophenol. Through comparison of a limited number of taxon-specific SSDs, we observe that there is a general decline in chemical sensitivity from algae to crustaceans, molluscs and then fishes. Following a statistical analysis of the results, we recommend an extrapolation factor of two for deriving tropical WQG from temperate information. Copyright © 2013 Elsevier Ltd. All rights reserved.
Imajo, Naoki; Matsui, Saori; Yasui, Yumiko; Matsui, Nobuaki; Fukuishi, Nobuyuki; Akagi, Masaaki
2005-12-01
Patients with high serum immunoglobulin E levels were reported to be protected against sudden death during acute myocardial infarction. The protection mechanism might be attributed to the facilitation of histamine release from sensitized mast cells; however, this remains to be clarified. In this study, we examined the influence of sensitization on ventricular fibrillation (VF) induced by myocardial hypoxia/reoxygenation (H/R). Guinea pigs were actively sensitized by subcutaneous injection of ovalbumin in Bordetella pertussis vaccine. Hearts isolated from non-sensitized and sensitized guinea pigs were subjected to 30-min hypoxia / 30-min reoxygenation using a Langendorff apparatus. The amount of histamine released in the sensitized guinea-pig hearts was elevated, and the duration of VF was found to be reduced. The treatment with a histamine H2-receptor antagonist inhibited the reduction of VF duration. Treatment of the non-sensitized hearts with the histamine H2-receptor agonist resulted in the decrease of VF duration to the same level as that in the sensitized hearts. In conclusion, these results suggest that the risk of sudden death during myocardial H/R may be attenuated in the sensitized hearts and that histamine H2-receptor activation due to the released histamine may be involved in the protective effect.
Holman, Dawn M; Ding, Helen; Guy, Gery P; Watson, Meg; Hartman, Anne M; Perna, Frank M
2018-05-01
Monitoring sun protection and sunburn over time at the population level can provide valuable information about progress toward skin cancer prevention goals and inform future intervention efforts. To examine the prevalence of sun protection use (shade, sunscreen, and clothing) and sunburn and the association between sunburn and individual characteristics and health behaviors in the US population. In this cross-sectional study using a nationally representative sample of 31 162 US adults from the 2015 National Health Interview Survey-Cancer Control Supplement, household interviews of civilian, noninstitutionalized US adults were conducted throughout 2015 in person and completed on the telephone when necessary. Data analysis was performed from August 16, 2016, to September 6, 2017. The prevalence of sunburn and use of sun protection and their association with demographic characteristics, sun sensitivity, and health-related behaviors and conditions using multivariable logistic regression modeling. A total of 31 162 respondents (mean [SD] age, 47.0 [0.36] years; 13 932 male [44.7%] and 17 230 female [55.3%]) were included in the analyses, with 34.2% experiencing sunburn in 2015. Sunburn prevalence was higher among younger age groups (51.2% in adults 18-29 years old; 95% CI, 48.8%-53.7%), non-Hispanic white individuals (42.5%; 95% CI, 41.2%-43.9%), and those with sun-sensitive skin (50.2%). However, sunburn was also prevalent among black (13.2%; 95% CI, 11.6%-15.1%) and Hispanic (29.7%; 95% CI, 27.6%-31.9%) individuals, demographic groups that are often considered to be at low risk of skin cancer. The most frequent sun protection behaviors were staying in the shade (37.1%; 95% CI, 36.3%-38.0%) and using sunscreen (31.5%; 95% CI, 30.7%-32.3%) followed by wearing long clothing to the ankles (28.4%; 95% CI, 27.6-29.1). Sun avoidance behaviors (seeking shade and not going in the sun) were significantly (39.5% vs 35.1%; P < .001) associated with a lower prevalence of sunburn. Those who used self-applied sunless tanning products (45.0% of users vs 36.1% of nonusers; P < .001), those who engaged in aerobic activity (37.9% of aerobic exercisers vs 32.8% of non-aerobic exercisers; P < .001), binge drinkers (45.1% of binge drinkers vs 35.0% of non-binge drinkers; P < .001), and overweight or obese individuals (37.9% of overweight or obese individuals vs 34.4% of non-overweight or obese individuals; P < .001) were more likely to experience sunburn compared with the respective comparison groups. Sun sensitivity was significantly associated with a higher sunburn prevalence, independent of race/ethnicity, suggesting a need to consider sun sensitivity when identifying target demographic groups for sun safety interventions. Efforts to improve vigilance and consistency with use of sun protection are needed. In addition, those who engage in physical activity, use sunless tanners, or use sunscreen for tanning purposes may require additional intervention strategies to address the unique barriers they face in staying adequately protected.
Physical cryptographic verification of nuclear warheads
Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; ...
2016-07-18
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably securemore » cryptographic hash that does not rely on electronics or software. Finally, these techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.« less
Rodrigues, Angela M; Sniehotta, Falko F; Birch-Machin, Mark A; Araujo-Soares, Vera
2017-01-01
Background: This article presents an exploratory study, aiming to explore the correspondence between knowledge, motivation and sun-protection practices during holidays. Methods: Seventeen participants aged 21-62 years old, recruited from community settings took part in individual face-to-face semi-structured interviews, completed sun sensitivity questions and an objective assessment of sunscreen use. Holidaymakers' knowledge about sun-safe messages, intentions and perceptions of barriers and facilitators for sun-protection were assessed. Qualitative data were analysed using thematic analysis and integrated with quantitative data, using a pragmatic theory-informed approach to synthesise the findings. Results: Participants were well informed about sun-safe messages, highly motivated to protect themselves from solar UV radiation (UVR) and they perceived themselves as well protected. However, they did not seem to use effective protective practices. Sunscreen was the preferred method of sun-protection, but most participants used considerably less than the recommended amount and significantly overestimated the amount of time they could be safely exposed. Seeking shade was the least used method of sun-protection and covering-up strategies were mostly implemented as a partial protection (i.e. hats or sunglasses). The desire to reach an optimal balance between getting a tan and using sun-protection to avoid sunburns was preeminent. Several additional barriers and facilitators for sun-protection were identified. Conclusions: Holidaymakers might have a false sense of security when it comes to sun-exposure. They are aware of the need to protect from solar UVR, but the motive for a safe tan, the overreliance on sunscreen, the overestimation of the safe sun-exposure time for their skin type and the insufficient application of sunscreen leaves holidaymakers motivated to protect their skin at significant risk of overexposure, sunburn and skin cancer. Public health messages need to address how to implement effective sun-safe strategies.
Rodrigues, Angela M.; Sniehotta, Falko F.; Birch-Machin, Mark A.; Araujo-Soares, Vera
2017-01-01
ABSTRACT Background: This article presents an exploratory study, aiming to explore the correspondence between knowledge, motivation and sun-protection practices during holidays. Methods: Seventeen participants aged 21–62 years old, recruited from community settings took part in individual face-to-face semi-structured interviews, completed sun sensitivity questions and an objective assessment of sunscreen use. Holidaymakers’ knowledge about sun-safe messages, intentions and perceptions of barriers and facilitators for sun-protection were assessed. Qualitative data were analysed using thematic analysis and integrated with quantitative data, using a pragmatic theory-informed approach to synthesise the findings. Results: Participants were well informed about sun-safe messages, highly motivated to protect themselves from solar UV radiation (UVR) and they perceived themselves as well protected. However, they did not seem to use effective protective practices. Sunscreen was the preferred method of sun-protection, but most participants used considerably less than the recommended amount and significantly overestimated the amount of time they could be safely exposed. Seeking shade was the least used method of sun-protection and covering-up strategies were mostly implemented as a partial protection (i.e. hats or sunglasses). The desire to reach an optimal balance between getting a tan and using sun-protection to avoid sunburns was preeminent. Several additional barriers and facilitators for sun-protection were identified. Conclusions: Holidaymakers might have a false sense of security when it comes to sun-exposure. They are aware of the need to protect from solar UVR, but the motive for a safe tan, the overreliance on sunscreen, the overestimation of the safe sun-exposure time for their skin type and the insufficient application of sunscreen leaves holidaymakers motivated to protect their skin at significant risk of overexposure, sunburn and skin cancer. Public health messages need to address how to implement effective sun-safe strategies. PMID:28670503
Zhang, Liping; Zhu, Shaohui; Tang, Shanyu
2017-03-01
Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.
Reward and punishment sensitivity and alcohol use: the moderating role of executive control.
Jonker, Nienke C; Ostafin, Brian D; Glashouwer, Klaske A; van Hemel-Ruiter, Madelon E; de Jong, Peter J
2014-05-01
Reward sensitivity and to a lesser extent punishment sensitivity have been found to explain individual differences in alcohol use. Furthermore, many studies showed that addictive behaviors are characterized by impaired self-regulatory processes, and that individual differences related to alcohol use are moderated by executive control. This is the first study that explores the potential moderating role of executive control in the relation between reward and punishment sensitivity and alcohol use. Participants were 76 university students, selected on earlier given information about their alcohol use. Half of the participants indicated to drink little alcohol and half indicated to drink substantial amounts of alcohol. As expected, correlational analyses showed a positive relationship between reward sensitivity and alcohol use and a negative relation between punishment sensitivity and alcohol use. Regression analysis confirmed that reward sensitivity was a significant independent predictor of alcohol use. Executive control moderated the relation between punishment sensitivity and alcohol use, but not the relation between reward sensitivity and alcohol use. Only in individuals with weak executive control punishment sensitivity and alcohol use were negatively related. The results suggest that for individuals with weak executive control, punishment sensitivity might be a protective factor working against substantial alcohol use. Copyright © 2013 Elsevier Ltd. All rights reserved.
Methodological and ethical issues related to qualitative telephone interviews on sensitive topics.
Mealer, Meredith; Jones Rn, Jacqueline
2014-03-01
To explore the methodological and ethical issues of conducting qualitative telephone interviews about personal or professional trauma with critical care nurses. The most common method for conducting interviews is face-to-face. However, there is evidence to support telephone interviewing on a variety of sensitive topics including post-traumatic stress disorder (PTSD). Qualitative telephone interviews can limit emotional distress because of the comfort experienced through virtual communication. Critical care nurses are at increased risk of developing PTSD due to the cumulative exposure to work-related stress in the intensive care unit. We explored the methodological and ethical issues of conducting qualitative telephone interviews, drawing on our experiences communicating with a group of critical care nurses. Qualitative research interviews with 27 critical care nurses. Fourteen of the nurses met the diagnostic criteria for PTSD; 13 did not and had scores consistent with high levels of resilience. This is a methodology paper on the authors' experiences of interviewing critical care nurses on sensitive topics via the telephone. The authors found that establishing rapport and connections with the participants and the therapeutic use of non-verbal communication were essential, and fostered trust and compassion. The ethical issues of this mode of communication include protecting the privacy and confidentiality associated with the disclosure of sensitive information, and minimising the risk of psychological harm to the researcher and participants. Qualitative telephone interviews are a valuable method of collecting information on sensitive topics. This paper explores a method of interviewing in the workplace. It will help inform interventions to promote healthy adaptation following trauma exposure in the intensive care unit.
Safety: Radiation Protection Manual
1997-05-30
t e c h n i c a l publication requires it, (2) personnel are required to wear dosimetry , EM 385-1-80 30 May 97 2-4 (3) personnel are required to...of SOPs, review of dosimetry results, changes in standards or guidance, equipment changes, and any other pertinent radiation safety information that...Table 3-4. The EDE is used in dosimetry to account for different organs having different sensitivities to radiation. Table 3-4 Weighting Factors
ERIC Educational Resources Information Center
Stein, Ronald H.; Zuckerman, Judy
As an aid to college administrators, information is presented on the following regulations: (1) Protection of Human Subjects; (2) Title IX of the Educational Amendments of 1972; (3) the Occupational Safety and Health Act of 1970; and (4) Title VI of the Civil Rights Act of 1964. The purpose of the guide is to sensitize administrators to the…
Manning, Liviah G.; Davies, Patrick T.; Cicchetti, Dante
2014-01-01
This study examined sensitive parenting as a protective factor in relations between interparental violence and children’s coping and psychological adjustment. Using a multi-method approach, a high risk sample of 201 two-year olds and their mothers participated in three annual waves of data collection. Moderator analyses revealed that sensitive parenting buffered the risk posed by interparental violence on children’s changes in externalizing and prosocial development over a two year period. Tests of mediated moderation further indicated that sensitive parenting protected children from the vulnerability of growing up in a violent home through its association with lower levels of children’s angry reactivity to interparental conflict. Results highlight the significance of identifying the mechanisms that mediate protective factors in models of family adversity. PMID:25132541
Quantum-Limited Directional Amplifiers with Optomechanics
NASA Astrophysics Data System (ADS)
Malz, Daniel; Tóth, László D.; Bernier, Nathan R.; Feofanov, Alexey K.; Kippenberg, Tobias J.; Nunnenkamp, Andreas
2018-01-01
Directional amplifiers are an important resource in quantum-information processing, as they protect sensitive quantum systems from excess noise. Here, we propose an implementation of phase-preserving and phase-sensitive directional amplifiers for microwave signals in an electromechanical setup comprising two microwave cavities and two mechanical resonators. We show that both can reach their respective quantum limits on added noise. In the reverse direction, they emit thermal noise stemming from the mechanical resonators; we discuss how this noise can be suppressed, a crucial aspect for technological applications. The isolation bandwidth in both is of the order of the mechanical linewidth divided by the amplitude gain. We derive the bandwidth and gain-bandwidth product for both and find that the phase-sensitive amplifier has an unlimited gain-bandwidth product. Our study represents an important step toward flexible, on-chip integrated nonreciprocal amplifiers of microwave signals.
Geographic Data as Personal Data in Four EU Member States
NASA Astrophysics Data System (ADS)
de Jong, A. J.; van Loenen, B.; Zevenbergen, J. A.
2016-06-01
The EU Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data aims at harmonising data protection legislation in the European Union. This should promote the free flow of products and services within the EU. This research found a wide variety of interpretations of the application of data protection legislation to geographic data. The variety was found among the different EU Member States, the different stakeholders and the different types of geographic data. In the Netherlands, the Data Protection Authority (DPA) states that panoramic images of streets are considered personal data. While Dutch case law judges that the data protection legislation does not apply if certain features are blurred and no link to an address is provided. The topographic datasets studied in the case studies do not contain personal data, according to the Dutch DPA, while the German DPA and the Belgian DPA judge that topographic maps of a large scale can contain personal data, and impose conditions on the processing of topographic maps. The UK DPA does consider this data outside of the scope of legal definition of personal data. The patchwork of differences in data protection legislation can be harmonised by using a traffic light model. This model focuses on the context in which the processing of the data takes place and has four categories of data: (1) sensitive personal data, (2) personal data, (3), data that can possibly lead to identification, and (4) non-personal data. For some geographic data, for example factual data that does not reveal sensitive information about a person, can be categorised in the third category giving room to opening up data under the INSPIRE Directive.
Shabani, Mahsa; Borry, Pascal
2018-02-01
Genetic data contain sensitive health and non-health-related information about the individuals and their family members. Therefore, adopting adequate privacy safeguards is paramount when processing genetic data for research or clinical purposes. One of the major legal instruments for personal data protection in the EU is the new General Data Protection Regulation (GDPR), which has entered into force in May 2016 and repealed the Directive 95/46/EC, with an ultimate goal of enhancing effectiveness and harmonization of personal data protection in the EU. This paper explores the major provisions of the new Regulation with regard to processing genetic data, and assesses the influence of such provisions on reinforcing the legal safeguards when sharing genetic data for research purposes. The new Regulation attempts to elucidate the scope of personal data, by recognizing pseudonymized data as personal (identifiable) data, and including genetic data in the catalog of special categories of data (sensitive data). Moreover, a set of new rules is laid out in the Regulation for processing personal data under the scientific research exemption. For instance, further use of genetic data for scientific research purposes, without obtaining additional consent will be allowed, if the specific conditions is met. The new Regulation has already fueled concerns among various stakeholders, owing to the challenges that may emerge when implementing the Regulation across the countries. Notably, the provided definition for pseudonymized data has been criticized because it leaves too much room for interpretations, and it might undermine the harmonization of the data protection across the countries.
Investigation of a redox-sensitive predictive model of mouse embryonic stem cell differentiation via quantitative nuclease protection assays and glutathione redox status Chandler KJ,Hansen JM, Knudsen T,and Hunter ES 1. U.S. Environmental Protection Agency, Research Triangl...
An Alternative Time Metric to Modified Tau for Unmanned Aircraft System Detect And Avoid
NASA Technical Reports Server (NTRS)
Wu, Minghong G.; Bageshwar, Vibhor L.; Euteneuer, Eric A.
2017-01-01
A new horizontal time metric, Time to Protected Zone, is proposed for use in the Detect and Avoid (DAA) Systems equipped by unmanned aircraft systems (UAS). This time metric has three advantages over the currently adopted time metric, modified tau: it corresponds to a physical event, it is linear with time, and it can be directly used to prioritize intruding aircraft. The protected zone defines an area around the UAS that can be a function of each intruding aircraft's surveillance measurement errors. Even with its advantages, the Time to Protected Zone depends explicitly on encounter geometry and may be more sensitive to surveillance sensor errors than modified tau. To quantify its sensitivity, simulation of 972 encounters using realistic sensor models and a proprietary fusion tracker is performed. Two sensitivity metrics, the probability of time reversal and the average absolute time error, are computed for both the Time to Protected Zone and modified tau. Results show that the sensitivity of the Time to Protected Zone is comparable to that of modified tau if the dimensions of the protected zone are adequately defined.
Protection detail. Protecting against breach of electronic protected health information.
Blass, Gerry; Miller, Susan A
2010-01-01
Covered entities need to conduct risk assessments that cover the requirements of HIPAA, HITECH and Meaningful use, and create a process for steady and consistent mitigation of known gaps and vulnerabilities based on risk. Reducing risk of vulnerabilities of unauthorized access to your ePHI can be done via safeguards and controls, plus audits and monitoring. When reducing risk is outside of a covered entities control, audits and monitoring are required in order to demonstrate due diligence. Know where your ePHI is stored, where it is at risk, and take steps now to reduce or eliminate the risk. Encrypt vulnerable locations. Encrypt sensitive data. By doing so, you will be protecting your organization by reducing risk of breach of ePHI. Finally, don't forget what is sometimes considered to be the hardest part--documenting your compliance activities in order to demonstrate evidence of due diligence in and avoid major $$$$ penalties for negligence under the HITECH Act of 2009.
Schijven, J F; Mülschlegel, J H C; Hassanizadeh, S M; Teunis, P F M; de Roda Husman, A M
2006-09-01
Protection zones of shallow unconfined aquifers in The Netherlands were calculated that allow protection against virus contamination to the level that the infection risk of 10(-4) per person per year is not exceeded with a 95% certainty. An uncertainty and a sensitivity analysis of the calculated protection zones were included. It was concluded that protection zones of 1 to 2 years travel time (206-418 m) are needed (6 to 12 times the currently applied travel time of 60 days). This will lead to enlargement of protection zones, encompassing 110 unconfined groundwater well systems that produce 3 x 10(8) m3 y(-1) of drinking water (38% of total Dutch production from groundwater). A smaller protection zone is possible if it can be shown that an aquifer has properties that lead to greater reduction of virus contamination, like more attachment. Deeper aquifers beneath aquitards of at least 2 years of vertical travel time are adequately protected because vertical flow in the aquitards is only 0.7 m per year. The most sensitive parameters are virus attachment and inactivation. The next most sensitive parameters are grain size of the sand, abstraction rate of groundwater, virus concentrations in raw sewage and consumption of unboiled drinking water. Research is recommended on additional protection by attachment and under unsaturated conditions.
Digression and Value Concatenation to Enable Privacy-Preserving Regression.
Li, Xiao-Bai; Sarkar, Sumit
2014-09-01
Regression techniques can be used not only for legitimate data analysis, but also to infer private information about individuals. In this paper, we demonstrate that regression trees, a popular data-analysis and data-mining technique, can be used to effectively reveal individuals' sensitive data. This problem, which we call a "regression attack," has not been addressed in the data privacy literature, and existing privacy-preserving techniques are not appropriate in coping with this problem. We propose a new approach to counter regression attacks. To protect against privacy disclosure, our approach introduces a novel measure, called digression , which assesses the sensitive value disclosure risk in the process of building a regression tree model. Specifically, we develop an algorithm that uses the measure for pruning the tree to limit disclosure of sensitive data. We also propose a dynamic value-concatenation method for anonymizing data, which better preserves data utility than a user-defined generalization scheme commonly used in existing approaches. Our approach can be used for anonymizing both numeric and categorical data. An experimental study is conducted using real-world financial, economic and healthcare data. The results of the experiments demonstrate that the proposed approach is very effective in protecting data privacy while preserving data quality for research and analysis.
Hagendorens, M M; Bridts, C H; Lauwers, K; van Nuijs, S; Ebo, D G; Vellinga, A; De Clerck, L S; Van Bever, H P; Weyler, J J; Stevens, W J
2005-06-01
To evaluate the influence of perinatal environmental factors on early sensitization, atopic dermatitis and wheezing during the first year. Information on pregnancy-related factors, parental atopic history, environmental factors and the clinical course of the infant until age one was gathered by questionnaires, as part of a prospective birth cohort study (Prospective study on the Influence of Perinatal factors on the Occurrence of asthma and allergies [PIPO-study]). Quantification of total and specific IgE was performed in 810 children and their parents. Early sensitization was found in 107/810 (13%) of the infants. Multiple regression analysis showed that specific IgE in fathers was a risk factor for early sensitization in their daughters (adjusted odds ratios (OR(adj)) 2.21 (95% confidence interval (CI) 1.10-4.49); P=0.03), whereas in boys, day care attendance was shown to be protective for early sensitization (OR(adj) 0.38 (95% CI 0.20-0.71); P=0.001). Atopic dermatitis occurred in 195/792 infants (25%). Specific IgE in the mother (OR(adj) 1.52 (95% CI 1.06-2.19); P=0.02) and in the infant (OR(adj) 4.20 (95% CI 2.63-6.68); P<0.001) were both risk factors for the occurence of atopic dermatitis, whereas postnatal exposure to cats was negatively associated with atopic dermatitis (OR(adj) 0.68 (0.47-0.97); P=0.03). Postnatal exposure to cigarette smoke (OR(adj) 3.31 (95% CI 1.79-6.09); P<0.001) and day care attendance (OR(adj) 1.96 (95% CI 1.18-3.23); P=0.009) were significantly associated with early wheezing, which occurred in 25% (197/795) of the infants. The effect of paternal sensitization and day care attendance on sensitization is gender dependent. Maternal sensitization predisposes for atopic dermatitis, whereas postnatal exposure to cats had a protective effect.
BoB, a best-of-breed automated text de-identification system for VHA clinical documents.
Ferrández, Oscar; South, Brett R; Shen, Shuying; Friedlin, F Jeffrey; Samore, Matthew H; Meystre, Stéphane M
2013-01-01
De-identification allows faster and more collaborative clinical research while protecting patient confidentiality. Clinical narrative de-identification is a tedious process that can be alleviated by automated natural language processing methods. The goal of this research is the development of an automated text de-identification system for Veterans Health Administration (VHA) clinical documents. We devised a novel stepwise hybrid approach designed to improve the current strategies used for text de-identification. The proposed system is based on a previous study on the best de-identification methods for VHA documents. This best-of-breed automated clinical text de-identification system (aka BoB) tackles the problem as two separate tasks: (1) maximize patient confidentiality by redacting as much protected health information (PHI) as possible; and (2) leave de-identified documents in a usable state preserving as much clinical information as possible. We evaluated BoB with a manually annotated corpus of a variety of VHA clinical notes, as well as with the 2006 i2b2 de-identification challenge corpus. We present evaluations at the instance- and token-level, with detailed results for BoB's main components. Moreover, an existing text de-identification system was also included in our evaluation. BoB's design efficiently takes advantage of the methods implemented in its pipeline, resulting in high sensitivity values (especially for sensitive PHI categories) and a limited number of false positives. Our system successfully addressed VHA clinical document de-identification, and its hybrid stepwise design demonstrates robustness and efficiency, prioritizing patient confidentiality while leaving most clinical information intact.
Hormetic modulation of hepatic insulin sensitivity by advanced glycation end products.
Fabre, Nelly T; Thieme, Karina; Silva, Karolline S; Catanozi, Sérgio; Cavaleiro, Ana Mercedes; Pinto, Danilo A C; Okamoto, Maristela M; Morais, Mychel Raony P T; Falquetto, Bárbara; Zorn, Telma M; Machado, Ubiratan F; Passarelli, Marisa; Correa-Giannella, Maria Lúcia
2017-05-15
Because of the paucity of information regarding metabolic effects of advanced glycation end products (AGEs) on liver, we evaluated effects of AGEs chronic administration in (1) insulin sensitivity; (2) hepatic expression of genes involved in AGEs, glucose and fat metabolism, oxidative stress and inflammation and; (3) hepatic morphology and glycogen content. Rats received intraperitoneally albumin modified (AlbAGE) or not by advanced glycation for 12 weeks. AlbAGE induced whole-body insulin resistance concomitantly with increased hepatic insulin sensitivity, evidenced by activation of AKT, inactivation of GSK3, increased hepatic glycogen content, and decreased expression of gluconeogenesis genes. Additionally there was reduction in hepatic fat content, in expression of lipogenic, pro-inflamatory and pro-oxidative genes and increase in reactive oxygen species and in nuclear expression of NRF2, a transcription factor essential to cytoprotective response. Although considered toxic, AGEs become protective when administered chronically, stimulating AKT signaling, which is involved in cellular defense and insulin sensitivity. Copyright © 2017 Elsevier B.V. All rights reserved.
An updated look at document security: from initiation to storage or shredder.
McConnell, Charles R
2014-01-01
In these days of close attention to security of information handled electronically, there is often a tendency to overlook the security of hard-copy documents. Document security can involve many areas of business, but the health care department manager's concerns are primarily for patient records and employee documentation. Document security is closely related to growing concerns for individual privacy; guidelines are furnished for protecting employee privacy by separating retention practices for business information from personal information. Sensitive documentation requires rules and procedures for processing, retaining, accessing, storing, and eventually destroying. Also, documents that are missing or incomplete at times present unique problems for the organization. The department manager is provided with some simple rules for safeguarding employee and patient documentation.
Graham, Christine E.; Basappa, Johnvesly; Turcan, Sevin; Vetter, Douglas E.
