Case Study: Creation of a Degree Program in Computer Security. White Paper.
ERIC Educational Resources Information Center
Belon, Barbara; Wright, Marie
This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…
Community Colleges and Cybersecurity Education.
ERIC Educational Resources Information Center
Teles, Elizabeth J.; Hovis, R. Corby
2002-01-01
Describes recent federal legislation (H.R. 3394) that charges the National Science Foundation with offering more grants to colleges and universities for degree programs in computer and network security, and to establish trainee programs for graduate students who pursue doctoral degrees in computer and network security. Discusses aspects of…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kryuchkov, Eduard F.; Geraskin, Nikolay I.; Killinger, Mark H.
The world’s first master’s degree program in nuclear safeguards and security, established at Moscow Engineering Physics Institute (MEPhI), has now graduated nine classes of students. Most of the graduates have gone on to work at government agencies, research organizations, or obtain their PhD. In order to meet the demand for safeguards and security specialists at nuclear facilities, MEPhI established a 5½ year engineering degree program that provides more hands-on training desired by facilities. In February 2004, the first students began their studies in the new discipline Nuclear Material Safeguards and Nonproliferation. This class, as well as other subsequent classes, includedmore » students who started the program in their third year of studies, as the first 2½ years consists of general engineering curriculum. Fourteen students made up the first graduating class, receiving their engineering degrees in February 2007. The topics addressed in this paper include specific features of the program caused by peculiarities of Russian education legislation and government quality control of academic education. This paper summarizes the main joint actions undertaken by MEPhI and the US National Laboratories in conjunction with the U.S. Department of Energy, to develop the engineering degree program. Also discussed are the program’s specific training requirements, student internships, and job placement. The paper concludes with recommendations from a recent international seminar on nonproliferation education and training.« less
Code of Federal Regulations, 2010 CFR
2010-07-01
... purposes only. 2. This information shall be accorded substantially the same degree of security protection... 413(a) of the Mutual Security Act of 1954, as amended (22 U.S.C. 1933(a)), and pursuant to the... the Mutual Security Program, to relieve the Department of Defense of administrative burdens, and to...
MD/MBA Students: An Analysis of Medical Student Career Choice.
Sherrill, Windsor Westbrook
2004-12-01
An increasing number of medical schools are offering dual degree MD/MBA programs. Career choices and factors influencing students to enter these programs provide an indicator of the roles in which dual degree students will serve in health care as well as the future of dual degree programs. Using career choice theory as a conceptual framework, career goals and factors influencing decisions to enter dual degree programs were assessed among dual degree medical students. Students enrolled at dual degree programs at six medical schools were surveyed and interviewed. A control group of traditional medical students was also surveyed. Factors influencing students to seek both medical and business training are varied but are often related to a desire for leadership opportunities, concerns about change in medicine and job security and personal career goals. Most students expect to combine clinical and administrative roles. Students entering these programs do so for a variety of reasons and plan diverse careers. These findings can provide guidance for program development and recruitment for dual degree medical education programs.
Russian University Education in Nuclear Safeguards and Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duncan, Cristen L.; Kryuchkov, Eduard F.; Geraskin, Nikolay I.
2009-03-15
As safeguards and security (S&S) systems are installed and upgraded in nuclear facilities throughout Russia, it becomes increasingly important to develop mechanisms for educating future Russian nuclear scientists and engineers in the technologies and methodologies of physical protection (PP) and nuclear material control and accounting (MC&A). As part of the U.S. Department of Energy’s (DOE) program to secure nuclear materials in Russia, the Education Project supports technical S&S degree programs at key Russian universities and nonproliferation education initiatives throughout the Russian Federation that are necessary to achieve the overall objective of fostering qualified and vigilant Russian S&S personnel. The Educationmore » Project supports major educational degree programs at the Moscow Engineering Physics Institute (MEPhI) and Tomsk Polytechnic University (TPU). The S&S Graduate Program is available only at MEPhI and is the world’s first S&S degree program. Ten classes of students have graduated with a total of 79 Masters Degrees as of early 2009. At least 84% of the graduates over the ten years are still working in the S&S field. Most work at government agencies or research organizations, and some are pursuing their PhD. A 5½ year Engineering Degree Program (EDP) in S&S is currently under development at MEPhI and TPU. The EDP is more tailored to the needs of nuclear facilities. The program’s first students (14) graduated from MEPhI in February 2007. Similar-sized classes are graduating from MEPhI each February. All of the EDP graduates are working in the S&S field, many at nuclear facilities. TPU also established an EDP and graduated its first class of approximately 18 students in February 2009. For each of these degree programs, the American project team works with MEPhI and TPU to develop appropriate curriculum, identify and acquire various training aids, develop and publish textbooks, and strengthen instructor skills. The project has also supported the instruction of policy-oriented nonproliferation courses at various Russian universities. These courses are targeted towards future workers in the nuclear field to help build an effective nonproliferation awareness within the nuclear complex. A long-range goal of this project is to assist the educational programs at MEPhI and TPU in becoming self-sustainable and therefore able to maintain the three degree programs without DOE support. This paper describes current development of these education programs and new initiatives. The paper also describes general nonproliferation education activities supported by DOE that complement the more technical S&S degree programs.« less
45 CFR 2400.62 - Evidence of master's degree.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 4 2014-10-01 2014-10-01 false Evidence of master's degree. 2400.62 Section 2400... FELLOWSHIP FOUNDATION FELLOWSHIP PROGRAM REQUIREMENTS Special Conditions § 2400.62 Evidence of master's... indicates that he or she has secured an approved master's degree as set forth in the Fellow's original Plan...
