Security and Cloud Outsourcing Framework for Economic Dispatch
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sarker, Mushfiqur R.; Wang, Jianhui; Li, Zuyi
The computational complexity and problem sizes of power grid applications have increased significantly with the advent of renewable resources and smart grid technologies. The current paradigm of solving these issues consist of inhouse high performance computing infrastructures, which have drawbacks of high capital expenditures, maintenance, and limited scalability. Cloud computing is an ideal alternative due to its powerful computational capacity, rapid scalability, and high cost-effectiveness. A major challenge, however, remains in that the highly confidential grid data is susceptible for potential cyberattacks when outsourced to the cloud. In this work, a security and cloud outsourcing framework is developed for themore » Economic Dispatch (ED) linear programming application. As a result, the security framework transforms the ED linear program into a confidentiality-preserving linear program, that masks both the data and problem structure, thus enabling secure outsourcing to the cloud. Results show that for large grid test cases the performance gain and costs outperforms the in-house infrastructure.« less
Security and Cloud Outsourcing Framework for Economic Dispatch
Sarker, Mushfiqur R.; Wang, Jianhui; Li, Zuyi; ...
2017-04-24
The computational complexity and problem sizes of power grid applications have increased significantly with the advent of renewable resources and smart grid technologies. The current paradigm of solving these issues consist of inhouse high performance computing infrastructures, which have drawbacks of high capital expenditures, maintenance, and limited scalability. Cloud computing is an ideal alternative due to its powerful computational capacity, rapid scalability, and high cost-effectiveness. A major challenge, however, remains in that the highly confidential grid data is susceptible for potential cyberattacks when outsourced to the cloud. In this work, a security and cloud outsourcing framework is developed for themore » Economic Dispatch (ED) linear programming application. As a result, the security framework transforms the ED linear program into a confidentiality-preserving linear program, that masks both the data and problem structure, thus enabling secure outsourcing to the cloud. Results show that for large grid test cases the performance gain and costs outperforms the in-house infrastructure.« less
NASA Astrophysics Data System (ADS)
Guo, Sangang
2017-09-01
There are two stages in solving security-constrained unit commitment problems (SCUC) within Lagrangian framework: one is to obtain feasible units’ states (UC), the other is power economic dispatch (ED) for each unit. The accurate solution of ED is more important for enhancing the efficiency of the solution to SCUC for the fixed feasible units’ statues. Two novel methods named after Convex Combinatorial Coefficient Method and Power Increment Method respectively based on linear programming problem for solving ED are proposed by the piecewise linear approximation to the nonlinear convex fuel cost functions. Numerical testing results show that the methods are effective and efficient.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vargas, L.S.; Quintana, V.H.; Vannelli, A.
This paper deals with the use of Successive Linear Programming (SLP) for the solution of the Security-Constrained Economic Dispatch (SCED) problem. The authors tutorially describe an Interior Point Method (IPM) for the solution of Linear Programming (LP) problems, discussing important implementation issues that really make this method far superior to the simplex method. A study of the convergence of the SLP technique and a practical criterion to avoid oscillatory behavior in the iteration process are also proposed. A comparison of the proposed method with an efficient simplex code (MINOS) is carried out by solving SCED problems on two standard IEEEmore » systems. The results show that the interior point technique is reliable, accurate and more than two times faster than the simplex algorithm.« less
Statistical security for Social Security.
Soneji, Samir; King, Gary
2012-08-01
The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.
Acousto-Optic and Linear Electro-Optic Properties of Organic Polymeric Materials
1989-04-27
Naval Research Laboratory Washington, DC 20375-5000 NRL Memorandum Report 6454 od I3 Acousto - Optic and Linear Electro-Optic Properties of Organic...PROGRAM P1RC;EC7 ASK Arlington, VA 22217-5000 ELEMENT NO NO1 I1I TITLE (Include Security Classification) Acousto - Optic and Linear Electro-Optic...briefly discussing the important molecular properties for enhanced acousto ~ optic and electro-Ooptic ef fects and then relating these to "current
2010-07-01
Research and Development Center (ERDC), Vicksburg, MS. At the time of publication, Glenn Rhett served as EMRPP Program Manager. COL Gary E. Johnston was...However, surveys done by Stein et al.(2000), Chaplin et al.(2000), Cole (2010) and others indicate that need is unevenly distributed among regions...relative security in a linear way; i.e., G5 species are not five times as secure as G1 species. The security rank is determined primarily by species
From Fault-Diagnosis and Performance Recovery of a Controlled System to Chaotic Secure Communication
NASA Astrophysics Data System (ADS)
Hsu, Wen-Teng; Tsai, Jason Sheng-Hong; Guo, Fang-Cheng; Guo, Shu-Mei; Shieh, Leang-San
Chaotic systems are often applied to encryption on secure communication, but they may not provide high-degree security. In order to improve the security of communication, chaotic systems may need to add other secure signals, but this may cause the system to diverge. In this paper, we redesign a communication scheme that could create secure communication with additional secure signals, and the proposed scheme could keep system convergence. First, we introduce the universal state-space adaptive observer-based fault diagnosis/estimator and the high-performance tracker for the sampled-data linear time-varying system with unanticipated decay factors in actuators/system states. Besides, robustness, convergence in the mean, and tracking ability are given in this paper. A residual generation scheme and a mechanism for auto-tuning switched gain is also presented, so that the introduced methodology is applicable for the fault detection and diagnosis (FDD) for actuator and state faults to yield a high tracking performance recovery. The evolutionary programming-based adaptive observer is then applied to the problem of secure communication. Whenever the tracker induces a large control input which might not conform to the input constraint of some physical systems, the proposed modified linear quadratic optimal tracker (LQT) can effectively restrict the control input within the specified constraint interval, under the acceptable tracking performance. The effectiveness of the proposed design methodology is illustrated through tracking control simulation examples.
Food Security and Weight Status in Children: Interactions With Food Assistance Programs.
Nguyen, Binh T; Ford, Christopher N; Yaroch, Amy L; Shuval, Kerem; Drope, Jeffrey
2017-02-01
It is unclear whether Supplemental Nutrition Assistance Program (SNAP) or National School Lunch Program (NSLP) participation modifies the relationship between food insecurity and obesity in children. Data were included for 4,719 children aged 9-17 years who participated in the National Health and Nutrition Survey between 2003-2004 and 2011-2012. Linear regression was used to examine the relationship between household food security (full, marginal, low, and very low) and BMI percentile. Adjusted models were also stratified by SNAP and NSLP participation. There was no significant overall relationship between household food security and BMI percentile. In SNAP non-participants, there was no apparent overall relationship between BMI percentile and household food security. However, BMI percentile in children from households with low food security was significantly higher than that of children from fully food-secure households (risk difference [RD]=5.95, 95% CI=1.11, 10.80). Among SNAP participants, there was no significant relationship between household food security and BMI percentile. By NSLP participation category, there was a non-significant trend toward increasing BMI percentile with decreasing household food security in those reporting two or fewer (RD=1.75, 95% CI= -0.79, 4.29) and two to three (RD=1.07; 95% CI= -1.74, 3.89) lunches/week. There was no apparent relationship between household food security and BMI percentile in those reporting four or more lunches/week. Although the overall relationship between household food security and weight status in school-aged children was not statistically significant, there was some evidence that the relationship may differ by SNAP or NSLP participation, suggesting the need for more research. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Elbert, Stephen T.; Kalsi, Karanjit; Vlachopoulou, Maria
Financial Transmission Rights (FTRs) help power market participants reduce price risks associated with transmission congestion. FTRs are issued based on a process of solving a constrained optimization problem with the objective to maximize the FTR social welfare under power flow security constraints. Security constraints for different FTR categories (monthly, seasonal or annual) are usually coupled and the number of constraints increases exponentially with the number of categories. Commercial software for FTR calculation can only provide limited categories of FTRs due to the inherent computational challenges mentioned above. In this paper, a novel non-linear dynamical system (NDS) approach is proposed tomore » solve the optimization problem. The new formulation and performance of the NDS solver is benchmarked against widely used linear programming (LP) solvers like CPLEX™ and tested on large-scale systems using data from the Western Electricity Coordinating Council (WECC). The NDS is demonstrated to outperform the widely used CPLEX algorithms while exhibiting superior scalability. Furthermore, the NDS based solver can be easily parallelized which results in significant computational improvement.« less
Shift scheduling model considering workload and worker’s preference for security department
NASA Astrophysics Data System (ADS)
Herawati, A.; Yuniartha, D. R.; Purnama, I. L. I.; Dewi, LT
2018-04-01
Security department operates for 24 hours and applies shift scheduling to organize its workers as well as in hotel industry. This research has been conducted to develop shift scheduling model considering the workers physical workload using rating of perceived exertion (RPE) Borg’s Scale and workers’ preference to accommodate schedule flexibility. The mathematic model is developed in integer linear programming and results optimal solution for simple problem. Resulting shift schedule of the developed model has equally distribution shift allocation among workers to balance the physical workload and give flexibility for workers in working hours arrangement.
USDA-ARS?s Scientific Manuscript database
Given global pressure to improve food security, there is increasing interest in the question of whether we should feed animals to feed humans. Another question is whether there is sufficient domestically produced food to meet a population’s nutrient requirements. A linear programming approach to ide...
Wide Area Security Region Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin
2010-03-31
This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of systemmore » parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.« less
Food Security Status is Related to Mental Health Quality of Life Among Persons Living with HIV.
Hatsu, Irene; Hade, Erinn; Campa, Adriana
2017-03-01
This study evaluated the association between health related quality of life and food security among persons living with HIV (PLHIV). We studied 167 PLHIV who completed questionnaires assessing food security, disease symptomatology, and several domains of the SF-36 health related quality of life survey. HIV disease state was assessed from medical records. Associations between independent and outcome variables were determined through linear regression models. Compared to food security, very low food security was significantly associated with lower mental component summary scores, [average difference -4.98 (95 % CI -9.85, -0.10)]; mental health, [average difference -5.44 (95 % CI -10.08, -0.81)]; and general health, [average difference -5.13 (95 % CI -9.65, -0.65)] after adjusting for covariates. About a fourth of participants experienced severe food insecurity, which negatively influenced their mental health and general wellbeing. The inclusion of resources for food assistance in HIV treatment programs may help ameliorate mental health challenges faced by PLHIV.
Rivera, Rebecca L; Dunne, Jennifer; Maulding, Melissa K; Wang, Qi; Savaiano, Dennis A; Nickols-Richardson, Sharon M; Eicher-Miller, Heather A
2018-04-01
To investigate the association of policy, systems and environmental factors with improvement in household food security among low-income Indiana households with children after a Supplemental Nutrition Assistance Program-Education (SNAP-Ed) direct nutrition education intervention. Household food security scores measured by the eighteen-item US Household Food Security Survey Module in a longitudinal randomized and controlled SNAP-Ed intervention study conducted from August 2013 to April 2015 were the response variable. Metrics to quantify environmental factors including classification of urban or rural county status; the number of SNAP-authorized stores, food pantries and recreational facilities; average fair market housing rental price; and natural amenity rank were collected from government websites and data sets covering the years 2012-2016 and used as covariates in mixed multiple linear regression modelling. Thirty-seven Indiana counties, USA, 2012-2016. SNAP-Ed eligible adults from households with children (n 328). None of the environmental factors investigated were significantly associated with changes in household food security in this exploratory study. SNAP-Ed improves food security regardless of urban or rural location or the environmental factors investigated. Expansion of SNAP-Ed in rural areas may support food access among the low-income population and reduce the prevalence of food insecurity in rural compared with urban areas. Further investigation into policy, systems and environmental factors of the Social Ecological Model are warranted to better understand their relationship with direct SNAP-Ed and their impact on diet-related behaviours and food security.
Algorithm 937: MINRES-QLP for Symmetric and Hermitian Linear Equations and Least-Squares Problems.
Choi, Sou-Cheng T; Saunders, Michael A
2014-02-01
We describe algorithm MINRES-QLP and its FORTRAN 90 implementation for solving symmetric or Hermitian linear systems or least-squares problems. If the system is singular, MINRES-QLP computes the unique minimum-length solution (also known as the pseudoinverse solution), which generally eludes MINRES. In all cases, it overcomes a potential instability in the original MINRES algorithm. A positive-definite pre-conditioner may be supplied. Our FORTRAN 90 implementation illustrates a design pattern that allows users to make problem data known to the solver but hidden and secure from other program units. In particular, we circumvent the need for reverse communication. Example test programs input and solve real or complex problems specified in Matrix Market format. While we focus here on a FORTRAN 90 implementation, we also provide and maintain MATLAB versions of MINRES and MINRES-QLP.
Decision-Making in National Security Affairs: Toward a Typology.
1985-06-07
decisional model, and thus provide the necessary linkage between observation and application of theory in explaining and/or predicting policy decisions . r...examines theories and models of decision -making processes from an interdisciplinary perspective, with a view toward deriving means by which the behavior of...processes, game theory , linear programming, network and graph theory , time series analysis, and the like. The discipline of decision analysis is a relatively
Food Security Status is related to Mental Health Quality of Life among Persons Living with HIV
Hatsu, Irene; Hade, Erinn; Campa, Adriana
2016-01-01
This study evaluated the association between health related quality of life and food security among persons living with HIV (PLHIV). We studied 167 PLHIV who completed questionnaires assessing food security, disease symptomatology, and several domains of the SF-36 health related quality of life survey. HIV disease state was assessed from medical records. Associations between independent and outcome variables were determined through linear regression models. Compared to food security, very low food security was significantly associated with lower mental component summary scores, [average difference: −4.98 (95% CI: −9.85, −0.10; mental health, [average difference: −5.44 (95% CI: −10.08, −0.81); and general health, [average difference: −5.13 (95% CI: −9.65, −0.65)] after adjusting for covariates. About a fourth of participants experienced severe food insecurity, which negatively influenced their mental health and general wellbeing. The inclusion of resources for food assistance in HIV treatment programs may help ameliorate mental health challenges faced by PLHIV. PMID:27699597
Rivera, Rebecca L; Maulding, Melissa K; Abbott, Angela R; Craig, Bruce A; Eicher-Miller, Heather A
2016-11-01
Food insecurity is negatively associated with US children's dietary intake and health. The Supplemental Nutrition Assistance Program-Education (SNAP-Ed) aims to alleviate food insecurity by offering nutrition, budgeting, and healthy lifestyle education to low-income individuals and families. The objective of this study was to evaluate the long-term impact of the Indiana SNAP-Ed on food security among households with children. A randomized, controlled, parallel study design with SNAP-Ed as an intervention was carried out during a 4- to 10-wk intervention period. Intervention group participants received the first 4 Indiana SNAP-Ed curriculum lessons. Study participants (n = 575) were adults aged ≥18 y from low-income Indiana households with ≥1 child living in the household. Both treatment groups completed an assessment before and after the intervention period and 1 y after recruitment. The 18-item US Household Food Security Survey Module was used to classify the primary outcomes of food security for the household and adults and children in the household. A linear mixed model was used to compare intervention with control group effects over time on food security. Mean ± SEM changes in household food security score and food security score among household adults from baseline to 1-y follow-up were 1.2 ± 0.4 and 0.9 ± 0.3 units lower, respectively, in the intervention group than in the control group (P < 0.01). The mean change in food security score from baseline to 1-y follow-up among household children was not significantly different in the intervention group compared with the control group. SNAP-Ed improved food security over a longitudinal time frame among low-income Indiana households with children in this study. SNAP-Ed may be a successful intervention to improve food security. © 2016 American Society for Nutrition.