2011-01-01
A key requirement for encoding the auditory environment is the ability to dynamically alter cochlear sensitivity. However, merely attaining a steady state of maximal sensitivity is not a viable solution since the sensory cells and ganglion cells of the cochlea are prone to damage following exposure to loud sound. Most often, such damage is via initial metabolic insult that can lead to cellular death. Thus, establishing the highest sensitivity must be balanced with protection against cellular metabolic damage that can lead to loss of hair cells and ganglion cells, resulting in loss of frequency representation. While feedback mechanisms are known to exist in the cochlea that alter sensitivity, they respond only after stimulus encoding, allowing potentially damaging sounds to impact the inner ear at times coincident with increased sensitivity. Thus, questions remain concerning the endogenous signaling systems involved in dynamic modulation of cochlear sensitivity and protection against metabolic stress. Understanding endogenous signaling systems involved in cochlear protection may lead to new strategies and therapies for prevention of cochlear damage and consequent hearing loss. We have recently discovered a novel cochlear signaling system that is molecularly equivalent to the classic hypothalamic-pituitary-adrenal (HPA) axis. This cochlear HPA-equivalent system functions to balance auditory sensitivity and susceptibility to noise-induced hearing loss, and also protects against cellular metabolic insults resulting from exposures to ototoxic drugs. We review the anatomy, physiology, and cellular signaling of this system, and compare it to similar signaling in other organs/tissues of the body. PMID:21909974
Threshold Things That Think: Authorisation for Resharing
NASA Astrophysics Data System (ADS)
Peeters, Roel; Kohlweiss, Markulf; Preneel, Bart
As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.
The co-evolution of networks and prisoner's dilemma game by considering sensitivity and visibility.
Li, Dandan; Ma, Jing; Han, Dun; Sun, Mei; Tian, Lixin; Stanley, H Eugene
2017-03-24
Strategies adopted by individuals in a social network significantly impact the network, and they strongly affect relationships between individuals in the network. Links between individuals also heavily influence their levels of cooperation. Taking into account the evolution of each individual's connection, we explore how sensitivity and visibility affect the prisoner's dilemma game. The so-called 'sensitivity' and 'visibility' respectively present one's self-protection consciousness and the ability of gaining information. We find that at moderate levels of player sensitivity cooperative behavior increases, but that at high levels it is inhibited. We also find that the heterogeneity of the weight of individuals at the end of the game is higher when sensitivity and visibility are increased, but that the successful-defection-payoff has less impact on the weight of individuals and on the relationship between the heterogeneity of the weight of individuals and the density of cooperators. This framework can be used to clarify the interaction mechanism between the micro-level of individual behavior and the macro-level of individual co-evolutionary processes.
Saarman, Emily T.; Owens, Brian; Murray, Steven N.; Weisberg, Stephen B.; Field, John C.; Nielsen, Karina J.
2018-01-01
There are numerous reasons to conduct scientific research within protected areas, but research activities may also negatively impact organisms and habitats, and thus conflict with a protected area’s conservation goals. We developed a quantitative ecological decision-support framework that estimates these potential impacts so managers can weigh costs and benefits of proposed research projects and make informed permitting decisions. The framework generates quantitative estimates of the ecological impacts of the project and the cumulative impacts of the proposed project and all other projects in the protected area, and then compares the estimated cumulative impacts of all projects with policy-based acceptable impact thresholds. We use a series of simplified equations (models) to assess the impacts of proposed research to: a) the population of any targeted species, b) the major ecological assemblages that make up the community, and c) the physical habitat that supports protected area biota. These models consider both targeted and incidental impacts to the ecosystem and include consideration of the vulnerability of targeted species, assemblages, and habitats, based on their recovery time and ecological role. We parameterized the models for a wide variety of potential research activities that regularly occur in the study area using a combination of literature review and expert judgment with a precautionary approach to uncertainty. We also conducted sensitivity analyses to examine the relationships between model input parameters and estimated impacts to understand the dominant drivers of the ecological impact estimates. Although the decision-support framework was designed for and adopted by the California Department of Fish and Wildlife for permitting scientific studies in the state-wide network of marine protected areas (MPAs), the framework can readily be adapted for terrestrial and freshwater protected areas. PMID:29920527
Pratt, Harry; Hassanin, Kareem; Troughton, Lee D; Czanner, Gabriela; Zheng, Yalin; McCormick, Austin G; Hamill, Kevin J
2017-01-01
Application of sunscreen is a widely used mechanism for protecting skin from the harmful effects of UV light. However, protection can only be achieved through effective application, and areas that are routinely missed are likely at increased risk of UV damage. Here we sought to determine if specific areas of the face are missed during routine sunscreen application, and whether provision of public health information is sufficient to improve coverage. To investigate this, 57 participants were imaged with a UV sensitive camera before and after sunscreen application: first visit; minimal pre-instruction, second visit; provided with a public health information statement. Images were scored using a custom automated image analysis process designed to identify areas of high UV reflectance, i.e. missed during sunscreen application, and analysed for 5% significance. Analyses revealed eyelid and periorbital regions to be disproportionately missed during routine sunscreen application (median 14% missed in eyelid region vs 7% in rest of face, p<0.01). Provision of health information caused a significant improvement in coverage to eyelid areas in general however, the medial canthal area was still frequently missed. These data reveal that a public health announcement-type intervention could be effective at improving coverage of high risk areas of the face, however high risk areas are likely to remain unprotected therefore other mechanisms of sun protection should be widely promoted such as UV blocking sunglasses.
An Integrated Framework for Multipollutant Air Quality Management and Its Application in Georgia
NASA Astrophysics Data System (ADS)
Cohan, Daniel S.; Boylan, James W.; Marmur, Amit; Khan, Maudood N.
2007-10-01
Air protection agencies in the United States increasingly confront non-attainment of air quality standards for multiple pollutants sharing interrelated emission origins. Traditional approaches to attainment planning face important limitations that are magnified in the multipollutant context. Recognizing those limitations, the Georgia Environmental Protection Division has adopted an integrated framework to address ozone, fine particulate matter, and regional haze in the state. Rather than applying atmospheric modeling merely as a final check of an overall strategy, photochemical sensitivity analysis is conducted upfront to compare the effectiveness of controlling various precursor emission species and source regions. Emerging software enables the modeling of health benefits and associated economic valuations resulting from air pollution control. Photochemical sensitivity and health benefits analyses, applied together with traditional cost and feasibility assessments, provide a more comprehensive characterization of the implications of various control options. The fuller characterization both informs the selection of control options and facilitates the communication of impacts to affected stakeholders and the public. Although the integrated framework represents a clear improvement over previous attainment-planning efforts, key remaining shortcomings are also discussed.
Getting the Biggest Bang for Your Buck: Wildlife Monitoring on Shrublands of the Nevada Test Site
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Derek B.; Greger, Paul D.
The Nevada Test Site (NTS) covers 3,561 km2 and extends over portions of both the Mojave and Great Basin Deserts. The resulting diverse and complex flora and fauna exhibit elements of both deserts. There are 20 vegetation associations, composed primarily of shrubs, nested within 10 vegetation alliances. Of the more than 1,200 invertebrate and 339 vertebrate species found in these shrubland habitats, 267 are considered sensitive or protected/regulated by federal or state laws. Wildlife and wildlife habitat monitoring ensures NTS activities comply with all federal and state laws enacted for the protection of these valuable biological resources and provides ecologicalmore » information that can be used to predict and evaluate the potential impacts of proposed projects and current activities on these resources. This paper describes the monitoring approach used at this large site. Monitoring strategies include conducting preactivity surveys, proactively monitoring sensitive species, monitoring long-term population trends, and collaborating with other agencies and biologists. Ways to make monitoring more efficient and examples of successful monitoring and collaborations are discussed.« less
An integrated framework for multipollutant air quality management and its application in Georgia.
Cohan, Daniel S; Boylan, James W; Marmur, Amit; Khan, Maudood N
2007-10-01
Air protection agencies in the United States increasingly confront non-attainment of air quality standards for multiple pollutants sharing interrelated emission origins. Traditional approaches to attainment planning face important limitations that are magnified in the multipollutant context. Recognizing those limitations, the Georgia Environmental Protection Division has adopted an integrated framework to address ozone, fine particulate matter, and regional haze in the state. Rather than applying atmospheric modeling merely as a final check of an overall strategy, photochemical sensitivity analysis is conducted upfront to compare the effectiveness of controlling various precursor emission species and source regions. Emerging software enables the modeling of health benefits and associated economic valuations resulting from air pollution control. Photochemical sensitivity and health benefits analyses, applied together with traditional cost and feasibility assessments, provide a more comprehensive characterization of the implications of various control options. The fuller characterization both informs the selection of control options and facilitates the communication of impacts to affected stakeholders and the public. Although the integrated framework represents a clear improvement over previous attainment-planning efforts, key remaining shortcomings are also discussed.
Protecting single-photon entanglement with practical entanglement source
NASA Astrophysics Data System (ADS)
Zhou, Lan; Ou-Yang, Yang; Wang, Lei; Sheng, Yu-Bo
2017-06-01
Single-photon entanglement (SPE) is important for quantum communication and quantum information processing. However, SPE is sensitive to photon loss. In this paper, we discuss a linear optical amplification protocol for protecting SPE. Different from the previous protocols, we exploit the practical spontaneous parametric down-conversion (SPDC) source to realize the amplification, for the ideal entanglement source is unavailable in current quantum technology. Moreover, we prove that the amplification using the entanglement generated from SPDC source as auxiliary is better than the amplification assisted with single photons. The reason is that the vacuum state from SPDC source will not affect the amplification, so that it can be eliminated automatically. This protocol may be useful in future long-distance quantum communications.
Security Protection on Trust Delegated Data in Public Mobile Networks
NASA Astrophysics Data System (ADS)
Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin
This paper provides detailed solutions for trust delegation and security protection for medical records in public mobile communication networks. The solutions presented in this paper enable the development of software for mobile devices that can be used by emergency medical units in urgent need of sensitive personal information about unconscious patients. In today's world, technical improvements in mobile communication systems mean that users can expect to have access to data at any time regardless of their location. This paper presents a token-based procedure for the data security at a mobile device and delegation of trust between a requesting mobile unit and secure medical data storage. The data security at the mobile device is enabled using identity based key generation methodology.
Using LTI Dynamics to Identify the Influential Nodes in a Network
Jorswieck, Eduard; Scheunert, Christian
2016-01-01
Networks are used for modeling numerous technical, social or biological systems. In order to better understand the system dynamics, it is a matter of great interest to identify the most important nodes within the network. For a large set of problems, whether it is the optimal use of available resources, spreading information efficiently or even protection from malicious attacks, the most important node is the most influential spreader, the one that is capable of propagating information in the shortest time to a large portion of the network. Here we propose the Node Imposed Response (NiR), a measure which accurately evaluates node spreading power. It outperforms betweenness, degree, k-shell and h-index centrality in many cases and shows the similar accuracy to dynamics-sensitive centrality. We utilize the system-theoretic approach considering the network as a Linear Time-Invariant system. By observing the system response we can quantify the importance of each node. In addition, our study provides a robust tool set for various protective strategies. PMID:28030548
[National Database of Genotypes--ethical and legal issues].
Franková, Vera; Tesínová, Jolana; Brdicka, Radim
2011-01-01
National Database of Genotypes--ethical and legal issues The aim of the project National Database of Genotypes is to outline structure and rules for the database operation collecting information about genotypes of individual persons. The database should be used entirely for health care. Its purpose is to enable physicians to gain quick and easy access to the information about persons requiring specialized care due to their genetic constitution. In the future, another introduction of new genetic tests into the clinical practice can be expected thus the database of genotypes facilitates substantial financial savings by exclusion of duplicates of the expensive genetic testing. Ethical questions connected with the creating and functioning of such database concern mainly privacy protection, confidentiality of personal sensitive data, protection of database from misuse, consent with participation and public interests. Due to necessity of correct interpretation by qualified professional (= clinical geneticist), particular categorization of genetic data within the database is discussed. The function of proposed database has to be governed in concordance with the Czech legislation together with solving ethical problems.
Privacy by design in personal health monitoring.
Nordgren, Anders
2015-06-01
The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted.
Privacy protection for HealthGrid applications.
Claerhout, B; De Moor, G J E
2005-01-01
This contribution aims at introducing the problem of privacy protection in e-Health and at describing a number of existing privacy enhancing techniques (PETs). The recognition that privacy constitutes a fundamental right is gradually entering public awareness. Because healthcare-related data are susceptible to being abused for many obvious reasons, public apprehension about privacy has focused on medical data. Public authorities have become convinced of the need to enforce privacy protection and make considerable efforts for promoting through privacy protection legislation the deployment of PETs. Based on the study of the specific features of Grid technology, ways in which PET services could be integrated in the HealthGrid are being analyzed. Grid technology aims at removing barriers between local and remote resources. The privacy and legal issues raised by the HealthGrid are caused by the transparent interchange and processing of sensitive medical information. PET technology has already proven its usefulness for privacy protection in health-related marketing and research data collection. While this paper does not describe market-ready solutions for privacy protection in the HealthGrid, it puts forward several cases in which the Grid may benefit from PETs. Early integration of privacy protection services into the HealthGrid can lead to a synergy that is beneficial for the development of the HealthGrid itself.
Aguirre-Sierra, Aránzazu; Alonso, Alvaro; Camargo, Julio A
2011-05-01
In contrast to aquatic vertebrates, there is scarce available information on the contrasting tolerance to fluoride of different life stages and/or sizes of aquatic invertebrates. The purpose of this study was to assess the likely differences in sensitivity between juveniles and adults of the aquatic snail Potamopyrgus antipodarum (Hydrobiidae, Mollusca) to short-term (4 days) toxicity of fluoride ion (F(-)). LC50 and EC50 values for juveniles were significantly lower than those for adults at 24, 48, 72 and 96 h. Based on our results, the use of fluoride data of bioassays with juveniles should provide more protective water quality criteria than data from adult stage. © Springer Science+Business Media, LLC 2011
Xu, Xin; Zhu, Ping; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua; He, Lian
2014-01-01
In the field of the Telecare Medicine Information System, recent researches have focused on consummating more convenient and secure healthcare delivery services for patients. In order to protect the sensitive information, various attempts such as access control have been proposed to safeguard patients' privacy in this system. However, these schemes suffered from some certain security defects and had costly consumption, which were not suitable for the telecare medicine information system. In this paper, based on the elliptic curve cryptography, we propose a secure and efficient two-factor mutual authentication and key agreement scheme to reduce the computational cost. Such a scheme enables to provide the patient anonymity by employing the dynamic identity. Compared with other related protocols, the security analysis and performance evaluation show that our scheme overcomes some well-known attacks and has a better performance in the telecare medicine information system.
Explore Awareness of Information Security: Insights from Cognitive Neuromechanism.
Han, Dongmei; Dai, Yonghui; Han, Tianlin; Dai, Xingyun
2015-01-01
With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people's awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people's awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG) signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people's cognition of potential risks in online financial payment.
Explore Awareness of Information Security: Insights from Cognitive Neuromechanism
Han, Dongmei; Han, Tianlin; Dai, Xingyun
2015-01-01
With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people's awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people's awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG) signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people's cognition of potential risks in online financial payment. PMID:26587017
'I can't tell my child they are dying'. Helping parents have conversations with their child.
Aldridge, J; Shimmon, K; Miller, M; Fraser, L K; Wright, B
2017-08-01
This paper explores the challenges of resolving conflicting feelings around talking with a child about their terminal prognosis. When children are left out of such conversations it is usually done with good intent, with a parent wishing to protect their child from anxiety or loss of hope. There is however growing evidence that sensitive, timely, age appropriate information from those with whom children have a good relationship is helpful both for the child and their family. There is no evidence that involving children in sensitive and timely discussions creates significant problems, rather that withholding information may lead to confusion, frustration, distress and anger. The authors discuss ways in which families can be supported to have these significant conversations with their children. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
2004-09-01
to provide access to and protect are the NG Game Code, Employee Files, E -MAIL, Marketing Plans and Legacy Code. The NG Game Code is the MOST...major hit. E -MAIL is classified NON- SENSITIVE. The Marketing Plans are for the NG Game Code. They contain information concerning what the new...simulation games currently on the market except that, rather than allowing players to choose rides, refreshments and facilities, CyberCIEGE will
Acute toxicity value extrapolation with fish and aquatic invertebrates
Buckler, Denny R.; Mayer, Foster L.; Ellersieck, Mark R.; Asfaw, Amha
2005-01-01
Assessment of risk posed by an environmental contaminant to an aquatic community requires estimation of both its magnitude of occurrence (exposure) and its ability to cause harm (effects). Our ability to estimate effects is often hindered by limited toxicological information. As a result, resource managers and environmental regulators are often faced with the need to extrapolate across taxonomic groups in order to protect the more sensitive members of the aquatic community. The goals of this effort were to 1) compile and organize an extensive body of acute toxicity data, 2) characterize the distribution of toxicant sensitivity across taxa and species, and 3) evaluate the utility of toxicity extrapolation methods based upon sensitivity relations among species and chemicals. Although the analysis encompassed a wide range of toxicants and species, pesticides and freshwater fish and invertebrates were emphasized as a reflection of available data. Although it is obviously desirable to have high-quality acute toxicity values for as many species as possible, the results of this effort allow for better use of available information for predicting the sensitivity of untested species to environmental contaminants. A software program entitled “Ecological Risk Analysis” (ERA) was developed that predicts toxicity values for sensitive members of the aquatic community using species sensitivity distributions. Of several methods evaluated, the ERA program used with minimum data sets comprising acute toxicity values for rainbow trout, bluegill, daphnia, and mysids provided the most satisfactory predictions with the least amount of data. However, if predictions must be made using data for a single species, the most satisfactory results were obtained with extrapolation factors developed for rainbow trout (0.412), bluegill (0.331), or scud (0.041). Although many specific exceptions occur, our results also support the conventional wisdom that invertebrates are generally more sensitive to contaminants than fish are.
Reflex Cough and Disease Duration as Predictors of Swallowing Dysfunction in Parkinson's Disease.
Troche, Michelle S; Schumann, Beate; Brandimore, Alexandra E; Okun, Michael S; Hegland, Karen W
2016-12-01
Patients with Parkinson's disease (PD) have progressive and pervasive disorders of airway protection. Recent work has highlighted the relationship between reflex and voluntary cough and swallowing safety. The goal of this study was to test the sensitivity and specificity of several airway protective and disease-specific factors for predicting swallowing safety outcomes in PD. Sixty-four participants (44 males) completed measures of voluntary and reflex cough, and swallowing safety. Clinical predictors included disease severity and duration, and cough airflow and sensitivity measures. ROC and Chi-square analyses identified predictors of swallowing safety (penetration-aspiration score) in PD. Disease duration significantly discriminated between patients with normal and abnormal swallowing safety (p = 0.027, sensitivity: 71 %, specificity: 55.4 %). Cough reflex sensitivity significantly discriminated between patients who penetrated above the level of the vocal folds and those with more severe penetration/aspiration (p = 0.021, sensitivity: 71.0 %, specificity 57.6 %). Urge-to-cough sensitivity (log-log linear slope) was the only variable which significantly discriminated between patients with penetration versus aspiration (p = 0.017, sensitivity: 85.7 %, specificity 73.2 %). It is important to identify the factors which influence airway protective outcomes in PD especially given that aspiration pneumonia is a leading cause of death. Results from this study highlight the ecological validity of reflex cough in the study of airway protection and this study further identifies important factors to consider in the screening of airway protective deficits in PD.
Using citizen science data to identify the sensitivity of species to human land use.
Todd, Brian D; Rose, Jonathan P; Price, Steven J; Dorcas, Michael E
2016-12-01
Conservation practitioners must contend with an increasing array of threats that affect biodiversity. Citizen scientists can provide timely and expansive information for addressing these threats across large scales, but their data may contain sampling biases. We used randomization procedures to account for possible sampling biases in opportunistically reported citizen science data to identify species' sensitivities to human land use. We analyzed 21,044 records of 143 native reptile and amphibian species reported to the Carolina Herp Atlas from North Carolina and South Carolina between 1 January 1990 and 12 July 2014. Sensitive species significantly associated with natural landscapes were 3.4 times more likely to be legally protected or treated as of conservation concern by state resource agencies than less sensitive species significantly associated with human-dominated landscapes. Many of the species significantly associated with natural landscapes occurred primarily in habitats that had been nearly eradicated or otherwise altered in the Carolinas, including isolated wetlands, longleaf pine savannas, and Appalachian forests. Rare species with few reports were more likely to be associated with natural landscapes and 3.2 times more likely to be legally protected or treated as of conservation concern than species with at least 20 reported occurrences. Our results suggest that opportunistically reported citizen science data can be used to identify sensitive species and that species currently restricted primarily to natural landscapes are likely at greatest risk of decline from future losses of natural habitat. Our approach demonstrates the usefulness of citizen science data in prioritizing conservation and in helping practitioners address species declines and extinctions at large extents. © 2016 Society for Conservation Biology.
Bennett, Gloria A.; Elder, Michael G.; Kemme, Joseph E.
1985-01-01
An apparatus which thermally protects sensitive components in tools used in a geothermal borehole. The apparatus comprises a Dewar within a housing. The Dewar contains heat pipes such as brass heat pipes for thermally conducting heat from heat sensitive components to a heat sink such as ice.
Cognitive capital, equity and child-sensitive social protection in Asia and the Pacific.
Samson, Michael; Fajth, Gaspar; François, Daphne
2016-01-01
Promoting child development and welfare delivers human rights and builds sustainable economies through investment in 'cognitive capital'. This analysis looks at conditions that support optimal brain development in childhood and highlights how social protection promotes these conditions and strengthens the achievement of the Sustainable Development Goals (SDGs) in Asia and the Pacific. Embracing child-sensitive social protection offers multiple benefits. The region has been a leader in global poverty reduction but the underlying pattern of economic growth exacerbates inequality and is increasingly unsustainable. The strategy of channelling low-skilled rural labour to industrial jobs left millions of children behind with limited opportunities for development. Building child-sensitive social protection and investing better in children's cognitive capacity could check these trends and trigger powerful long-term human capital development-enabling labour productivity to grow faster than populations age. While governments are investing more in social protection, the region's spending remains low by international comparison. Investment is particularly inadequate where it yields the highest returns: during the first 1000 days of life. Five steps are recommended for moving forward: (1) building cognitive capital by adjusting the region's development paradigms to reflect better the economic and social returns from investing in children; (2) understand and track better child poverty and vulnerability; (3) progressively build universal, child-sensitive systems that strengthen comprehensive interventions within life cycle frameworks; (4) mobilise national resources for early childhood investments and child-sensitive social protection; and (5) leverage the SDGs and other channels of national and international collaboration.
Rico, Andreu; Van den Brink, Paul J
2015-08-01
In the present study, the authors evaluated the vulnerability of aquatic invertebrates to insecticides based on their intrinsic sensitivity and their population-level recovery potential. The relative sensitivity of invertebrates to 5 different classes of insecticides was calculated at the genus, family, and order levels using the acute toxicity data available in the US Environmental Protection Agency ECOTOX database. Biological trait information was linked to the calculated relative sensitivity to evaluate correlations between traits and sensitivity and to calculate a vulnerability index, which combines intrinsic sensitivity and traits describing the recovery potential of populations partially exposed to insecticides (e.g., voltinism, flying strength, occurrence in drift). The analysis shows that the relative sensitivity of arthropods depends on the insecticide mode of action. Traits such as degree of sclerotization, size, and respiration type showed good correlation to sensitivity and can be used to make predictions for invertebrate taxa without a priori sensitivity knowledge. The vulnerability analysis revealed that some of the Ephemeroptera, Plecoptera, and Trichoptera taxa were vulnerable to all insecticide classes and indicated that particular gastropod and bivalve species were potentially vulnerable. Microcrustaceans (e.g., daphnids, copepods) showed low potential vulnerability, particularly in lentic ecosystems. The methods described in the present study can be used for the selection of focal species to be included as part of ecological scenarios and higher tier risk assessments. © 2015 SETAC.
Basketter, D A; Selbie, E; Scholes, E W; Lees, D; Kimber, I; Botham, P A
1993-01-01
The guinea pig maximization test and the Buehler occluded patch test are used widely to identify the sensitization potential of new chemicals. This information enables toxicologists and/or regulatory authorities to determine whether a chemical should be classified formally as a skin sensitizer. Both to improve and to harmonize these assessments internationally, the OECD has recommended recently that moderate rather than strong contact sensitizers are used as positive control substances. The purpose is to ensure an adequate level of sensitivity in sensitization assays performed at specific testing establishments. Results from two laboratories reported here show that the minimum acceptable standard laid down by the OECD can be achieved and indeed commonly exceeded by a substantial margin. Furthermore, results with these positive controls in a new method, the local lymph node assay, also appear to satisfy similar criteria, suggesting results from this assay, including negative data, should be acceptable for classification purposes. However, a review of the way in which results with new chemicals will be interpreted for regulatory purposes, in the context of positive control data, reveals that considerable inadequacies still exist. It is recommended that ultimately, sensitization data can only be interpreted meaningfully (i.e. to protect humans from sensitization hazards) by considering the potency of the contact allergen in the context of the sensitivity of the assay performed at the particular testing institution.
Wang, Joshua W; Jagu, Subhashini; Wang, Chenguang; Kitchener, Henry C; Daayana, Sai; Stern, Peter L; Pang, Susana; Day, Patricia M; Huh, Warner K; Roden, Richard B S
2014-01-01
Antibodies specific for neutralizing epitopes in either Human papillomavirus (HPV) capsid protein L1 or L2 can mediate protection from viral challenge and thus their accurate and sensitive measurement at high throughput is likely informative for monitoring response to prophylactic vaccination. Here we compare measurement of L1 and L2-specific neutralizing antibodies in human sera using the standard Pseudovirion-Based Neutralization Assay (L1-PBNA) with the newer Furin-Cleaved Pseudovirion-Based Neutralization Assay (FC-PBNA), a modification of the L1-PBNA intended to improve sensitivity towards L2-specific neutralizing antibodies without compromising assay of L1-specific responses. For detection of L1-specific neutralizing antibodies in human sera, the FC- PBNA and L1-PBNA assays showed similar sensitivity and a high level of correlation using WHO standard sera (n = 2), and sera from patients vaccinated with Gardasil (n = 30) or an experimental human papillomavirus type 16 (HPV16) L1 VLP vaccine (n = 70). The detection of L1-specific cross-neutralizing antibodies in these sera using pseudovirions of types phylogenetically-related to those targeted by the L1 virus-like particle (VLP) vaccines was also consistent between the two assays. However, for sera from patients (n = 17) vaccinated with an L2-based immunogen (TA-CIN), the FC-PBNA was more sensitive than the L1-PBNA in detecting L2-specific neutralizing antibodies. Further, the neutralizing antibody titers measured with the FC-PBNA correlated with those determined with the L2-PBNA, another modification of the L1-PBNA that spacio-temporally separates primary and secondary receptor engagement, as well as the protective titers measured using passive transfer studies in the murine genital-challenge model. In sum, the FC-PBNA provided sensitive measurement for both L1 VLP and L2-specific neutralizing antibody in human sera. Vaccination with TA-CIN elicits weak cross-protective antibody in a subset of patients, suggesting the need for an adjuvant.