45 CFR 2400.62 - Evidence of master's degree.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 4 2013-10-01 2013-10-01 false Evidence of master's degree. 2400.62 Section 2400... FELLOWSHIP FOUNDATION FELLOWSHIP PROGRAM REQUIREMENTS Special Conditions § 2400.62 Evidence of master's... indicates that he or she has secured an approved master's degree as set forth in the Fellow's original Plan...
45 CFR 2400.62 - Evidence of master's degree.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 4 2012-10-01 2012-10-01 false Evidence of master's degree. 2400.62 Section 2400... FELLOWSHIP FOUNDATION FELLOWSHIP PROGRAM REQUIREMENTS Special Conditions § 2400.62 Evidence of master's... indicates that he or she has secured an approved master's degree as set forth in the Fellow's original Plan...
(Congressional Interest) Institute for Science, Space and Security (ISSS)
2012-03-19
Studies program between UCCS and University of Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb ...security and assist the University of Zagreb in establishing a regional (Eastern Europe) Center of Excellence in Homeland Security. In the long-term...UCCS will assist the University of Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees
First Responders: Community Colleges on the Front Line of Security
ERIC Educational Resources Information Center
American Association of Community Colleges, 2006
2006-01-01
Although homeland security has gained prominence as a national focus and investment, it is clear that much of the most effective preparation must begin at local, state, and regional levels. This report reveals that an astonishing number of community colleges offer degree and certificate programs for first responders--law enforcement officers,…
Have the Mexican Drug Cartels Evolved into a Terrorist Insurgency?
2013-06-14
Command and General Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE Homeland Security......Director, Graduate Degree Programs Robert F. Baumann, Ph.D. The opinions and conclusions expressed herein are those of the student author and do not
- Oklahoma Water Resources Center
INTERDISCIPLINARY PROGRAMS Environmental Sciences Master of International Agriculture Degree Program OSU Home Professional Development Training (Baton Rouge, LA; 8/5-10) Global Water Security for Agriculture and Natural Oklahoma City Center for Health Sciences Division of Agriculture Institute of Technology Veterinary
Protecting proprietary rights - A potential Shuttle user's view
NASA Technical Reports Server (NTRS)
Day, J. B.
1977-01-01
Maintaining a high degree of industrial security in the multiple-payload Shuttle environment poses a number of problems for NASA. As a part of Battelle-Columbus' support of NASA's User Development Program, this paper presents a potential user's perspective on this situation. The need for security, the nature of the problem, and precedents for NASA security measures are discussed. Eleven policy guidelines representing desirable features from a potential user's viewpoint are presented for NASA consideration.
76 FR 59733 - Privacy Act of 1974, as Amended; Notice To Amend an Existing System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-27
... name, alias, address, date of birth, social security number, blood degree, enrollment/BIA number, date... suspected or confirmed compromise there is a risk of harm to economic or property interest, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs whether...
Fragmentation in social security old-age benefit provision in China.