Algorithm 937: MINRES-QLP for Symmetric and Hermitian Linear Equations and Least-Squares Problems
Choi, Sou-Cheng T.; Saunders, Michael A.
2014-01-01
We describe algorithm MINRES-QLP and its FORTRAN 90 implementation for solving symmetric or Hermitian linear systems or least-squares problems. If the system is singular, MINRES-QLP computes the unique minimum-length solution (also known as the pseudoinverse solution), which generally eludes MINRES. In all cases, it overcomes a potential instability in the original MINRES algorithm. A positive-definite pre-conditioner may be supplied. Our FORTRAN 90 implementation illustrates a design pattern that allows users to make problem data known to the solver but hidden and secure from other program units. In particular, we circumvent the need for reverse communication. Example test programs input and solve real or complex problems specified in Matrix Market format. While we focus here on a FORTRAN 90 implementation, we also provide and maintain MATLAB versions of MINRES and MINRES-QLP. PMID:25328255
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 9 2012-10-01 2012-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
Advanced Computational Methods for Security Constrained Financial Transmission Rights
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kalsi, Karanjit; Elbert, Stephen T.; Vlachopoulou, Maria
Financial Transmission Rights (FTRs) are financial insurance tools to help power market participants reduce price risks associated with transmission congestion. FTRs are issued based on a process of solving a constrained optimization problem with the objective to maximize the FTR social welfare under power flow security constraints. Security constraints for different FTR categories (monthly, seasonal or annual) are usually coupled and the number of constraints increases exponentially with the number of categories. Commercial software for FTR calculation can only provide limited categories of FTRs due to the inherent computational challenges mentioned above. In this paper, first an innovative mathematical reformulationmore » of the FTR problem is presented which dramatically improves the computational efficiency of optimization problem. After having re-formulated the problem, a novel non-linear dynamic system (NDS) approach is proposed to solve the optimization problem. The new formulation and performance of the NDS solver is benchmarked against widely used linear programming (LP) solvers like CPLEX™ and tested on both standard IEEE test systems and large-scale systems using data from the Western Electricity Coordinating Council (WECC). The performance of the NDS is demonstrated to be comparable and in some cases is shown to outperform the widely used CPLEX algorithms. The proposed formulation and NDS based solver is also easily parallelizable enabling further computational improvement.« less
Fuzzy Random λ-Mean SAD Portfolio Selection Problem: An Ant Colony Optimization Approach
NASA Astrophysics Data System (ADS)
Thakur, Gour Sundar Mitra; Bhattacharyya, Rupak; Mitra, Swapan Kumar
2010-10-01
To reach the investment goal, one has to select a combination of securities among different portfolios containing large number of securities. Only the past records of each security do not guarantee the future return. As there are many uncertain factors which directly or indirectly influence the stock market and there are also some newer stock markets which do not have enough historical data, experts' expectation and experience must be combined with the past records to generate an effective portfolio selection model. In this paper the return of security is assumed to be Fuzzy Random Variable Set (FRVS), where returns are set of random numbers which are in turn fuzzy numbers. A new λ-Mean Semi Absolute Deviation (λ-MSAD) portfolio selection model is developed. The subjective opinions of the investors to the rate of returns of each security are taken into consideration by introducing a pessimistic-optimistic parameter vector λ. λ-Mean Semi Absolute Deviation (λ-MSAD) model is preferred as it follows absolute deviation of the rate of returns of a portfolio instead of the variance as the measure of the risk. As this model can be reduced to Linear Programming Problem (LPP) it can be solved much faster than quadratic programming problems. Ant Colony Optimization (ACO) is used for solving the portfolio selection problem. ACO is a paradigm for designing meta-heuristic algorithms for combinatorial optimization problem. Data from BSE is used for illustration.
12 CFR 168.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...
12 CFR 568.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Security program. 568.3 Section 568.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...
12 CFR 391.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for business...
12 CFR 168.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...
12 CFR 391.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for business...
Key-Generation Algorithms for Linear Piece In Hand Matrix Method
NASA Astrophysics Data System (ADS)
Tadaki, Kohtaro; Tsujii, Shigeo
The linear Piece In Hand (PH, for short) matrix method with random variables was proposed in our former work. It is a general prescription which can be applicable to any type of multivariate public-key cryptosystems for the purpose of enhancing their security. Actually, we showed, in an experimental manner, that the linear PH matrix method with random variables can certainly enhance the security of HFE against the Gröbner basis attack, where HFE is one of the major variants of multivariate public-key cryptosystems. In 1998 Patarin, Goubin, and Courtois introduced the plus method as a general prescription which aims to enhance the security of any given MPKC, just like the linear PH matrix method with random variables. In this paper we prove the equivalence between the plus method and the primitive linear PH matrix method, which is introduced by our previous work to explain the notion of the PH matrix method in general in an illustrative manner and not for a practical use to enhance the security of any given MPKC. Based on this equivalence, we show that the linear PH matrix method with random variables has the substantial advantage over the plus method with respect to the security enhancement. In the linear PH matrix method with random variables, the three matrices, including the PH matrix, play a central role in the secret-key and public-key. In this paper, we clarify how to generate these matrices and thus present two probabilistic polynomial-time algorithms to generate these matrices. In particular, the second one has a concise form, and is obtained as a byproduct of the proof of the equivalence between the plus method and the primitive linear PH matrix method.
75 FR 18872 - Ginnie Mae Multiclass Securities Program Documents
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
... Securities Program Documents AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice. SUMMARY... with the Multiclass Securities Program. The intent of the Multiclass Securities program is to increase... Securities Program Documents. OMB Approval Number: 2503-0030. Form Numbers: None. Description of the Need for...
12 CFR 748.0 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security program...
12 CFR 748.0 - Security program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security program...
49 CFR 1546.103 - Form, content, and availability of security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Form, content, and availability of security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a...
49 CFR 1546.103 - Form, content, and availability of security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Form, content, and availability of security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a...
A secure distributed logistic regression protocol for the detection of rare adverse drug events
El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat
2013-01-01
Background There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. Objective To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. Methods We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. Results The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. Conclusion The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models. PMID:22871397
A secure distributed logistic regression protocol for the detection of rare adverse drug events.
El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat
2013-05-01
There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models.
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1987-12-31
This report also provides data on the initiatives being implemented as a result of the review of domestic airport security by the Secretary’s Safety...enforcement support for airline and airport security measures. Finally, the passengers-the ultimate beneficiaries of the security program--pay for...of these airports is required to implement a security program which provides a secure operating environment for these air carriers. Airport security programs
Effectiveness of the Civil Aviation Security Program.
1979-12-05
The airline and airport security measures currently in effect continue to provide increased safety for airline passengers and crews as well as...107 governing airport security . other ongoing programs which contributed significantly to airport security included the training of law enforce- ment...officers supporting airport security programs and the explosives detection K(9 team program. Highlights of these actions and programs are summarized
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
Masa, Rainier; Chowa, Gina; Nyirenda, Victor
2018-01-01
The objective of this study was to examine the prevalence and predictors of food insecurity among people living with HIV (PLHIV) in two rural communities in Zambia. A cross-sectional sample of 101 PLHIV was surveyed using the Household Food Insecurity Access Scale. In multivariable linear regression models, income, household possessions, and perceived coping strategies were significantly associated with decreased food insecurity. Debt and perceived mental distress were significantly associated with increased food insecurity. Programs that tackle economic disadvantage and its adverse effect on stress may be an appropriate strategy to improve food security of PLHIV in low-resource communities. PMID:28418728
44 CFR 8.3 - Senior FEMA official responsible for the information security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the Security...
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1983-01-01
The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.
5 CFR 1312.12 - Security Program Review Committee.
Code of Federal Regulations, 2011 CFR
2011-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Security Program Review Committee. 1312...
5 CFR 1312.12 - Security Program Review Committee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security Program Review Committee. 1312...
7 CFR 772.6 - Subordination of security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.6 Subordination of security. (a) Eligibility. The Agency shall grant a subordination of Minor Program loan security when the transaction will... still be adequately secured after the subordination, or the value of the loan security will be increased...
15 CFR 2008.16 - Security education program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures for...
2009-04-21
6 Intercity Passenger Rail Program (Amtrak) .....................................................................6... Intercity Bus Security Grant Program..............................................................................7 Trucking Security Program...continue security enhancements for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-16
... measure their effectiveness. Through its voluntary Corporate Security Review (CSR) Program, TSA's Highway... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Approval From OMB of One New Public Collection of Information: Security Program for Hazardous Materials Motor...
Self-efficacy is associated with increased food security in novel food pantry program.
Martin, Katie S; Colantonio, Angela G; Picho, Katherine; Boyle, Katie E
2016-12-01
We examined the effect of a novel food pantry intervention (Freshplace) that includes client-choice and motivational interviewing on self-efficacy and food security in food pantry clients. The study was designed as a randomized control trial. Participants were recruited over one year from traditional food pantries in Hartford, CT. Participants were randomized to Freshplace or traditional food pantries (controls) and data collection occurred at baseline with quarterly follow-ups for 18 months. Food security was measured using the USDA 18-item Food Security Module. A newly developed scale was utilized to measure self-efficacy. Scale reliability was measured using a Cronbach alpha test; validity was measured via correlating with a related variable. Analyses included chi-square tests for bivariate analyses and hierarchical linear modeling for longitudinal analyses. A total of 227 adults were randomized to the Freshplace intervention ( n =112) or control group ( n =115). The overall group was 60% female, 73% Black, mean age=51. The new self-efficacy scale showed good reliability and validity. Self-efficacy was significantly inversely associated with very low food security ( p <.05). Being in the Freshplace intervention ( p =.01) and higher self-efficacy ( p =.04) were independently associated with decreased very low food security. The traditional food pantry model fails to recognize the influence of self-efficacy on a person's food security. A food pantry model with client-choice, motivational interviewing and targeted referral services can increase self-efficacy of clients. Prioritizing the self-efficacy of clients over the efficiency of pantry operations is required to increase food security among disadvantaged populations.
The role of optics in secure credentials
NASA Astrophysics Data System (ADS)
Lichtenstein, Terri L.
2006-02-01
The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.
77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-17
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...
78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-08
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1984-04-13
AD-fl143 023 SEMIANNUAL REPORT TO CONGRESS ON THEUEFFECTIVENESS OF i/i THE CIVIL AVIATION SECURITY PROGRAM(U) FEDERAL AVIATION ADMINISTRATION...Semiannual Report to O Congress on the US Deportmnent of TrasEffectiveness ofi of TransportationFedewl Avkffim Avao The Civil Aviation - Security Program... Aviation Security Program 8. Performing OrgniaetioNi RePwt Us. Aviation Security Division 9. Performing Organistion Name and Address 10. Work Unit No
Los Alamos Neutron Science Center
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kippen, Karen Elizabeth
For more than 30 years the Los Alamos Neutron Science Center (LANSCE) has provided the scientific underpinnings in nuclear physics and material science needed to ensure the safety and surety of the nuclear stockpile into the future. In addition to national security research, the LANSCE User Facility has a vibrant research program in fundamental science, providing the scientific community with intense sources of neutrons and protons to perform experiments supporting civilian research and the production of medical and research isotopes. Five major experimental facilities operate simultaneously. These facilities contribute to the stockpile stewardship program, produce radionuclides for medical testing, andmore » provide a venue for industrial users to irradiate and test electronics. In addition, they perform fundamental research in nuclear physics, nuclear astrophysics, materials science, and many other areas. The LANSCE User Program plays a key role in training the next generation of top scientists and in attracting the best graduate students, postdoctoral researchers, and early-career scientists. The U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) —the principal sponsor of LANSCE—works with the Office of Science and the Office of Nuclear Energy, which have synergistic long-term needs for the linear accelerator and the neutron science that is the heart of LANSCE.« less
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
2010-04-30
5 Intercity Bus Security Grant Program...eligibility.22 This grant program includes funding for the Freight Rail Security Grant Program (FRSGP), and the Intercity Passenger Rail Program (IPR...eligible to receive funding to continue security enhancements for its intercity rail services between high-risk urban areas. 21 U.S. Department of
Security Assistance Dependence - Wielding American Power
2002-12-09
national security objectives. One vehicle of this power brokering is the well-developed international security assistance program – oftentimes...incorrectly referred to exclusively as foreign military sales. There is nothing simple about the security assistance program as it has developed today...For the USG, there are many agencies influencing today’s security assistance program to execute complex, integrated tasks directly impacting U.S
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2014 CFR
2014-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2011 CFR
2011-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2013 CFR
2013-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2012 CFR
2012-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2010 CFR
2010-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2014 CFR
2014-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2013 CFR
2013-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2012 CFR
2012-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2011 CFR
2011-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
7 CFR 772.5 - Security maintenance.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security maintenance. 772.5 Section 772.5 Agriculture... SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.5 Security maintenance. (a) General. Borrowers are responsible for maintaining the collateral that is serving as security for their Minor Program loan in...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
7 CFR 772.5 - Security maintenance.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security maintenance. 772.5 Section 772.5 Agriculture... SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.5 Security maintenance. (a) General. Borrowers are responsible for maintaining the collateral that is serving as security for their Minor Program loan in...
Effectiveness of the Civil Aviation Security Program.