Regulation, Privacy and Security: Chairman's Opening Remarks
Gabrieli, E.R.
1979-01-01
Medical privacy is a keystone of a free democratic society. To conserve the right of the patient to medical privacy, computerization of the medical data must be regulated. This paper enumerates some steps to be taken urgently for the protection of computerized sensitive medical data. A computer-oriented medical lexicon is urgently needed for accurate coding. Health industry standards should be drafted. The goals of various data centers must be sharply defined to avoid conflicts of interest. Medical privacy should be studied further, and medical data centers should consider cost-effectiveness. State boards for medical privacy should be created to monitor data security procedures. There is a need for purposeful decentralization. A national medical information policy should be drafted, and a national clinical information board should implement the nation's medical information policy.
Applying Triple-Matrix Masking for Privacy Preserving Data Collection and Sharing in HIV Studies.
Pei, Qinglin; Chen, Shigang; Xiao, Yao; Wu, Samuel S
2016-01-01
Many HIV research projects are plagued by the high missing rate of selfreported information during data collection. Also, due to the sensitive nature of the HIV research data, privacy protection is always a concern for data sharing in HIV studies. This paper applies a data masking approach, called triple-matrix masking [1], to the context of HIV research for ensuring privacy protection during the process of data collection and data sharing. Using a set of generated HIV patient data, we show step by step how the data are randomly transformed (masked) before leaving the patients' individual data collection device (which ensures that nobody sees the actual data) and how the masked data are further transformed by a masking service provider and a data collector. We demonstrate that the masked data retain statistical utility of the original data, yielding the exactly same inference results in the planned logistic regression on the effect of age on the adherence to antiretroviral therapy and in the Cox proportional hazard model for the age effect on time to viral load suppression. Privacy-preserving data collection method may help resolve the privacy protection issue in HIV research. The individual sensitive data can be completely hidden while the same inference results can still be obtained from the masked data, with the use of common statistical analysis methods.
Effects of pressure, cold and gloves on hand skin temperature and manual performance of divers.
Zander, Joanna; Morrison, James
2008-09-01
Cold water immersion and protective gloves are associated with decreased manual performance. Although neoprene gloves slow hand cooling, there is little information on whether they provide sufficient protection when diving in cold water. Nine divers wearing three-fingered neoprene gloves and dry suits were immersed in water at 25 and 4 degrees C, at depths of 0.4 msw (101 kPa altitude adjusted) and 40 msw (497 kPa) in a hyperbaric chamber. Skin temperatures were measured at the fingers, hand, forearm, chest and head. Grip strength, tactile sensitivity and manual dexterity were measured at three time intervals. There was an exponential decay in finger and back of hand skin temperatures with exposure time in 4 degrees C water. Finger and back of hand skin temperatures were lower at 40 msw than at 0.4 msw (P < 0.05). There was no effect of pressure or temperature on grip strength. Tactile sensitivity decreased linearly with finger skin temperature at both pressures. Manual dexterity was not affected by finger skin temperature at 0.4 msw, but decreased with fall in finger skin temperature at 40 msw. Results show that neoprene gloves do not provide adequate thermal protection in 4 degrees C water and that impairment of manual performance is dependent on the type of task, depth and exposure time.
Setlow, Barbara; Korza, George; Blatt, Kelly M.S.; Fey, Julien P.; Setlow, Peter
2015-01-01
Aims Determine how supercritical CO2 (scCO2) plus peracetic acid (PAA) inactivates Bacillus subtilis spores, factors important in spore resistance to scCO2-PAA, and if spores inactivated by scCO2-PAA are truly dead. Methods and Results Spores of wild-type B. subtilis and isogenic mutants lacking spore protective proteins were treated with scCO2-PAA in liquid or dry at 35°C. Wild-type wet spores (aqueous suspension) were more susceptible than dry spores. Treated spores were examined for viability (and were truly dead), dipicolinic acid (DPA), mutations, permeability to nucleic acid stains, germination under different conditions, energy metabolism and outgrowth. ScCO2-PAA-inactivated spores retained DPA, and survivors had no notable DNA damage. However, DPA was released from inactivated spores at a normally innocuous temperature (85°C), and colony formation from treated spores was salt sensitive. The inactivated spores germinated but did not outgrow, and these germinated spores had altered plasma membrane permeability and defective energy metabolism. Wet or dry coat-defective spores had increased scCO2-PAA sensitivity, and dry spores but not wet spores lacking DNA protective proteins were more scCO2-PAA sensitive. Conclusions These findings suggest that scCO2-PAA inactivates spores by damaging spores’ inner membrane. The spore coat provided scCO2-PAA resistance for both wet and dry spores. DNA protective proteins provided scCO2-PAA resistance only for dry spores. Significance and Impact of Study These results provide information on mechanisms of spore inactivation of and resistance to scCO2-PAA, an agent with increasing use in sterilization applications. PMID:26535794
Setlow, B; Korza, G; Blatt, K M S; Fey, J P; Setlow, P
2016-01-01
Determine how supercritical CO2 (scCO2 ) plus peracetic acid (PAA) inactivates Bacillus subtilis spores, factors important in spore resistance to scCO2 -PAA, and if spores inactivated by scCO2 -PAA are truly dead. Spores of wild-type B. subtilis and isogenic mutants lacking spore protective proteins were treated with scCO2 -PAA in liquid or dry at 35°C. Wild-type wet spores (aqueous suspension) were more susceptible than dry spores. Treated spores were examined for viability (and were truly dead), dipicolinic acid (DPA), mutations, permeability to nucleic acid stains, germination under different conditions, energy metabolism and outgrowth. ScCO2 -PAA-inactivated spores retained DPA, and survivors had no notable DNA damage. However, DPA was released from inactivated spores at a normally innocuous temperature (85°C), and colony formation from treated spores was salt sensitive. The inactivated spores germinated but did not outgrow, and these germinated spores had altered plasma membrane permeability and defective energy metabolism. Wet or dry coat-defective spores had increased scCO2 -PAA sensitivity, and dry spores but not wet spores lacking DNA protective proteins were more scCO2 -PAA sensitive. These findings suggest that scCO2 -PAA inactivates spores by damaging spores' inner membrane. The spore coat provided scCO2 -PAA resistance for both wet and dry spores. DNA protective proteins provided scCO2 -PAA resistance only for dry spores. These results provide information on mechanisms of spore inactivation of and resistance to scCO2 -PAA, an agent with increasing use in sterilization applications. © 2015 The Society for Applied Microbiology.
NASA Astrophysics Data System (ADS)
Gillabel, J.; de Gryze, S.; Six, J.; Merckx, R.
2007-12-01
Knowledge on the sensitivity of soil organic matter (SOM) respiration to changes in temperature is crucial for predicting future impacts of climate change on soil C stocks. Temperature sensitivity of respiration is determined by the chemical structure of the compound to be decomposed and by the availability of the organic matter for decomposers. Biochemically recalcitrant SOM has a higher temperature sensitivity than biochemically labile SOM. However, it is hypothesized that the stabilization of SOM by interaction with the soil matrix could be an important attenuating control on temperature sensitivity. We investigated the effect of different SOM stabilization mechanisms on temperature sensitivity of SOM respiration. Two main mechanisms were considered: chemical interactions of SOM with clay and silt particles, and physical protection inside aggregates. Soil samples from an agricultural silt loam soil were fractionated by wet-sieving into macroaggregates, microaggregates and silt+clay fractions. SOM stabilization in the silt+clay fraction occurs mainly chemically, whereas in aggregates physical protection of SOM is more important. Samples of each fraction and of bulk soil were incubated at two temperatures (20°C and 30°C) for one month. After 2% of total soil carbon was respired, temperature sensitivity was determined for respiration of the next 0.5% of total soil carbon. This was done by calculating a Q10 value as the ratio of the times needed at each temperature to respire that fraction of the soil C. This method allows determination of temperature sensitivity independent of C quality. Calculated Q10 values decreased in the order bulk soil > macroaggregates > microaggregates > silt+clay, with the difference between macroaggregate Q10 and silt+clay Q10 being the only significant difference. These results indicate that protection of SOM attenuates temperature sensitivity, with chemical protection (silt+clay) having a larger effect than physical protection (aggregates).
Sullivan, Marianne; Green, Donna
2016-01-06
This study assesses the accuracy and comprehensiveness of online public health education materials from the three Australian cities with active lead mines and or smelters: Broken Hill, Mount Isa and Port Pirie. Qualitative content analysis of online Australian material with comparison to international best practice where possible. All materials provided incomplete information about the health effects of lead and pathways of exposure compared to best practice materials. Inconsistent strategies to reduce exposure to lead were identified among the Australian cities, and some evidence-based best practices were not included. The materials normalised environmental lead and neglected to identify that there is no safe level of lead, or that primary prevention is the best strategy for protecting children's health. Health education materials need to clearly state health risks from lead across developmental stages and for sensitive populations, integrate a primary prevention perspective, and provide comprehensive evidence-based recommendations for reducing lead exposure in and around the home. Families who rely on information provided by these online public education materials are likely to be inadequately informed about the importance of protecting their children from exposure to lead and strategies for doing so.
Web-browser encryption of personal health information
2011-01-01
Background Electronic health records provide access to an unprecedented amount of clinical data for research that can accelerate the development of effective medical practices. However it is important to protect patient confidentiality, as many medical conditions are stigmatized and disclosure could result in personal and/or financial loss. Results We describe a system for remote data entry that allows the data that would identify the patient to be encrypted in the web browser of the person entering the data. These data cannot be decrypted on the server by the staff at the data center but can be decrypted by the person entering the data or their delegate. We developed this system to solve a problem that arose in the context of clinical research, but it is applicable in a range of situations where sensitive information is stored and updated in a database and it is necessary to ensure that it cannot be viewed by any except those intentionally given access. Conclusion By developing this system, we are able to centralize the collection of some patient data while minimizing the risk that protected health information be made available to study personnel who are not authorized to use it. PMID:22073940
A safe way to talk about death.
2016-11-09
Could a learning disability-specific death cafe be the key to initiating conversations about death and dying in a safe way? Paula Hopes writes in Learning Disability Practice about a conference on breaking bad news and noted that while some people with learning disabilities were ready to deal with the issues, healthcare professionals were not. Reasons varied from protecting people with learning disabilities to the assumption that they cannot cope with or understand the information. Ms Hopes says nurses should be advocates for people with learning disabilities and provide them with information to engage them in the process of dying. A learning disability-specific death cafe could support nurses to develop confidence in discussing this sensitive issue.
No privacy for all? Serious failings in the HHS medical records regulations.
Sobel, Richard
2002-01-01
The Bush administration surprised many by the approval without major revisions of the Clinton administration's HHS medical records regulations, despite heavy lobbying from the health industry. Though these "privacy rules" are supposed to protect patient confidentiality, what has gone unmentioned are the regulations' major lapses that breach informed consent and confidentiality. Recently issued "clarifications" of the regulations reveal that they do not prevent unconsented access to sensitive medical information by marketers, health plans, health care clearinghouses, and law enforcement. These problems with the regulations constitute a serious breach of patient privacy, endangering the doctor-patient relationship and potentially driving up health care costs, and need to be addressed.
2014-01-01
Background The ultrasonic transducer is one of the core components of ultrasound systems, and the transducer’s sensitivity is significantly related the loss of electronic components such as the transmitter, receiver, and protection circuit. In an ultrasonic device, protection circuits are commonly used to isolate the electrical noise between an ultrasound transmitter and transducer and to minimize unwanted discharged pulses in order to protect the ultrasound receiver. However, the performance of the protection circuit and transceiver obviously degrade as the operating frequency or voltage increases. We therefore developed a crossed SMPS (Switching Mode Power Supply) MOSFET-based protection circuit in order to maximize the sensitivity of high frequency transducers in ultrasound systems. The high frequency pulse signals need to trigger the transducer, and high frequency pulse signals must be received by the transducer. We therefore selected the SMPS MOSFET, which is the main component of the protection circuit, to minimize the loss in high frequency operation. The crossed configuration of the protection circuit can drive balanced bipolar high voltage signals from the pulser and transfer the balanced low voltage echo signals from the transducer. Methods The equivalent circuit models of the SMPS MOSFET-based protection circuit are shown in order to select the proper device components. The schematic diagram and operation mechanism of the protection circuit is provided to show how the protection circuit is constructed. The P-Spice circuit simulation was also performed in order to estimate the performance of the crossed MOSFET-based protection circuit. Results We compared the performance of our crossed SMPS MOSFET-based protection circuit with a commercial diode-based protection circuit. At 60 MHz, our expander and limiter circuits have lower insertion loss than the commercial diode-based circuits. The pulse-echo test is typical method to evaluate the sensitivity of ultrasonic transducers. Therefore, we performed a pulse-echo test using a single element transducer in order to utilize the crossed SMPS MOSFET-based protection circuit in an ultrasound system. Conclusions The SMPS-based protection circuit could be a viable alternative that provides better sensitivity, especially for high frequency ultrasound applications. PMID:24924595
Choi, Hojong; Shung, K Kirk
2014-06-12
The ultrasonic transducer is one of the core components of ultrasound systems, and the transducer's sensitivity is significantly related the loss of electronic components such as the transmitter, receiver, and protection circuit. In an ultrasonic device, protection circuits are commonly used to isolate the electrical noise between an ultrasound transmitter and transducer and to minimize unwanted discharged pulses in order to protect the ultrasound receiver. However, the performance of the protection circuit and transceiver obviously degrade as the operating frequency or voltage increases. We therefore developed a crossed SMPS (Switching Mode Power Supply) MOSFET-based protection circuit in order to maximize the sensitivity of high frequency transducers in ultrasound systems.The high frequency pulse signals need to trigger the transducer, and high frequency pulse signals must be received by the transducer. We therefore selected the SMPS MOSFET, which is the main component of the protection circuit, to minimize the loss in high frequency operation. The crossed configuration of the protection circuit can drive balanced bipolar high voltage signals from the pulser and transfer the balanced low voltage echo signals from the transducer. The equivalent circuit models of the SMPS MOSFET-based protection circuit are shown in order to select the proper device components. The schematic diagram and operation mechanism of the protection circuit is provided to show how the protection circuit is constructed. The P-Spice circuit simulation was also performed in order to estimate the performance of the crossed MOSFET-based protection circuit. We compared the performance of our crossed SMPS MOSFET-based protection circuit with a commercial diode-based protection circuit. At 60 MHz, our expander and limiter circuits have lower insertion loss than the commercial diode-based circuits. The pulse-echo test is typical method to evaluate the sensitivity of ultrasonic transducers. Therefore, we performed a pulse-echo test using a single element transducer in order to utilize the crossed SMPS MOSFET-based protection circuit in an ultrasound system. The SMPS-based protection circuit could be a viable alternative that provides better sensitivity, especially for high frequency ultrasound applications.
Developing a monitoring protocol for visitor-created informal trails in Yosemite National Park, USA.
Leung, Yu-Fai; Newburger, Todd; Jones, Marci; Kuhn, Bill; Woiderski, Brittany
2011-01-01
Informal trails created or perpetuated by visitors is a management challenge in many protected natural areas such as Yosemite National Park. This is a significant issue as informal trail networks penetrate and proliferate into protected landscapes and habitats, threatening ecological integrity, aesthetics, and visitor experiences. In order to develop effective strategies for addressing this problem under an adaptive management framework, indicators must be developed and monitoring protocol must be established to gather timely and relevant data about the condition, extent, and distribution of these undesired trail segments. This article illustrates a process of developing and evaluating informal trail indicators for meadows in Yosemite Valley. Indicator measures developed in past research were reviewed to identify their appropriateness for the current application. Information gaps in existing indicator measures were addressed by creating two new indices to quantify the degree of informal trailing based on its land fragmentation effects. The selected indicator measures were applied to monitoring data collected between 2006 and 2008. The selected measures and indices were evaluated for their ability to characterize informal trail impacts at site and landscape scales. Results demonstrate the utility of indicator measures in capturing different characteristics of the informal trail problem, though several metrics are strongly related to each other. The two fragmentation indices were able to depict fragmentation without being too sensitive to changes in one constituent parameter. This study points to the need for a multiparameter approach to informal trail monitoring and integration with other monitoring data. Implications for monitoring programs and research are discussed.
Developing a Monitoring Protocol for Visitor-Created Informal Trails in Yosemite National Park, USA
NASA Astrophysics Data System (ADS)
Leung, Yu-Fai; Newburger, Todd; Jones, Marci; Kuhn, Bill; Woiderski, Brittany
2011-01-01
Informal trails created or perpetuated by visitors is a management challenge in many protected natural areas such as Yosemite National Park. This is a significant issue as informal trail networks penetrate and proliferate into protected landscapes and habitats, threatening ecological integrity, aesthetics, and visitor experiences. In order to develop effective strategies for addressing this problem under an adaptive management framework, indicators must be developed and monitoring protocol must be established to gather timely and relevant data about the condition, extent, and distribution of these undesired trail segments. This article illustrates a process of developing and evaluating informal trail indicators for meadows in Yosemite Valley. Indicator measures developed in past research were reviewed to identify their appropriateness for the current application. Information gaps in existing indicator measures were addressed by creating two new indices to quantify the degree of informal trailing based on its land fragmentation effects. The selected indicator measures were applied to monitoring data collected between 2006 and 2008. The selected measures and indices were evaluated for their ability to characterize informal trail impacts at site and landscape scales. Results demonstrate the utility of indicator measures in capturing different characteristics of the informal trail problem, though several metrics are strongly related to each other. The two fragmentation indices were able to depict fragmentation without being too sensitive to changes in one constituent parameter. This study points to the need for a multiparameter approach to informal trail monitoring and integration with other monitoring data. Implications for monitoring programs and research are discussed.
Water Quality Standards for Coral Reef Protection | Science ...
The U.S. Clean Water Act provides a legal framework to protect coastal biological resources such as coral reefs, mangrove forests, and seagrass meadows from the damaging effects of human activities. Even though many resources are protected under this authority, water quality standards have not been effectively applied to coral reefs. The Environmental Protection Agency is promoting biocriteria and other water quality standards through collaborative development of bioassessment procedures, indicators and monitoring strategies. To support regulatory action, bioassessment indicators must be biologically meaningful, relevant to management, responsive to human disturbance, and relatively immune to natural variability. A rapid bioassessment protocol for reef-building stony corals was developed and tested for regulatory applicability. Preliminary testing in the Florida Keys found indicators had sufficient precision and provided information relevant to coral reef management. Sensitivity to human disturbance was demonstrated in the U.S. Virgin Islands for five of eight indicators tested. Once established, monitoring programs using these indicators can provide valuable, long-term records of coral condition and regulatory compliance. Development of a rapid bioassement protocol for reef-building stony corals was tested for regulatory applicability.
Privacy Protection on Multiple Sensitive Attributes
NASA Astrophysics Data System (ADS)
Li, Zhen; Ye, Xiaojun
In recent years, a privacy model called k-anonymity has gained popularity in the microdata releasing. As the microdata may contain multiple sensitive attributes about an individual, the protection of multiple sensitive attributes has become an important problem. Different from the existing models of single sensitive attribute, extra associations among multiple sensitive attributes should be invested. Two kinds of disclosure scenarios may happen because of logical associations. The Q&S Diversity is checked to prevent the foregoing disclosure risks, with an α Requirement definition used to ensure the diversity requirement. At last, a two-step greedy generalization algorithm is used to carry out the multiple sensitive attributes processing which deal with quasi-identifiers and sensitive attributes respectively. We reduce the overall distortion by the measure of Masking SA.
Processor register error correction management
Bose, Pradip; Cher, Chen-Yong; Gupta, Meeta S.
2016-12-27
Processor register protection management is disclosed. In embodiments, a method of processor register protection management can include determining a sensitive logical register for executable code generated by a compiler, generating an error-correction table identifying the sensitive logical register, and storing the error-correction table in a memory accessible by a processor. The processor can be configured to generate a duplicate register of the sensitive logical register identified by the error-correction table.
Eloranta, Katariina; Auvinen, Anssi
2015-07-17
Register-based research can provide important and valuable contributions to public health research, but involves ethical issues concerning the balance of public health benefits and individual autonomy. This study aimed to describe the opinions of the Finnish public about these issues. Mail survey questionnaire sent to a random sample of 1000 Finns. Participation proportion was 42%, with 258 women and 160 men. The majority of the participants (61%) were willing to provide their identifiable health information for research. Almost half of the participants (48%) would, nevertheless, like to be informed when their information is used. A third (30%) indicated no need for informed consent in register-based research, a similar proportion felt it should be obtained for every study, and 40% thought it necessary in some situations, such as studies addressing a sensitive study topic. As for the best policy for obtaining consent, the majority (86%) favoured broader consent methods: one consent covering a certain register or a research topic. Half of the participants (55%) desired a required ethical evaluation from register-based research addressing a sensitive issue. Privacy protection was the most common concern for register-based research. More than half of the participants were either content with the current Finnish laws concerning register-based research or wanted to liberalize them to advance research. The Finnish public is supportive of register-based research, but the requirement for informed consent divides opinions and many would at least like to be informed of the research use of their information.
Palfy, Julia Anna; Benezet-Mazuecos, Juan; Milla, Juan Martinez; Iglesias, Jose Antonio; de la Vieja, Juan Jose; Sanchez-Borque, Pepa; Miracle, Angel; Rubio, Jose Manuel
2018-06-01
Heart failure (HF) hospitalizations have a negative impact on quality of life and imply important costs. Intrathoracic impedance (ITI) variations detected by cardiac devices have been hypothesized to predict HF hospitalizations. Although Optivol™ algorithm (Medtronic) has been widely studied, CorVue™ algorithm (St. Jude Medical) long term efficacy has not been systematically evaluated in a "real life" cohort. CorVue™ was activated in ICD/CRT-D patients to store information about ITI measures. Clinical events (new episodes of HF requiring treatment and hospitalizations) and CorVue™ data were recorded every three months. Appropriate CorVue™ detection for HF was considered if it occurred in the four prior weeks to the clinical event. 53 ICD/CRT-D (26 ICD and 27 CRT-D) patients (67±1 years-old, 79% male) were included. Device position was subcutaneous in 28 patients. At inclusion, mean LVEF was 25±7% and 27 patients (51%) were in NYHA class I, 18 (34%) class II and 8 (15%) class III. After a mean follow-up of 17±9 months, 105 ITI drops alarms were detected in 32 patients (60%). Only six alarms were appropriate (true positive) and required hospitalization. Eighteen patients (34%) presented 25 clinical episodes (12 hospitalizations and 13 ER/ambulatory treatment modifications). Nineteen of these clinical episodes (76%) remained undetected by the CorVue™ (false negative). Sensitivity of CorVue™ resulted in 24%, specificity was 70%, positive predictive value of 6% and negative predictive value of 93%. CorVue™ showed a low sensitivity to predict HF events. Therefore, routinely activation of this algorithm could generate misleading information. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
Abubakar, I; Pimpin, L; Ariti, C; Beynon, R; Mangtani, P; Sterne, J A C; Fine, P E M; Smith, P G; Lipman, M; Elliman, D; Watson, J M; Drumright, L N; Whiting, P F; Vynnycky, E; Rodrigues, L C
2013-09-01
Recent evidence suggests that the duration of protection by bacillus Calmette-Guérin (BCG) may exceed previous estimates with potential implications for estimating clinical and cost-efficacy. To estimate the protection and duration of protection provided by BCG vaccination against tuberculosis, explore how this protection changes with time since vaccination, and examine the reasons behind the variation in protection and the rate of waning of protection. Electronic databases including MEDLINE, Excerpta Medica Database (EMBASE), Cochrane Databases, NHS Economic Evaluation Database (NHS EED), Database of Abstracts of Reviews of Effects (DARE), Web of Knowledge, Biosciences Information Service (BIOSIS), Latin American and Caribbean Health Sciences Literature (LILACs), MEDCARIB Database, Cumulative Index to Nursing and Allied Health Literature (CINAHL) were searched from inception to May 2009. Index to Theses, System for Information on Grey Literature in Europe (SIGLE), Centre for Agricultural Bioscience International (CABI) Abstracts, Scopus, Article First, Academic Complete, Africa-Wide Information, Google Scholar, Global Health, British National Bibliography for Report Literature, and clinical trial registration websites were searched from inception to October 2009. Electronic databases searches, screening of identified studies, data extraction and analysis were undertaken. Meta-analysis was used to present numerical and graphical summaries of clinical efficacy and efficacy by time since vaccination. Evidence of heterogeneity was assessed using the tau-squared statistic. Meta-regression allowed the investigation of observed heterogeneity. Factors investigated included BCG strain, latitude, stringency of pre-BCG vaccination tuberculin testing, age at vaccination, site of disease, study design and vulnerability to biases. Rate of waning of protection was estimated using the ratio of the measure of efficacy after 10 years compared with the efficacy in the first 10 years of a study. Study selection. A total of 21,030 references were identified, providing data on 132 studies after abstract and full-text review. Efficacy. Protection against pulmonary tuberculosis in adults is variable, ranging from substantial protection in the UK MRC trial {rate ratio 0.22 [95% confidence interval (CI) 0.16 to 0.31]}, to absence of clinically important benefit, as in the large Chingleput trial [rate ratio 1.05 (95% CI 0.88 to 1.25)] and greater in latitudes further away from the equator. BCG vaccination efficacy was usually high, and varied little by form of disease (with higher protection against meningeal and miliary tuberculosis) or study design when BCG vaccination was given only to infants or to children after strict screening for tuberculin sensitivity. High levels of protection against death were observed from both trials and observational studies. The observed protective effect of BCG vaccination did not differ by the strain of BCG vaccine used in trials. Reviewed studies showed that BCG vaccination protects against pulmonary and extrapulmonary tuberculosis for up to 10 years. Most studies either did not follow up participants for long enough or had very few cases after 15 years. This should not be taken to indicate an absence of effect: five studies (one trial and four observational studies) provided evidence of measurable protection at least 15 years after vaccination. Efficacy declined with time. The rate of decline was variable, with faster decline in latitudes further from the equator and in situations where BCG vaccination was given to tuberculin-sensitive participants after stringent tuberculin testing. The main limitation of this review relates to quality of included trials, most of which were conducted before current standards for reporting were formulated. In addition, data were lacking in some areas and the review had to rely on evidence from observational studies. BCG vaccination protection against tuberculosis varies between populations, to an extent that cannot be attributed to chance alone. Failure to exclude those already sensitised to mycobacteria and study latitude closer to the equator were associated with lower efficacy. These factors explained most of the observed variation. There is good evidence that BCG vaccination protection declines with time and that protection can last for up to 10 years. Data on protection beyond 15 years are limited; however, a small number of trials and observational studies suggest that BCG vaccination may protect for longer. Further studies are required to investigate the duration of protection by BCG vaccination. The National Institute for Health Research Health Technology Assessment programme.