Chen, Tianhong; Turner, John A
2015-01-01
Currently, in many countries most workers are covered by a national social security benefits program that applies equally in all parts of the country. In China, however, social security old-age benefits are provided in a highly fragmented manner. This article documents the high degree of fragmentation. It discusses both why that has occurred and the effects of the fragmentation on participants. It examines effects of the fragmentation on benefit levels, focusing on variations in the generosity of benefit formulas but also considering other measures of benefit adequacy. Fragmentation is seen to cause differences in benefit levels even within a single city. While the new National Rural Pension Scheme is a major improvement in the provision of retirement security for rural workers, important differences still exist in the social security programs for urban and rural workers.
Effect of postsecondary education on the economic status of persons who are deaf or hard of hearing.
Schley, Sara; Walter, Gerard G; Weathers, Robert R; Hemmeter, Jeffrey; Hennessey, John C; Burkhauser, Richard V
2011-01-01
This article examines the effect that postsecondary education has on earnings and the duration of time spent in the Social Security disability programs for young persons who are deaf or hard of hearing. Our hypothesis is that investments in postsecondary training increase the likelihood of employment for persons who are deaf or hard of hearing and thus reduce dependency on disability-related income support programs. A longitudinal data set based upon records from the National Technical Institute for the Deaf and Social Security administrative records is used for this analysis. We find that those who graduate, even those who graduate with vocational degrees, experience significant earnings benefits and reductions in the duration of time spent on federal disability programs when compared with those who do not graduate with a degree. This finding suggests that reductions in the duration of time spent on Social Security programs are not limited to those with the highest level of scholastic aptitude and that investments in post-secondary education can benefit a broad group of deaf and hard-of-hearing persons. In addition, the data show that individuals who attend college, but withdraw before graduation, fair no better economically than individuals who never attended college.
Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.
Caruso, Ronald D
2003-01-01
Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003
A Proposed Model for PSDS Admissions. Technical Report Number 15.
ERIC Educational Resources Information Center
Melendrez, Gilbert; And Others
The purpose of the Program of Special Directed Studies (PSDS) is: (1) to identify a group of secondary school seniors and recent graduates with marked intellectual ability and potential for academic attainment whose achievement, as measured by standard tests and school records, is inadequate to secure admission to degree programs at accredited and…
Nuclear Security Education Program at the Pennsylvania State University
DOE Office of Scientific and Technical Information (OSTI.GOV)
Uenlue, Kenan; The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304; Jovanovic, Igor
The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basismore » of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory.« less
International Nuclear Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Doyle, James E.
2012-08-14
This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; andmore » (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.« less
Information Security Considerations for Applications Using Apache Accumulo
2014-09-01
Distributed File System INSCOM United States Army Intelligence and Security Command JPA Java Persistence API JSON JavaScript Object Notation MAC Mandatory... MySQL [13]. BigTable can process 20 petabytes per day [14]. High degree of scalability on commodity hardware. NoSQL databases do not rely on highly...manipulation in relational databases. NoSQL databases each have a unique programming interface that uses a lower level procedural language (e.g., Java
32 CFR 154.17 - Special access programs.
Code of Federal Regulations, 2012 CFR
2012-07-01
...) Presidential aircrew and associated maintenance and security personnel. (2) Personnel assigned to the White... Support areas, activities, or equipment—including maintenance of the Presidential retreat, communications, and aircraft. (C) Individuals in designated units requiring a lesser degree of access to the President...
32 CFR 154.17 - Special access programs.
Code of Federal Regulations, 2013 CFR
2013-07-01
...) Presidential aircrew and associated maintenance and security personnel. (2) Personnel assigned to the White... Support areas, activities, or equipment—including maintenance of the Presidential retreat, communications, and aircraft. (C) Individuals in designated units requiring a lesser degree of access to the President...
32 CFR 154.17 - Special access programs.
Code of Federal Regulations, 2011 CFR
2011-07-01
...) Presidential aircrew and associated maintenance and security personnel. (2) Personnel assigned to the White... Support areas, activities, or equipment—including maintenance of the Presidential retreat, communications, and aircraft. (C) Individuals in designated units requiring a lesser degree of access to the President...
32 CFR 154.17 - Special access programs.
Code of Federal Regulations, 2014 CFR
2014-07-01
...) Presidential aircrew and associated maintenance and security personnel. (2) Personnel assigned to the White... Support areas, activities, or equipment—including maintenance of the Presidential retreat, communications, and aircraft. (C) Individuals in designated units requiring a lesser degree of access to the President...
ERIC Educational Resources Information Center
Black, Rachel; Huelsman, Mark
2012-01-01
The rise in student loan debt has directed critical attention to the growing pace of college costs as well as the reliance on loans to finance those costs. For graduates entering the workforce in recent years, many are finding that they are unable to find the type of job they thought they were securing when they received their degree, if they are…
Security Force Assistance Logistics: The Key to Self-Reliance?