1980-05-22
SECURITY. - CONTINUED TRAINING OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. - SECURITY PROGRAMS IMPLEMENTED BY AIR FREIGHT...cooperation by all concerned. (See Exhibit 14) Airport Security - Ongoing activities which contributed significantly to airport security included full...implementation of the revised Federal Aviation Regulations (FAR) Part 107 governing airport security , training of law enforcement officers supporting
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2012 CFR
2012-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2012-10-01 2012-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
2009-06-08
Security Grant Program ...............................................................................6 Intercity Passenger Rail Program (Amtrak...6 Intercity Bus Security Grant Program...fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services between high-risk
2009-08-05
Freight Rail Security Grant Program ...............................................................................6 Intercity Passenger Rail Program...Amtrak) .....................................................................6 Intercity Bus Security Grant Program...overview- fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
78 FR 45452 - Mailing of Tickets Under the Ticket To Work Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-29
... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 411 [Docket No. SSA-2011-0034] RIN 0960-AH34 Mailing of Tickets Under the Ticket To Work Program AGENCY: Social Security Administration. ACTION: Final rule..., Office of Employment Support Programs, Social Security Administration, 6401 Security Boulevard, Baltimore...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2010 CFR
2010-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2014 CFR
2014-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2012 CFR
2012-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2013 CFR
2013-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2011 CFR
2011-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
What is Security? A perspective on achieving security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Atencio, Julian J.
This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.
Science and technology in the stockpile stewardship program, S & TR reprints
DOE Office of Scientific and Technical Information (OSTI.GOV)
Storm, E
This document reports on these topics: Computer Simulations in Support of National Security; Enhanced Surveillance of Aging Weapons; A New Precision Cutting Tool: The Femtosecond Laser; Superlasers as a Tool of Stockpile Stewardship; Nova Laser Experiments and Stockpile Stewardship; Transforming Explosive Art into Science; Better Flash Radiography Using the FXR; Preserving Nuclear Weapons Information; Site 300Õs New Contained Firing Facility; The Linear Electric Motor: Instability at 1,000 gÕs; A Powerful New Tool to Detect Clandestine Nuclear Tests; High Explosives in Stockpile Surveillance Indicate Constancy; Addressing a Cold War Legacy with a New Way to Produce TATB; JumpinÕ Jupiter! Metallic Hydrogen;more » Keeping the Nuclear Stockpile Safe, Secure, and Reliable; The Multibeam FabryÐPerot Velocimeter: Efficient Measurements of High Velocities; Theory and Modeling in Material Science; The Diamond Anvil Cell; Gamma-Ray Imaging Spectrometry; X-Ray Lasers and High-Density Plasma« less
ERIC Educational Resources Information Center
Comp, David J.
2013-01-01
The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…
Federal Funding for Health Security in FY2018.
Watson, Crystal; Watson, Matthew; Kirk Sell, Tara
This article is the latest in an annual series analyzing federal funding for health security programs. It examines proposed funding in the President's Budget Request for FY2018 and provides updated amounts for FY2017 and actual funding for FY2010 through FY2016. The proposed FY2018 budget for health security-related programs represents a significant decrease in funding from prior years and previous administrations. In total, the President's proposed FY2018 budget includes $12.45 billion for health security-related programs, an estimated decrease in funding of $1.25 billion, or 9%, from the estimated $13.71 billion in FY2017 and an 11% decrease from the FY2016 actual funding level of $13.99 billion. Most FY2018 health security funding ($6.67 billion, 54%) would go to programs with multiple-hazard and preparedness goals and missions, representing a 14% decrease in this funding compared to FY2017. Radiological and nuclear security programs would receive 20% ($2.48 billion) of all health security funding, a slight decrease of 2% from the prior year. Biosecurity programs would be funded at $1.53 billion (12% of health security funding) in FY2018, a decrease of 6% compared to FY2017. Chemical security programs would represent 3% ($389.7 million) of all health security funding in FY2018, a 9% decrease from the prior year. Finally, 11% of health security funding ($1.39 billion) would be dedicated to pandemic influenza and emerging infectious diseases programs, the only category of funding to see an increase (3%) above FY2017.
75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...
76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...
77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-01
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National... Information Security Oversight Office no later than Friday, March 16, 2012. The Information Security Oversight... FURTHER INFORMATION CONTACT: David O. Best, Senior Program Analyst, The Information Security Oversight...
76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-01
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 11...
76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-13
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...
75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-09
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-01
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0089] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that...
Effectiveness of the Civil Aviation Security Program.
1975-10-06
Results of the passenger screening procedures continue to reflect the success and effec- tiveness of airline and airport security programs. During the...airline and airport security programs. While it is impossible to estimate accurately just how many hijackings and related crimes were prevented, the...attempts might have occurred during 1974 and as many as 25 during the first 6 months of 1975, if current airline and airport security programs had not
12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2011 CFR
2011-01-01
... Establishing Information Security Standards Table of Contents I. Introduction A. Scope B. Preservation of... Security Program B. Objectives III. Development and Implementation of Customer Information Security Program.... Introduction The Interagency Guidelines Establishing Information Security Standards (Guidelines) set forth...
14 CFR 1203.201 - Information security objectives.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...
14 CFR 1203.201 - Information security objectives.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...
76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-21
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR... Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the following Information...
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2014 CFR
2014-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2012 CFR
2012-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
14 CFR 1203.409 - Exceptional cases.
Code of Federal Regulations, 2010 CFR
2010-01-01
....409 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM... Information Security Program Committee, Security Division, Washington, DC 20546 for a classification..., to the Director, Information Security Oversight Office, GSA, for a determination. ...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 9 2012-10-01 2012-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...
78 FR 31966 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: [FEMA-2013-0019... Security Initiative (UASI) Nonprofit Security Grant Program (NSGP). DATES: Comments must be submitted on or... Urban Areas Security Initiative (UASI) Nonprofit Security Grant Program (NSGP) provides funding support...
Code of Federal Regulations, 2014 CFR
2014-01-01
... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...
Code of Federal Regulations, 2012 CFR
2012-01-01
... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...
49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
Code of Federal Regulations, 2011 CFR
2011-01-01
... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...
49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2013 CFR
2013-10-01
...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...
49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2014 CFR
2014-10-01
...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...
49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2012 CFR
2012-10-01
...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...
49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2011 CFR
2011-10-01
...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program
1991-02-01
enforcement support for airline and airport security measures. Airline passengers, as the ultimate beneficiaries of the security program. pay for the...environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 4(02 airports. 18...essential to many passengers. " FAA is currently reviewing Parts 107 and 108 of the Federal Aviation Regulations, covering airport security and airplane
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less
ERIC Educational Resources Information Center
Francois, Michael T.
2016-01-01
Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…
Applying your corporate compliance skills to the HIPAA security standard.
Carter, P I
2000-01-01
Compliance programs are an increasingly hot topic among healthcare providers. These programs establish policies and procedures covering billing, referrals, gifts, confidentiality of patient records, and many other areas. The purpose is to help providers prevent and detect violations of the law. These programs are voluntary, but are also simply good business practice. Any compliance program should now incorporate the Health Insurance Portability and Accountability Act (HIPAA) security standard. Several sets of guidelines for development of compliance programs have been issued by the federal government, and each is directed toward a different type of healthcare provider. These guidelines share certain key features with the HIPAA security standard. This article examines the common areas between compliance programs and the HIPAA security standard to help you to do two very important things: (1) Leverage your resources by combining compliance with the security standard with other legal and regulatory compliance efforts, and (2) apply the lessons learned in developing your corporate compliance program to developing strategies for compliance with the HIPAA security standard.
Nonlinear Excitation of the Ablative Rayleigh-Taylor Instability for All Wave Numbers
NASA Astrophysics Data System (ADS)
Zhang, H.; Betti, R.; Gopalaswamy, V.; Aluie, H.; Yan, R.
2017-10-01
Small-scale modes of the ablative Rayleigh-Taylor instability (ARTI) are often neglected because they are linearly stable when their wavelength is shorter than a linear cutoff. Using 2-D and 3-D numerical simulations, it is shown that linearly stable modes of any wavelength can be destabilized. This instability regime requires finite amplitude initial perturbations. Compared to 2-D, linearly stable ARTI modes are more easily destabilized in 3-D and the penetrating bubbles have a higher density because of enhanced vorticity. It is shown that for conditions found in laser fusion targets, short-wavelength ARTI modes are more efficient at driving mixing of ablated material throughout the target since the nonlinear bubble density increases with the wave number and small-scale bubbles carry a larger mass flux of mixed material. This work was supported by the Office of Fusion Energy Sciences Nos. DE-FG02-04ER54789, DE-SC0014318, the Department of Energy National Nuclear Security Administration under Award No. DE-NA0001944, the Ministerio de Ciencia e Innovacion of Spain (Grant No. ENE2011-28489), and the NANL LDRD program through Project Number 20150568ER.
Code of Federal Regulations, 2011 CFR
2011-04-01
... who is responsible for implementation and oversight of information security programs and procedures... complaints regarding all elements of the information security program shall be directed to the Director of... UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION National Security...
14 CFR 1203.901 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...
14 CFR 1203.603 - Systematic review for declassification.
Code of Federal Regulations, 2010 CFR
2010-01-01
... INFORMATION SECURITY PROGRAM Declassification and Downgrading § 1203.603 Systematic review for... review guidelines. The Chairperson, NASA Information Security Program Committee, shall develop, in... custodian and referred to the Chairperson, NASA Information Security Program Committee. This listing shall...
14 CFR 1203.901 - Responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...
14 CFR 1203.202 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...
14 CFR 1203.202 - Responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...
7 CFR 764.255 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.255 Section 764.255... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Operating Loan Program § 764.255 Security requirements. An OL... operating purposes, loans must be secured by a first lien on farm property or products having a security...
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... banking office; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES...
12 CFR 568.3 - Security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...
2011-08-25
Security Cooperation Agency INL Bureau of International Narcotics and Law Enforcement Affairs JSSP Justice Sector Security Program PAE Pacific...regional training centers. The programs were the Justice Sector Security Program ( JSSP ), the Corrections System Support Program (CSSP), and the...Civilian Police International. JSSP and CSSP are considered rule of law programs. Rule of law is most commonly understood to be a foundational
Nuclear Security Education Program at the Pennsylvania State University
DOE Office of Scientific and Technical Information (OSTI.GOV)
Uenlue, Kenan; The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304; Jovanovic, Igor
The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basismore » of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory.« less
2009-12-01
6 Intercity Passenger Rail Program (Amtrak) .....................................................................7 Intercity Bus Security Grant...20 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services between high-risk urban...Research Service 7 Intercity Passenger Rail Program (Amtrak) The Intercity Passenger Rail Program (IPR) is designed to enhance security of the
14 CFR 1203.604 - Mandatory review for declassification.
Code of Federal Regulations, 2011 CFR
2011-01-01
... requestor may submit the request to: (i) The Chairperson, NASA Information Security Program Committee; or... determination to the Chairperson, NASA Information Security Program Committee, National Aeronautics and Space... Chairperson, NASA Information Security Program Committee, for final resolution and appropriate response. (f...
14 CFR 1203.604 - Mandatory review for declassification.
Code of Federal Regulations, 2010 CFR
2010-01-01
... requestor may submit the request to: (i) The Chairperson, NASA Information Security Program Committee; or... determination to the Chairperson, NASA Information Security Program Committee, National Aeronautics and Space... Chairperson, NASA Information Security Program Committee, for final resolution and appropriate response. (f...
48 CFR 3019.705-1 - General support for the program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS SMALL BUSINESS PROGRAMS The Small Business Subcontracting Program 3019.705-1 General support for the program. In any...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-29
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-15
... to certain issues of securities in DTC's Fast Automated Securities Transfer program (``FAST''). For securities that are part of the FAST program, the transfer agents hold the securities registered in the name...
Correlation between heavy-hole and light-hole Mahan Excitons in a two-dimensional electron gas
NASA Astrophysics Data System (ADS)
Paul, J.; Dey, P.; Stevens, C. E.; Tokumoto, T.; Reno, J. L.; Hilton, D. J.; Karaiskaj, D.; D. J. Hilton Collaboration; J. L. Reno Collaboration
2015-03-01
We present the coherent two-dimensional Fourier transform (2DFT) spectra of Mahan Excitons associated with the heavy-hole and light-hole resonances observed in a modulation doped GaAs/AlGaAs single quantum well. These resonances are observed to be strongly coupled through many-body interactions. The 2DFT spectra were measured using co-linear, cross-linear, and co-circular polarizations and reveal striking differences. This work was performed, in part, at the Center for Integrated Nanotechnologies, a U.S. Department of Energy, Office of Basic Energy Sciences user facility. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under Contract No. DE-AC04-94AL85000. NSF, Division of Materials Research under Grant Number: DMR-1409473.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, G.; Mansur, D.L.; Ruhter, W.D.
1994-10-01
This report presents the details of the Lawrence Livermore National Laboratory safeguards and securities program. This program is focused on developing new technology, such as x- and gamma-ray spectrometry, for measurement of special nuclear materials. This program supports the Office of Safeguards and Securities in the following five areas; safeguards technology, safeguards and decision support, computer security, automated physical security, and automated visitor access control systems.
Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2014 CFR
2014-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2012 CFR
2012-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2010 CFR
2010-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2011 CFR
2011-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2013 CFR
2013-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-27
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0071] National Protection and Programs Directorate; Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security.... SUMMARY: The Department of Homeland Security, National Protection and Programs Directorate, Office of...
Code of Federal Regulations, 2010 CFR
2010-10-01
... requested by TSA concerning Security Threat Assessments. (ix) A statement acknowledging and ensuring that each employee and agent will successfully complete a Security Threat Assessment under § 1548.15 before... training and Security Threat Assessments by relevant personnel. (4) Duration of security program. The...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
ERIC Educational Resources Information Center
New York State Office of the Comptroller, Albany.
Findings of an audit of the New York State Education Department's procedures to maintain security over Pupil Evaluation Program (PEP) and Program Evaluation Test (PET) examination materials are presented in this report. The audit sought to determine whether the department's security procedures adequately prevented unauthorized access to exam…
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 2 2011-10-01 2011-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 2 2014-10-01 2012-10-01 true What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 2 2013-10-01 2012-10-01 true What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 2 2012-10-01 2012-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 2 2010-10-01 2010-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
Interactive Programming Support for Secure Software Development
ERIC Educational Resources Information Center
Xie, Jing
2012-01-01
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
78 FR 15734 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0010] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...
78 FR 15733 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0008] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...
78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 8, 2013. ISOO...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-05
... DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate [Docket No. DHS-2010-0071] Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office...
78 FR 38724 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-27
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0006] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... Agreement that establishes a computer matching program between the Department of Homeland Security/U.S...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2011 CFR
2011-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2010 CFR
2010-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2012 CFR
2012-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2013 CFR
2013-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
Effectiveness of the Civil Aviation Security Program.