Ethics Certification of Health Information Professionals.
Kluge, Eike-Henner; Lacroix, Paulette; Ruotsalainen, Pekka
2018-04-22
To provide a model for ensuring the ethical acceptability of the provisions that characterize the interjurisdictional use of eHealth, telemedicine, and associated modalities of health care deliveiy that are currently in place. Following the approach initiated in their Global Protection of Health Data project within the Security in Health Information Systems (SiHIS) working group of the International Medical Informatics Association (IMIA), the authors analyze and evaluate relevant privacy and security approaches that are intended to stem the erosion of patients' trustworthiness in the handling of their sensitive information by health care and informatics professionals in the international context. The authors found that while the majority of guidelines and ethical codes essentially focus on the role and functioning of the institutions that use EHRs and information technologies, little if any attention has been paid to the qualifications of the health informatics professionals (HIPs) who actualize and operate information systems to deal with or address relevant ethical issues. The apparent failure to address this matter indicates that the ethical qualification of HIPs remains an important security issue and that the Global Protection of Health Data project initiated by the SiHIS working group in 2015 should be expanded to develop into an internationally viable method of certification. An initial model to this effect is sketched and discussed. Georg Thieme Verlag KG Stuttgart.
NASA Astrophysics Data System (ADS)
Li, Xiang; Ding, Xuelian; Li, Yongfang; Wang, Linsong; Fan, Jing
2016-05-01
Development of new strategies for the sensitive and selective detection of ultra-low concentrations of specific cancer markers is of great importance for assessing cancer therapeutics due to its crucial role in early clinical diagnoses and biomedical applications. In this work, we have developed two types of fluorescence polarization (FP) amplification assay strategies for the detection of biomolecules by using TiS2 as a FP enhancer and Zn2+-dependent self-hydrolyzing deoxyribozymes as catalysts to realize enzyme-catalyzed target-recycling signal amplification. One approach is based on the terminal protection of small-molecule-linked DNA, in which biomolecular binding to small molecules in DNA-small-molecule chimeras can protect the conjugated DNA from degradation by exonuclease I (Exo I); the other approach is based on the terminal protection of biomolecular bound aptamer DNA, in which biomolecules directly bound to the single strand aptamer DNA can protect the ssDNA from degradation by Exo I. We select folate receptor (FR) and thrombin (Tb) as model analytes to verify the current concept. It is shown that under optimized conditions, our strategies exhibit high sensitivity and selectivity for the quantification of FR and Tb with low detection limits (0.003 ng mL-1 and 0.01 pM, respectively). Additionally, this strategy is a simple ``mix and detect'' approach, and does not require any separation steps. This biosensor is also utilized in the analysis of real biological samples, the results agree well with those obtained by the enzyme-linked immunosorbent assay (ELISA).Development of new strategies for the sensitive and selective detection of ultra-low concentrations of specific cancer markers is of great importance for assessing cancer therapeutics due to its crucial role in early clinical diagnoses and biomedical applications. In this work, we have developed two types of fluorescence polarization (FP) amplification assay strategies for the detection of biomolecules by using TiS2 as a FP enhancer and Zn2+-dependent self-hydrolyzing deoxyribozymes as catalysts to realize enzyme-catalyzed target-recycling signal amplification. One approach is based on the terminal protection of small-molecule-linked DNA, in which biomolecular binding to small molecules in DNA-small-molecule chimeras can protect the conjugated DNA from degradation by exonuclease I (Exo I); the other approach is based on the terminal protection of biomolecular bound aptamer DNA, in which biomolecules directly bound to the single strand aptamer DNA can protect the ssDNA from degradation by Exo I. We select folate receptor (FR) and thrombin (Tb) as model analytes to verify the current concept. It is shown that under optimized conditions, our strategies exhibit high sensitivity and selectivity for the quantification of FR and Tb with low detection limits (0.003 ng mL-1 and 0.01 pM, respectively). Additionally, this strategy is a simple ``mix and detect'' approach, and does not require any separation steps. This biosensor is also utilized in the analysis of real biological samples, the results agree well with those obtained by the enzyme-linked immunosorbent assay (ELISA). Electronic supplementary information (ESI) available: Tables S1-S4, Scheme S1, Fig. S1-S10. See DOI: 10.1039/c6nr00946h
Metallothionein--a promising tool for cancer diagnostics.
Krizkova, S; Fabrik, I; Adam, V; Hrabeta, J; Eckschlager, T; Kizek, R
2009-01-01
The latest research outcomes indicate that metallothionein (MT) levels in peripheral blood and serum from cancer patients can provide many interesting information about type or clinical stage of the disease, or response to therapy. MT plays a key role in transport of essential heavy metals, detoxification of toxic metals and protection of cells against oxidation stress. Serum MT levels of cancer patients are three times higher than control patients (0.5 microM). The elevated MT levels in cancer cells are probably related to their increased proliferation and protection against apoptosis. Automated electrochemical detection of MT allows its serial analysis in a very small volume with excellent sensitivity, reliability and reproducibility and therefore it can be considered as a new tool for cancer diagnosis (Fig. 4, Ref. 55). Full Text (Free, PDF) www.bmj.sk.
Video redaction: a survey and comparison of enabling technologies
NASA Astrophysics Data System (ADS)
Sah, Shagan; Shringi, Ameya; Ptucha, Raymond; Burry, Aaron; Loce, Robert
2017-09-01
With the prevalence of video recordings from smart phones, dash cams, body cams, and conventional surveillance cameras, privacy protection has become a major concern, especially in light of legislation such as the Freedom of Information Act. Video redaction is used to obfuscate sensitive and personally identifiable information. Today's typical workflow involves simple detection, tracking, and manual intervention. Automated methods rely on accurate detection mechanisms being paired with robust tracking methods across the video sequence to ensure the redaction of all sensitive information while minimizing spurious obfuscations. Recent studies have explored the use of convolution neural networks and recurrent neural networks for object detection and tracking. The present paper reviews the redaction problem and compares a few state-of-the-art detection, tracking, and obfuscation methods as they relate to redaction. The comparison introduces an evaluation metric that is specific to video redaction performance. The metric can be evaluated in a manner that allows balancing the penalty for false negatives and false positives according to the needs of particular application, thereby assisting in the selection of component methods and their associated hyperparameters such that the redacted video has fewer frames that require manual review.
Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan
2017-12-15
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.
78 FR 2359 - Approval and Promulgation of State Implementation Plans: Idaho
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-11
... travel hazards, protecting sensitive populations, and recordkeeping. Under IDAPA 58.01.01.624.04.c, spot... provisions and provisions relating to preventing travel hazards, protecting sensitive populations, and... limited to, the Coeur d'Alene Reservation, the Duck Valley Reservation, the Reservation of the Kootenai...
40 CFR 144.86 - What are the definitions I need to know?
Code of Federal Regulations, 2014 CFR
2014-07-01
... of ground water protection areas are identified. (g) Other sensitive ground water areas. States may... to protecting underground sources of drinking water from contamination. These other sensitive ground water areas may include areas such as areas overlying sole-source aquifers; highly productive aquifers...
40 CFR 144.86 - What are the definitions I need to know?
Code of Federal Regulations, 2011 CFR
2011-07-01
... of ground water protection areas are identified. (g) Other sensitive ground water areas. States may... to protecting underground sources of drinking water from contamination. These other sensitive ground water areas may include areas such as areas overlying sole-source aquifers; highly productive aquifers...
40 CFR 144.86 - What are the definitions I need to know?
Code of Federal Regulations, 2012 CFR
2012-07-01
... of ground water protection areas are identified. (g) Other sensitive ground water areas. States may... to protecting underground sources of drinking water from contamination. These other sensitive ground water areas may include areas such as areas overlying sole-source aquifers; highly productive aquifers...
40 CFR 144.86 - What are the definitions I need to know?
Code of Federal Regulations, 2013 CFR
2013-07-01
... of ground water protection areas are identified. (g) Other sensitive ground water areas. States may... to protecting underground sources of drinking water from contamination. These other sensitive ground water areas may include areas such as areas overlying sole-source aquifers; highly productive aquifers...
Maury, Carl Peter J
2018-05-01
A crucial stage in the origin of life was the emergence of the first molecular entity that was able to replicate, transmit information, and evolve on the early Earth. The amyloid world hypothesis posits that in the pre-RNA era, information processing was based on catalytic amyloids. The self-assembly of short peptides into β-sheet amyloid conformers leads to extraordinary structural stability and novel multifunctionality that cannot be achieved by the corresponding nonaggregated peptides. The new functions include self-replication, catalytic activities, and information transfer. The environmentally sensitive template-assisted replication cycles generate a variety of amyloid polymorphs on which evolutive forces can act, and the fibrillar assemblies can serve as scaffolds for the amyloids themselves and for ribonucleotides proteins and lipids. The role of amyloid in the putative transition process from an amyloid world to an amyloid-RNA-protein world is not limited to scaffolding and protection: the interactions between amyloid, RNA, and protein are both complex and cooperative, and the amyloid assemblages can function as protometabolic entities catalyzing the formation of simple metabolite precursors. The emergence of a pristine amyloid-based in-put sensitive, chiroselective, and error correcting information-processing system, and the evolvement of mutualistic networks were, arguably, of essential importance in the dynamic processes that led to increased complexity, organization, compartmentalization, and, eventually, the origin of life.
The right to information and their exceptions in medical practices in the Iranian legal system.
Sheykh-Talimi, Maysam; Shariati-Nasab, Sadegh; Zare, Mohammad Kazem; Omani-Samani, Reza
2016-01-01
The right to information Act was implemented in the Iranian legal system through accession of the Merida Convention ensuring the right to information as a fundamental right for the public. One significant aspects of this subject is the ratification of the "Disclosure and Access to Information Act" by which it is recognized as a right of all Persian individuals and citizens to access state-held information in Iran administration. The Iranian legislature, with regard to the role of access to information and its significance, clarified the scope, permitted subjects of access, and exceptions of the right to state-held information. In this essay, we will discuss the legal aspects and scope of ensuring access to medical information in the Iranian statutes and their exceptions. It is argued that the Iranian legislation ensures the principle of maximum disclosure, while sensitive subjects', specially classified and private information, are exempted. Therefore, the related rules in Iran's statutes not only do not threaten patient's information, but also protect them by criminalizing the breaching of the mentioned right.
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
Měsíček, Libor; Choi, Jongsun
2018-01-01
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely. PMID:29796233
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing.
Ko, Hoon; Měsíček, Libor; Choi, Jongsun; Hwang, Seogchan
2018-01-01
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.
Zhang, Liping; Zhu, Shaohui
2015-05-01
To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.
Troughton, Lee D.; Czanner, Gabriela; Zheng, Yalin; McCormick, Austin G.
2017-01-01
Application of sunscreen is a widely used mechanism for protecting skin from the harmful effects of UV light. However, protection can only be achieved through effective application, and areas that are routinely missed are likely at increased risk of UV damage. Here we sought to determine if specific areas of the face are missed during routine sunscreen application, and whether provision of public health information is sufficient to improve coverage. To investigate this, 57 participants were imaged with a UV sensitive camera before and after sunscreen application: first visit; minimal pre-instruction, second visit; provided with a public health information statement. Images were scored using a custom automated image analysis process designed to identify areas of high UV reflectance, i.e. missed during sunscreen application, and analysed for 5% significance. Analyses revealed eyelid and periorbital regions to be disproportionately missed during routine sunscreen application (median 14% missed in eyelid region vs 7% in rest of face, p<0.01). Provision of health information caused a significant improvement in coverage to eyelid areas in general however, the medial canthal area was still frequently missed. These data reveal that a public health announcement-type intervention could be effective at improving coverage of high risk areas of the face, however high risk areas are likely to remain unprotected therefore other mechanisms of sun protection should be widely promoted such as UV blocking sunglasses. PMID:28968413
Email authentication using symmetric and asymmetric key algorithm encryption
NASA Astrophysics Data System (ADS)
Halim, Mohamad Azhar Abdul; Wen, Chuah Chai; Rahmi, Isredza; Abdullah, Nurul Azma; Rahman, Nurul Hidayah Ab.
2017-10-01
Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.
The co-evolution of networks and prisoner’s dilemma game by considering sensitivity and visibility
NASA Astrophysics Data System (ADS)
Li, Dandan; Ma, Jing; Han, Dun; Sun, Mei; Tian, Lixin; Stanley, H. Eugene
2017-03-01
Strategies adopted by individuals in a social network significantly impact the network, and they strongly affect relationships between individuals in the network. Links between individuals also heavily influence their levels of cooperation. Taking into account the evolution of each individual’s connection, we explore how sensitivity and visibility affect the prisoner’s dilemma game. The so-called ‘sensitivity’ and ‘visibility’ respectively present one’s self-protection consciousness and the ability of gaining information. We find that at moderate levels of player sensitivity cooperative behavior increases, but that at high levels it is inhibited. We also find that the heterogeneity of the weight of individuals at the end of the game is higher when sensitivity and visibility are increased, but that the successful-defection-payoff has less impact on the weight of individuals and on the relationship between the heterogeneity of the weight of individuals and the density of cooperators. This framework can be used to clarify the interaction mechanism between the micro-level of individual behavior and the macro-level of individual co-evolutionary processes.
The co-evolution of networks and prisoner’s dilemma game by considering sensitivity and visibility
Li, Dandan; Ma, Jing; Han, Dun; Sun, Mei; Tian, Lixin; Stanley, H. Eugene
2017-01-01
Strategies adopted by individuals in a social network significantly impact the network, and they strongly affect relationships between individuals in the network. Links between individuals also heavily influence their levels of cooperation. Taking into account the evolution of each individual’s connection, we explore how sensitivity and visibility affect the prisoner’s dilemma game. The so-called ‘sensitivity’ and ‘visibility’ respectively present one’s self-protection consciousness and the ability of gaining information. We find that at moderate levels of player sensitivity cooperative behavior increases, but that at high levels it is inhibited. We also find that the heterogeneity of the weight of individuals at the end of the game is higher when sensitivity and visibility are increased, but that the successful-defection-payoff has less impact on the weight of individuals and on the relationship between the heterogeneity of the weight of individuals and the density of cooperators. This framework can be used to clarify the interaction mechanism between the micro-level of individual behavior and the macro-level of individual co-evolutionary processes. PMID:28338070
NASA Technical Reports Server (NTRS)
Takamura, Eduardo; Mangum, Kevin
2016-01-01
The National Aeronautics and Space Administration (NASA) invests millions of dollars in spacecraft and ground system development, and in mission operations in the pursuit of scientific knowledge of the universe. In recent years, NASA sent a probe to Mars to study the Red Planet's upper atmosphere, obtained high resolution images of Pluto, and it is currently preparing to find new exoplanets, rendezvous with an asteroid, and bring a sample of the asteroid back to Earth for analysis. The success of these missions is enabled by mission assurance. In turn, mission assurance is backed by information assurance. The information systems supporting NASA missions must be reliable as well as secure. NASA - like every other U.S. Federal Government agency - is required to manage the security of its information systems according to federal mandates, the most prominent being the Federal Information Security Management Act (FISMA) of 2002 and the legislative updates that followed it. Like the management of enterprise information technology (IT), federal information security management takes a "one-size fits all" approach for protecting IT systems. While this approach works for most organizations, it does not effectively translate into security of highly specialized systems such as those supporting NASA missions. These systems include command and control (C&C) systems, spacecraft and instrument simulators, and other elements comprising the ground segment. They must be carefully configured, monitored and maintained, sometimes for several years past the missions' initially planned life expectancy, to ensure the ground system is protected and remains operational without any compromise of its confidentiality, integrity and availability. Enterprise policies, processes, procedures and products, if not effectively tailored to meet mission requirements, may not offer the needed security for protecting the information system, and they may even become disruptive to mission operations. Certain protective measures for the general enterprise may not be as efficient within the ground segment. This is what the authors have concluded through observations and analysis of patterns identified from the various security assessments performed on NASA missions such as MAVEN, OSIRIS-REx, New Horizons and TESS, to name a few. The security audits confirmed that the framework for managing information system security developed by the National Institute of Standards and Technology (NIST) for the federal government, and adopted by NASA, is indeed effective. However, the selection of the technical, operational and management security controls offered by the NIST model - and how they are implemented - does not always fit the nature and the environment where the ground system operates in even though there is no apparent impact on mission success. The authors observed that unfit controls, that is, controls that are not necessarily applicable or sufficiently effective in protecting the mission systems, are often selected to facilitate compliance with security requirements and organizational expectations even if the selected controls offer minimum or non-existent protection. This paper identifies some of the standard security controls that can in fact protect the ground system, and which of them offer little or no benefit at all. It offers multiple scenarios from real security audits in which the controls are not effective without, of course, disclosing any sensitive information about the missions assessed. In addition to selection and implementation of controls, the paper also discusses potential impact of recent legislation such as the Federal Information Security Modernization Act (FISMA) of 2014 - aimed at the enterprise - on the ground system, and offers other recommendations to Information System Owners (ISOs).
Cognitive capital, equity and child-sensitive social protection in Asia and the Pacific
Samson, Michael; Fajth, Gaspar; François, Daphne
2016-01-01
Promoting child development and welfare delivers human rights and builds sustainable economies through investment in ‘cognitive capital’. This analysis looks at conditions that support optimal brain development in childhood and highlights how social protection promotes these conditions and strengthens the achievement of the Sustainable Development Goals (SDGs) in Asia and the Pacific. Embracing child-sensitive social protection offers multiple benefits. The region has been a leader in global poverty reduction but the underlying pattern of economic growth exacerbates inequality and is increasingly unsustainable. The strategy of channelling low-skilled rural labour to industrial jobs left millions of children behind with limited opportunities for development. Building child-sensitive social protection and investing better in children's cognitive capacity could check these trends and trigger powerful long-term human capital development—enabling labour productivity to grow faster than populations age. While governments are investing more in social protection, the region's spending remains low by international comparison. Investment is particularly inadequate where it yields the highest returns: during the first 1000 days of life. Five steps are recommended for moving forward: (1) building cognitive capital by adjusting the region's development paradigms to reflect better the economic and social returns from investing in children; (2) understand and track better child poverty and vulnerability; (3) progressively build universal, child-sensitive systems that strengthen comprehensive interventions within life cycle frameworks; (4) mobilise national resources for early childhood investments and child-sensitive social protection; and (5) leverage the SDGs and other channels of national and international collaboration. PMID:28588990
Bennett, G.A.; Elder, M.G.; Kemme, J.E.
1984-03-20
The disclosure is directed to an apparatus for thermally protecting sensitive components in tools used in a geothermal borehole. The apparatus comprises a Dewar within a housing. The Dewar contains heat pipes such as brass heat pipes for thermally conducting heat from heat sensitive components such as electronics to a heat sink such as ice.
We evaluated several lines of evidence to identify bedded fine sediment levels that should protect and maintain self-sustaining populations of native sediment-sensitive aquatic species in the western US. To identify these potential criterion values for streambed sediments ≤0.06 ...
Yan, Sha; Zhou, Qixing
2011-10-01
Little information is available about the toxicity of toluene, ethylbenzene and xylene acting on macrophytes, and their toxicity data are rarely used in regulation and criteria decisions. The results extended the knowledge on toxic effects of toluene, ethylbenzene and xylene on aquatic plants. The responses of Hydrilla verticillata to these pollutants were investigated. Chlorophyll levels, lipid peroxidation, and antioxidant enzymes (superoxide dismutase and guaiacol peroxidase) showed diverse responses at different concentrations of toluene, ethylbenzene and xylene. The linear regression analyses were performed respectively, suggesting the concentrations of toluene, ethylbenzene and xylene expected to protect aquatic macrophytes were 7.30 mg L⁻¹, 1.15 mg L⁻¹ and 2.36 mg L⁻¹, respectively. This study emphasized that aquatic plants are also sensitive to organic pollutants as fishes and zooplanktons, indicating that macrophytes could be helpful in predicting the toxicity of these pollutants and should be considered in regulation and criteria decisions for aquatic environment protection. Copyright © 2011 Elsevier Ltd. All rights reserved.
Understanding Socio-Hydrology System in the Kissimmee River Basin
NASA Astrophysics Data System (ADS)
Chen, X.; Wang, D.; Tian, F.; Sivapalan, M.
2014-12-01
This study is to develop a conceptual socio-hydrology model for the Kissimmee River Basin. The Kissimmee River located in Florida was channelized in mid-20 century for flood protection. However, the environmental issues caused by channelization led Floridians to conduct a restoration project recently, focusing on wetland recovery. As a complex coupled human-water system, Kissimmee River Basin shows the typical socio-hydrology interactions. Hypothetically, the major reason to drive the system from channelization to restoration is that the community sensitivity towards the environment has changed from controlling to restoring. The model developed in this study includes 5 components: water balance, flood risk, wetland area, crop land area, and community sensitivity. Furthermore, urban population and rural population in the basin have different community sensitivities towards the hydrologic system. The urban population, who live further away from the river are more sensitive to wetland restoration; while the rural population, who live closer to the river are more sensitive to flood protection. The power dynamics between the two groups and its impact on management decision making is described in the model. The model is calibrated based on the observed watershed outflow, wetland area and crop land area. The results show that the overall focus of community sensitivity has changed from flood protection to wetland restoration in the past 60 years in Kissimmee River Basin, which confirms the study hypothesis. There are two main reasons for the community sensitivity change. Firstly, people's flood memory is fading because of the effective flood protection, while the continuously shrinking wetland and the decreasing bird and fish population draw more and more attention. Secondly, in the last 60 years, the urban population in Florida drastically increased compared with a much slower increase of rural population. As a result, the community sensitivity of urban population towards wetland restoration has more weight than the rural population's towards flood protection.
Privacy-protected biometric templates: acoustic ear identification
NASA Astrophysics Data System (ADS)
Tuyls, Pim T.; Verbitskiy, Evgeny; Ignatenko, Tanya; Schobben, Daniel; Akkermans, Ton H.
2004-08-01
Unique Biometric Identifiers offer a very convenient way for human identification and authentication. In contrast to passwords they have hence the advantage that they can not be forgotten or lost. In order to set-up a biometric identification/authentication system, reference data have to be stored in a central database. As biometric identifiers are unique for a human being, the derived templates comprise unique, sensitive and therefore private information about a person. This is why many people are reluctant to accept a system based on biometric identification. Consequently, the stored templates have to be handled with care and protected against misuse [1, 2, 3, 4, 5, 6]. It is clear that techniques from cryptography can be used to achieve privacy. However, as biometric data are noisy, and cryptographic functions are by construction very sensitive to small changes in their input, and hence one can not apply those crypto techniques straightforwardly. In this paper we show the feasibility of the techniques developed in [5], [6] by applying them to experimental biometric data. As biometric identifier we have choosen the shape of the inner ear-canal, which is obtained by measuring the headphone-to-ear-canal Transfer Functions (HpTFs) which are known to be person dependent [7].
Ecological Monitoring and Compliance Program 2007 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansen, Dennis; Anderson, David; Derek, Hall
2008-03-01
In accordance with U.S. Department of Energy (DOE) Order 450.1, 'Environmental Protection Program', the Office of the Assistant Manager for Environmental Management of the DOE, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) requires ecological monitoring and biological compliance support for activities and programs conducted at the Nevada Test Site (NTS). National Security Technologies, LLC (NSTec), Ecological Services has implemented the Ecological Monitoring and Compliance (EMAC) Program to provide this support. EMAC is designed to ensure compliance with applicable laws and regulations, delineate and define NTS ecosystems, and provide ecological information that can be used to predict and evaluate themore » potential impacts of proposed projects and programs on those ecosystems. This report summarizes the EMAC activities conducted by NSTec during calendar year 2007. Monitoring tasks during 2007 included eight program areas: (a) biological surveys, (b) desert tortoise compliance, (c) ecosystem mapping and data management, (d) sensitive plant monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat monitoring, (g) habitat restoration monitoring, and (h) biological monitoring at the Nonproliferation Test and Evaluation Complex (NPTEC). The following sections of this report describe work performed under these eight areas.« less
Zhang, Yang; Shen, Jing; Li, Yu
2018-01-01
Assessing and quantifying atmospheric vulnerability is a key issue in urban environmental protection and management. This paper integrated the Analytical hierarchy process (AHP), fuzzy synthesis evaluation and Geographic Information System (GIS) spatial analysis into an Exposure-Sensitivity-Adaptive capacity (ESA) framework to quantitatively assess atmospheric environment vulnerability in the Beijing-Tianjin-Hebei (BTH) region with spatial and temporal comparisons. The elaboration of the relationships between atmospheric environment vulnerability and indices of exposure, sensitivity, and adaptive capacity supports enable analysis of the atmospheric environment vulnerability. Our findings indicate that the atmospheric environment vulnerability of 13 cities in the BTH region exhibits obvious spatial heterogeneity, which is caused by regional diversity in exposure, sensitivity, and adaptive capacity indices. The results of atmospheric environment vulnerability assessment and the cause analysis can provide guidance to pick out key control regions and recognize vulnerable indicators for study sites. The framework developed in this paper can also be replicated at different spatial and temporal scales using context-specific datasets to support environmental management. PMID:29342852
Zhang, Yang; Shen, Jing; Li, Yu
2018-01-13
Assessing and quantifying atmospheric vulnerability is a key issue in urban environmental protection and management. This paper integrated the Analytical hierarchy process (AHP), fuzzy synthesis evaluation and Geographic Information System (GIS) spatial analysis into an Exposure-Sensitivity-Adaptive capacity (ESA) framework to quantitatively assess atmospheric environment vulnerability in the Beijing-Tianjin-Hebei (BTH) region with spatial and temporal comparisons. The elaboration of the relationships between atmospheric environment vulnerability and indices of exposure, sensitivity, and adaptive capacity supports enable analysis of the atmospheric environment vulnerability. Our findings indicate that the atmospheric environment vulnerability of 13 cities in the BTH region exhibits obvious spatial heterogeneity, which is caused by regional diversity in exposure, sensitivity, and adaptive capacity indices. The results of atmospheric environment vulnerability assessment and the cause analysis can provide guidance to pick out key control regions and recognize vulnerable indicators for study sites. The framework developed in this paper can also be replicated at different spatial and temporal scales using context-specific datasets to support environmental management.