2011-05-19
internal defense – the umbrella term that SFA falls under – and directly linked to assisting the foreign security force (FSF) “with the procurement...ideology.6 To some extent or another logistics figures prominently under the umbrella of military advising, so there is understandably a certain degree...billion” under the Mutual Defense Assistance Program (MDAP), which “included more than 1,100 medium-gun M47 and M48 Patton tanks, 152 light-gun tanks
2012-03-01
security education . According to statistical data collected and published by Indiana University for graduation years 2005–2006 through 2009–2010, between... education efforts to the already existing programs of public administration within colleges and universities in Indiana. By using survey data collected...right direction, but it is limiting in scope. According to the National Center for Education Statistics , 23,493 bachelor’s degrees were awarded to
A Security Assistance Example, the U.S. Air Force and the African Coastal Security Program
1989-04-01
Mauritania’s air unit, attached to the army and called the Groupement Aerienne de la Republique Islamique de Mauritanie 15 (GARIM), has two Piper Cheyennes for...degree these countries effectively use these aircraft is a major question. The GARIM, for instance, has had problems financing its flying hours and...obtain financing from another source, assistance from the United States to improve the airpower capability in the region is highly unlikely. Within the
2010-01-01
Circulation in the Indonesian Seas: 1/12 degree Global HYCOM and the INSTANT Observations 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM...SUPPLEMENTARY NOTES 14. ABSTRACT A l/l 2 global version of the HYbrid Coordinate Ocean Model (HYCOM) using 3-hourly atmospheric forcing is analyzed and...TERMS Indonesian Throughflow, global HYCOM, INSTANT, Inter-ocean exchange, ocean modeling 16. SECURITY CLASSIFICATION OF: a. REPORT Unclassified b
International Internships in Nuclear Safeguards and Security: Challenges and Successes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duncan, Cristen L.; Heinberg, Cynthia L.; Killinger, Mark H.
2010-04-20
All students in the Russian safeguards and security degree programs at the National Research Nuclear University MEPhI and Tomsk Polytechnic University, sponsored by the Material Protection, Control and Accounting (MPC&A) Education Project, take part in a domestic internship at a Russian enterprise or facility. In addition, a select few students are placed in an international internship. These internships provide students with a better view of how MPC&A and nonproliferation in general are addressed outside of Russia. The possibility of an international internship is a significant incentive for students to enroll in the safeguards and security degree programs. The U.S. membersmore » of the MPC&A Education Project team interview students who have been nominated by their professors. These students must have initiative and reasonable English skills. The project team and professors then select students to be tentatively placed in various international internships during the summer or fall of their final year of study. Final arrangements are then made with the host organizations. This paper describes the benefits of the joint United States/Russia cooperation for next-generation workforce development, some of the international internships that have been carried out, the benefits of these international internships, and lessons learned in implementing them.« less
Sharing Ideas: Tough Times Encourage Colleges to Collaborate
ERIC Educational Resources Information Center
Fain, Paul; Blumenstyk, Goldie; Sander, Libby
2009-01-01
Tough times are encouraging colleges to share resources in a variety of areas, including campus security, research, and degree programs. Despite its veneer of cooperation, higher education is a competitive industry, where resource sharing is eyed warily. But the recession is chipping away at that reluctance, and institutions are pursuing…
Colleges Play Crucial Role in Military's Restructuring
ERIC Educational Resources Information Center
Fischer, Karin
2009-01-01
Across the U.S., colleges like Anne Arundel Community College (Maryland) are devising strategies and designing curricula to meet the demands created by the substantial troop shifts. They are adding degree and certificate programs and refashioning or expanding others, in areas as diverse as network security, procurement and contracting, and…
2011-10-24
Operations Management Track in the established B.S. in Global Security and Intelligence Studies Degree offered at Embry-Riddle Aeronautical University...and a model 4 -year college curriculum for a BS degree in Security Operations Management
National Guard State Partnership Program: Measuring Effectiveness
2013-06-14
and General Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE Homeland Security...Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 ii MASTER OF MILITARY ART AND SCIENCE THESIS APPROVAL PAGE Name of Candidate: MAJ Andrew O...OF MILITARY ART AND SCIENCE THESIS APPROVAL PAGE ............ iii ABSTRACT
ERIC Educational Resources Information Center
Flower, Alonzo M., III.