1976-09-20
commerce--a pr per balance appears to exist. Moreover, airline and airport security programs appear to be capable of responding to changes in the nature...Moreover, airline and airport security programs appear to be capable of responding to changes in the nature and level of current and future threats. The...delays and diversions were experienced. Airline and airport security measures continued to afford the necessary level of protection to U.S. air
Implementing the global health security agenda: lessons from global health and security programs.
Paranjape, Suman M; Franz, David R
2015-01-01
The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.
Administrator, National Security Education Program
1993-01-19
1. Administer, direct, and manage the resources for the lit program. 2. Establish and direct an international education center, as approved by the...approve the hiring of, and evaluate the performance of personnel who staff the international education center. 4. Ensure appropriate internal management...Administrator, National Security Education Program * References: (a) DoD Directive 1025.2 , "National Security * Education Program," January 13, 1993
Case Study: Creation of a Degree Program in Computer Security. White Paper.
ERIC Educational Resources Information Center
Belon, Barbara; Wright, Marie
This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…
48 CFR 3019.705 - Responsibilities for the contracting officer under the subcontracting program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS SMALL BUSINESS PROGRAMS The Small Business Subcontracting Program 3019.705...
49 CFR 1549.101 - Acceptance, screening, and transfer of cargo.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO SCREENING PROGRAM Operations § 1549.101 Acceptance, screening, and transfer of cargo. (a) Preventing or... facilities, equipment, and procedures described in its security program to prevent or deter the carriage...
78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, July 12, 2013. ISOO will...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
Social Security Disability Insurance Enrollment and Health Care Employment.
Pellegrini, Lawrence C; Geissler, Kimberley H
2017-09-21
To examine the relationship between Social Security Disability Insurance (SSDI) enrollment and health care employment. State-year level data from government and other publicly available sources for all states (2000-2014). Population-weighted linear regression analyses model associations between each health care employment measure and each SSDI enrollment measure (i.e., SSDI overall, physical, or mental health enrollment rates), controlling for factors associated with health care employment, state fixed effects, and secular time trends. Data are gathered from publicly available sources. A one standard deviation increase in SSDI enrollment per 100,000 population is associated with a statistically significant 2.6 and 4.5 percent increase in the mean employment rate per 100,000 population for health care practitioner and technical occupations and health care support occupations, respectively. The size of this relationship varies by the type of disabling condition for SSDI enrollment (physical versus mental health). Social Security Disability Insurance enrollment is significantly associated with health care employment at the state level. Quantifying the magnitude of this relationship is important given high SSDI enrollment rates as well as evolving policy and demographic shifts related to the SSDI program. © Health Research and Educational Trust.
Bergmans, Rachel S; Palta, Mari; Robert, Stephanie A; Berger, Lawrence M; Ehrenthal, Deborah B; Malecki, Kristen M
2018-06-01
Evidence suggests both that chronic inflammation mediates the association of food insecurity with adverse health outcomes and that diet may be a significant source of inflammation among food insecure individuals. To examine whether food security status is associated with dietary inflammatory potential. Cross-sectional data came from the National Health and Nutrition Examination Survey (NHANES), cycles 2007 to 2014 (n=10,630). The analysis sample is representative of noninstitutionalized US adults with an income-to-poverty ratio ≤3.00. Dietary Inflammatory Index (DII) score, calculated using the average of two 24-hour dietary recalls, was the main outcome measure. Type III F tests or χ 2 tests compared population characteristics by food security status, defined using the US Food Security Survey Module. Multivariable linear regression was used to estimate the association between food security status and the DII score and moderation by demographic factors. Survey weighting procedures accounted for the effects of stratification and clustering used in the NHANES study design. When accounting for socioeconomic status, demographic factors, and health status, DII score was higher at greater levels of food insecurity (P=0.0033). Those with very low food security had a 0.31 (95% CI=0.12 to 0.49) higher DII score than those with high food security. Age moderated the association between food security status and DII score (interaction P=0.0103), where the magnitude of the association between DII score and severity of food insecurity was higher for those >65 years than for younger age groups. Food security status may be associated with dietary inflammatory potential, which is hypothesized to play a role in multiple chronic health conditions. Further research is needed to determine the causal nature of this relationship and evaluate how best to implement programs designed to address health disparities within food insecure populations. Copyright © 2018 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.
7 CFR 772.8 - Sale or exchange of security property.
Code of Federal Regulations, 2014 CFR
2014-01-01
..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...
7 CFR 772.8 - Sale or exchange of security property.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...
7 CFR 772.8 - Sale or exchange of security property.
Code of Federal Regulations, 2012 CFR
2012-01-01
..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...
7 CFR 772.8 - Sale or exchange of security property.
Code of Federal Regulations, 2013 CFR
2013-01-01
..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...
An Innovative Community College Program and Partnership in Information Security.
ERIC Educational Resources Information Center
Howard, Barbara C; Morneau, Keith A.
This report describes an innovative network security program initiated by Northern Virginia Community College and funded with a grant from the Northern Virginia Regional Partnership. The program educates and trains students in the instillation, configuration, and troubleshooting of the hardware and software infrastructure of information security.…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-19
... Insured Credit Unions to maintain an information security program and an incident response plan that... Federally Insured Credit Unions to maintain an information security program and an incident response plan... credit unions to develop a written security program to safeguard sensitive member information. This...
77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-11
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...
Huang, Jin; Kim, Youngmi; Barnidge, Ellen
2016-11-20
The National School Lunch Program (NSLP) is one of the most important food assistance programs in the United States to ensure children's food security and healthy development. Previous studies have offered mixed results and challenges in estimating the effects of program participation. This study assesses NSLP's effect on household food security using data from the Survey of Income and Program Participation (SIPP). SIPP collects information on food security that covers four reference months, including both summer (June, July, August) and nonsummer months. The number of summer months in these four reference months varies by SIPP rotation group. These unique features allow this study to address the potential selection bias in the research of NSLP and food security by examining a seasonal difference in program participation. The analysis found that one more summer month in the reference period increases the difference in low food security rates by about 1.5 percentage points between recipients and nonrecipients eligible for free or reduced-price lunch. Findings have important social work and health policy implications for increasing food security among low-income households with children. © 2016 National Association of Social Workers.
12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2011 CFR
2011-01-01
... Part 364—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...
76 FR 65107 - Recovery of Delinquent Debts-Treasury Offset Program Enhancements
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-20
... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404, 408, 416, and 422 [Docket No. SSA-2010-0010] RIN 0960-AH19 Recovery of Delinquent Debts--Treasury Offset Program Enhancements AGENCY: Social Security... Recovery Policy, Social Security Administration, 6401 Security Boulevard, Baltimore, MD 21235-6401, (410...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-01
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration (SSA). ACTION: Notice of renewal of an existing...
10 CFR 37.43 - General security program requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... overall security strategy to ensure the integrated and effective functioning of the security program required by this subpart. The security plan must, at a minimum: (i) Describe the measures and strategies... lessons learned; (iii) Relevant results of NRC inspections; and (iv) Relevant results of the licensee's...
Federal funding for health security in FY2015.
Boddie, Crystal; Sell, Tara Kirk; Watson, Matthew
2014-01-01
Previous articles in this series have provided funding information for federal civilian biodefense programs and programs focused on radiological and nuclear preparedness and consequence management. This year the authors have expanded the focus of the analysis to US federal funding for health security. This article provides proposed funding amounts for FY2015, estimated amounts for FY2014, and actual amounts for FY2010 through FY2013 in 5 domains critical to health security: biodefense programs, radiological and nuclear programs, chemical programs, pandemic influenza and emerging infectious disease programs, and multiple-hazard and preparedness programs.
Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.
Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less
Effectiveness of the Civil Aviation Security Program.
1980-10-14
CEASE FUNDING OF TRAINING"OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. F. FEDERAL AIR MARSHALS PROVIDE LAW ENFORCEMENT SUPPORT...enforcement officer authority through special deputations by the U.S. Marshals Service on an annual basis. Airport Security - Continuing activities...which contributed signifi- cantly to airport security include the training of local law enforcement officers supporting airport security programs, the
Effectiveness of the Civil Aviation Security Program.
1977-04-05
diversions. Perhaps the best evidence of the effectiveness of airline and airport security measures is the number of hijackings and related crimes prevented...airports. Consideration is being given to include a provision in the airport security regulation which would prohibit the introduction of...Security Program. A complete revision of the regulation that established basic airport security requirements is currently underway. One of the more
Global Security Contingency Fund: Summary and Issue Overview
2014-04-04
Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance
44 CFR 8.3 - Senior FEMA official responsible for the information security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official... Senior FEMA official responsible for the information security program. The Director of the Security Division, has been designated as the senior official to direct and administer the FEMA information security...
41 CFR 101-26.507 - Security equipment.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true Security equipment. 101... PROGRAM 26.5-GSA Procurement Programs § 101-26.507 Security equipment. Federal agencies and other activities authorized to purchase security equipment through GSA sources shall do so in accordance with the...
7 CFR 764.235 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.235 Section 764.235... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Conservation Loan Program § 764.235 Security requirements. (a... estate may be taken as additional security if needed. (c) Loans of $25,000 of less for real estate...
24 CFR 880.608 - Security deposits.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Security deposits. 880.608 Section... PROGRAM) SECTION 8 HOUSING ASSISTANCE PAYMENTS PROGRAM FOR NEW CONSTRUCTION Management § 880.608 Security... a security deposit in an amount equal to one month's Total Tenant Payment or $50, whichever is...
41 CFR 101-26.507 - Security equipment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true Security equipment. 101... PROGRAM 26.5-GSA Procurement Programs § 101-26.507 Security equipment. Federal agencies and other activities authorized to purchase security equipment through GSA sources shall do so in accordance with the...
7 CFR 764.355 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.355 Section 764.355... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Emergency Loan Program § 764.355 Security requirements. (a) EM loans made under § 764.351(a)(1) must comply with the general security requirements established at...
41 CFR 101-26.507 - Security equipment.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true Security equipment. 101... PROGRAM 26.5-GSA Procurement Programs § 101-26.507 Security equipment. Federal agencies and other activities authorized to purchase security equipment through GSA sources shall do so in accordance with the...
41 CFR 101-26.507 - Security equipment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Security equipment. 101... PROGRAM 26.5-GSA Procurement Programs § 101-26.507 Security equipment. Federal agencies and other activities authorized to purchase security equipment through GSA sources shall do so in accordance with the...
7 CFR 764.355 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.355 Section 764.355... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Emergency Loan Program § 764.355 Security requirements. Link... comply with the general security requirements established at §§ 764.103, 764.104 and 764.155(b). (b) EM...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-18
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0055] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration. ACTION: Notice of a renewal of an existing...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... Prevention Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of... to establish a new system of records titled, ``Department of Homeland Security/Transportation Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-08
... 1974; Department of Homeland Security U.S. Citizenship and Immigration Services -011 E-Verify Program... ``Department of Homeland Security/United States Citizenship and Immigration Services--011 E- Verify Program System of Records.'' The United States Citizenship and Immigration Services E-Verify Program allows...
49 CFR 1546.103 - Form, content, and availability of security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... security program is acceptable only if TSA finds that the security program provides a level of protection similar to the level of protection provided by U.S. aircraft operators serving the same airports. Foreign... the same airport, if TSA determines that such procedures are necessary to provide a similar level of...
ERIC Educational Resources Information Center
Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William
2016-01-01
The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…
31 CFR 1023.210 - Anti-money laundering program requirements for brokers or dealers in securities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... requirements for brokers or dealers in securities. 1023.210 Section 1023.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.210 Anti-money laundering program...
31 CFR 1023.210 - Anti-money laundering program requirements for brokers or dealers in securities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... requirements for brokers or dealers in securities. 1023.210 Section 1023.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.210 Anti-money laundering program...
31 CFR 1023.210 - Anti-money laundering program requirements for brokers or dealers in securities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... requirements for brokers or dealers in securities. 1023.210 Section 1023.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.210 Anti-money laundering program...
31 CFR 1023.210 - Anti-money laundering program requirements for brokers or dealers in securities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... requirements for brokers or dealers in securities. 1023.210 Section 1023.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.210 Anti-money laundering program...
Menu-Driven Solver Of Linear-Programming Problems
NASA Technical Reports Server (NTRS)
Viterna, L. A.; Ferencz, D.
1992-01-01
Program assists inexperienced user in formulating linear-programming problems. A Linear Program Solver (ALPS) computer program is full-featured LP analysis program. Solves plain linear-programming problems as well as more-complicated mixed-integer and pure-integer programs. Also contains efficient technique for solution of purely binary linear-programming problems. Written entirely in IBM's APL2/PC software, Version 1.01. Packed program contains licensed material, property of IBM (copyright 1988, all rights reserved).
Joint Logistics Commanders Guide for the Management of Multinational Program,
1981-07-01
purchase of the A-300 Airbus and the 1977 record-breaking export performance of the French and UK aerospace industries of around $5 billion and $2 billion...DIS. They are the Defense Industrial Security Clearance Office ( DISCO ), the Defense Industrial Security Institute (DISI), and the Office of Industrial...Security International (ISI). Defense Industrial Security Clearance Office ( DISCO ) The Defense Industrial Security Program (DISP) establishes pro
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of certain direct participation program securities from the arranging provisions of sections 7(c) and 11(d)(1). 240.3a12-9 Section 240.3a12-9 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL...
Water security evaluation in Yellow River basin
NASA Astrophysics Data System (ADS)
Jiang, Guiqin; He, Liyuan; Jing, Juan
2018-03-01
Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1983-10-21
Aviation Security Program -s fro January 1 -June 30, 1983 c> CD C_3 LU DTIC ELECTE NOV 1 8 1983 D <sS^ B Washington, O.C. 20691 October...Effectiveness of the Civil Aviation Security Program 7. A-.W.) Aviation Security Division V. P»tf»m..»» 0>|fi •« Nam» «n4 Aa^rai» DOT/Federal...Aviation Administration Office of Civil Aviation Security 800 Independence Avenue, SW. Washington, P.C. 20591 1. ••€•*.»•<•’• Caiala*. Na. S.
46 CFR 503.53 - Oversight Committee.
Code of Federal Regulations, 2011 CFR
2011-10-01
... FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security... provisions of Executive Order 13526 and directives of the Information Security Oversight Office. The program... and complaints concerning the Commission's information security program; (d) Recommend appropriate...