A special protection scheme utilizing trajectory sensitivity analysis in power transmission
NASA Astrophysics Data System (ADS)
Suriyamongkol, Dan
In recent years, new measurement techniques have provided opportunities to improve the North American Power System observability, control and protection. This dissertation discusses the formulation and design of a special protection scheme based on a novel utilization of trajectory sensitivity techniques with inputs consisting of system state variables and parameters. Trajectory sensitivity analysis (TSA) has been used in previous publications as a method for power system security and stability assessment, and the mathematical formulation of TSA lends itself well to some of the time domain power system simulation techniques. Existing special protection schemes often have limited sets of goals and control actions. The proposed scheme aims to maintain stability while using as many control actions as possible. The approach here will use the TSA in a novel way by using the sensitivities of system state variables with respect to state parameter variations to determine the state parameter controls required to achieve the desired state variable movements. The initial application will operate based on the assumption that the modeled power system has full system observability, and practical considerations will be discussed.
Water-quality monitoring of Sweetwater Reservoir
Majewski, Michael
2001-01-01
Sweetwater Authority is concerned with the quality of water it provides to its customers. Results from the water-quality monitoring study that the USGS is conducting in the Sweetwater watershed show that the contaminant concentrations in bed sediments, water, and air are reflected in increased urbanization. The bed sediments show the most dramatic evidence of this impact with a sharp increase of persistent organic chemical concentrations over the past 65 years. Water quality is also affected by urbanization in the form of chemicals in the runoff water and deposition of airborne chemicals. The concentrations of the detected organic chemicals in Sweetwater and Loveland Reservoirs are all well below the guidance limits set by State and Federal agencies to protect human health. Many of these compounds are detected only because of the sensitive analytical methods used. This monitoring program provides the Sweetwater Authority with information on what monitored chemicals are present in the reservoirs, and at what concentrations. With this information, the Authority can assess the associated risks, and consider future water treatment and remediation. These results also help focus and support future efforts by Sweetwater Authority to protect the watershed.
Shimasaki, Noriko; Hara, Masayuki; Kikuno, Ritsuko; Shinohara, Katsuaki
2016-01-01
To prevent nosocomial infections caused by even either Ebola virus or methicillin-resistant Staphylococcus aureus (MRSA), healthcare workers must wear the appropriate protective clothing which can inhibit contact transmission of these pathogens. Therefore, it is necessary to evaluate the performance of protective clothing for penetration resistance against infectious agents. In Japan, some standard methods were established to evaluate the penetration resistance of protective clothing fabric materials under applied pressure. However, these methods only roughly classified the penetration resistance of fabrics, and the detection sensitivity of the methods and the penetration amount with respect to the relationship between blood and the pathogen have not been studied in detail. Moreover, no standard method using bacteria for evaluation is known. Here, to evaluate penetration resistance of protective clothing materials under applied pressure, the detection sensitivity and the leak amount were investigated by using synthetic blood containing bacteriophage phi-X174 or S. aureus. And the volume of leaked synthetic blood and the amount of test microbe penetration were simultaneously quantified. Our results showed that the penetration detection sensitivity achieved using a test microbial culture was higher than that achieved using synthetic blood at invisible leak level pressures. This finding suggested that there is a potential risk of pathogen penetration even when visual leak of contaminated blood through the protective clothing was not observed. Moreover, at visible leak level pressures, it was found that the amount of test microbe penetration varied at least ten-fold among protective clothing materials classified into the same class of penetration resistance. Analysis of the penetration amount revealed a significant correlation between the volume of penetrated synthetic blood and the amount of test microbe penetration, indicating that the leaked volume of synthetic blood could be considered as a latent indicator for infection risk, that the amount of exposure to contaminated blood corresponds to the risk of infection. Our study helped us ascertain, with high sensitivity, the differences among fabric materials with respect to their protective performance, which may facilitate effective selection of protective clothing depending on the risk assessment.
Ecological Monitoring and Compliance Program 2006 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
David C. Anderson; Paul D. Greger; Derek B. Hall
2007-03-01
The Ecological Monitoring and Compliance program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), monitors the ecosystem of the Nevada Test Site (NTS) and ensures compliance with laws and regulations pertaining to NTS biota. This report summarizes the program's activities conducted by National Security Technologies LLC (NSTec) during the Calendar Year 2006. Program activities included: (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem mapping and data management, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat monitoring, (g) habitat restoration monitoring, and (h)more » monitoring of the Nonproliferation Test and Evaluation Complex (NPTEC). Sensitive and protected/regulated species of the NTS include 44 plants, 1 mollusk, 2 reptiles, over 250 birds, and 26 mammals protected, managed, or considered sensitive as per state or federal regulations and natural resource agencies and organizations. The threatened desert tortoise (Gopherus agassizii) is the only species on the NTS protected under the Endangered Species Act. Biological surveys for the presence of sensitive and protected/regulated species and important biological resources on which they depend were conducted for 34 projects. A total of 342.1 hectares (ha) (845.37 acres [ac]) was surveyed for these projects. Sensitive and protected/regulated species and important biological resources found included: 2 inactive tortoise burrows, 2 western burrowing owls (Athene cunicularia hypugaea), several horses (Equus caballus), 2 active predator burrows, mature Joshua trees (Yucca brevifolia), yuccas and cacti; and also 1 bird nest (2 eggs), 1 barn owl (Tyto alba) and 2 great-horned owls (Bubo virginianus). NSTec provided a written summary report of all survey findings and mitigation recommendations, where applicable. All flagged burrows were avoided during construction activities. Twenty one of the 34 projects had sites within the distribution range of the threatened desert tortoise. NNSA/NSO must comply with the terms and conditions of a permit (called a Biological Opinion) from the U.S. Fish and Wildlife Service (FWS) when conducting work in tortoise habitat. No tortoises were found in or displaced from project areas. No desert tortoises were accidentally injured or killed, nor were any captured or displaced from project sites. One desert tortoise was accidentally killed along a paved road. One site specific re-vegetation plan was submitted this year as required by the desert tortoise habitat re-vegetation plan approved in 2004. This year a total of 1.89 ha (4.69 ac) of tortoise habitat was disturbed. Re-vegetation of habitat at the Bren Tower burn was completed in the spring of 2006. In the summer of 2006, NSTec scientists prepared a Biological Assessment of the security activities that were being conducted at the Device Assembly Facility (DAF). NNSA requested a Biological Opinion from FWS in late 2006. Ecosystem mapping and data management in 2006 focused primarily on two tasks: (a) converting hardcopies of about 17 reports (EMAC annual reports and selected topical reports from 1996 to 2003) into electronic versions (Portable Document Format [PDF] files) to facilitate electronic document exchange, rapid retrieval, duplication, and printing, and (b) conducting an annual vegetation survey to determine wildland fire hazards on the NTS. Copies of the PDF documents were sent to DOE's Office of Scientific and Technical Information website in Oak Ridge, Tennessee, and the DOE National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Public Reading Facility.« less
de Meer, G; Janssen, N A H; Brunekreef, B
2005-05-01
There is a growing body of evidence that the early childhood environment with respect to day care attendance, older siblings, pet ownership, and early life airway infections may protect from developing atopic disease. Few studies have distinguished between atopic sensitization and symptoms, and none have evaluated independent contributions for all of these different environmental conditions. Examine independent effects on atopic sensitization and symptoms of day care attendance, older siblings, pet ownership, and early infancy's airway disease. A cross-sectional survey among 8-13-year-old school children with complete data for 1555 children. After adjustment for confounders, atopic sensitization occurred less frequently in children that had attended a day care centre (OR: 0.73, 95% CI: 0.55-0.98) or had a cat or dog before 2 years of age (OR: 0.78, 95% CI: 0.61-0.99). Having older siblings yielded a nonsignificant trend towards protection (OR: 0.88, 95% CI: 0.70-1.11). For symptoms, there was no relation with having older sibs, day care attendance and pet ownership, although there was a trend towards protection for the combination of atopy and symptoms. In contrast, children with doctors' treated airway disease before age 2, more frequently reported recent symptoms of wheeze, asthma, rhinitis, or dermatitis (all P < 0.05). Early life environmental exposure to day care, or pets may protect against atopic sensitization. Protection against symptoms only occurred if atopic sensitization was present as well.
2 CFR 200.82 - Protected Personally Identifiable Information (Protected PII).
Code of Federal Regulations, 2014 CFR
2014-01-01
... 2 Grants and Agreements 1 2014-01-01 2014-01-01 false Protected Personally Identifiable Information (Protected PII). 200.82 Section 200.82 Grants and Agreements Office of Management and Budget... § 200.82 Protected Personally Identifiable Information (Protected PII). Protected PII means an...
King, Tatiana; Brankovic, Ljiljana; Gillard, Patricia
2012-04-01
The aim of this study was to discover the public's attitude and views towards privacy in health care. This is a part of a larger project which aims to gain an insight into what kind of privacy is needed and develop technical measures to provide such privacy. The study was a two-stage process which combined qualitative and quantitative research. Stage One of the study comprised arranging and facilitating focus groups while in Stage Two we conducted a social survey. We measured attitudes towards privacy, medical research and consent; privacy concern about sharing one's health information for research; privacy concern about the possibility that some specific information from medical records could be linked to the patient's name in a situation that was not related to medical treatment. The results of the study revealed both great support for medical research (98%), and concern about privacy of health information (66%). Participants prefer to be asked for their permission before their health information is used for any purpose other than medical treatment (92%), and they would like to know the organisation and details of the research before allowing the use of their health records (83%). Age, level of education, place of birth and employment status are most strongly associated with privacy concerns. The study showed that there are some particularly sensitive issues and there is a concern (42-60%) about any possibility of linking these kinds of data to the patient's name in a situation that is not related to medical treatment. Such issues include sexually transmitted diseases, abortions and infertility, family medical history/genetic disorders, mental illness, drug/alcohol related incidents, lists of previous operations/procedures/dates and current medications. Participants believe they should be asked for permission before their health information is used for any purpose other than medical treatment. However, consent and privacy concerns are not necessary related. Assuring individuals that their personal health information is de-identified reduces their concern about the necessity of consent for releasing health information for research purposes, but many people are not aware that removing their names and other direct identifiers from medical records does not guarantee full privacy protection for their health information. Privacy concerns decrease as extra security measures are introduced to protect privacy. Therefore, instead of "tailoring concern" as proposed by Willison we suggest improving privacy protection of personal information by introducing additional security measures in data publishing. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
TealLock 5.20 security software program for handheld devices.
Tahil, Fatimah A
2004-07-01
The TealLock has a simple graphic interface, and the program is user-friendly with well thought out options to customize security settings. The program is inexpensive and works seamlessly with the Palm OS platform's built-in basic Security application. The developer offers a 30-day free trial version and there is no downside to trying it to see if it meets your needs. It seems to be an effective security software program for psychiatrists who keep confidential and sensitive patient information on their PDAs. In keeping with HIPAA regulations, the TealLock bolsters security for protected health information stored on PDAs or other handheld devices by providing safeguards that address authentication, access control, encryption, and selected aspects of transmission.
Chen, Jinyang; Liu, Yucheng; Ji, Xinghu; He, Zhike
2016-09-15
In this work, a versatile dumbbell molecular (DM) probe was designed and employed in the sensitively homogeneous bioassay. In the presence of target molecule, the DM probe was protected from the digestion of exonucleases. Subsequently, the protected DM probe specifically bound to the intercalation dye and resulted in obvious fluorescence signal which was used to determine the target molecule in return. This design allows specific and versatile detection of diverse targets with easy operation and no sophisticated fluorescence labeling. Integrating the idea of target-protecting DM probe with adenosine triphosphate (ATP) involved ligation reaction, the DM probe with 5'-end phosphorylation was successfully constructed for ATP detection, and the limitation of detection was found to be 4.8 pM. Thanks to its excellent selectivity and sensitivity, this sensing strategy was used to detect ATP spiked in human serum as well as cellular ATP. Moreover, the proposed strategy was also applied in the visual detection of ATP in droplet-based microfluidic platform with satisfactory results. Similarly, combining the principle of target-protecting DM probe with streptavidin (SA)-biotin interaction, the DM probe with 3'-end biotinylation was developed for selective and sensitive SA determination, which demonstrated the robustness and versatility of this design. Copyright © 2016 Elsevier B.V. All rights reserved.
Tanko, Zita; Shab, Arna; Diepgen, Thomas Ludwig; Weisshaar, Elke
2009-06-01
Fragrances are very common in everyday products. A metalworker with chronic hand eczema and previously diagnosed type IV sensitizations to epoxy resin, balsam of Peru, fragrance mix and fragrance mix II was diagnosed with additional type IV sensitizations to geraniol, hydroxycitronellal, lilial, tree moss, oak moss absolute, citral, citronellol, farnesol, Lyral, fragrance mix II and fragrance mix (with sorbitan sesquioleate). In addition, a type IV sensitization to the skin protection cream containing geraniol and citronellol used at the workplace was detected, and deemed occupationally relevant in this case. The patient could have had contact to fragrances through private use of cosmetics and detergents. On the other hand, the fragrance-containing skin protection cream supports occupational exposure. This case report demonstrates that fragrance contact allergy has to be searched for and clarified individually, which requires a thorough history and a detailed analysis of the work place.
Mondoulet, Lucie; Dioszeghy, Vincent; Busato, Florence; Plaquet, Camille; Dhelft, Véronique; Bethune, Kevin; Leclere, Laurence; Daviaud, Christian; Ligouis, Mélanie; Sampson, Hugh; Dupont, Christophe; Tost, Jörg
2018-05-19
Epicutaneous immunotherapy (EPIT) is a promising method for treating food allergies. In animal models, EPIT induces sustained unresponsiveness and prevents further sensitization mediated by Tregs. Here, we elucidate the mechanisms underlying the therapeutic effect of EPIT, by characterizing the kinetics of DNA methylation changes in sorted cells from spleen and blood and by evaluating its persistence and bystander effect compared to oral immunotherapy (OIT). BALB/c mice orally sensitized to peanut proteins (PPE) were treated by EPIT using a PPE-patch or by PPE-OIT. Another set of peanut-sensitized mice treated by EPIT or OIT were sacrificed following a protocol of sensitization to OVA. DNA methylation was analysed during immunotherapy and 8 weeks after the end of treatment in sorted cells from spleen and blood by pyrosequencing. Humoral and cellular responses were measured during and after immunotherapy. Analyses showed a significant hypermethylation of the Gata3 promoter detectable only in Th2 cells for EPIT from the 4 th week and a significant hypomethylation of the Foxp3 promoter in CD62L + Tregs, which was sustained only for EPIT. In addition, mice treated with EPIT were protected from subsequent sensitization and maintained the epigenetic signature characteristic for EPIT. Our study demonstrates that EPIT leads to a unique and stable epigenetic signature in specific T cell compartments with down regulation of Th2 key regulators and upregulation of Treg transcription factors, likely explaining the sustainability of protection and the observed bystander effect. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
Attacks on practical quantum key distribution systems (and how to prevent them)
NASA Astrophysics Data System (ADS)
Jain, Nitin; Stiller, Birgit; Khan, Imran; Elser, Dominique; Marquardt, Christoph; Leuchs, Gerd
2016-07-01
With the emergence of an information society, the idea of protecting sensitive data is steadily gaining importance. Conventional encryption methods may not be sufficient to guarantee data protection in the future. Quantum key distribution (QKD) is an emerging technology that exploits fundamental physical properties to guarantee perfect security in theory. However, it is not easy to ensure in practice that the implementations of QKD systems are exactly in line with the theoretical specifications. Such theory-practice deviations can open loopholes and compromise security. Several such loopholes have been discovered and investigated in the last decade. These activities have motivated the proposal and implementation of appropriate countermeasures, thereby preventing future attacks and enhancing the practical security of QKD. This article introduces the so-called field of quantum hacking by summarising a variety of attacks and their prevention mechanisms.
Small sum privacy and large sum utility in data publishing.
Fu, Ada Wai-Chee; Wang, Ke; Wong, Raymond Chi-Wing; Wang, Jia; Jiang, Minhao
2014-08-01
While the study of privacy preserving data publishing has drawn a lot of interest, some recent work has shown that existing mechanisms do not limit all inferences about individuals. This paper is a positive note in response to this finding. We point out that not all inference attacks should be countered, in contrast to all existing works known to us, and based on this we propose a model called SPLU. This model protects sensitive information, by which we refer to answers for aggregate queries with small sums, while queries with large sums are answered with higher accuracy. Using SPLU, we introduce a sanitization algorithm to protect data while maintaining high data utility for queries with large sums. Empirical results show that our method behaves as desired. Copyright © 2014 Elsevier Inc. All rights reserved.
The Case for Individualized Goal Attainment Scaling Measurement in Elder Abuse Interventions.
Burnes, David; Lachs, Mark S
2017-01-01
Research available to inform the development of effective community-based elder abuse protective response interventions is severely limited. Elder abuse intervention research is constrained by a lack of research capacity, including sensitive and responsive outcome measures that can assess change in case status over the course of intervention. Given the heterogeneous nature of elder abuse, standard scales can lack the flexibility necessary to capture the diverse range of individually relevant issues across cases. In this paper, we seek to address this gap by proposing the adaptation and use of an innovative measurement strategy-goal attainment scaling-in the context of elder protection. Goal attainment scaling is an individualized, client-centered outcome measurement approach that has the potential to address existing measurement challenges constraining progress in elder abuse intervention research. © The Author(s) 2015.
Psychosocial Research on the International Space Station: Special Privacy Considerations
NASA Astrophysics Data System (ADS)
Kanas, N.; Salnitskiy, V.; Ritsher, J.; Grund, E.; Weiss, D.; Gushin, V.; Kozerenko, O.
Conducting psychosocial research with astronauts and cosmonauts requires special privacy and confidentiality precautions due to the high profile nature of the subject population and to individual crewmember perception of the risks inherent in divulging sensitive psychological information. Sampling from this small population necessitates subject protections above and beyond standard scientific human subject protocols. Many of these protections have relevance for psychosocial research on the International Space Station. In our previous study of psychosocial issues involving crewmembers on the Mir space station, special precautions were taken during each phase of the missions. These were implemented in order to gain the trust necessary to ameliorate the perceived risks of divulging potentially sensitive psychological information and to encourage candid responses. Pre-flight, a standard confidentiality agreement was provided along with a special layman's summary indicating that only group-level data would be presented, and subjects chose their own ID codes known only to themselves. In-flight, special procedures and technologies (such as encryption) were employed to protect the data during the collection. Post-flight, an analytic strategy was chosen to further mask subject identifiers, and draft manuscripts were reviewed by the astronaut office prior to publication. All of the eligible five astronauts and eight cosmonauts who flew joint US/Russian missions on the Mir were successfully recruited to participate, and their data completion rate was 76%. Descriptive analyses of the data indicated that there was sufficient variability in all of the measures to indicate that thoughtful, discriminating responses were being provided (e.g., the full range of response options was used in 63 of the 65 items of the Profile of Mood States measure, and both true and false response options were used in all 126 items of the Group Environment and the Work Environment measures). This presentation will discuss and expand on the lessons learned during the Mir study and relate them to future long-duration space missions.
Harper, Elizabeth B; Rittenhouse, Tracy A G; Semlitsch, Raymond D
2008-10-01
Much of the biodiversity associated with isolated wetlands requires aquatic and terrestrial habitat to maintain viable populations. Current federal wetland regulations in the United States do not protect isolated wetlands or extend protection to surrounding terrestrial habitat. Consequently, some land managers, city planners, and policy makers at the state and local levels are making an effort to protect these wetland and neighboring upland habitats. Balancing human land-use and habitat conservation is challenging, and well-informed land-use policy is hindered by a lack of knowledge of the specific risks of varying amounts of habitat loss. Using projections of wood frog (Rana sylvatica) and spotted salamander (Ambystoma maculatum) populations, we related the amount of high-quality terrestrial habitat surrounding isolated wetlands to the decline and risk of extinction of local amphibian populations. These simulations showed that current state-level wetland regulations protecting 30 m or less of surrounding terrestrial habitat are inadequate to support viable populations of pool-breeding amphibians. We also found that species with different life-history strategies responded differently to the loss and degradation of terrestrial habitat. The wood frog, with a short life span and high fecundity, was most sensitive to habitat loss and isolation, whereas the longer-lived spotted salamander with lower fecundity was most sensitive to habitat degradation that lowered adult survival rates. Our model results demonstrate that a high probability of local amphibian population persistence requires sufficient terrestrial habitat, the maintenance of habitat quality, and connectivity among local populations. Our results emphasize the essential role of adequate terrestrial habitat to the maintenance of wetland biodiversity and ecosystem function and offer a means of quantifying the risks associated with terrestrial habitat loss and degradation.
45 CFR 164.524 - Access of individuals to protected health information.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Health Information § 164.524 Access of individuals to protected health information. (a) Standard: Access to protected health information—(1) Right of access. Except as otherwise provided in paragraph (a)(2... protected health information about the individual in a designated record set, for as long as the protected...
45 CFR 164.524 - Access of individuals to protected health information.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Health Information § 164.524 Access of individuals to protected health information. (a) Standard: Access to protected health information—(1) Right of access. Except as otherwise provided in paragraph (a)(2... protected health information about the individual in a designated record set, for as long as the protected...
Raimondo, Sandy; Vivian, Deborah N; Delos, Charles; Barron, Mace G
2008-12-01
A primary objective of threatened and endangered species conservation is to ensure that chemical contaminants and other stressors do not adversely affect listed species. Assessments of the ecological risks of chemical exposures to listed species often rely on the use of surrogate species, safety factors, and species sensitivity distributions (SSDs) of chemical toxicity; however, the protectiveness of these approaches can be uncertain. We comprehensively evaluated the protectiveness of SSD first and fifth percentile hazard concentrations (HC1, HC5) relative to the application of safety factors using 68 SSDs generated from 1,482 acute (lethal concentration of 50%, or LC50) toxicity records for 291 species, including 24 endangered species (20 fish, four mussels). The SSD HC5s and HCls were lower than 97 and 99.5% of all endangered species mean acute LC50s, respectively. The HC5s were significantly less than the concentrations derived from applying safety factors of 5 and 10 to rainbow trout (Oncorhynchus mykiss) toxicity data, and the HCls were generally lower than the concentrations derived from a safety factor of 100 applied to rainbow trout toxicity values. Comparison of relative sensitivity (SSD percentiles) of broad taxonomic groups showed that crustaceans were generally the most sensitive taxa and taxa sensitivity was related to chemical mechanism of action. Comparison of relative sensitivity of narrow fish taxonomic groups showed that standard test fish species were generally less sensitive than salmonids and listed fish. We recommend the use of SSDs as a distribution-based risk assessment approach that is generally protective of listed species.
45 CFR 164.520 - Notice of privacy practices for protected health information.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Health Information § 164.520 Notice of privacy practices for protected health information. (a) Standard... legal duties with respect to protected health information. (2) Exception for group health plans. (i) An... receive protected health information other than summary health information as defined in § 164.504(a) or...
45 CFR 164.520 - Notice of privacy practices for protected health information.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Health Information § 164.520 Notice of privacy practices for protected health information. (a) Standard... legal duties with respect to protected health information. (2) Exception for group health plans. (i) An... receive protected health information other than summary health information as defined in § 164.504(a) or...
The impact of the EU general data protection regulation on scientific research.
Chassang, Gauthier
2017-01-01
The use of personal data is critical to ensure quality and reliability in scientific research. The new Regulation [European Union (EU)] 2016/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data [general data protection regulation (GDPR)], repealing Directive 95/46/EC, strengthens and harmonises the rules for protecting individuals' privacy rights and freedoms within and, under certain conditions, outside the EU territory. This new and historic legal milestone both prolongs and updates the EU acquis of the previous Data Protection Directive 95/46/EC. The GDPR fixes both general rules applying to any kind of personal data processing and specific rules applying to the processing of special categories of personal data such as health data taking place in the context of scientific research, this including clinical and translational research areas. This article aims to provide an overview of the new rules to consider where scientific projects include the processing of personal health data, genetic data or biometric data and other kinds of sensitive information whose use is strictly regulated by the GDPR in order to give the main key facts to researchers to adapt their practices and ensure compliance to the EU law to be enforced in May 2018.
The impact of the EU general data protection regulation on scientific research
Chassang, Gauthier
2017-01-01
The use of personal data is critical to ensure quality and reliability in scientific research. The new Regulation [European Union (EU)] 2016/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data [general data protection regulation (GDPR)], repealing Directive 95/46/EC, strengthens and harmonises the rules for protecting individuals’ privacy rights and freedoms within and, under certain conditions, outside the EU territory. This new and historic legal milestone both prolongs and updates the EU acquis of the previous Data Protection Directive 95/46/EC. The GDPR fixes both general rules applying to any kind of personal data processing and specific rules applying to the processing of special categories of personal data such as health data taking place in the context of scientific research, this including clinical and translational research areas. This article aims to provide an overview of the new rules to consider where scientific projects include the processing of personal health data, genetic data or biometric data and other kinds of sensitive information whose use is strictly regulated by the GDPR in order to give the main key facts to researchers to adapt their practices and ensure compliance to the EU law to be enforced in May 2018. PMID:28144283
ERIC Educational Resources Information Center
Ostapczuk, Martin; Moshagen, Morten; Zhao, Zengmei; Musch, Jochen
2009-01-01
Randomized response techniques (RRTs) aim to reduce social desirability bias in the assessment of sensitive attributes but differ regarding privacy protection. The less protection a design offers, the more likely respondents cheat by disobeying the instructions. In asymmetric RRT designs, respondents can play safe by giving a response that is…
24 CFR 81.76 - FOIA requests and protection of GSE information.
Code of Federal Regulations, 2010 CFR
2010-04-01
... FOIA requests and protection of GSE information. (a) General. HUD shall process FOIA requests for... disclosure. (b) Protection of confidential business information other than mortgage data and AHAR information. When a GSE seeks to protect from disclosure confidential business information, the GSE may seek...
Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun
2018-01-01
To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.