2014-01-01
Scientific and technological innovation, according to a report by the National Academy of Sciences (2007), can only be secured with individuals' success in science, technology, engineering, and mathematics (STEM). Because STEM remains White and male-dominated, programs that focus on increasing the participation of female and minority students has…
Rep. Issa, Darrell E. [R-CA-49
2009-10-01
House - 10/19/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Development of Amphibious Doctrine
2010-06-11
Graduate Degree Programs Robert F. Baumann, Ph.D. The opinions and conclusions expressed herein are those of the student author and do not...battalion composed of six companies of Marines, its commander, Lieutenant Colonel Robert W. Huntington, finally received the mission of securing an...42,000 men. The participants included the Commanding Officer, Marine Corps Schools, Colonel Robert Dunlap, as well as the students and instructors
[Important issues of biological safety].
Onishchenko, G G
2007-01-01
The problem of biological security raises alarm due to the real growth of biological threats. Biological security includes a wide scope of problems, the solution of which becomes a part of national security as a necessary condition for the constant development of the country. A number of pathogens, such as human immunodeficiency virus, exotic Ebola and Lassa viruses causing hemorrhagic fever,rotaviruses causing acute intestinal diseases, etc. were first discovered in the last century. Terrorist actions committed in the USA in 2001 using the anthrax pathogen made the problem of biological danger even more important. In Russian Federation, biological threats are counteracted through the united state policy being a part of general state security policy. The biological Security legislation of Russian Federation is chiefly based on the 1992 Federal Law on Security. On the basis of cumulated experience, the President of Russia ratified Basics of Russian Federation's State Policy for Chemical and Biological Security for the Period through 2010 and Beyond on 4 December, 2003. The document determines the main directions and stages of the state development in the area of chemical and biological security. The Federal target program Russian Federation's National Program for Chemical and Biological Security is being developed, and its development is to be completed soon in order to perfect the national system for biological security and fulfill Basics of Russian Federation's State Policy for Chemical and Biological Security for the Period through 2010 and Beyond, ratified by the President. The new global strategy for control over infectious diseases, presented in the materials of Saint Petersburg summit of the Group of Eight, as well as the substantive part of its elements in Sanitary International Standards, are to a large degree an acknowledgement of the Russian Federation's experience and the algorithm for fighting extremely dangerous infections. This Russia's experience has resulted in the following global achievements: smallpox elimination in the USSR (1936); the USSR's suggestions on the program of smallpox elimination in the world and 2 billion doses of the vaccine transferred to the possession of the WHO (since 1958); the global elimination of the disease (1980); effective control over avian influenza at the epizootic stage, recognized internationally at Beijing International Congress, 17-18 January, 2006.
Xu, Mei; Liu, Chun la; Li, Dan; Zhong, Xiao Lin
2017-11-01
Tourism ecological security early warning is of great significance both to the coordination of ecological environment protection and tourism industry rapid development in tourism destination, and the sustainable and healthy development of regional social and economy. Firstly, based on the DPSIR model, the tourism ecological security early warning index system of Zhangjiajie was constructed from 5 aspects, which were driving force, pressure, state, impact and response. Then, by using the improved TOPSIS method, the tourism ecological security situation of Zhangjiajie from 2001 to 2014 was analyzed. Lastly, by using the grey GM (1,1) model, the tourism ecological security evolution trend of 2015-2020 was predicted. The results indicated that, on the whole, the close degree of Zhangjiajie's tourism ecological security showed a slightly upward trend during 2001-2014, the warning degree was the moderate warning. In terms of each subsystem, warning degree of the driving force system and the pressure system of Zhangjiajie's tourism ecological secu-rity were on the rise, which evolved from light warning to heavy warning; warning degree of the state system and the impact system had not changed so much, and had been in the moderate warning; warning degree of the response system was on the decline, which changed from huge warning to no warning during 2001-2014. According to the current development trend, the close degree of Zhangjiajie's tourism ecological security would rise further in 2015-2020, and the warning degree would turn from moderate warning into light warning, but the task of coordinating the relationship between tourism development and ecological construction and environmental protection would be still arduous.