46 CFR 503.53 - Oversight Committee.
Code of Federal Regulations, 2010 CFR
2010-10-01
... FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security... provisions of Executive Order 12958 and directives of the Information Security Oversight Office. The program... and complaints concerning the Commission's information security program; (d) Recommend appropriate...
FAA computer security : recommendations to address continuing weaknesses
DOT National Transportation Integrated Search
2000-12-01
In September, testimony before the Committee on Science, House of Representatives, focused on the Federal Aviation Administration's (FAA) computer security program. In brief, we reported that FAA's agency-wide computer security program has serious, p...
TealLock 5.20 security software program for handheld devices.
Tahil, Fatimah A
2004-07-01
The TealLock has a simple graphic interface, and the program is user-friendly with well thought out options to customize security settings. The program is inexpensive and works seamlessly with the Palm OS platform's built-in basic Security application. The developer offers a 30-day free trial version and there is no downside to trying it to see if it meets your needs. It seems to be an effective security software program for psychiatrists who keep confidential and sensitive patient information on their PDAs. In keeping with HIPAA regulations, the TealLock bolsters security for protected health information stored on PDAs or other handheld devices by providing safeguards that address authentication, access control, encryption, and selected aspects of transmission.
Semilinear programming: applications and implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mohan, S.
Semilinear programming is a method of solving optimization problems with linear constraints where the non-negativity restrictions on the variables are dropped and the objective function coefficients can take on different values depending on whether the variable is positive or negative. The simplex method for linear programming is modified in this thesis to solve general semilinear and piecewise linear programs efficiently without having to transform them into equivalent standard linear programs. Several models in widely different areas of optimization such as production smoothing, facility locations, goal programming and L/sub 1/ estimation are presented first to demonstrate the compact formulation that arisesmore » when such problems are formulated as semilinear programs. A code SLP is constructed using the semilinear programming techniques. Problems in aggregate planning and L/sub 1/ estimation are solved using SLP and equivalent linear programs using a linear programming simplex code. Comparisons of CPU times and number iterations indicate SLP to be far superior. The semilinear programming techniques are extended to piecewise linear programming in the implementation of the code PLP. Piecewise linear models in aggregate planning are solved using PLP and equivalent standard linear programs using a simple upper bounded linear programming code SUBLP.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-23
...] Revision of Agency Information Collection Activity Under OMB Review: Secure Flight Program AGENCY... operators and foreign air carriers submit to Secure Flight for the purposes of watch list matching... screening checkpoint which airport operators will submit to Secure Flight, and a survey of certain general...
Evaluation of Participant Needs in a Regional Center for Security Studies
ERIC Educational Resources Information Center
Schmoker, Oliver E., III.
2009-01-01
This research study was implemented within the subject headquarters of a regional center, an organization responsible for security cooperation in Europe and Eurasia. The focus of the study was the center's program of security education. This program was designed to support evolving security objectives of foreign countries in order to increase the…
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1985-11-07
hijackings since 1973 during any comparable 6-month period. (See Exhibits 1, 2, and 3) Air carrier and airport security measures required by the FAA have...enforcement support for airline passenger boarding and airport security measures. The passengers, who are the principal beneficiaries of the security program
6 CFR 13.1 - Basis, purpose, scope and effect.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Basis, purpose, scope and effect. 13.1 Section 13.1 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL... Security on or after October 12, 2005. (2) Program fraud cases initiated by any component of the Department...
Cultural Awareness in Nuclear Security Programs: A Critical Link
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nasser, Al-Sharif Nasser bin; Auda, Jasmine; Bachner, Katherine
Nuclear security programs that offer training and capacity building opportunities to practitioners working in nuclear facilities play a central role in strengthening the global nuclear security architecture. There is often a significant divide, however, between both the development of these programs and their implementation, and between the programs’ intended and actual outcomes. This article argues that this disconnect can often be attributed to an absence of cultural awareness and an inability for internationally-designed programs to effectively resonate with local audiences. Furthermore, the importance of the role of cultural awareness in implementing nuclear security programs will be assessed, and its applicationsmore » in the Jordanian context will be presented.« less
Cultural Awareness in Nuclear Security Programs: A Critical Link
Nasser, Al-Sharif Nasser bin; Auda, Jasmine; Bachner, Katherine
2016-11-20
Nuclear security programs that offer training and capacity building opportunities to practitioners working in nuclear facilities play a central role in strengthening the global nuclear security architecture. There is often a significant divide, however, between both the development of these programs and their implementation, and between the programs’ intended and actual outcomes. This article argues that this disconnect can often be attributed to an absence of cultural awareness and an inability for internationally-designed programs to effectively resonate with local audiences. Furthermore, the importance of the role of cultural awareness in implementing nuclear security programs will be assessed, and its applicationsmore » in the Jordanian context will be presented.« less
Federal Funding for Health Security in FY2015
Sell, Tara Kirk; Watson, Matthew
2014-01-01
Previous articles in this series have provided funding information for federal civilian biodefense programs and programs focused on radiological and nuclear preparedness and consequence management. This year the authors have expanded the focus of the analysis to US federal funding for health security. This article provides proposed funding amounts for FY2015, estimated amounts for FY2014, and actual amounts for FY2010 through FY2013 in 5 domains critical to health security: biodefense programs, radiological and nuclear programs, chemical programs, pandemic influenza and emerging infectious disease programs, and multiple-hazard and preparedness programs. PMID:24988432
ERIC Educational Resources Information Center
Wilshusen, Gregory C.; Melvin, Valerie C.
2009-01-01
The Veterans Benefits, Health Care, and Information Technology Act of 2006 authorizes the Secretary of Veterans Affairs to establish an educational assistance program for information security. The Information Security Education Assistance Program is envisioned as a means for the Department of Veterans Affairs (VA) to attract and retain individuals…
Report: EPA’s National Security Information Program Could Be Improved
Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
5 CFR 9701.107 - Program evaluation.
Code of Federal Regulations, 2010 CFR
2010-01-01
....107 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.107 Program evaluation. (a) DHS will establish...
Pelfrey, William V; Pelfrey, William V
2009-02-01
Although most academic disciplines evolve at a measured pace, the emerging field of homeland security must, for reasons of safety and security, evolve rapidly. The Department of Homeland Security sponsored the establishment of a graduate educational program for key officials holding homeland security roles. Because homeland security is a nascent field, the establishment of a program curriculum was forced to draw from a variety of disciplines. Curriculum evaluation was complicated by the rapid changes occurring in the emerging discipline, producing response shift bias, and interfering with the pre-post assessments. To compensate for the validity threat associated with response shift bias, a retrospective pretest-posttest evaluative methodology was used. Data indicate the program has evolved in a significant and orderly fashion and these data support the use of this innovative evaluation approach in the development of any discipline.
Effectiveness of the Civil Aviation Security Program.
1976-04-19
AD-AtA 424 FEDERAL AVIATION ADMINISTRATION WASHINGToN DC OFFICE 7 ETC F/6 1/2 EFFECTIVENESS OF THE CIVIL AVIATION SECURITY PROGRAM. U) APR 76...April 19, 1976 Semiannual Report to Congress -on the Effectiveness 6. Pefom,-g o,qn.st.,n Cad of the Civil Aviation Security Program __._. P..I.,mng O,oon...Aviatio’n Administration Office of Civil Aviation Security 1i. C0a,,,c , ,No. 0800 Independence Avenue, SW. Washington, D.C. 20591 13. 7ype of Row iaend Pe
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program
1988-11-01
secure Zround environment and for providing local law enforcement support for airline and airport security measures. Finally, the passengers, the...operating environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 402 airports...assistance during this project. Responding to urgent requests from the Government of Liberia for onsite training of its airport security forces, FAA
ERIC Educational Resources Information Center
Moody, John Charles
Assessed were the effects of linear and modified linear programed materials on the achievement of slow learners in tenth grade Biological Sciences Curriculum Study (BSCS) Special Materials biology. Two hundred and six students were randomly placed into four programed materials formats: linear programed materials, modified linear program with…
Tao, Jinyuan; Gunter, Glenda; Tsai, Ming-Hsiu; Lim, Dan
2016-01-01
Recently, the many robust learning management systems, and the availability of affordable laptops, have made secure laptop-based testing a reality on many campuses. The undergraduate nursing program at the authors' university began to implement a secure laptop-based testing program in 2009, which allowed students to use their newly purchased laptops to take quizzes and tests securely in classrooms. After nearly 5 years' secure laptop-based testing program implementation, a formative evaluation, using a mixed method that has both descriptive and correlational data elements, was conducted to seek constructive feedback from students to improve the program. Evaluation data show that, overall, students (n = 166) believed the secure laptop-based testing program helps them get hands-on experience of taking examinations on the computer and gets them prepared for their computerized NCLEX-RN. Students, however, had a lot of concerns about laptop glitches and campus wireless network glitches they experienced during testing. At the same time, NCLEX-RN first-time passing rate data were analyzed using the χ2 test, and revealed no significant association between the two testing methods (paper-and-pencil testing and the secure laptop-based testing) and students' first-time NCLEX-RN passing rate. Based on the odds ratio, however, the odds of students passing NCLEX-RN the first time was 1.37 times higher if they were taught with the secure laptop-based testing method than if taught with the traditional paper-and-pencil testing method in nursing school. It was recommended to the institution that better quality of laptops needs to be provided to future students, measures needed to be taken to further stabilize the campus wireless Internet network, and there was a need to reevaluate the Laptop Initiative Program.
Leveraging Trade Agreements to Meet U.S. Security Aims
2016-04-08
TO MEET U.S. SECURITY AIMS 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd. PROJECT NUMBER LTC Allysa A. Kropp (USARNG) Se. TASK NUMBER 5f...Sanctions Programs and Country Information,” under “Resource Center, Financial Sanctions, Programs ,” https’.//wwiv.treasurv.gov/resource center/sanctions... Program , and economic integration of former adversaries through U.S. trade policy.7 In the National Security Strategy, President Obama underscored the
14 CFR 1203.603 - Systematic review for declassification.
Code of Federal Regulations, 2011 CFR
2011-01-01
... National Security Agency. (3) Systematic review for declassification of classified information pertaining... coordinated through the Central Intelligence Agency. (4) The Chairperson, NASA Information Security Program... guidelines. The Chairperson, NASA Information Security Program Committee, shall develop, in coordination with...
Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.
ERIC Educational Resources Information Center
Hungerford, Thomas L.
2006-01-01
The Social Security Trustees project that the Social Security program faces longterm financing difficulties. Several proposals that have been offered to shore-up the finances of the Social Security program would create individual retirement accounts funded with part of the payroll tax. The authors of many of these proposals claim that future…
49 CFR 659.25 - Annual review of system safety program plan and system security plan.
Code of Federal Regulations, 2010 CFR
2010-10-01
... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...
Rural income transfer programs and rural household food security in Ethiopia.
Uraguchi, Zenebe B
2012-01-01
Based on household food security surveys conducted in Ethiopia, this study seeks to understand the roles and limitations of income transfer projects as determinants of households’ food security. By covering the Food-For-Work Programs (FFWPs) and the Productive Safety Net Programs (PSNPs), the study shows that these programs served as temporary safety nets for food availability, but they were limited in boosting the dietary diversity of households and their coping strategies. Households which participated in the programs increased their supply of food as a temporary buffer to seasonal asset depletion. However, participation in the programs was marred by inclusion error (food-secure households were included) and exclusion error (food-insecure households were excluded). Income transfer projects alone were not robust determinants of household food security. Rather, socio-demographic variables of education and family size as well as agricultural input of land size were found to be significant in accounting for changes in households’ food security. The programs in the research sites were funded through foreign aid, and the findings of the study imply the need to reexamine the approaches adopted by bilateral donors in allocating aid to Ethiopia. At the same time the study underscores the need to improve domestic policy framework in terms of engendering rural local institutional participation in project management.
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
6 CFR 29.5 - Requirements for protection.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL... PCII Program Manager or the PCII Program Manager's designee; (2) The information is submitted for... information initially provided received by the PCII Program Manager or the PCII Program Manager's designee...
6 CFR 29.5 - Requirements for protection.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL... PCII Program Manager or the PCII Program Manager's designee; (2) The information is submitted for... information initially provided received by the PCII Program Manager or the PCII Program Manager's designee...
14 CFR 1203.200 - Background and discussion.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 1203.200 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.200 Background and discussion. (a) In establishing a... public inspection of that information that is classified to protect the national security. (b) In...
14 CFR 1203.900 - Establishment.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.900 Establishment. Pursuant to Executive Order 12958, “National Security Information,” and the National Aeronautics and Space Act of 1958, as amended, there is established...
Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.
Programs That Support Safety and Security for the Transit Industry
DOT National Transportation Integrated Search
2001-03-01
FTA's Office of Safety and Security (Office) directly supports the U.S. Department of Transportation's safety goals through a series of programs designed to maintain continuous improvement in the safety and security of our nation's transit systems. T...
Code of Federal Regulations, 2010 CFR
2010-01-01
... establish an industrial security program for the purpose of safeguarding classified information under the... Agent for the National Industrial Security Program. Commission means the Nuclear Regulatory Commission... designated by the Executive Director for Operations, is eligible for a security clearance for access to...
14 CFR 1203.200 - Background and discussion.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 1203.200 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.200 Background and discussion. (a) In establishing a... public inspection of that information that is classified to protect the national security. (b) In...
14 CFR 1203.900 - Establishment.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.900 Establishment. Pursuant to Executive Order 12958, “National Security Information,” and the National Aeronautics and Space Act of 1958, as amended, there is established...
Dykstra, Holly; Davey, Adam; Fisher, Jennifer O; Polonsky, Heather; Sherman, Sandra; Abel, Michelle L; Dale, Lauren C; Foster, Gary D; Bauer, Katherine W
2016-03-01
Universal access to the School Breakfast Program (SBP) is intended to help low-income and food-insecure students overcome barriers to eating breakfast. However, SBP participation is often still low despite universal access. Further information is needed with regard to these children's breakfast behaviors, and in particular breakfast behaviors among youth from food-insecure families, to inform effective breakfast interventions. The objective of this study was to examine breakfast behaviors among a large sample of urban students with universal access to the SBP and to identify differences in breakfast behaviors among children from food-secure compared with food-insecure households. A cross-sectional study of 821 fourth- through sixth-grade students and their parents from 16 schools was conducted. Students reported the foods/drinks selected and location of obtaining food/drink on the morning of data collection, parents reported household food security status using the 6-item Food Security Survey Module, and the school district provided SBP participation data during the fall semester of 2013. Multivariable linear regression models accounting for school-level clustering were used to examine differences in breakfast behaviors across 3 levels of household food security: food secure, low food secure, and very low food secure. Students participated in the SBP 31.2% of possible days, with 13% never participating in the SBP. One-fifth (19.4%) of students purchased something from a corner store for breakfast, and 16.9% skipped breakfast. Forty-six percent of students were food insecure; few differences in breakfast behaviors were observed across levels of food security. Despite universal access to the SBP, participation in the SBP is low. Breakfast skipping and selection of foods of low nutritional quality in the morning are common, regardless of household food security status. Additional novel implementation of the SBP and addressing students' breakfast preferences may be necessary to further reduce barriers to students obtaining a free, healthful breakfast. This trial was registered at clinicaltrials.gov as NCT01924130. © 2016 American Society for Nutrition.