Optical field encryption for secure transmission of data
NASA Astrophysics Data System (ADS)
Fraser, Colin B.; Harvey, Andrew R.
2004-12-01
The growing awareness of the vulnerability of information transmitted on communication systems within the government, military and commercial sectors, has stimulated a number of areas of research within the optical community to design optical hardware encryption systems providing inherent immunity to espionage techniques. This paper describes a hardware optical encryption technique that utilises off the shelf telecommunication equipment and negates the necessity for an independent key distribution system with respect to the data transmission system, as is common with alternative encryption system implementations. This method also lends itself easily to fiber optic or free space communication and is applicable within any optical waveband. The encryption-decryption of the optical signal is achieved through low coherence optical interferometry. This requires the instantaneous processing and analysis of the signal, optically, to retrieve the relevant optical phase information hidden in the transmitted optical noise. This technology allows an authorised user to transmit encrypted information at a high data rate securely, while maintaining opaqueness to an unauthorised observer that data transmission is occurring. As the instantaneous optical field properties of the signals present in the system are essential to the optical encryption - decryption process, the system is inherently protected against electronic recording and advances in computational decryption algorithms. For organisations wishing to protect sensitive data and levels of communication activity these are highly desirable features.
Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan
2017-01-01
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack. PMID:29244776
Breaking out of the innovation box.
Wolpert, John D
2002-08-01
In most companies, investments in innovation follow a boom-bust cycle. For a time, the cash flows. Then, as the economy sours or companies rethink their priorities, the taps go dry. But when research budgets are slashed, the strong projects are often abandoned along with the weak ones. Promising initiatives are cut off just when they are about to bear fruit. Expensive labs are closed; partnership agreements costing millions in legal fees are thrown away. When disruptive changes in the competitive landscape come, companies are caught flat-footed. Sustainable innovation requires a new approach: Instead of being largely isolated projects, innovation initiatives need to gain access to the insights and capabilities of other companies. To be protected from the ax of short-term cost reductions and the faddishness born of easy money, the initiatives must become part of the ongoing commerce that takes place among companies. But how can businesses traffic in such sensitive information without giving their competitors an advantage? The answer, the author contends, lies in a practice that's been common since the Middle Ages: the use of independent intermediaries to facilitate the exchange of sensitive information among companies without revealing the principals' identities or motives and without otherwise compromising their interests. Executive search firms, for example, allow job seekers to remain anonymous during the early stages of a search, and they protect businesses from disclosing their hiring plans to rivals. A network of innovation intermediaries would be in a unique position to visualize new opportunities synthesized from insights and technologies provided by several companies--ideas that might never occur to businesses working on their own.
45 CFR 164.502 - Uses and disclosures of protected health information: General rules.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Health Information § 164.502 Uses and disclosures of protected health information: General rules. (a) Standard. A covered entity or business associate may not use or disclose protected health information... protected health information as follows: (i) To the individual; (ii) For treatment, payment, or health care...
Assessing effects of pesticides on amphibians and reptiles: status and needs
Hall, R.J.; Henry, P.F.P.
1992-01-01
Growing concern about the decline of certain amphibian populations and for conservation of amphibians and reptiles has led to renewed awareness of problems from pesticides. Testing amphibians and reptiles as a requirement for chemical registration has been proposed but is difficult because of the phylogenetic diversity of these groups. Information from the literature and research may determine whether amphibians and reptiles are adequately protected by current tests for mammals, birds, and fish. Existing information indicates that amphibians are unpredictably more resistant to certain cholinesterase inhibitors, and more sensitive to two chemicals used in fishery applications than could have been predicted. A single study on one species of lizard suggests that reptiles may be close in sensitivity to mammals and birds. Research on effects of pesticides on amphibians and reptiles should compare responses to currently tested groups and should seek to delineate those taxa and chemicals for which cross-group prediction is not possible. New tests for amphibians and reptiles should rely to the greatest extent possible on existing data bases, and should be designed for maximum economy and minimum harm to test animals. A strategy for developing the needed information is proposed. Good field testing and surveillance of chemicals in use may compensate for failures of predictive evaluations and may ultimately lead to improved tests.
Social Norms Information Enhances the Efficacy of an Appearance-based Sun Protection Intervention
Kulik, James A; Butler, Heather; Gerrard, Meg; Gibbons, Frederick X; Mahler, Heike
2008-01-01
This experiment examined whether the efficacy of an appearance-based sun protection intervention could be enhanced by the addition of social norms information. Southern California college students (N=125, predominantly female) were randomly assigned to either an appearance-based sun protection intervention-that consisted of a photograph depicting underlying sun damage to their skin (UV photo) and information about photoaging or to a control condition. Those assigned to the intervention were further randomized to receive information about what one should do to prevent photoaging (injunctive norms information), information about the number of their peers who currently use regular sun protection (descriptive norms information), both injunctive and descriptive norms information, or neither type of norms information. The results demonstrated that those who received the UV Photo/photoaging information intervention expressed greater sun protection intentions and subsequently reported greater sun protection behaviors than did controls. Further, the addition of both injunctive and descriptive norms information increased self-reported sun protection behaviors during the subsequent month. PMID:18448221
Demopoulos, Amanda W.J.; Foster, Ann M.; Jones, Michal L.; Gualtieri, Daniel J.
2011-01-01
The Geospatial Characteristics Geopdf of Florida's Coastal and Offshore Environments is a comprehensive collection of geospatial data describing the political and natural resources of Florida. This interactive map provides spatial information on bathymetry, sand resources, military areas, marine protected areas, cultural resources, locations of submerged cables, and shipping routes. The map should be useful to coastal resource managers and others interested in the administrative and political boundaries of Florida's coastal and offshore region. In particular, as oil and gas explorations continue to expand, the map may be used to explore information regarding sensitive areas and resources in the State of Florida. Users of this geospatial database will find that they have access to synthesized information in a variety of scientific disciplines concerning Florida's coastal zone. This powerful tool provides a one-stop assembly of data that can be tailored to fit the needs of many natural resource managers.
Chemically dependent physicians and informed consent disclosure.
Ackerman, T F
1996-01-01
Developments in law, professional guidelines, and public attitudes support informed consent disclosure by physicians who have been treated for chemical dependency. This view is built on the apparent materiality of the risk of relapse to informed treatment decisions by patients. Several considerations undercut this position. The probability is remote that a patient will be injured by a recovering physician who suffers an undetected relapse while being properly monitored. Monitoring by impaired physicians programs provides a more sensitive and specific mechanism for detecting relapsed physicians. Moreover, compromise of the privacy and employment rights of recovering physicians by consent disclosure is not justified if programs provide rigorous monitoring that protects the welfare of patients. Finally, required consent disclosure will reduce referrals of chemically dependent physicians to impaired physicians programs, thereby increasing the danger to patients. Limiting demands for required consent disclosure necessitates effective operation of impaired physicians programs.
45 CFR 164.502 - Uses and disclosures of protected health information: general rules.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Health Information § 164.502 Uses and disclosures of protected health information: general rules. (a) Standard. A covered entity may not use or disclose protected health information, except as permitted or.... A covered entity is permitted to use or disclose protected health information as follows: (i) To the...
Bose, Anushika; Dürr, Tobias; Klenke, Reinhard A; Henle, Klaus
2018-02-28
Biodiversity-related impacts at wind energy facilities have increasingly become a cause of conservation concern, central issue being the collision of birds. Utilizing spatial information of their carcass detections at wind turbines (WTs), we quantified the detections in relation to the metric distances of the respective turbines to different land-use types. We used ecological niche factor analysis (ENFA) to identify combinations of land-use distances with respect to the spatial allocation of WTs that led to higher proportions of collisions among the worst affected bird-groups: Buntings, Crows, Larks, Pigeons and Raptors. We also assessed their respective similarities to the collision phenomenon by checking for overlaps amongst their distance combinations. Crows and Larks showed the narrowest "collision sensitive niche"; a part of ecological niche under higher risk of collisions with turbines, followed by that of Buntings and Pigeons. Raptors had the broadest niche showing significant overlaps with the collision sensitive niches of the other groups. This can probably be attributed to their larger home range combined with their hunting affinities to open landscapes. Identification of collision sensitive niches could be a powerful tool for landscape planning; helping avoid regions with higher risks of collisions for turbine allocations and thus protecting sensitive bird populations.
6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.
Code of Federal Regulations, 2014 CFR
2014-01-01
...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2014-01-01 2014-01-01 false Protected Critical Infrastructure Information...
6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2011-01-01 2011-01-01 false Protected Critical Infrastructure Information...
6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2010-01-01 2010-01-01 false Protected Critical Infrastructure Information...
6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.
Code of Federal Regulations, 2012 CFR
2012-01-01
...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2012-01-01 2012-01-01 false Protected Critical Infrastructure Information...
6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.
Code of Federal Regulations, 2013 CFR
2013-01-01
...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2013-01-01 2013-01-01 false Protected Critical Infrastructure Information...
Cytokine Profiling for Chemical Sensitizers: Application of the Ribonuclease Protection Assay and Effect of Dose. L.M. Plitnick1, S.E. Loveless3, G.S. Ladics3, M.P. Holsapple4, M.J. Selgrade2, D.M. Sailstad2 and R.J. Smialowicz2. 1UNC, Curriculum in Toxicology, Chapel Hill, NC a...
15 CFR 785.10 - Matters protected against disclosure.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Matters protected against disclosure... ENFORCEMENT § 785.10 Matters protected against disclosure. (a) Protective measures. The ALJ may limit... ALJ determines that documents containing classified or sensitive matter must be made available to a...
15 CFR 785.10 - Matters protected against disclosure.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Matters protected against disclosure... ENFORCEMENT § 785.10 Matters protected against disclosure. (a) Protective measures. The ALJ may limit... ALJ determines that documents containing classified or sensitive matter must be made available to a...
15 CFR 785.10 - Matters protected against disclosure.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Matters protected against disclosure... ENFORCEMENT § 785.10 Matters protected against disclosure. (a) Protective measures. The ALJ may limit... ALJ determines that documents containing classified or sensitive matter must be made available to a...
15 CFR 785.10 - Matters protected against disclosure.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false Matters protected against disclosure... ENFORCEMENT § 785.10 Matters protected against disclosure. (a) Protective measures. The ALJ may limit... ALJ determines that documents containing classified or sensitive matter must be made available to a...
Quality of Nevada's aquifers and their susceptibility to contamination, 1990-2004
Lopes, Thomas J.
2006-01-01
EXECUTIVE SUMMARY: In 1999, the U.S. Environmental Protection Agency introduced a rule to protect the quality of ground water in areas other than source-water protection areas. These other sensitive ground-water areas (OSGWA) are areas that are not currently but could eventually be used as a source of drinking water. To help determine whether a well is in an OSGWA, the Nevada Division of Environmental Protection needs statewide information on the susceptibility and vulnerability of Nevada's aquifer systems to contamination. This report presents an evaluation of the quality of ground water and susceptibility of Nevada's aquifer systems to anthropogenic contamination. Chemical tracers and statistical methods were used to assess the susceptibility of aquifer systems in Nevada. Chemical tracers included nitrate, pesticides, volatile organic compounds (VOCs), chlorofluorocarbons (CFCs), dissolved gases, and isotopes of hydrogen and oxygen. Ground-water samples were collected from 133 wells during August 2002 through October 2003. Logistic regression was done to estimate the probability of detecting nitrate above concentrations typically found in undeveloped areas. Nitrate is one of the most common anthropogenic contaminants that degrades ground-water quality, is commonly measured and is persistent, except in reducing conditions. These characteristics make nitrate a good indicator of aquifer susceptibility. Water-quality data for 5,528 wells were compiled into a database. The area around each well was characterized using information on explanatory variables that could be related to nitrate concentrations. Data also were used to characterize the quality of ground water in Nevada, including dissolved solids, nitrate, pesticide, and VOC concentrations.
Collmann, Jeff; Cooper, Ted
2007-01-01
This case study describes and analyzes a breach of the confidentiality and integrity of personally identified health information (e.g. appointment details, answers to patients' questions, medical advice) for over 800 Kaiser Permanente (KP) members through KP Online, a web-enabled health care portal. The authors obtained and analyzed multiple types of qualitative data about this incident including interviews with KP staff, incident reports, root cause analyses, and media reports. Reasons at multiple levels account for the breach, including the architecture of the information system, the motivations of individual staff members, and differences among the subcultures of individual groups within as well as technical and social relations across the Kaiser IT program. None of these reasons could be classified, strictly speaking, as "security violations." This case study, thus, suggests that, to protect sensitive patient information, health care organizations should build safe organizational contexts for complex health information systems in addition to complying with good information security practice and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) of 1996.
Agents Based e-Commerce and Securing Exchanged Information
NASA Astrophysics Data System (ADS)
Al-Jaljouli, Raja; Abawajy, Jemal
Mobile agents have been implemented in e-Commerce to search and filter information of interest from electronic markets. When the information is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described, which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol usingSymbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data-authenticity, origin confidentiality and data non-repudiability.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 1 2012-07-01 2012-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...
43 CFR 2.36 - Can a bureau release information protected by Exemption 4?
Code of Federal Regulations, 2014 CFR
2014-10-01
... 43 Public Lands: Interior 1 2014-10-01 2014-10-01 false Can a bureau release information protected... release information protected by Exemption 4? If a bureau determines that the requested information is protected from release by Exemption 4 of the FOIA, the bureau has no discretion to release the information...
43 CFR 2.36 - Can a bureau release information protected by Exemption 4?
Code of Federal Regulations, 2013 CFR
2013-10-01
... 43 Public Lands: Interior 1 2013-10-01 2013-10-01 false Can a bureau release information protected... release information protected by Exemption 4? If a bureau determines that the requested information is protected from release by Exemption 4 of the FOIA, the bureau has no discretion to release the information...
45 CFR 164.105 - Organizational requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... “protected health information” refers to protected health information that is created or received by or on... “electronic protected health information” refers to electronic protected health information that is created... disclose protected health information to another component of the covered entity in circumstances in which...
15 CFR 719.12 - Matters protected against disclosure.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Matters protected against disclosure... ENFORCEMENT § 719.12 Matters protected against disclosure. (a) Protective measures. The ALJ may limit... classified or sensitive matter must be made available to a party in order to avoid prejudice, the ALJ may...
15 CFR 766.11 - Matter protected against disclosure.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Matter protected against disclosure... ADMINISTRATIVE ENFORCEMENT PROCEEDINGS § 766.11 Matter protected against disclosure. (a) Protective measures. It... determines that documents containing the sensitive matter need to be made available to a respondent to avoid...
15 CFR 719.12 - Matters protected against disclosure.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false Matters protected against disclosure... ENFORCEMENT § 719.12 Matters protected against disclosure. (a) Protective measures. The ALJ may limit... classified or sensitive matter must be made available to a party in order to avoid prejudice, the ALJ may...
15 CFR 766.11 - Matter protected against disclosure.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false Matter protected against disclosure... ADMINISTRATIVE ENFORCEMENT PROCEEDINGS § 766.11 Matter protected against disclosure. (a) Protective measures. It... determines that documents containing the sensitive matter need to be made available to a respondent to avoid...
15 CFR 280.212 - Matter protected against disclosure.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Matter protected against disclosure... PROGRAMS FASTENER QUALITY Enforcement § 280.212 Matter protected against disclosure. (a) Protective... containing the classified or sensitive matter need to be made available to a party to avoid prejudice, the...
15 CFR 280.212 - Matter protected against disclosure.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false Matter protected against disclosure... PROGRAMS FASTENER QUALITY Enforcement § 280.212 Matter protected against disclosure. (a) Protective... containing the classified or sensitive matter need to be made available to a party to avoid prejudice, the...
15 CFR 766.11 - Matter protected against disclosure.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Matter protected against disclosure... ADMINISTRATIVE ENFORCEMENT PROCEEDINGS § 766.11 Matter protected against disclosure. (a) Protective measures. It... determines that documents containing the sensitive matter need to be made available to a respondent to avoid...
15 CFR 280.212 - Matter protected against disclosure.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false Matter protected against disclosure... PROGRAMS FASTENER QUALITY Enforcement § 280.212 Matter protected against disclosure. (a) Protective... containing the classified or sensitive matter need to be made available to a party to avoid prejudice, the...
15 CFR 766.11 - Matter protected against disclosure.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Matter protected against disclosure... ADMINISTRATIVE ENFORCEMENT PROCEEDINGS § 766.11 Matter protected against disclosure. (a) Protective measures. It... determines that documents containing the sensitive matter need to be made available to a respondent to avoid...
15 CFR 719.12 - Matters protected against disclosure.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Matters protected against disclosure... ENFORCEMENT § 719.12 Matters protected against disclosure. (a) Protective measures. The ALJ may limit... classified or sensitive matter must be made available to a party in order to avoid prejudice, the ALJ may...
15 CFR 280.212 - Matter protected against disclosure.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Matter protected against disclosure... PROGRAMS FASTENER QUALITY Enforcement § 280.212 Matter protected against disclosure. (a) Protective... containing the classified or sensitive matter need to be made available to a party to avoid prejudice, the...
15 CFR 719.12 - Matters protected against disclosure.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Matters protected against disclosure... ENFORCEMENT § 719.12 Matters protected against disclosure. (a) Protective measures. The ALJ may limit... classified or sensitive matter must be made available to a party in order to avoid prejudice, the ALJ may...
Vavrek, Jayson R; Henderson, Brian S; Danagoulian, Areg
2018-04-24
Future nuclear arms reduction efforts will require technologies to verify that warheads slated for dismantlement are authentic without revealing any sensitive weapons design information to international inspectors. Despite several decades of research, no technology has met these requirements simultaneously. Recent work by Kemp et al. [Kemp RS, Danagoulian A, Macdonald RR, Vavrek JR (2016) Proc Natl Acad Sci USA 113:8618-8623] has produced a novel physical cryptographic verification protocol that approaches this treaty verification problem by exploiting the isotope-specific nature of nuclear resonance fluorescence (NRF) measurements to verify the authenticity of a warhead. To protect sensitive information, the NRF signal from the warhead is convolved with that of an encryption foil that contains key warhead isotopes in amounts unknown to the inspector. The convolved spectrum from a candidate warhead is statistically compared against that from an authenticated template warhead to determine whether the candidate itself is authentic. Here we report on recent proof-of-concept warhead verification experiments conducted at the Massachusetts Institute of Technology. Using high-purity germanium (HPGe) detectors, we measured NRF spectra from the interrogation of proxy "genuine" and "hoax" objects by a 2.52 MeV endpoint bremsstrahlung beam. The observed differences in NRF intensities near 2.2 MeV indicate that the physical cryptographic protocol can distinguish between proxy genuine and hoax objects with high confidence in realistic measurement times.
Cultural aspects related to informed consent in health research: A systematic review.
Halkoaho, Arja; Pietilä, Anna-Maija; Ebbesen, Mette; Karki, Suyen; Kangasniemi, Mari
2016-09-01
In order to protect the autonomy of human subjects, we need to take their culture into account when we are obtaining informed consent. This study describes the cultural aspects related to informed consent in health research and is based on electronic searches that were conducted using the Scopus, PubMed, CINAHL, and Cochrane databases published between 2000 and 2013. A total of 25 articles were selected. Our findings indicate that cultural perspectives relating to the informed consent process are essential during the whole research process and particularly crucial in the planning phase of a study. Our study indicates that appropriate communication between different stakeholders plays a vital role in cultural understanding. The researchers' awareness of cultural differences and their ability to work in a culturally sensitive way are key factors in improving study participation and retention in a multicultural context. Taking cultural aspects into account during the whole research process improves the quality of research. © The Author(s) 2015.
Designing privacy-friendly digital whiteboards for mediation of clinical progress
2014-01-01
Background In hospitals, digital versions of dry-erase whiteboards are increasingly becoming more common. One of the purposes with such whiteboards is to support coordination of care by augmenting visibility and availability of clinical information. However, clinical information usually concerns patients and is regarded as sensitive personal health information, meaning that it should be access controlled. The purpose of this study is to explore how digital whiteboards can be designed for supporting coordination of care, by providing clinicians with useful information in a usable way, and at the same time protect patient privacy. Methods A demo application was designed, demonstrated and evaluated iteratively. In total, 15 professional ward nurses role-played a scenario in which the application played a central part. Afterwards, the participants were interviewed. All interviews were recorded, transcribed verbatim, and analysed qualitatively. Results The participants valued having updated clinical information presented on a digital whiteboard, even if the information was de-identified and abstracted. According to the participants, such information could possibly improve inter-departmental communication, reduce the number of electronic health record-logins, and make nurses more rapidly aware of new information. The participants expected that they would be able to re-identify much of the de-identified information in real situations based on their insight into their patients’ recent and expected care activities. Moreover, they also valued being able to easily access more detailed information and verify patient identities. While abstraction and de-identification was regarded to sufficiently protect the patients’ privacy, the nurses also pointed out the importance of having control over what can be seen by other patients and passers-by if detailed medical information was accessed on a digital whiteboard. Conclusions Presenting updated information from patient care activities on a digital whiteboard in a de-identified and abstracted format may support coordination of care at a hospital ward without compromising patient privacy. PMID:24708868
Designing privacy-friendly digital whiteboards for mediation of clinical progress.
Gjære, Erlend Andreas; Lillebo, Børge
2014-04-04
In hospitals, digital versions of dry-erase whiteboards are increasingly becoming more common. One of the purposes with such whiteboards is to support coordination of care by augmenting visibility and availability of clinical information. However, clinical information usually concerns patients and is regarded as sensitive personal health information, meaning that it should be access controlled. The purpose of this study is to explore how digital whiteboards can be designed for supporting coordination of care, by providing clinicians with useful information in a usable way, and at the same time protect patient privacy. A demo application was designed, demonstrated and evaluated iteratively. In total, 15 professional ward nurses role-played a scenario in which the application played a central part. Afterwards, the participants were interviewed. All interviews were recorded, transcribed verbatim, and analysed qualitatively. The participants valued having updated clinical information presented on a digital whiteboard, even if the information was de-identified and abstracted. According to the participants, such information could possibly improve inter-departmental communication, reduce the number of electronic health record-logins, and make nurses more rapidly aware of new information. The participants expected that they would be able to re-identify much of the de-identified information in real situations based on their insight into their patients' recent and expected care activities. Moreover, they also valued being able to easily access more detailed information and verify patient identities. While abstraction and de-identification was regarded to sufficiently protect the patients' privacy, the nurses also pointed out the importance of having control over what can be seen by other patients and passers-by if detailed medical information was accessed on a digital whiteboard. Presenting updated information from patient care activities on a digital whiteboard in a de-identified and abstracted format may support coordination of care at a hospital ward without compromising patient privacy.
Recognition and pseudonymisation of medical records for secondary use.
Heurix, Johannes; Fenz, Stefan; Rella, Antonio; Neubauer, Thomas
2016-03-01
Health records rank among the most sensitive personal information existing today. An unwanted disclosure to unauthorised parties usually results in significant negative consequences for an individual. Therefore, health records must be adequately protected in order to ensure the individual's privacy. However, health records are also valuable resources for clinical studies and research activities. In order to make the records available for privacy-preserving secondary use, thorough de-personalisation is a crucial prerequisite to prevent re-identification. This paper introduces MEDSEC, a system which automatically converts paper-based health records into de-personalised and pseudonymised documents which can be accessed by secondary users without compromising the patients' privacy. The system converts the paper-based records into a standardised structure that facilitates automated processing and the search for useful information.
Wang, Shuang; Jiang, Xiaoqian; Wu, Yuan; Cui, Lijuan; Cheng, Samuel; Ohno-Machado, Lucila
2013-01-01
We developed an EXpectation Propagation LOgistic REgRession (EXPLORER) model for distributed privacy-preserving online learning. The proposed framework provides a high level guarantee for protecting sensitive information, since the information exchanged between the server and the client is the encrypted posterior distribution of coefficients. Through experimental results, EXPLORER shows the same performance (e.g., discrimination, calibration, feature selection etc.) as the traditional frequentist Logistic Regression model, but provides more flexibility in model updating. That is, EXPLORER can be updated one point at a time rather than having to retrain the entire data set when new observations are recorded. The proposed EXPLORER supports asynchronized communication, which relieves the participants from coordinating with one another, and prevents service breakdown from the absence of participants or interrupted communications. PMID:23562651
NASA Astrophysics Data System (ADS)
Jyotsna; Kapil; Aayush
2012-09-01
Censorship on Internet has always wet its hands in the water of controversies, It is said to go in with synonym of "FILTERING THE NET" i.e. Either done to protect minors or for nationís privacy, some take it as snatching their freedom over internet and some take it as an appropriate step to protect minor, It has its supporters as well as opponents.Google has reported a whooping number of requests from Governments of U.K, China, Poland, Spain, and Canada to remove videos and search links that led to harassment, sensitive issues or suspicious people. This paper deals with the cons of censorship on internet and to make people aware of the fact that Internet is not a single body owned by an org. but an open sky of information shared equally by all. Research done has found out many unseen aspects of different people's view point.
Preserving differential privacy for similarity measurement in smart environments.
Wong, Kok-Seng; Kim, Myung Ho
2014-01-01
Advances in both sensor technologies and network infrastructures have encouraged the development of smart environments to enhance people's life and living styles. However, collecting and storing user's data in the smart environments pose severe privacy concerns because these data may contain sensitive information about the subject. Hence, privacy protection is now an emerging issue that we need to consider especially when data sharing is essential for analysis purpose. In this paper, we consider the case where two agents in the smart environment want to measure the similarity of their collected or stored data. We use similarity coefficient function (F SC) as the measurement metric for the comparison with differential privacy model. Unlike the existing solutions, our protocol can facilitate more than one request to compute F SC without modifying the protocol. Our solution ensures privacy protection for both the inputs and the computed F SC results.
Privacy Preservation in Distributed Subgradient Optimization Algorithms.
Lou, Youcheng; Yu, Lean; Wang, Shouyang; Yi, Peng
2017-07-31
In this paper, some privacy-preserving features for distributed subgradient optimization algorithms are considered. Most of the existing distributed algorithms focus mainly on the algorithm design and convergence analysis, but not the protection of agents' privacy. Privacy is becoming an increasingly important issue in applications involving sensitive information. In this paper, we first show that the distributed subgradient synchronous homogeneous-stepsize algorithm is not privacy preserving in the sense that the malicious agent can asymptotically discover other agents' subgradients by transmitting untrue estimates to its neighbors. Then a distributed subgradient asynchronous heterogeneous-stepsize projection algorithm is proposed and accordingly its convergence and optimality is established. In contrast to the synchronous homogeneous-stepsize algorithm, in the new algorithm agents make their optimization updates asynchronously with heterogeneous stepsizes. The introduced two mechanisms of projection operation and asynchronous heterogeneous-stepsize optimization can guarantee that agents' privacy can be effectively protected.
Dissipative quantum error correction and application to quantum sensing with trapped ions.
Reiter, F; Sørensen, A S; Zoller, P; Muschik, C A
2017-11-28
Quantum-enhanced measurements hold the promise to improve high-precision sensing ranging from the definition of time standards to the determination of fundamental constants of nature. However, quantum sensors lose their sensitivity in the presence of noise. To protect them, the use of quantum error-correcting codes has been proposed. Trapped ions are an excellent technological platform for both quantum sensing and quantum error correction. Here we present a quantum error correction scheme that harnesses dissipation to stabilize a trapped-ion qubit. In our approach, always-on couplings to an engineered environment protect the qubit against spin-flips or phase-flips. Our dissipative error correction scheme operates in a continuous manner without the need to perform measurements or feedback operations. We show that the resulting enhanced coherence time translates into a significantly enhanced precision for quantum measurements. Our work constitutes a stepping stone towards the paradigm of self-correcting quantum information processing.
DNA marker technology for wildlife conservation
Arif, Ibrahim A.; Khan, Haseeb A.; Bahkali, Ali H.; Al Homaidan, Ali A.; Al Farhan, Ahmad H.; Al Sadoon, Mohammad; Shobrak, Mohammad
2011-01-01
Use of molecular markers for identification of protected species offers a greater promise in the field of conservation biology. The information on genetic diversity of wildlife is necessary to ascertain the genetically deteriorated populations so that better management plans can be established for their conservation. Accurate classification of these threatened species allows understanding of the species biology and identification of distinct populations that should be managed with utmost care. Molecular markers are versatile tools for identification of populations with genetic crisis by comparing genetic diversities that in turn helps to resolve taxonomic uncertainties and to establish management units within species. The genetic marker analysis also provides sensitive and useful tools for prevention of illegal hunting and poaching and for more effective implementation of the laws for protection of the endangered species. This review summarizes various tools of DNA markers technology for application in molecular diversity analysis with special emphasis on wildlife conservation. PMID:23961128
10 CFR 71.11 - Protection of Safeguards Information.
Code of Federal Regulations, 2012 CFR
2012-01-01
... public health and safety or the common defense and security, shall protect Safeguards Information against... 10 Energy 2 2012-01-01 2012-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or...
10 CFR 71.11 - Protection of Safeguards Information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... public health and safety or the common defense and security, shall protect Safeguards Information against... 10 Energy 2 2011-01-01 2011-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or...
10 CFR 71.11 - Protection of Safeguards Information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... public health and safety or the common defense and security, shall protect Safeguards Information against... 10 Energy 2 2010-01-01 2010-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or...
10 CFR 71.11 - Protection of Safeguards Information.
Code of Federal Regulations, 2013 CFR
2013-01-01
... public health and safety or the common defense and security, shall protect Safeguards Information against... 10 Energy 2 2013-01-01 2013-01-01 false Protection of Safeguards Information. 71.11 Section 71.11... General Provisions § 71.11 Protection of Safeguards Information. Each licensee, certificate holder, or...
45 CFR 164.528 - Accounting of disclosures of protected health information.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Accounting of disclosures of protected health... Health Information § 164.528 Accounting of disclosures of protected health information. (a) Standard: Right to an accounting of disclosures of protected health information. (1) An individual has a right to...
Toska, Elona; Cluver, Lucie D; Boyes, Mark E; Isaacsohn, Maya; Hodes, Rebecca; Sherr, Lorraine
2017-09-01
Social protection can reduce HIV-risk behavior in general adolescent populations, but evidence among HIV-positive adolescents is limited. This study quantitatively tests whether social protection is associated with reduced unprotected sex among 1060 ART-eligible adolescents from 53 government facilities in South Africa. Potential social protection included nine 'cash/cash-in-kind' and 'care' provisions. Analyses tested interactive/additive effects using logistic regressions and marginal effects models, controlling for covariates. 18 % of all HIV-positive adolescents and 28 % of girls reported unprotected sex. Lower rates of unprotected sex were associated with access to school (OR 0.52 95 % CI 0.33-0.82 p = 0.005), parental supervision (OR 0.54 95 % CI 0.33-0.90 p = 0.019), and adolescent-sensitive clinic care (OR 0.43 95 % CI 0.25-0.73 p = 0.002). Gender moderated the effect of adolescent-sensitive clinic care. Combination social protection had additive effects amongst girls: without any provisions 49 % reported unprotected sex; with 1-2 provisions 13-38 %; and with all provisions 9 %. Combination social protection has the potential to promote safer sex among HIV-positive adolescents, particularly girls.
Dose Limits for Man do not Adequately Protect the Ecosystem
DOE Office of Scientific and Technical Information (OSTI.GOV)
Higley, Kathryn A.; Alexakhin, Rudolf M.; McDonald, Joseph C.
2004-08-01
It has been known for quite some time that different organisms display differing degrees of sensitivity to the effects of ionizing radiations. Some microorganisms such as the bacterium Micrococcus radiodurans, along with many species of invertebrates, are extremely radio-resistant. Humans might be categorized as being relatively sensitive to radiation, and are a bit more resistant than some pine trees. Therefore, it could be argued that maintaining the dose limits necessary to protect humans will also result in the protection of most other species of flora and fauna. This concept is usually referred to as the anthropocentric approach. In other words,more » if man is protected then the environment is also adequately protected. The ecocentric approach might be stated as; the health of humans is effectively protected only when the environment is not unduly exposed to radiation. The ICRP is working on new recommendations dealing with the protection of the environment, and this debate should help to highlight a number of relevant issues concerning that topic.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nooij, R.J.W. de; Lotterman, K.M.; Sande, P.H.J. van de
Environmental Impact Assessment (EIA) must account for legally protected and endangered species. Uncertainties relating to the validity and sensitivity of EIA arise from predictions and valuation of effects on these species. This paper presents a validity and sensitivity analysis of a model (BIO-SAFE) for assessment of impacts of land use changes and physical reconstruction measures on legally protected and endangered river species. The assessment is based on links between species (higher plants, birds, mammals, reptiles and amphibians, butterflies and dragon- and damselflies) and ecotopes (landscape ecological units, e.g., river dune, soft wood alluvial forests), and on value assignment to protectedmore » and endangered species using different valuation criteria (i.e., EU Habitats and Birds directive, Conventions of Bern and Bonn and Red Lists). The validity of BIO-SAFE has been tested by comparing predicted effects of landscape changes on the diversity of protected and endangered species with observed changes in biodiversity in five reconstructed floodplains. The sensitivity of BIO-SAFE to value assignment has been analysed using data of a Strategic Environmental Assessment concerning the Spatial Planning Key Decision for reconstruction of the Dutch floodplains of the river Rhine, aimed at flood defence and ecological rehabilitation. The weights given to the valuation criteria for protected and endangered species were varied and the effects on ranking of alternatives were quantified. A statistically significant correlation (p < 0.01) between predicted and observed values for protected and endangered species was found. The sensitivity of the model to value assignment proved to be low. Comparison of five realistic valuation options showed that different rankings of scenarios predominantly occur when valuation criteria are left out of the assessment. Based on these results we conclude that linking species to ecotopes can be used for adequate impact assessments. Quantification of sensitivity of impact assessment to value assignment shows that a model like BIO-SAFE is relatively insensitive to assignment of values to different policy and legislation based criteria. Arbitrariness of the value assignment therefore has a very limited effect on assessment outcomes. However, the decision to include valuation criteria or not is very important.« less
Fuse protects circuit from voltage and current overloads
NASA Technical Reports Server (NTRS)
Casey, L. O.
1969-01-01
Low-melting resistor connected in series with the load protects the circuit against current overloads. It protects test subjects and patients being monitored by electronic instrumentation from inadvertant overloads of current, and sensitive electronic equipment against high-voltage damage.
Bouvette-Turcot, Andrée-Anne; Bernier, Annie; Leblanc, Élizabel
2017-01-01
In light of evidence suggesting that maternal adaptation may impact early child emotional development, this study investigated the interactive effects of maternal psychosocial maladjustment and maternal sensitivity on child internalizing symptoms, with the aim of investigating the potentially protective function of maternal sensitivity. Families (N = 71 to 106 across measures, with gender spread almost evenly: number of boys = 31 to 51 across measures) took part in four assessments between child ages 1 and 3 years. Mothers completed measures of parental stress, psychological distress, and marital satisfaction when their children were between 12 and 15 months. A composite score of maternal psychosocial maladjustment was derived from these measures. Maternal sensitivity was rated by trained observers at 12 months following a home visit. Child internalizing symptoms were assessed by both parents when the child was 2 and 3 years old. Hierarchical regressions revealed that increased maternal psychosocial maladjustment was related to more internalizing symptoms in children, however only among children of less sensitive mothers. In contrast, children of more sensitive mothers appeared to be protected. This was observed with maternal reports at 2 years, and both maternal and paternal reports at 3 years. These results suggest that young children may be differentially affected by their parents' emotional adjustment, while highlighting the pivotal protective role of maternal sensitivity in this process.
Comparative Analysis of State Fish Consumption Advisories Targeting Sensitive Populations
Scherer, Alison C.; Tsuchiya, Ami; Younglove, Lisa R.; Burbacher, Thomas M.; Faustman, Elaine M.
2008-01-01
Objective Fish consumption advisories are issued to warn the public of possible toxicological threats from consuming certain fish species. Although developing fetuses and children are particularly susceptible to toxicants in fish, fish also contain valuable nutrients. Hence, formulating advice for sensitive populations poses challenges. We conducted a comparative analysis of advisory Web sites issued by states to assess health messages that sensitive populations might access. Data sources We evaluated state advisories accessed via the National Listing of Fish Advisories issued by the U.S. Environmental Protection Agency. Data extraction We created criteria to evaluate advisory attributes such as risk and benefit message clarity. Data synthesis All 48 state advisories issued at the time of this analysis targeted children, 90% (43) targeted pregnant women, and 58% (28) targeted women of childbearing age. Only six advisories addressed single contaminants, while the remainder based advice on 2–12 contaminants. Results revealed that advisories associated a dozen contaminants with specific adverse health effects. Beneficial health effects of any kind were specifically associated only with omega-3 fatty acids found in fish. Conclusions These findings highlight the complexity of assessing and communicating information about multiple contaminant exposure from fish consumption. Communication regarding potential health benefits conferred by specific fish nutrients was minimal and focused primarily on omega-3 fatty acids. This overview suggests some lessons learned and highlights a lack of both clarity and consistency in providing the breadth of information that sensitive populations such as pregnant women need to make public health decisions about fish consumption during pregnancy. PMID:19079708
Information Protection Engineering: Using Technology and Experience to Protect Assets
2001-07-01
SAIC’s highly experienced team has developed technology, techniques and expertise in protecting these information assets from electronic attack by...criminals, terrorists, hackers or nation states. INFORMATION PROTECTION ENGINEERING : Using Technology and Experience to Protect Assets William J. Marlow... Engineering : Using Technology and Experience to Protect Assets Contract or Grant Number Program Element Number Authors Marlow, William J. Project
NASA Astrophysics Data System (ADS)
Bulander, Rebecca; Decker, Michael; Schiefer, Gunther; Kölmel, Bernhard
Mobile terminals like cellular phones and PDAs are a promising target platform for mobile advertising: The devices are widely spread, are able to present interactive multimedia content and offer as almost permanently carried along personal communication devices a high degree of reachability. But particular because of the latter feature it is important to pay great attention to privacy aspects and avoidance of spam-messages when designing an application for mobile advertising. Furthermore the limited user interface of mobile devices is a special challenge. The following article describes the solution approach for mobile advertising developed within the project MoMa, which was funded by the Federal Ministry of Economics and Labour of Germany (BMWA). MoMa enables highly personalized and context sensitive mobile advertising while guaranteeing data protection. To achieve this we have to distinguish public and private context information.
Privacy of genetic information: a review of the laws in the United States.
Fuller, B; Ip, M
2001-01-01
This paper examines the privacy of genetic information and the laws in the United States designed to protect genetic privacy. While all 50 states have laws protecting the privacy of health information, there are many states that have additional laws that carve out additional protections specifically for genetic information. The majority of the individual states have enacted legislation to protect individuals from discrimination on the basis of genetic information, and most of this legislation also has provisions to protect the privacy of genetic information. On the Federal level, there has been no antidiscrimination or genetic privacy legislation. Secretary Donna Shalala of the Department of Health and Human Services has issued proposed regulations to protect the privacy of individually identifiable health information. These regulations encompass individually identifiable health information and do not make specific provisions for genetic information. The variety of laws regarding genetic privacy, some found in statutes to protect health information and some found in statutes to prevent genetic discrimination, presents challenges to those charged with administering and executing these laws.
45 CFR 164.526 - Amendment of protected health information.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 1 2012-10-01 2012-10-01 false Amendment of protected health information. 164.526....526 Amendment of protected health information. (a) Standard: Right to amend. (1) Right to amend. An individual has the right to have a covered entity amend protected health information or a record about the...
Location Privacy Protection on Social Networks
NASA Astrophysics Data System (ADS)
Zhan, Justin; Fang, Xing
Location information is considered as private in many scenarios. Protecting location information on mobile ad-hoc networks has attracted much research in past years. However, location information protection on social networks has not been paid much attention. In this paper, we present a novel location privacy protection approach on the basis of user messages in social networks. Our approach grants flexibility to users by offering them multiple protecting options. To the best of our knowledge, this is the first attempt to protect social network users' location information via text messages. We propose five algorithms for location privacy protection on social networks.
Blanke, Sandra J; McGrady, Elizabeth
2016-07-01
Health care stakeholders are concerned about the growing risk of protecting sensitive patient health information from breaches. The Federal Emergency Management Agency (FEMA) has identified cyber attacks as an emerging concern, and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH) have increased security requirements and are enforcing compliance through stiff financial penalties. The purpose of this study is to describe health care breaches of protected information, analyze the hazards and vulnerabilities of reported breach cases, and prescribe best practices of managing risk through security controls and countermeasures. Prescriptive findings were used to construct a checklist tool to assess and monitor common risks. This research uses a case methodology to describe specific examples of the 3 major types of cyber breach hazards: portable device, insider, and physical breaches. We utilize a risk management framework to prescribe preventative actions that organizations can take to assess, analyze, and mitigate these risks. The health care sector has the largest number of reported breaches, with 3 major types: portable device, insider, and physical breaches. Analysis of actual cases indicates security gaps requiring prescriptive fixes based on "best practices." Our research culminates in a 25-item checklist that organizations can use to assess existing practices and identify security gaps requiring improvement. © 2016 American Society for Healthcare Risk Management of the American Hospital Association.
Floyd, P T
2000-02-01
A recent challenge in the hospital environment is the care of patients with latex sensitivity. Since the introduction of universal precautions in the late 1980s, reports of latex sensitivity have soared. The sensitization process and development of latex allergy and its effect on the hospitalized patient are currently under much discussion. Medical personnel must stay abreast of new data and product information to provide up-to-date care for patients, as well as protection for themselves. Statistics have shown a dramatic increase in the incidence of allergy to latex-containing products. Depending on the source, the incidence is thought to range from 15% to 17% for health care workers, as opposed to 1% to 3% for the general population. Other high-risk groups report as much as a 73% incidence of latex allergies. This article explores the issue of latex allergy and its impact on patient care. Signs and symptoms, as well as the etiology of allergic reactions to latex are examined. The basics of the manufacturing and packaging processes are explored, along with elements of diagnosis and screening, with emphasis on the role of the peri-anesthesia nurse.
Effects of a Culturally Informed Intervention on Abused, Suicidal African American Women
Taha, Farah; Zhang, Huaiyu; Snead, Kara; Jones, Ashley D.; Blackmon, Brittane; Bryant, Rachel J.; Siegelman, Asher E.; Kaslow, Nadine J.
2014-01-01
Background This study examined 1) the relative efficacy of a culturally-sensitive empowerment group intervention (Nia) aimed at increasing three protective factors—self-esteem, hopefulness, and effectiveness of obtaining resources—versus treatment as usual (TAU) for low-income, abused African American women who recently had attempted suicide and 2) the impact of participants’ readiness to change with regard to their abusive relationship and suicidal behavior on their levels of each protective factor in the two conditions. Methods The sample included 89 African American women who reported intimate partner violence (IPV) exposure and a recent suicide attempt. Results Multivariate general linear modeling revealed that those in Nia showed greater improvements in self-esteem, but not in hopefulness or effectiveness of obtaining resources. However, significant interactions emerged in which participants that were “less ready to change” (i.e., earlier in the stages of change process) their IPV situation and suicidal behavior endorsed greater levels of hopefulness and perceived effectiveness of obtaining resources, respectively, following Nia. Conclusion Findings suggest that abused, suicidal African American women who are more reluctant initially to changing their abusive situation and suicidal behavior may benefit from even a brief, culturally-informed intervention. PMID:25403027
Effects of a culturally informed intervention on abused, suicidal African American women.
Taha, Farah; Zhang, Huaiyu; Snead, Kara; Jones, Ashley D; Blackmon, Brittane; Bryant, Rachel J; Siegelman, Asher E; Kaslow, Nadine J
2015-10-01
This study examined (a) the relative efficacy of a culturally sensitive empowerment group intervention (Nia) aimed at increasing 3 protective factors-self-esteem, hopefulness, and effectiveness of obtaining resources-versus treatment as usual (TAU) for low-income, abused African American women who recently had attempted suicide and (b) the impact of participants' readiness to change with regard to their abusive relationship and suicidal behavior on their levels of each protective factor in the 2 conditions. The sample included 89 African American women who reported intimate partner violence (IPV) exposure and a recent suicide attempt. Multivariate general linear modeling revealed that those in Nia showed greater improvements in self-esteem, but not in hopefulness or effectiveness of obtaining resources. However, significant interactions emerged in which participants who were "less ready to change" (i.e., earlier in the stages of change process) their IPV situation and suicidal behavior endorsed greater levels of hopefulness and perceived effectiveness of obtaining resources, respectively, following Nia. Findings suggest that abused, suicidal African American women who are more reluctant initially to changing their abusive situation and suicidal behavior may benefit from even a brief, culturally informed intervention. (c) 2015 APA, all rights reserved).
Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage
Liu, Fang; Cai, Zhiping; Xiao, Nong; Zhao, Ziming
2018-01-01
Smart sensor-equipped mobile devices sense, collect, and process data generated by the edge network to achieve intelligent control, but such mobile devices usually have limited storage and computing resources. Mobile cloud storage provides a promising solution owing to its rich storage resources, great accessibility, and low cost. But it also brings a risk of information leakage. The encryption of sensitive data is the basic step to resist the risk. However, deploying a high complexity encryption and decryption algorithm on mobile devices will greatly increase the burden of terminal operation and the difficulty to implement the necessary privacy protection algorithm. In this paper, we propose ENSURE (EfficieNt and SecURE), an efficient and secure encrypted search architecture over mobile cloud storage. ENSURE is inspired by edge computing. It allows mobile devices to offload the computation intensive task onto the edge server to achieve a high efficiency. Besides, to protect data security, it reduces the information acquisition of untrusted cloud by hiding the relevance between query keyword and search results from the cloud. Experiments on a real data set show that ENSURE reduces the computation time by 15% to 49% and saves the energy consumption by 38% to 69% per query. PMID:29652810
Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage.
Guo, Yeting; Liu, Fang; Cai, Zhiping; Xiao, Nong; Zhao, Ziming
2018-04-13
Smart sensor-equipped mobile devices sense, collect, and process data generated by the edge network to achieve intelligent control, but such mobile devices usually have limited storage and computing resources. Mobile cloud storage provides a promising solution owing to its rich storage resources, great accessibility, and low cost. But it also brings a risk of information leakage. The encryption of sensitive data is the basic step to resist the risk. However, deploying a high complexity encryption and decryption algorithm on mobile devices will greatly increase the burden of terminal operation and the difficulty to implement the necessary privacy protection algorithm. In this paper, we propose ENSURE (EfficieNt and SecURE), an efficient and secure encrypted search architecture over mobile cloud storage. ENSURE is inspired by edge computing. It allows mobile devices to offload the computation intensive task onto the edge server to achieve a high efficiency. Besides, to protect data security, it reduces the information acquisition of untrusted cloud by hiding the relevance between query keyword and search results from the cloud. Experiments on a real data set show that ENSURE reduces the computation time by 15% to 49% and saves the energy consumption by 38% to 69% per query.
Cummings, Tonnie; Blett, Tamara; Porter, Ellen; Geiser, Linda; Graw, Rick; McMurray, Jill; Perakis, Steven S.; Rochefort, Regina
2014-01-01
The National Park Service and U.S. Forest Service manage areas in the states of Idaho, Oregon, and Washington – collectively referred to in this report as the Pacific Northwest - that contain significant natural resources and provide many recreational opportunities. The agencies are mandated to protect the air quality and air pollution-sensitive resources on these federal lands. Human activity has greatly increased the amount of nitrogen emitted to the atmosphere, resulting in elevated amounts of nitrogen being deposited in park and forest ecosystems. There is limited information in the Pacific Northwest about the levels of nitrogen that negatively affect natural systems, i.e., the critical loads. The National Park Service and U.S. Forest Service, with scientific input from the U.S. Geological Survey, have developed an approach for accumulating additional nitrogen critical loads information in the Pacific Northwest and using the data in planning and regulatory arenas. As a first step in that process, this report summarizes the current state of knowledge about nitrogen deposition, effects, and critical loads in the region. It also describes ongoing research efforts and identifies and prioritizes additional data needs.
Fabrics Protect Sensitive Skin from UV Rays
NASA Technical Reports Server (NTRS)
2009-01-01
Late Johnson Space Center engineer Dr. Robert Dotts headed a team to develop cool suits for children suffering from life-threatening sun sensitivities. Dotts hoped to develop ultraviolet-blocking technology in a fabric that -- unlike in a bulky space suit -- could remain comfortable, light, and breathable in the sun and heat. The team worked with SPF 4 US LLC (SPF) of Madison, Wisconsin to design ultraviolet-blocking cool suits, which protect sun-sensitive patients and enable them to experience life outdoors safely. Using knowledge gained during the NASA collaboration, SPF created an entire line of ultraviolet-blocking apparel.
Coal resources in environmentally-sensitive lands under federal management
Watson, William D.; Tully, John K.; Moser, Edward N.; Dee, David P.; Bryant, Karen; Schall, Richard; Allan, Harold A.
1995-01-01
This report presents estimates of coal-bearing acreage and coal tonnage in environmentally-sensitive areas. The analysis was conducted to provide data for rulemaking by the Federal Office of Surface Mining (Watson and others, 1995). The rulemaking clarifies conditions under which coal can be mined in environmentally-sensitive areas. The area of the U.S. is about 2.3 billion acres. Contained within that acreage are certain environmentally-sensitive and unique areas (including parks, forests, and various other Federal land preserves). These areas are afforded special protection under Federal and State law. Altogether these protected areas occupy about 400 million acres. This report assesses coal acreage and coal tonnage in these protected Federal land preserves. Results are presented in the form of 8 map-displays prepared using GIS methods at a national scale. Tables and charts that accompany each map provide estimates of the total acreage in Federal land preserve units that overlap or fall within coal fields, coal-bearing acreage in each unit, and coal tonnage in each unit. Summary charts, compiled from the maps, indicate that about 8% of the Nation's coal reserves are located within environmentally-sensitive Federal land preserves.
45 CFR 164.530 - Administrative requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... workforce on the policies and procedures with respect to protected health information required by this... administrative, technical, and physical safeguards to protect the privacy of protected health information. (2)(i) Implementation specification: Safeguards. A covered entity must reasonably safeguard protected health information...
45 CFR 164.530 - Administrative requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... workforce on the policies and procedures with respect to protected health information required by this... administrative, technical, and physical safeguards to protect the privacy of protected health information. (2)(i) Implementation specification: Safeguards. A covered entity must reasonably safeguard protected health information...
Ortiz-Santaliestra, Manuel E; Maia, Joao P; Egea-Serrano, Andrés; Lopes, Isabel
2018-02-28
Amphibians and reptiles are the two most endangered groups of vertebrates. Environmental pollution by pesticides is recognised as one of the major factors threatening populations of these groups. However, the effects of pesticides on amphibians and reptiles have been studied for few substances, which is partly related to the fact that these animals are not included in the mandatory toxicity testing conducted as part of environmental risk assessments of pesticides. Whether risks of pesticides to amphibians and reptiles are addressed by surrogate taxa used in risk assessment is currently under debate. In order to develop a scientifically sound and robust risk assessment scheme, information needs to be gathered to examine whether fish, birds and mammals are valid surrogates for amphibians and reptiles. We updated a systematic review of scientific literature that was recently published compiling toxicity data on amphibians and reptiles. The outcome of this review was analysed with the purposes to (1) compare endpoints from amphibians and reptiles with the available information from fish, birds and mammals, and (2) develop species sensitivity distributions (SSDs) for those substances tested in at least six amphibian species (no substances were found tested in at least six reptile species) to identify a candidate amphibian model species to be used as surrogate in risk assessment. A positive correlation was found between toxicity recorded on fish and amphibians, the former revealing, in general, to be more sensitive than the latter to waterborne pollutants. In the terrestrial environment, although birds and mammals were more sensitive than amphibians and reptiles to at least 60% of tested substances, just a few weak significant correlations were observed. As a general rule, homoeothermic vertebrates are not good surrogates for reptiles and terrestrial amphibians in pesticide risk assessment. However, some chemical-dependent trends were detected, with pyrethroids and organochlorine insecticides being more toxic to amphibians or reptiles than to birds or mammals. These trends could ultimately help in decisions about protection provided by surrogate taxa for specific groups of substances, and also to determine when risk assessment of pesticides needs to pay special consideration to amphibians and reptiles. The outcome of this review reflects that there is still much information needed to reduce uncertainties and extract relevant conclusions on the overall protection of amphibians and reptiles by surrogate vertebrates.