Creation of security engineering programs by the Southwest Surety Institute
NASA Astrophysics Data System (ADS)
Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn
1998-12-01
The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.
75 FR 39423 - National Institute on Disability and Rehabilitation Research (NIDRR)-Disability and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
... (VR) State Grants program; the Social Security Disability Insurance and Supplemental Security Income programs; health care initiatives; and other Federal or State programs affect employment rates for...
75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-10
... Education Program; 1101 Wilson Blvd., Suite 1210; Rosslyn, VA 22219. FOR FURTHER INFORMATION CONTACT: Dr. Kevin Gormley, Program Officer, National Security Education Program, 1101 Wilson Boulevard, Suite 1210...
Kaliningrad and Baltic Security
2001-06-01
Kennedy-Minott, Thesis Co-Advisor ___________________________________________ James Wirtz , Chairman Department of National Security Affairs iv...39 Jochen Prantl, �Security and Stability in Northern Europe � A Threat Assessment,� Program on the Northern Dimension of the CFSP, 29...www.usis.usemb.se/ wireless/500/eur508.htm Prantl, Jochen . �Security and Stability in Northern Europe � A Threat Assessment.� Program on the Northern Dimension
17 CFR 38.605 - Requirements for financial surveillance program.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Requirements for financial surveillance program. 38.605 Section 38.605 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... financial surveillance program. A designated contract market's financial surveillance program for futures...
17 CFR 38.605 - Requirements for financial surveillance program.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Requirements for financial surveillance program. 38.605 Section 38.605 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... financial surveillance program. A designated contract market's financial surveillance program for futures...
Developing a computer security training program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1990-01-01
We all know that training can empower the computer protection program. However, pushing computer security information outside the computer security organization into the rest of the company is often labeled as an easy project or a dungeon full of dragons. Used in part or whole, the strategy offered in this paper may help the developer of a computer security training program ward off dragons and create products and services. The strategy includes GOALS (what the result of training will be), POINTERS (tips to ensure survival), and STEPS (products and services as a means to accomplish the goals).
Measuring Security Effectiveness and Efficiency at U.S. Commercial Airports
2013-03-01
formative program evaluation and policy analysis to investigate current airport security programs. It identifies innovative public administration and...policy-analysis tools that could provide potential benefits to airport security . These tools will complement the System Based Risk Management framework if
7 CFR 764.155 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.155 Section 764.155 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Farm Ownership Loan Program § 764.155 Security requirements...
7 CFR 764.235 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.235 Section 764.235 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Conservation Loan Program § 764.235 Security requirements. (a...
7 CFR 764.205 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.205 Section 764.205 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Downpayment Loan Program § 764.205 Security requirements. A...
7 CFR 764.155 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.155 Section 764.155 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Farm Ownership Loan Program § 764.155 Security requirements...
7 CFR 764.205 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.205 Section 764.205 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Downpayment Loan Program § 764.205 Security requirements. A...
Bartfeld, Judith S; Ahn, Hong-Min
2011-03-01
The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.
NNSA Program Develops the Next Generation of Nuclear Security Experts
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brim, Cornelia P.; Disney, Maren V.
2015-09-02
NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.
Valuation of financial models with non-linear state spaces
NASA Astrophysics Data System (ADS)
Webber, Nick
2001-02-01
A common assumption in valuation models for derivative securities is that the underlying state variables take values in a linear state space. We discuss numerical implementation issues in an interest rate model with a simple non-linear state space, formulating and comparing Monte Carlo, finite difference and lattice numerical solution methods. We conclude that, at least in low dimensional spaces, non-linear interest rate models may be viable.
7 CFR 772.7 - Leasing minor program loan security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 7 2010-01-01 2010-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan... property for Minor Program loans to a third party when: (1) Leasing is the only feasible way to continue to...
7 CFR 772.7 - Leasing minor program loan security.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 7 2011-01-01 2011-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan... property for Minor Program loans to a third party when: (1) Leasing is the only feasible way to continue to...
Neller, Daniel J; Vitacco, Michael J; Magaletta, Philip R; Phillips-Boyles, A Brooke
2016-03-01
Research supports the effectiveness of the Risk-Needs-Responsivity model for reducing criminal recidivism. Yet programming interests of inmates--one facet of responsivity--remain an understudied phenomenon. In the present study, we explored the programming interests of 753 federal inmates housed across three levels of security. Results suggest that inmates, as a group, prefer specific programs over others, and that some of their interests may differ by security level. We discuss possible implications of these findings. © The Author(s) 2014.
Integrated Cavity QED in a linear Ion Trap Chip for Enhanced Light Collection
NASA Astrophysics Data System (ADS)
Benito, Francisco; Jonathan, Sterk; Boyan, Tabakov; Haltli, Raymond; Tigges, Chris; Stick, Daniel; Balin, Matthew; Moehring, David
2012-06-01
Realizing a scalable trapped-ion quantum information processor may require integration of tools to manipulate qubits into trapping devices. We present efforts towards integrating a 1 mm optical cavity into a microfabricated surface ion trap to efficiently connect nodes in a quantum network. The cavity is formed by a concave mirror and a flat coated silicon mirror around a linear trap where ytterbium ions can be shuttled in and out of the cavity mode. By utilizing the Purcell effect to increase the rate of spontaneous emission into the cavity mode, we expect to collect up to 13% of the emitted photons. This work was supported by Sandia's Laboratory Directed Research and Development (LDRD) and the Intelligence Advanced Research Projects Activity (IARPA). Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the US Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
... Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Infrastructure Security Compliance... submitted by mail to the DHS/NPPD/ IP/ISCD CFATS Program Manager at the Department of Homeland Security, 245...
78 FR 15730 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... 1974; Computer Matching Program AGENCY: U.S. Citizenship and Immigration Services, Department of... Matching Program between the Department of Homeland Security, U.S. Citizenship and Immigration Services and... computer matching program between the Department of Homeland Security, U.S. Citizenship and Immigration...
77 FR 61771 - Facility Security Officer Training Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-11
... Security Officer training program, with the primary focus on developing the curriculum for such a program... Administrator of the Department of Transportation in developing the FSO training curriculum. The purpose of the...) to establish comprehensive FSO training requirements designed to provide full security training that...
2009-02-26
6 Intercity Passenger Rail Program (Amtrak...6 Intercity Bus Security Grant Program................................................................................. 7...for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency Management Agency
22 CFR 9.3 - Senior agency official.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.3 Senior agency official. The... senior agency official to direct and administer its information security program. The Department's senior... carrying out the provisions of the Executive Order and the Department's information security program by the...
77 FR 66880 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-07
... the database that stores information for the Lost and Stolen Securities Program. We estimate that 26... Lost and Stolen Securities Program database will be kept confidential. The Commission may not conduct... SECURITIES AND EXCHANGE COMMISSION Submission for OMB Review; Comment Request Upon Written Request...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
7 CFR 764.255 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.255 Section 764.255 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Operating Loan Program § 764.255 Security requirements. An OL...
7 CFR 764.305 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.305 Section 764.305 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Youth Loan Program § 764.305 Security requirements. A first...
7 CFR 764.305 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.305 Section 764.305 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Youth Loan Program § 764.305 Security requirements. A first...
78 FR 48697 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-09
... INFORMATION: FEMA's Homeland Security Grant Program (HSGP) is an important part of the Administration's larger... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0034... concerning the collection of information to administer the Homeland Security Grant Program (HSGP). DATES...
34 CFR 361.63 - Program income.
Code of Federal Regulations, 2011 CFR
2011-07-01
... supported under this part. (b) Sources. Sources of program income include, but are not limited to, payments from the Social Security Administration for assisting Social Security beneficiaries and recipients to... earned when it is received. (2) Payments provided to a State from the Social Security Administration for...
34 CFR 361.63 - Program income.
Code of Federal Regulations, 2010 CFR
2010-07-01
... supported under this part. (b) Sources. Sources of program income include, but are not limited to, payments from the Social Security Administration for assisting Social Security beneficiaries and recipients to... earned when it is received. (2) Payments provided to a State from the Social Security Administration for...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2012 CFR
2012-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2011 CFR
2011-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2014 CFR
2014-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2013 CFR
2013-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
45 CFR 303.30 - Securing medical support information.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 2 2013-10-01 2012-10-01 true Securing medical support information. 303.30... (CHILD SUPPORT ENFORCEMENT PROGRAM), ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES STANDARDS FOR PROGRAM OPERATIONS § 303.30 Securing medical support information. (a) If...
45 CFR 303.30 - Securing medical support information.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 2 2011-10-01 2011-10-01 false Securing medical support information. 303.30... (CHILD SUPPORT ENFORCEMENT PROGRAM), ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES STANDARDS FOR PROGRAM OPERATIONS § 303.30 Securing medical support information. (a) If...
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215... FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...-risk, the facility must complete a Security Vulnerability Assessment. A Security Vulnerability...
Effectiveness of the Civil Aviation Security Program.
1981-04-15
on item were processed through the screening system daily. The airline and airport security measures developed continue to provide increased safety...United States or Puerto Rico. None of these 16 hijackings resulted from insufficient airport security measures or a breakdown in the FAA-approved airport ... airport security programs is conducted at the Transportation Safety Institute in Oklahoma City, Oklahoma. The course provides in-depth coverage of civil
An Instructional Note on Linear Programming--A Pedagogically Sound Approach.
ERIC Educational Resources Information Center
Mitchell, Richard
1998-01-01
Discusses the place of linear programming in college curricula and the advantages of using linear-programming software. Lists important characteristics of computer software used in linear programming for more effective teaching and learning. (ASK)
Supporting secure programming in web applications through interactive static analysis.
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2014-07-01
Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bachner, Katherine M.; Mladineo, Stephen V.
The NNSA Material Protection, Control, and Accounting (MPC&A) program has been engaged for fifteen years in upgrading the security of nuclear materials in Russia. Part of the effort has been to establish the conditions necessary to ensure the long-term sustainability of nuclear security. A sustainable program of nuclear security requires the creation of an indigenous infrastructure, starting with sustained high level government commitment. This includes organizational development, training, maintenance, regulations, inspections, and a strong nuclear security culture. The provision of modern physical protection, control, and accounting equipment to the Russian Federation alone is not sufficient. Comprehensive infrastructure projects support themore » Russian Federation's ability to maintain the risk reduction achieved through upgrades to the equipment. To illustrate the contributions to security, and challenges of implementation, this paper discusses the history and next steps for an indigenous Tamper Indication Device (TID) program, and a Radiation Portal Monitoring (RPM) program.« less
Supporting secure programming in web applications through interactive static analysis
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2013-01-01
Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513
What lies behind crop decisions?Coming to terms with revealing farmers' preferences
NASA Astrophysics Data System (ADS)
Gomez, C.; Gutierrez, C.; Pulido-Velazquez, M.; López Nicolás, A.
2016-12-01
The paper offers a fully-fledged applied revealed preference methodology to screen and represent farmers' choices as the solution of an optimal program involving trade-offs among the alternative welfare outcomes of crop decisions such as profits, income security and management easiness. The recursive two-stage method is proposed as an alternative to cope with the methodological problems inherent to common practice positive mathematical program methodologies (PMP). Differently from PMP, in the model proposed in this paper, the non-linear costs that are required for both calibration and smooth adjustment are not at odds with the assumptions of linear Leontief technologies and fixed crop prices and input costs. The method frees the model from ad-hoc assumptions about costs and then recovers the potential of economic analysis as a means to understand the rationale behind observed and forecasted farmers' decisions and then to enhance the potential of the model to support policy making in relevant domains such as agricultural policy, water management, risk management and climate change adaptation. After the introduction, where the methodological drawbacks and challenges are set up, section two presents the theoretical model, section three develops its empirical application and presents its implementation to a Spanish irrigation district and finally section four concludes and makes suggestions for further research.
Exploring Public Health's roles and limitations in advancing food security in British Columbia.
Seed, Barbara A; Lang, Tim M; Caraher, Martin J; Ostry, Aleck S
2014-07-22
This research analyzes the roles and limitations of Public Health in British Columbia in advancing food security through the integration of food security initiatives into its policies and programs. It asks the question, can Public Health advance food security? If so, how, and what are its limitations? This policy analysis merges findings from 38 key informant interviews conducted with government and civil society stakeholders involved in the development of food security initiatives, along with an examination of relevant documents. The Population Health Template is used to delineate and analyze Public Health roles in food security. Public Health was able to advance food security in some ways, such as the adoption of food security as a core public health program. Public Health's leadership role in food security is constrained by a restricted mandate, limited ability to collaborate across a wide range of sectors and levels, as well as internal conflict within Public Health between Food Security and Food Protection programs. Public Health has a role in advancing food security, but it also faces limitations. As the limitations are primarily systemic and institutional, recommendations to overcome them are not simple but, rather, require movement toward embracing the determinants of health and regulatory pluralism. The results also suggest that the historic role of Public Health in food security remains salient today.
1985-01-01
jurisdiction over all U.S. DOD personnel and their dependents in Turkey. Security Assistance The U.S. Security Assistance Program in Turkey consists of a...variety of related activities. a. The Foreign Military Sales (FMS) and Military Assistance Pro- gram (MAP). These programs are designed to help...training. The FY85 IMET program for Turkey is about $3.1 million. [An expanded discussion of these security assistance activities is provided in the
Independent Review of Aviation Technology and Research Information Analysis System (ATRIAS) Database
1994-02-01
capability to support the Federal Aviation Administration (FAA)/ Aviation Security Research and Development Service’s (ACA) Explosive Detection...Systems (EDS) programs and Aviation Security Human Factors Program (ASHFP). This review was conducted by an independent consultant selected by the FAA...sections 2 and 3 of the report. Overall, ATRIAS was found to address many technology application areas relevant to the FAA’s aviation security programs
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 2 2012-07-01 2012-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 2 2011-07-01 2011-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 2 2014-07-01 2014-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 2 2013-07-01 2013-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
78 FR 1275 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-08
... Social Security Administration (Computer Matching Agreement 1071). SUMMARY: In accordance with the... of its new computer matching program with the Social Security Administration (SSA). DATES: OPM will... conditions under which SSA will disclose Social Security benefit data to OPM via direct computer link. OPM...