Bresser, Laura; Köhler, Steffen; Schwaab, Christoph
2014-01-01
It is necessary to optimize workflows and communication between institutions involved in patients' treatment to improve quality and efficiency of the German healthcare. To achieve these in the Metropolregion Rhein-Neckar, a personal, cross-institutional patient record (PEPA) is used. Given the immense sensitivity of health-related information saved in the PEPA, it is imperative to obey the data protection regulations in Germany. One important aspect is the logging of access to personal health data and all other safety-related events. For gathering audit information, the IHE profile ATNA can be used, because it provides a flexible and standardized infrastructure. There are already existing solutions for gathering the audit information based on ATNA. In this article one solution (OpenATNA) is evaluated, which uses the method of evaluation defined by Peter Baumgartner. In addition, a user interface for a privacy officer is necessary to support the examination of the audit information. Therefore, we will describe a method to develop an application in Liferay (an OpenSource enterprise portal project) which supports examinations on the gathered audit information.
Radiation Sensitization in Cancer Therapy.
ERIC Educational Resources Information Center
Greenstock, Clive L.
1981-01-01
Discusses various aspects of radiation damage to biological material, including free radical mechanisms, radiation sensitization and protection, tumor hypoxia, mechanism of hypoxic cell radiosensitization, redox model for radiation modification, sensitizer probes of cellular radiation targets, pulse radiolysis studies of free radical kinetics,…
40 CFR 35.3580 - Environmental review requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... consequences on the existing environment, the future environment, and individual sensitive environmental issues... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Environmental review requirements. 35.3580 Section 35.3580 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL...
The Endangered Species Act requires specific and stringent protection to threatened and endangered species and their critical habitat. Therefore, protective methods for risk assessment for such species are needed. Species sensitivity distributions (SSDs) are a common tool used fo...
[Aspects of data protection in telemedicine].
Vetter, R
2001-10-01
Telemedical applications like the electronic patient file, the electronic physician's letter and the electronic consultation ("Telekonsil"), the electronic prescription, the electronic patient's card (the "patient smart card") facilitate and improve the processing of sensitive medical data as well as the possibilities for using medical resources in an unusual degree and can thereby substantially contribute to the well-being of the patient. However, improving the quality of medical supply must not lead to a degradation of the patients' rights, in particular their right of self-determination. The introduction and the use of telemedical applications do not change the legal basic conditions for medical data processing. Therefore, a patient-friendly telemedicine must include data protection as well. Data protective telemedicine requires medical secrecy ensuring the patients' rights of information and transparency, correction of false and the up-to-date deletion of information that is no longer necessary, as well as secure data processing. All electronic processing of patients' data must meet the requirements of data security, i.e. the confidentiality, the integrity, the availability of the data at any time and the verifiability of the data processing have to be guaranteed. For this, electronic signatures and encodings have to be used, medical information systems have to be protected effectively against any risks resulting from open networks, particularly the Internet, and data processing has to be monitored. Electronic patient files may be open only to the treating physician and the medical assistants up to the necessary extent, ensuring the possibility of an emergency access. Any access beyond that does require the special consent of the patient. The medical secrecy has to be ensured. The electronic prescription with a documentation of the patient's medication requires the consent of the patient and must protect the rights of the physicians. In particular it has to ensure that the respective physician's prescribing behaviour cannot be stored or become known from a third party. Furthermore it has to protect the pharmacists' right to hide their turnover from other pharmacies. So-called patient smart cards require the consent of the patient. The right of the patient to keep his information secret, must be ensured with access options to the information stored on the smart card. Electronic physician's letters and socalled Telekonsile, i.e. the consultation with professional colleagues who were not involved in the patient's treatment from the beginning, require basically the agreement of the patient--if there cannot be dealt with anonymized data already from the beginning. In emergencies, after adequate consideration and weighing of values and interests, the consent of the patient can be suspected. The adherence to these boundary conditions ensures security and trustworthiness of telemedicine regarding the security of data processing as well as the rights of self-determination of all who are concerned. Data protection is also a contribution for the acceptance of these revolutionary advancements in the medical world.
J2ME implementation of system for storing and accessing of sensitive data on patient's mobile device
NASA Astrophysics Data System (ADS)
Zabołotny, Wojciech M.; Wielgórski, Radosław; Nowik, Marcin
2011-10-01
This paper presents a system allowing to use a patient's mobile phone or PDA for storing of biomedical data, which then, during medical consultation or intervention may be used by the medical staff. The presented solution is aimed on providing both: reliable protection to sensitive patient's data, and easy access to information for authorized medical staff. In the presented system, data are stored in an encrypted form, and the encryption key is available only for authorized persons. The central authentication server verifies the current access rights of the person trying to obtain the information, before providing him or her with the key needed to access the patient's data. The key provided by the server is valid only for the particular device, which minimizes the risk of its misuse. For rare situations when no connection to the authentication server is available (e.g. intervention in the mountains or rural area), system assures an additional "emergency" method to access the encryption key in controlled, registered way. The system has been implemented in Java language and tested in the simulated environment provided by Sun Java Wireless Toolkit for CLDC.
Design and implementation of an audit trail in compliance with US regulations.
Jiang, Keyuan; Cao, Xiang
2011-10-01
Audit trails have been used widely to ensure quality of study data and have been implemented in computerized clinical trials data systems. Increasingly, there is a need to audit access to study participant identifiable information to provide assurance that study participant privacy is protected and confidentiality is maintained. In the United States, several federal regulations specify how the audit trail function should be implemented. To describe the development and implementation of a comprehensive audit trail system that meets the regulatory requirements of assuring data quality and integrity and protecting participant privacy and that is also easy to implement and maintain. The audit trail system was designed and developed after we examined regulatory requirements, data access methods, prevailing application architecture, and good security practices. Our comprehensive audit trail system was developed and implemented at the database level using a commercially available database management software product. It captures both data access and data changes with the correct user identifier. Documentation of access is initiated automatically in response to either data retrieval or data change at the database level. Currently, our system has been implemented only on one commercial database management system. Although our audit trail algorithm does not allow for logging aggregate operations, aggregation does not reveal sensitive private participant information. Careful consideration must be given to data items selected for monitoring because selection of all data items using our system can dramatically increase the requirements for computer disk space. Evaluating the criticality and sensitivity of individual data items selected can control the storage requirements for clinical trial audit trail records. Our audit trail system is capable of logging data access and data change operations to satisfy regulatory requirements. Our approach is applicable to virtually any data that can be stored in a relational database.
Using false colors to protect visual privacy of sensitive content
NASA Astrophysics Data System (ADS)
Ćiftçi, Serdar; Korshunov, Pavel; Akyüz, Ahmet O.; Ebrahimi, Touradj
2015-03-01
Many privacy protection tools have been proposed for preserving privacy. Tools for protection of visual privacy available today lack either all or some of the important properties that are expected from such tools. Therefore, in this paper, we propose a simple yet effective method for privacy protection based on false color visualization, which maps color palette of an image into a different color palette, possibly after a compressive point transformation of the original pixel data, distorting the details of the original image. This method does not require any prior face detection or other sensitive regions detection and, hence, unlike typical privacy protection methods, it is less sensitive to inaccurate computer vision algorithms. It is also secure as the look-up tables can be encrypted, reversible as table look-ups can be inverted, flexible as it is independent of format or encoding, adjustable as the final result can be computed by interpolating the false color image with the original using different degrees of interpolation, less distracting as it does not create visually unpleasant artifacts, and selective as it preserves better semantic structure of the input. Four different color scales and four different compression functions, one which the proposed method relies, are evaluated via objective (three face recognition algorithms) and subjective (50 human subjects in an online-based study) assessments using faces from FERET public dataset. The evaluations demonstrate that DEF and RBS color scales lead to the strongest privacy protection, while compression functions add little to the strength of privacy protection. Statistical analysis also shows that recognition algorithms and human subjects perceive the proposed protection similarly
Clinical validation of the nursing diagnosis of ineffective protection in haemodialysis patients.
de Sá Tinôco, Jéssica Dantas; de Paiva, Maria das Graças Mariano Nunes; de Queiroz Frazão, Cecília Maria Farias; Lucio, Kadyjina Daiane Batista; Fernandes, Maria Isabel da Conceição Dias; de Oliveira Lopes, Marcos Venicios; de Carvalho Lira, Ana Luisa Brandão
2018-01-01
To evaluate the clinical validity of indicators of the nursing diagnosis of "ineffective protection" in haemodialysis patients. Haemodialysis patients have reduced protection. Studies on the nursing diagnosis of "ineffective protection" are scarce in the literature. The use of indicators to diagnose "ineffective protection" could improve the care of haemodialysis patients. The clinical usefulness of the indicators requires clinical validation. This was a diagnostic accuracy study. This study assessed a sample of 200 patients undergoing haemodialysis in a reference clinic for nephrology during the first half of 2015. Operational definitions were created for each clinical indicator based on concept analysis and content validation by experts for these indicators. Diagnostic accuracy measurement was performed with latent class analysis with randomised effects. The clinical indicator of "fatigue" had high sensitivity (p = .999) and specificity (p = 1.000) for the identification of "ineffective protection." Additionally, "maladaptive response to stress" (p = .711) and "coagulation change" (p = .653) were sensitive indicators. The main indicators that showed high specificity were "fever" (p = .987), "increased number of hospitalisations" (p = .911), "weakness" (p = .937), "infected vascular access" (p = .962) and "vascular access dysfunction" (p = .722). A set of nine clinical indicators of "ineffective protection" were accurate and statistically significant for haemodialysis patients. Three clinical indicators showed sensitivity, and six indicators showed specificity. Accurate measures for nursing diagnoses can help nurses confirm or rule out the probability of the occurrence of "ineffective protection" in patients undergoing haemodialysis. © 2017 John Wiley & Sons Ltd.
Evaluation of a radiation protection cabin for invasive electrophysiological procedures.
Dragusin, Octavian; Weerasooriya, Rukshen; Jaïs, Pierre; Hocini, Mélèze; Ector, Joris; Takahashi, Yoshihide; Haïssaguerre, Michel; Bosmans, Hilde; Heidbüchel, Hein
2007-01-01
Complex invasive electrophysiological procedures may result in high cumulative operator radiation exposure. Classical protection with lead aprons results in discomfort while radioprotection is still incomplete. This study evaluated the usefulness of a radiation protection cabin (RPC) that completely surrounds the operator. The evaluation was performed independently in two electrophysiology laboratories (E1-Leuven, Belgium; E2-Bordeaux, France), comparing operator radiation exposure using the RPC vs. a 0.5 mm lead-equivalent apron (total of 135 procedures). E1 used thermoluminiscent dosimeters (TLDs) placed at 16 positions in and out of the RPC and nine positions in and out of the apron. E2 used more sensitive electronic personal dosimeters (EPD), placed at waist and neck. The sensitivity thresholds of the TLDs and EPDs were 10-20 microSv and 1-1.5 microSv, respectively. All procedures could be performed unimpeded with the RPC. Median TLD dose values outside protected areas were in the range of 57-452 microSv, whereas doses under the apron or inside the RPC were all at the background radiation level, irrespective of procedure and fluoroscopy duration and of radiation energy delivered. In addition, the RPC was protecting the entire body (except the hands), whereas lead apron protection is incomplete. Also with the more sensitive EPDs, the radiation dose within the RPC was at the sensitivity threshold/background level (1.3+/-0.6 microSv). Again, radiation to the head was significantly lower within the RPC (1.9+/-1.2 microSv) than with the apron (102+/-23 microSv, P<0.001). The use of the RPC allows performing catheter ablation procedures without compromising catheter manipulation, and with negligible radiation exposure for the operator.
Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N
2014-01-01
Introduction This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). Methods The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents’ concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Results Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). Conclusions This study underscores the need for enhanced measures to secure patients’ PHI to avoid undermining their trust. PMID:23975624
Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N
2014-01-01
This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents' concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). This study underscores the need for enhanced measures to secure patients' PHI to avoid undermining their trust.
Data sensitivity in a hybrid STEP/Coulomb model for aftershock forecasting
NASA Astrophysics Data System (ADS)
Steacy, S.; Jimenez Lloret, A.; Gerstenberger, M.
2014-12-01
Operational earthquake forecasting is rapidly becoming a 'hot topic' as civil protection authorities seek quantitative information on likely near future earthquake distributions during seismic crises. At present, most of the models in public domain are statistical and use information about past and present seismicity as well as b-value and Omori's law to forecast future rates. A limited number of researchers, however, are developing hybrid models which add spatial constraints from Coulomb stress modeling to existing statistical approaches. Steacy et al. (2013), for instance, recently tested a model that combines Coulomb stress patterns with the STEP (short-term earthquake probability) approach against seismicity observed during the 2010-2012 Canterbury earthquake sequence. They found that the new model performed at least as well as, and often better than, STEP when tested against retrospective data but that STEP was generally better in pseudo-prospective tests that involved data actually available within the first 10 days of each event of interest. They suggested that the major reason for this discrepancy was uncertainty in the slip models and, in particular, in the geometries of the faults involved in each complex major event. Here we test this hypothesis by developing a number of retrospective forecasts for the Landers earthquake using hypothetical slip distributions developed by Steacy et al. (2004) to investigate the sensitivity of Coulomb stress models to fault geometry and earthquake slip, and we also examine how the choice of receiver plane geometry affects the results. We find that the results are strongly sensitive to the slip models and moderately sensitive to the choice of receiver orientation. We further find that comparison of the stress fields (resulting from the slip models) with the location of events in the learning period provides advance information on whether or not a particular hybrid model will perform better than STEP.
24 CFR 51.101 - General policy.
Code of Federal Regulations, 2013 CFR
2013-04-01
... to save lives, protect property, protect public health and safety, remove debris and wreckage, or... noise sensitive interior spaces such as bedrooms. Minimum attenuation requirements are prescribed in...
24 CFR 51.101 - General policy.
Code of Federal Regulations, 2011 CFR
2011-04-01
... to save lives, protect property, protect public health and safety, remove debris and wreckage, or... noise sensitive interior spaces such as bedrooms. Minimum attenuation requirements are prescribed in...
24 CFR 51.101 - General policy.
Code of Federal Regulations, 2014 CFR
2014-04-01
... to save lives, protect property, protect public health and safety, remove debris and wreckage, or... noise sensitive interior spaces such as bedrooms. Minimum attenuation requirements are prescribed in...
24 CFR 51.101 - General policy.
Code of Federal Regulations, 2012 CFR
2012-04-01
... to save lives, protect property, protect public health and safety, remove debris and wreckage, or... noise sensitive interior spaces such as bedrooms. Minimum attenuation requirements are prescribed in...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... Activities; Proposed Collection; Comment Request; EPA Strategic Plan Information on Source Water Protection... submitting comments. E-mail: [email protected] . Mail: Water Docket, Environmental Protection Agency, EPA.../epahome/dockets.htm . FOR FURTHER INFORMATION CONTACT: Beth Hall, Drinking Water Protection Division...
Standard Information Models for Representing Adverse Sensitivity Information in Clinical Documents.
Topaz, M; Seger, D L; Goss, F; Lai, K; Slight, S P; Lau, J J; Nandigam, H; Zhou, L
2016-01-01
Adverse sensitivity (e.g., allergy and intolerance) information is a critical component of any electronic health record system. While several standards exist for structured entry of adverse sensitivity information, many clinicians record this data as free text. This study aimed to 1) identify and compare the existing common adverse sensitivity information models, and 2) to evaluate the coverage of the adverse sensitivity information models for representing allergy information on a subset of inpatient and outpatient adverse sensitivity clinical notes. We compared four common adverse sensitivity information models: Health Level 7 Allergy and Intolerance Domain Analysis Model, HL7-DAM; the Fast Healthcare Interoperability Resources, FHIR; the Consolidated Continuity of Care Document, C-CDA; and OpenEHR, and evaluated their coverage on a corpus of inpatient and outpatient notes (n = 120). We found that allergy specialists' notes had the highest frequency of adverse sensitivity attributes per note, whereas emergency department notes had the fewest attributes. Overall, the models had many similarities in the central attributes which covered between 75% and 95% of adverse sensitivity information contained within the notes. However, representations of some attributes (especially the value-sets) were not well aligned between the models, which is likely to present an obstacle for achieving data interoperability. Also, adverse sensitivity exceptions were not well represented among the information models. Although we found that common adverse sensitivity models cover a significant portion of relevant information in the clinical notes, our results highlight areas needed to be reconciled between the standards for data interoperability.
The global decline of cheetah Acinonyx jubatus and what it means for conservation.
Durant, Sarah M; Mitchell, Nicholas; Groom, Rosemary; Pettorelli, Nathalie; Ipavec, Audrey; Jacobson, Andrew P; Woodroffe, Rosie; Böhm, Monika; Hunter, Luke T B; Becker, Matthew S; Broekhuis, Femke; Bashir, Sultana; Andresen, Leah; Aschenborn, Ortwin; Beddiaf, Mohammed; Belbachir, Farid; Belbachir-Bazi, Amel; Berbash, Ali; Brandao de Matos Machado, Iracelma; Breitenmoser, Christine; Chege, Monica; Cilliers, Deon; Davies-Mostert, Harriet; Dickman, Amy J; Ezekiel, Fabiano; Farhadinia, Mohammad S; Funston, Paul; Henschel, Philipp; Horgan, Jane; de Iongh, Hans H; Jowkar, Houman; Klein, Rebecca; Lindsey, Peter Andrew; Marker, Laurie; Marnewick, Kelly; Melzheimer, Joerg; Merkle, Johnathan; M'soka, Jassiel; Msuha, Maurus; O'Neill, Helen; Parker, Megan; Purchase, Gianetta; Sahailou, Samaila; Saidu, Yohanna; Samna, Abdoulkarim; Schmidt-Küntzel, Anne; Selebatso, Eda; Sogbohossou, Etotépé A; Soultan, Alaaeldin; Stone, Emma; van der Meer, Esther; van Vuuren, Rudie; Wykstra, Mary; Young-Overton, Kim
2017-01-17
Establishing and maintaining protected areas (PAs) are key tools for biodiversity conservation. However, this approach is insufficient for many species, particularly those that are wide-ranging and sparse. The cheetah Acinonyx jubatus exemplifies such a species and faces extreme challenges to its survival. Here, we show that the global population is estimated at ∼7,100 individuals and confined to 9% of its historical distributional range. However, the majority of current range (77%) occurs outside of PAs, where the species faces multiple threats. Scenario modeling shows that, where growth rates are suppressed outside PAs, extinction rates increase rapidly as the proportion of population protected declines. Sensitivity analysis shows that growth rates within PAs have to be high if they are to compensate for declines outside. Susceptibility of cheetah to rapid decline is evidenced by recent rapid contraction in range, supporting an uplisting of the International Union for the Conservation of Nature (IUCN) Red List threat assessment to endangered. Our results are applicable to other protection-reliant species, which may be subject to systematic underestimation of threat when there is insufficient information outside PAs. Ultimately, conserving many of these species necessitates a paradigm shift in conservation toward a holistic approach that incentivizes protection and promotes sustainable human-wildlife coexistence across large multiple-use landscapes.
The global decline of cheetah Acinonyx jubatus and what it means for conservation
Mitchell, Nicholas; Groom, Rosemary; Pettorelli, Nathalie; Ipavec, Audrey; Jacobson, Andrew P.; Woodroffe, Rosie; Böhm, Monika; Becker, Matthew S.; Broekhuis, Femke; Bashir, Sultana; Andresen, Leah; Aschenborn, Ortwin; Beddiaf, Mohammed; Berbash, Ali; Brandao de Matos Machado, Iracelma; Breitenmoser, Christine; Chege, Monica; Cilliers, Deon; Davies-Mostert, Harriet; Dickman, Amy J.; Ezekiel, Fabiano; Farhadinia, Mohammad S.; Funston, Paul; Henschel, Philipp; Horgan, Jane; de Iongh, Hans H.; Jowkar, Houman; Klein, Rebecca; Lindsey, Peter Andrew; Marker, Laurie; Marnewick, Kelly; Melzheimer, Joerg; Merkle, Johnathan; M'soka, Jassiel; Msuha, Maurus; O'Neill, Helen; Parker, Megan; Purchase, Gianetta; Sahailou, Samaila; Saidu, Yohanna; Samna, Abdoulkarim; Schmidt-Küntzel, Anne; Selebatso, Eda; Sogbohossou, Etotépé A.; Stone, Emma; van der Meer, Esther; van Vuuren, Rudie; Wykstra, Mary; Young-Overton, Kim
2017-01-01
Establishing and maintaining protected areas (PAs) are key tools for biodiversity conservation. However, this approach is insufficient for many species, particularly those that are wide-ranging and sparse. The cheetah Acinonyx jubatus exemplifies such a species and faces extreme challenges to its survival. Here, we show that the global population is estimated at ∼7,100 individuals and confined to 9% of its historical distributional range. However, the majority of current range (77%) occurs outside of PAs, where the species faces multiple threats. Scenario modeling shows that, where growth rates are suppressed outside PAs, extinction rates increase rapidly as the proportion of population protected declines. Sensitivity analysis shows that growth rates within PAs have to be high if they are to compensate for declines outside. Susceptibility of cheetah to rapid decline is evidenced by recent rapid contraction in range, supporting an uplisting of the International Union for the Conservation of Nature (IUCN) Red List threat assessment to endangered. Our results are applicable to other protection-reliant species, which may be subject to systematic underestimation of threat when there is insufficient information outside PAs. Ultimately, conserving many of these species necessitates a paradigm shift in conservation toward a holistic approach that incentivizes protection and promotes sustainable human–wildlife coexistence across large multiple-use landscapes. PMID:28028225
Theory and simulent design of a type of auto-self-protecting optical switches
NASA Astrophysics Data System (ADS)
Li, Binhong; Peng, Songcun
1990-06-01
As the use of lasers in the military and in the civilian economy increases with each passing day, it is often necessary for the human eye or sensitive instruments to observe weak lasers, such as the return waves of laser radar and laser communications signals; but it is also necessary to provide protection against damage to the eye from the strong lasers of enemy laser weapons. For this reason, it is necessary to have a kind of automatic optical self-protecting switch. Based upon a study of the transmitting and scattering characteristics of multilayer dielectric optical waveguides, a practical computer program is set up for designing a type of auto-self-protecting optical switch with a computer model by using the nonlinear property of dielectric layers and the plasma behavior of metal substrates. This technique can be used to protect the human eye and sensitive detectors from damage caused by strong laser beams.
NASA Astrophysics Data System (ADS)
Raby, K. S.; Williams, M. W.
2004-12-01
Each passing year amplifies the demands placed on communities across the US in terms of population growth, increased tourism, and stresses resulting from escalated use. The conflicting concerns of recreational users, local citizens, environmentalists, and traditional economic interests cause land managers to contend with controversial decisions regarding development and protection of watersheds. Local history and culture, politics, economic goals, and science are all influential factors in land use decision making. Here we report on a scientific study to determine the sensitivity of alpine areas, and the adaptation of this study into a decision support framework. We use water quality data as an indicator of ecosystem health across a variety of alpine and subalpine landscapes, and input this information into a spatially-based decision support tool that planners can use to make informed land use decisions. We develop this tool in a case study in San Juan County, Colorado, a site chosen because its largest town, Silverton, is a small mountain community experiencing a recent surge in tourism and development, and its fragile high elevation locale makes it more sensitive to environmental changes. Extensive field surveys were conducted in priority drainages throughout the county to map the spatial distribution and aerial extent of landscape types during the summers of 2003 and 2004. Surface water samples were collected and analyzed for inorganic and organic solutes, and water quality values were associated with different land covers to enable sensitivity analysis at the landscape scale. Water quality results for each watershed were entered into a module linked to a geographic information system (GIS), which displays maps of sensitive areas based on criteria selected by the user. The decision support system initially incorporates two major water quality parameters: acid neutralizing capacity (ANC) and nitrate (NO3-) concentration, and several categories of sensitivity were created based on ANC and NO3- levels (e.g., pristine, slightly sensitive, moderately sensitive, highly sensitive, sensitive but unimpacted, disturbance impacted). We based threshold concentrations for these water quality parameters on first principles developed at the Niwot Ridge LTER site. Additional parameters such as specific conductance, base cation concentration, sulfate concentration, and dissolved organic carbon concentration may be added for a particular landscape type. Superimposed on this categorization, federal, state, and county planners are able to make decisions about the degree of potential impairment or enhancement produced by a particular project, or the maximum level of acceptable impairment to a particular area. Because water quality parameters are correlated with landscape types, the model returns a map of the watershed, partitioned by landscape type, presenting the sensitivity level of each area. This format provides land use managers with spatial criteria for project implementation.
CHILDREN AS A SENSITIVE SUBPOPULATION FOR THE RISK ASSESSMENT PROCESS
Children as a sensitive subpopulation for the risk assessment process
Abstract
For cancer risk assessment purposes, it is necessary to consider how to incorporate sensitive subpopulations into the process to ensure that they are appropriately protected. Children represent o...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-29
... Information Collection: Comment Request; Floodplain Management and Protection of Wetlands AGENCY: Office of... following information: Title of Proposal: Floodplain Management and Protection of Wetlands. OMB Control... Executive Order 11990, ``Protection of Wetlands.'' Each respondent that proposes to use HUD assistance to...
Li, Lei; Wang, Tie-yu; Wang, Xiaojun; Xiao, Rong-bo; Li, Qi-feng; Peng, Chi; Han, Cun-liang
2016-04-15
Based on comprehensive consideration of soil environmental quality, pollution status of river, environmental vulnerability and the stress of pollution sources, a technical method was established for classification of priority area of soil environmental protection around the river-style water sources. Shunde channel as an important drinking water sources of Foshan City, Guangdong province, was studied as a case, of which the classification evaluation system was set up. In detail, several evaluation factors were selected according to the local conditions of nature, society and economy, including the pollution degree of heavy metals in soil and sediment, soil characteristics, groundwater sensitivity, vegetation coverage, the type and location of pollution sources. Data information was mainly obtained by means of field survey, sampling analysis, and remote sensing interpretation. Afterwards, Analytical Hierarchy Process (AHP) was adopted to decide the weight of each factor. The basic spatial data layers were set up respectively and overlaid based on the weighted summation assessment model in Geographical Information System (GIS), resulting in a classification map of soil environmental protection level in priority area of Shunde channel. Accordingly, the area was classified to three levels named as polluted zone, risky zone and safe zone, which respectively accounted for 6.37%, 60.90% and 32.73% of the whole study area. Polluted zone and risky zone were mainly distributed in Lecong, Longjiang and Leliu towns, with pollutants mainly resulted from the long-term development of aquaculture and the industries containing furniture, plastic constructional materials and textile and clothing. In accordance with the main pollution sources of soil, targeted and differentiated strategies were put forward. The newly established evaluation method could be referenced for the protection and sustainable utilization of soil environment around the water sources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive Information...
Code of Federal Regulations, 2010 CFR
2010-10-01
... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive Information...
Code of Federal Regulations, 2014 CFR
2014-10-01
... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive Information...