Strong tobacco control program requirements and secure funding are not enough: lessons from Florida.
Kennedy, Allison; Sullivan, Sarah; Hendlin, Yogi; Barnes, Richard; Glantz, Stanton
2012-05-01
Florida's Tobacco Pilot Program (TPP; 1998-2003), with its edgy Truth media campaign, achieved unprecedented youth smoking reductions and became a model for tobacco control programming. In 2006, 3 years after the TPP was defunded, public health groups restored funding for tobacco control programming by convincing Florida voters to amend their constitution. Despite the new program's strong legal structure, Governor Charlie Crist's Department of Health implemented a low-impact program. Although they secured the program's strong structure and funding, Florida's nongovernmental public health organizations did not mobilize to demand a high-impact program. Implementation of Florida's Amendment 4 demonstrates that a strong programmatic structure and secure funding are insufficient to ensure a successful public health program, without external pressure from nongovernmental groups.
2013-08-14
Connectivity Graph; Graph Search; Bounded Disturbances; Linear Time-Varying (LTV); Clohessy - Wiltshire -Hill (CWH) 16. SECURITY CLASSIFICATION OF: 17...the linearization of the relative motion model given by the Hill- Clohessy - Wiltshire (CWH) equations is used [14]. A. Nonlinear equations of motion...equations can be used to describe the motion of the debris. B. Linearized HCW equations in discrete-time For δr << R, the linearized Hill- Clohessy
Code of Federal Regulations, 2010 CFR
2010-04-01
... UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION National Security Information § 201.43 Program. The Director of Administration is designated as the official of the Commission who is responsible for implementation and oversight of information security programs and procedures...
12 CFR Appendix D-2 to Part 208 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2010 CFR
2010-01-01
... Relationships Risk Management Principles,” Nov. 1, 2001; FDIC FIL 68-99, Risk Assessment Tools and Practices for.... Definitions II. Standards for Safeguarding Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of...
12 CFR Appendix F to Part 225 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2010 CFR
2010-01-01
... Relationships Risk Management Principles,” Nov. 1, 2001; FDIC FIL 68-99, Risk Assessment Tools and Practices for.... Standards for Safeguarding Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B...
Mental Retardation: Determining Eligibility for Social Security Benefits.
ERIC Educational Resources Information Center
Reschly, Daniel J., Ed.; Myers, Tracy G., Ed.; Hartel, Christine R., Ed.
The Social Security Administration (SSA) provides income support and medical benefits for adults with mental retardation unable to perform substantial gainful activity through the Disability Insurance (DI) program and the Supplemental Security Income (SSI) program. SSI benefits are also provided to families of children and adolescents who evidence…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-09
... 1974; Department of Homeland Security/United States Citizenship and Immigration Services--DHS/USCIS-011... ``Department of Homeland Security/United States Citizenship and Immigration Services--011 E- Verify Program System of Records.'' The United States Citizenship and Immigration Services E-Verify Program allows...
32 CFR 321.9 - Appeal of initial amendment decision.
Code of Federal Regulations, 2011 CFR
2011-07-01
... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...
32 CFR 321.9 - Appeal of initial amendment decision.
Code of Federal Regulations, 2010 CFR
2010-07-01
... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...
32 CFR 321.9 - Appeal of initial amendment decision.
Code of Federal Regulations, 2012 CFR
2012-07-01
... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...
32 CFR 321.9 - Appeal of initial amendment decision.
Code of Federal Regulations, 2014 CFR
2014-07-01
... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...
32 CFR 321.9 - Appeal of initial amendment decision.
Code of Federal Regulations, 2013 CFR
2013-07-01
... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...
76 FR 6596 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
.... The Food Security Act of 1985 permits the states to establish ``central filing systems.'' These... in section 1324 of the Food Security Act of 1985. The information received from the State is... responsibility for the Clear Title Program (Section 1324 of the Food Security Act of 1985. Clear Title Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... Collection Activity Under OMB Review: Highway Baseline Assessment for Security Enhancement (BASE) Program... Assessment for Security Enhancement (BASE) Program. Type of Request: New collection. OMB Control Number: Not yet assigned. Form(s): Highway Baseline Assessment for Security Enhancement (BASE). Affected Public...
Code of Federal Regulations, 2013 CFR
2013-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.200 General. Brokers or dealers in securities are subject to the program requirements set forth and cross referenced in this subpart. Brokers or dealers in securities should also refer to subpart B of part 1010 of...
Code of Federal Regulations, 2011 CFR
2011-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.200 General. Brokers or dealers in securities are subject to the program requirements set forth and cross referenced in this subpart. Brokers or dealers in securities should also refer to subpart B of part 1010 of...
Code of Federal Regulations, 2014 CFR
2014-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.200 General. Brokers or dealers in securities are subject to the program requirements set forth and cross referenced in this subpart. Brokers or dealers in securities should also refer to subpart B of part 1010 of...
Code of Federal Regulations, 2012 CFR
2012-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.200 General. Brokers or dealers in securities are subject to the program requirements set forth and cross referenced in this subpart. Brokers or dealers in securities should also refer to subpart B of part 1010 of...
Cyber security evaluation of II&C technologies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Ken
The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.« less
Implementing an Information Security Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.
The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to covermore » information security best practices, planning for an information security management system, and implementing security controls for information security.« less
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gearhart, Jared Lee; Adair, Kristin Lynn; Durfee, Justin David.
When developing linear programming models, issues such as budget limitations, customer requirements, or licensing may preclude the use of commercial linear programming solvers. In such cases, one option is to use an open-source linear programming solver. A survey of linear programming tools was conducted to identify potential open-source solvers. From this survey, four open-source solvers were tested using a collection of linear programming test problems and the results were compared to IBM ILOG CPLEX Optimizer (CPLEX) [1], an industry standard. The solvers considered were: COIN-OR Linear Programming (CLP) [2], [3], GNU Linear Programming Kit (GLPK) [4], lp_solve [5] and Modularmore » In-core Nonlinear Optimization System (MINOS) [6]. As no open-source solver outperforms CPLEX, this study demonstrates the power of commercial linear programming software. CLP was found to be the top performing open-source solver considered in terms of capability and speed. GLPK also performed well but cannot match the speed of CLP or CPLEX. lp_solve and MINOS were considerably slower and encountered issues when solving several test problems.« less
32 CFR 154.61 - Security education.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...
32 CFR 154.61 - Security education.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...
32 CFR 154.61 - Security education.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...
32 CFR 154.61 - Security education.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...
32 CFR 154.61 - Security education.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-25
... program under title XIX of the Social Security Act, (3) the Children's Health Insurance Program (CHIP... program under title XIX of the Social Security Act; (3) the Children's Health Insurance Program (CHIP... qualified health plans in which the taxpayers or a member of the taxpayers family (coverage family) is...
ERIC Educational Resources Information Center
Grossman, Michael; Schortgen, Francis
2016-01-01
This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-30
... notice of its renewal of an ongoing computer-matching program with the Social Security Administration... computer-matching program with the Committee on Homeland Security and Governmental Affairs of the Senate... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as amended; Notice of Computer Matching Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-10
... notice of its renewal of an ongoing computer-matching program with the Social Security Administration... computer-matching program with the Committee on Homeland Security and Governmental Affairs of the Senate... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as Amended; Notice of Computer Matching Program...
ERIC Educational Resources Information Center
Ayers, David F.; Miller-Dyce, Cherrel; Carlone, David
2008-01-01
Researchers asked 17 participants in a job-training program to describe their personal struggles following an economic restructuring. Examined through a critical theoretical lens, findings indicate that the learners enrolled in the program to reclaim security, dignity, meaningful work, and caring relationships. Program planners at community…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-28
... 253 Administrative practice and procedure, Food assistance programs, Grant programs, Social programs... title XVI of the Social Security Act or disability or blindness payments under titles I, II, X, XIV, or XVI of the Social Security Act; (2) Receives federally- or State-administered supplemental benefits...
Federal Funding for Health Security in FY2016.
Boddie, Crystal; Sell, Tara Kirk; Watson, Matthew
2015-01-01
This article assesses US government funding in 5 domains critical to strengthening health security: biodefense programs, radiological and nuclear programs, chemical programs, pandemic influenza and emerging infectious disease programs, and multiple-hazard and preparedness programs. This year's article also highlights the emergency funding appropriated in FY2015 to enable the international and domestic response to the Ebola outbreak in West Africa.
Federal Funding for Health Security in FY2016
Sell, Tara Kirk; Watson, Matthew
2015-01-01
This article assesses US government funding in 5 domains critical to strengthening health security: biodefense programs, radiological and nuclear programs, chemical programs, pandemic influenza and emerging infectious disease programs, and multiple-hazard and preparedness programs. This year's article also highlights the emergency funding appropriated in FY2015 to enable the international and domestic response to the Ebola outbreak in West Africa. PMID:26042863
Two Stage Sibling Cycle Compressor/Expander.
1994-02-01
documents, follow the procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1 -R, Information Security Program Regulation...procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1-R, Information Security Program Regulation, Chapter IX. For...Spae Piston rotation periodically connects channels from expansion/ compresion ces to ports P1Port B2 Heat Exchangers B Piston moves Ports Process Al
Safe teleradiology: information assurance as project planning methodology.
Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2005-01-01
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.
The Use of Electronic Book Theft Detection Systems in Libraries.
ERIC Educational Resources Information Center
Witt, Thomas B.
1996-01-01
Although electronic book theft detection systems can be a deterrent to library material theft, no electronic system is foolproof, and a total security program is necessary to ensure collection security. Describes how book theft detection systems work, their effectiveness, and the problems inherent in technology. A total security program considers…
7 CFR 774.18 - Interest rate, terms and security requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 7 2010-01-01 2010-01-01 false Interest rate, terms and security requirements. 774.18..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS EMERGENCY LOAN FOR SEED PRODUCERS PROGRAM § 774.18 Interest rate, terms and security requirements. (a) Interest rate. (1) The interest rate on the loan will be zero...
12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2010 CFR
2010-01-01
... Relationships Risk Management Principles,” Nov. 1, 2001; FDIC FIL 68-99, Risk Assessment Tools and Practices for... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
...; Department of Homeland Security Transportation Security Administration-023 Workplace Violence Prevention... Administration-023 Workplace Violence Prevention Program System of Records and this proposed rulemaking. In this... Privacy Act (5 U.S.C. 552a) titled, DHS/TSA-023 Workplace Violence Prevention Program System of Records...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-27
... the provisions of the Department of Defense National Industrial Security Program Operating Manual, an... Department of Defense National Industrial Security Program Operating Manual (unless such requirements are in..., Arms Control and International Security, Department of State. [FR Doc. 2010-21450 Filed 8-26-10; 8:45...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-20
... Request; Secure Supply Chain Pilot Program AGENCY: Food and Drug Administration, HHS. ACTION: Notice... identified with the title Secure Supply Chain Pilot Program. Also include the FDA docket number found in... following proposed collection of information to OMB for review and clearance: ``Secure Supply Chain Pilot...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...
Mabli, James; Ohls, Jim
2015-02-01
The Supplemental Nutrition Assistance Program (SNAP) provides nutrition assistance benefits to low-income families in an effort to reduce hunger and improve health and well-being. Because 1 in 7 Americans participate in the program each month, policymakers need to know whether the program is meeting these objectives effectively. The objective of this study was to estimate the association between SNAP participation and household food security using recent data from the largest national survey of the food security of SNAP participants to date. The analysis used a survey of nearly 6500 households and a quasi-experimental research design that consisted of 2 sets of comparisons. Using a cross-sectional sample, we compared information collected from SNAP households within days of program entry with information collected from a contemporaneous sample of SNAP households that had participated for ∼6 mo. Next, using a longitudinal sample, we compared baseline information collected from new-entrant SNAP households with information from those same households 6 mo later. Multivariate logistic regression analysis was used to estimate associations between SNAP and household food security. SNAP participation decreased the percentage of SNAP households that were food insecure in both samples by 6-17%. SNAP participation also decreased the percentage of households experiencing severe food insecurity--designated very low food security--by 12-19%. Findings were qualitatively robust to different empirical specifications. SNAP serves a vital role in improving the health and well-being of households by increasing food security. Given recent legislation to reduce program size and limit program eligibility, this study underscores SNAP's continued importance in affecting households' well-being. Future research is needed to determine whether specific groups of households experience differential improvements in food security. © 2015 American Society for Nutrition.
33 CFR 101.125 - Approved Alternative Security Programs.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 106 of this subchapter, as applicable: (a) American Gaming Association Alternative Security Program..., and Towboats and Barges, dated September 24, 2003. (c) Passenger Vessel Association Industry Standards...
46 CFR 295.23 - Reporting requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...
46 CFR 295.23 - Reporting requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...
46 CFR 295.23 - Reporting requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...
46 CFR 295.23 - Reporting requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...
46 CFR 295.23 - Reporting requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...
Hammering Yucca Flat, Part One: P-Wave Velocity
NASA Astrophysics Data System (ADS)
Tang, D. G.; Abbott, R. E.; Preston, L. A.; Hampshire, J. B., II
2015-12-01
Explosion-source phenomenology is best studied when competing signals (such as instrument, site, and propagation effects), are well understood. The second phase of the Source Physics Experiments (SPE), is moving from granite geology to alluvium geology at Yucca Flat, Nevada National Security Site. To improve subsurface characterization of Yucca Flat (and therefore better understand propagation and site effects), an active-source seismic survey was conducted using a novel 13,000-kg impulsive hammer source. The source points, spaced 200 m apart, covered a N-S transect spanning 18 km. Three component, 2-Hz geophones were used to record useable signals out to 10 km. We inverted for P-wave velocity by computing travel times using a finite-difference 3D eikonal solver, and then compared that to the picked travel times using a linearized iterative inversion scheme. Preliminary results from traditional reflection processing methods are also presented. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.
NASA Technical Reports Server (NTRS)
Ferencz, Donald C.; Viterna, Larry A.
1991-01-01
ALPS is a computer program which can be used to solve general linear program (optimization) problems. ALPS was designed for those who have minimal linear programming (LP) knowledge and features a menu-driven scheme to guide the user through the process of creating and solving LP formulations. Once created, the problems can be edited and stored in standard DOS ASCII files to provide portability to various word processors or even other linear programming packages. Unlike many math-oriented LP solvers, ALPS contains an LP parser that reads through the LP formulation and reports several types of errors to the user. ALPS provides a large amount of solution data which is often useful in problem solving. In addition to pure linear programs, ALPS can solve for integer, mixed integer, and binary type problems. Pure linear programs are solved with the revised simplex method. Integer or mixed integer programs are solved initially with the revised simplex, and the completed using the branch-and-bound technique. Binary programs are solved with the method of implicit enumeration. This manual describes how to use ALPS to create, edit, and solve linear programming problems. Instructions for installing ALPS on a PC compatible computer are included in the appendices along with a general introduction to linear programming. A programmers guide is also included for assistance in modifying and maintaining the program.
Savoie-Roskos, Mateja; Durward, Carrie; Jeweks, Melanie; LeBlanc, Heidi
2016-01-01
To determine whether participation in a farmers' market incentive pilot program had an impact on food security and fruit and vegetable (F&V) intake of participants. Participants in the Supplemental Nutrition Assistance Program were eligible to receive a dollar-per-dollar match up to $10/wk in farmers' market incentives. The researchers used a pretest-posttest design to measure F&V intake and food security status of 54 adult participants before and after receiving farmers' market incentives. The 6-item Behavior Risk Factor Surveillance System questionnaire and US Household Food Security Survey Module were used to measure F&V intake and food security, respectively. Wilcoxon signed-rank test was used to compare scores of F&V intake. After receiving incentives, fewer individuals reported experiencing food insecurity-related behaviors. A significantly increased intake (P < .05) was found among selected vegetables. Participation in a farmers' market incentive program was positively related to greater food security and intake of select vegetables among participants in the Supplemental Nutrition Assistance Program. Copyright © 2016 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
Human Reliability Program Workshop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Landers, John; Rogers, Erin; Gerke, Gretchen
A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security andmore » the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.« less
Laurent, Heidemarie K.; Kim, Hyoun K.; Capaldi, Deborah M.
2009-01-01
This study investigated the impact of parents' observed conflict behavior on subsequent child attachment security, both as a main effect and as moderated by parents' romantic attachment. Participants were 80 heterosexual couples involving men from the Oregon Youth Study and their first-born children. We used hierarchical linear modeling to predict child security with each parent. Interparental psychological aggression predicted lower child security with father, regardless of romantic attachment. If the father was insecure, interparental positive engagement predicted lower child security with him. If either the mother or father was avoidant, interparental withdrawal did not predict lower child security, though it did for more secure parents. Results are discussed in terms of implications of attachment-(in)congruent behavior for parents' emotional availability. PMID:18540766
48 CFR 3019.708-70 - Solicitation provision and contract clauses.
Code of Federal Regulations, 2010 CFR
2010-10-01
... HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS SMALL BUSINESS PROGRAMS The Small Business Subcontracting Program 3019.708-70 Solicitation provision and contract clauses. (a) The contracting officer shall insert the clause at (HSAR) 48 CFR 3052.219-70, Small Business...
78 FR 15731 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0011] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy Act of 1974; Computer Matching Program...
78 FR 15732 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0007] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy Act of 1974; Computer Matching Program...
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Introduction § 411... Security Act which establishes the Ticket to Work and Self-Sufficiency Program (hereafter referred to as... provisions relating to employment networks in the Ticket to Work program. (f) Subpart F contains provisions...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
User's manual for LINEAR, a FORTRAN program to derive linear aircraft models
NASA Technical Reports Server (NTRS)
Duke, Eugene L.; Patterson, Brian P.; Antoniewicz, Robert F.
1987-01-01
This report documents a FORTRAN program that provides a powerful and flexible tool for the linearization of aircraft models. The program LINEAR numerically determines a linear system model using nonlinear equations of motion and a user-supplied nonlinear aerodynamic model. The system model determined by LINEAR consists of matrices for both state and observation equations. The program has been designed to allow easy selection and definition of the state, control, and observation variables to be used in a particular model.
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1986-05-30
and airport security measures in effect. Section V of this report provides a smry of firearms which were detected at screening points under suspicious...with the Secretary of State concerning threats, and (3) the inclusion of a sumnmary on foreign airport security in the Semiannual Report to Congress on...International Civil Aviation Organization (ICAO) to embark inediately upon an intensified program aimed at responding to the need for enhanced airport security . As
6 CFR 27.204 - Minimum concentration by security issue.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Minimum concentration by security issue. 27.204 Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by...
76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-21
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR...), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the... for all levels of government to complete a cyber network security assessment so that a full measure of...
Code of Federal Regulations, 2011 CFR
2011-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... requested. There are no fees associated with a Privacy Act request, except as stated in NSA/CSS Regulation...
Code of Federal Regulations, 2013 CFR
2013-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... requested. There are no fees associated with a Privacy Act request, except as stated in NSA/CSS Regulation...
Code of Federal Regulations, 2012 CFR
2012-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... requested. There are no fees associated with a Privacy Act request, except as stated in NSA/CSS Regulation...
Framework for Managing Metadata Security Tags as the Basis for Making Security Decisions.
2002-12-01
and Performance,” D.H. Associates, Inc., Sep 2001. [3] Deitel , H. M., and Deitel , P. J., Java How to Program , 3rd Edition, Prentice Hall Inc...1999. [4] Deitel , H. M., Deitel , P. J., and Nieto, T. R., Internet and The World Wide Web: How to Program , 2nd Edition, 2002. [5] Grohn, M. J., A...words) This thesis presents an analysis of a capability to employ CAPCO (Controlled Access Program Coordination Office) compliant Metadata security
2016-03-01
PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity
NASA Astrophysics Data System (ADS)
Cheon, Jung Hee; Jarecki, Stanislaw; Seo, Jae Hong
Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such a task could have multiple potential applications in commerce, health care, and security. However, all currently known secure set intersection protocols for n>2 parties have computational costs that are quadratic in the (maximum) number of entries in the dataset contributed by each party, making secure computation of the set intersection only practical for small datasets. In this paper, we describe the first multi-party protocol for securely computing the set intersection functionality with both the communication and the computation costs that are quasi-linear in the size of the datasets. For a fixed security parameter, our protocols require O(n2k) bits of communication and Õ(n2k) group multiplications per player in the malicious adversary setting, where k is the size of each dataset. Our protocol follows the basic idea of the protocol proposed by Kissner and Song, but we gain efficiency by using different representations of the polynomials associated with users' datasets and careful employment of algorithms that interpolate or evaluate polynomials on multiple points more efficiently. Moreover, the proposed protocol is robust. This means that the protocol outputs the desired result even if some corrupted players leave during the execution of the protocol.
2016-03-01
they traverse land [e.g., runway, road, rail line, pipeline, fence, pavement , electrical distribution line] and are reported by a linear unit of...locations. Furthermore, these officials stated that the new risk- based Interagency Security Committee standards provide a more flexible risk-based
49 CFR 228.203 - Program components.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Program components. (a) System security. The integrity of the program and database must be protected by a security system that utilizes an employee identification number and password, or a comparable method, to... system to pre-populate fields of the hours of service record provided that— (A) The recordkeeping system...
10 CFR 1046.12 - Physical fitness training program.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Physical fitness training program. 1046.12 Section 1046.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS Protective Force Personnel § 1046.12 Physical fitness training program. (a) Each incumbent security police officer...
10 CFR 1046.12 - Physical fitness training program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Physical fitness training program. 1046.12 Section 1046.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS Protective Force Personnel § 1046.12 Physical fitness training program. (a) Each incumbent security police officer...
Science Programs Applied Energy Programs Civilian Nuclear Energy Programs Laboratory Directed Research Energy United States of America National Nuclear Security Administration Visit Blogger Join Us on key role in national security and nuclear deterrence in an increasingly dangerous and unstable world
32 CFR 154.14 - Civilian employment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... intelligence and security agencies with respect to granting security clearances in an expeditious manner under... National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Personnel Security Investigative Requirements § 154.14 Civilian...
14 CFR 1203.408 - Assistance by installation security classification officers.
Code of Federal Regulations, 2011 CFR
2011-01-01
... ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.408 Assistance by installation security classification officers. Installation Security Classification Officers, as the... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Assistance by installation security...
14 CFR 1203.408 - Assistance by installation security classification officers.
Code of Federal Regulations, 2010 CFR
2010-01-01
... ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.408 Assistance by installation security classification officers. Installation Security Classification Officers, as the... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Assistance by installation security...
Security auditing: a prescription for keeping protection programs healthy.
Luizzo, Anthony
2010-01-01
The different aspects of security auditing and the role of the security auditor is explained in detail by the author in this primer for security professionals with specific advice on what should be included in a security audit report.
49 CFR 1542.101 - General requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...
49 CFR 1542.101 - General requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...
49 CFR 1542.301 - Contingency plan.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...
49 CFR 1542.101 - General requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...
49 CFR 1542.101 - General requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...
49 CFR 1542.301 - Contingency plan.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...
49 CFR 1542.101 - General requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and...
49 CFR 1542.301 - Contingency plan.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...
49 CFR 1542.301 - Contingency plan.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...
Code of Federal Regulations, 2013 CFR
2013-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... 22161. 2 See footnote 1 to this section. (b) This part applies to all NSA/CSS elements, field activities...
Code of Federal Regulations, 2014 CFR
2014-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... 22161. 2 See footnote 1 to this section. (b) This part applies to all NSA/CSS elements, field activities...
Code of Federal Regulations, 2012 CFR
2012-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... 22161. 2 See footnote 1 to this section. (b) This part applies to all NSA/CSS elements, field activities...
Code of Federal Regulations, 2011 CFR
2011-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM... 22161. 2 See footnote 1 to this section. (b) This part applies to all NSA/CSS elements, field activities...
6 CFR 27.200 - Information regarding security risk for a chemical facility.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Information regarding security risk for a chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information...
Leveraging Safety Programs to Improve and Support Security Programs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Leach, Janice; Snell, Mark K.; Pratt, R.
2015-10-01
There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.
On the linear programming bound for linear Lee codes.
Astola, Helena; Tabus, Ioan
2016-01-01
Based on an invariance-type property of the Lee-compositions of a linear Lee code, additional equality constraints can be introduced to the linear programming problem of linear Lee codes. In this paper, we formulate this property in terms of an action of the multiplicative group of the field [Formula: see text] on the set of Lee-compositions. We show some useful properties of certain sums of Lee-numbers, which are the eigenvalues of the Lee association scheme, appearing in the linear programming problem of linear Lee codes. Using the additional equality constraints, we formulate the linear programming problem of linear Lee codes in a very compact form, leading to a fast execution, which allows to efficiently compute the bounds for large parameter values of the linear codes.
17 CFR 156.3 - Contract market program for enforcement.
Code of Federal Regulations, 2014 CFR
2014-04-01
... for potential abuse and to secure compliance with all other contract market bylaws, rules, regulations... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Contract market program for... (CONTINUED) BROKER ASSOCIATIONS § 156.3 Contract market program for enforcement. A contract market must, as...
17 CFR 156.3 - Contract market program for enforcement.
Code of Federal Regulations, 2013 CFR
2013-04-01
... abuse and to secure compliance with all other contract market bylaws, rules, regulations and resolutions... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Contract market program for... BROKER ASSOCIATIONS § 156.3 Contract market program for enforcement. A contract market must, as part of...
17 CFR 156.3 - Contract market program for enforcement.
Code of Federal Regulations, 2010 CFR
2010-04-01
... abuse and to secure compliance with all other contract market bylaws, rules, regulations and resolutions... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Contract market program for... BROKER ASSOCIATIONS § 156.3 Contract market program for enforcement. A contract market must, as part of...
17 CFR 156.3 - Contract market program for enforcement.
Code of Federal Regulations, 2012 CFR
2012-04-01
... abuse and to secure compliance with all other contract market bylaws, rules, regulations and resolutions... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Contract market program for... BROKER ASSOCIATIONS § 156.3 Contract market program for enforcement. A contract market must, as part of...
17 CFR 156.3 - Contract market program for enforcement.
Code of Federal Regulations, 2011 CFR
2011-04-01
... abuse and to secure compliance with all other contract market bylaws, rules, regulations and resolutions... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Contract market program for... BROKER ASSOCIATIONS § 156.3 Contract market program for enforcement. A contract market must, as part of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-17
... Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Infrastructure Security Compliance... questions about this Information Collection Request should be forwarded to DHS/NPPD/IP/ISCD CFATS Program... to the DHS/NPPD/IP/ISCD CFATS Program Manager at the Department of Homeland Security, 245 Murray Lane...
Legal Guide for Senior Citizens: Laws and Programs Affecting Kansas Senior Citizens.
ERIC Educational Resources Information Center
Hollinger, Judith A., Ed.
This booklet is intended to inform (not advise) older Kansans about eligibility requirements and benefits provided by state and federal programs. Financial assistance programs discussed are Social Security, railroad retirements, veterans' benefits, unrestricted general assistance, Employee Retirement Income Security Act, food stamps, Low Income…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-16
... Security benefit information to OPM via direct computer link for the administration of certain programs by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and Social Security Administration AGENCY: Office of Personnel Management...
Under Secretary of Defense for Policy > OUSDP Offices > ASD for
cooperation programs and foreign military sales programs in these regions. Responsibilities and Functions The defense establishments; and for oversight of security cooperation programs and foreign military sales all foreign governments in assigned areas of responsibility. Develop regional security and defense
Building a Secure Library System.
ERIC Educational Resources Information Center
Benson, Allen C.
1998-01-01
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2014 CFR
2014-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2013 CFR
2013-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2012 CFR
2012-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2011 CFR
2011-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
Update on security plans to prevent bioterrorism attacks during agricultural bacilli programs
Robert A. Fusco
2003-01-01
In the aftermath of September 11, security in aerial application suppression programs utilizing Bacillus thuringiensis has become a critical concern for State pest control managers and aerial applicators.
Program Oversight of Contractors on the Battlefield
2011-03-23
contractor to another. For example, under Blackwater Security Firm‟s contract for private security services in Iraq, the contract paid workers guarding...subcontracting relationship with Blackwater . 38 The Coalition Provisional Authority (CPA) provided less than adequate control for approximately $8.8...the Army‟s LOGCAP, the Navy ‟s Construction Capabilities Contract Program, and the Air Force‟s Contract Augmentation Program. These programs remain