Millennials at Work: The Advice of Great Leaders
2015-04-01
Millennials at Work The Advice of Great Leaders Carol Axten Axten has more than 30 years of experience in Defense Department engineering, program...management, and policy development. She has graduate degrees in business , engineering, international relations, and national security resource strategy...million members of the millennial generation will enter the workforce and by 2030 will make up 75 percent of all working professionals. As managers in the
An online survey of chiropractors' opinions of continuing education
Stuber, Kent J; Grod, Jaroslaw P; Smith, Dean L; Powers, Paul
2005-01-01
Background Continuing Education (CE) for chiropractors is mandatory for licensure in most North American jurisdictions. Numerous chiropractic colleges have begun collaborating with universities to offer master's degree programs. Distance education master's degree programs may be desirable to allow full-time practicing doctors to further their post-graduate education. The present survey sought to answer three questions. First, what is the level of satisfaction of chiropractors with their continuing education? Second, what is the level of interest of chiropractors in online master's degree programs? Lastly, what is the response rate of chiropractors to an online survey? Methods An online survey consisting of 22 multiple choice questions was e-mailed to 1000 chiropractors randomly selected from the mailing list of an online chiropractic newsletter. Upon completion of the questionnaire, participants' answers were saved on a secure site. Data analysis included evaluation of the demographic characteristics of the respondents, their opinions of and patterns of taking CE including online education, preferred learning formats, and their interest in proposed online master's degree programs. A survey response rate was determined. Results Nearly 86% of respondents felt their previously completed CE courses were either somewhat or extremely satisfactory. Over ninety percent of respondents who had completed online or distance CE coursesfound them to be somewhat or extremelysatisfactory. Almost half the respondents indicated that they most preferred online distance learning, while 34.08% most preferred face-to-face interaction. Fifty-three percent of respondents indicated an interest in starting a master's degree program; however 70.46% of respondents were interested in an online master's degree program that would offer CE credit. A response rate of 35.8% was obtained. Conclusion Satisfaction among chiropractors with CE programs is high. The notion of completing a part-time online master's degree (or online combined with face-to-face interaction) appears to be popular among respondents, with a M.Sc. in Chiropractic Sciences being the most popular of those mentioned. Online surveys are a viable method of obtaining opinion in a cost and time efficient manner; there are some sources of bias involved in this type of research, and numerous steps need to be taken to obtain a suitable response rate. PMID:16242035
Security Force Assistance: What Right Looks Like
2013-03-01
manuscript is submitted in partial fulfillment of the requirements of the Master of Strategic Studies Degree. The views expressed in this student academic...Education Accreditation. The views expressed in this student academic research paper are those of the author and do not reflect the official policy...partner capacity the institution can learn from the program executed by the U.S. Army Europe (USAREUR) to assist the Romanian Land Forces. The
Air Force Journal of Logistics. Volume 34, Numbers 3 and 4, 2011
2011-01-01
best value. Since these scores are mathematically derived, they violate some agencies* procurement policies (those that require qualitative ratings...the trust fund assets will be exhausted and Social Security will lack the resources to pay all promised benefits. According to SSA actuaries ...education programs (masters degrees) than either the Air Force or the Army. This was quite surprising. Mathematical Model to Determine Senior Officers
Defense AT&L (Volume 37, Number 2, March-April 2008)
2008-04-01
environment. Operational suit- ability is the degree to which a system can be satisfactorily placed in field use, with consideration given to reliability...devise the most effective test-and-evaluation strategy. Whenever possible, the program should be developed and fielded in small increments and provided... ability to control access to design-related informa- tion and availability of technology, and it will raise grave security considerations. Do you develop
A Weakest Precondition Approach to Robustness
NASA Astrophysics Data System (ADS)
Balliu, Musard; Mastroeni, Isabella
With the increasing complexity of information management computer systems, security becomes a real concern. E-government, web-based financial transactions or military and health care information systems are only a few examples where large amount of information can reside on different hosts distributed worldwide. It is clear that any disclosure or corruption of confidential information in these contexts can result fatal. Information flow controls constitute an appealing and promising technology to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in the area of language-based security. Robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is unable to disclose more private information than a passive attacker, who merely observes unclassified data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from public output towards private input. The choice of semantics allows us to distinguish between different attacks models and to characterize the security of applications in different scenarios.
Business Administration and Computer Science Degrees: Earnings, Job Security, and Job Satisfaction
ERIC Educational Resources Information Center
Mehta, Kamlesh; Uhlig, Ronald
2017-01-01
This paper examines the potential of business administration vs. computer science degrees in terms of earnings, job security, and job satisfaction. The paper focuses on earnings potential five years and ten years after the completion of business administration and computer science degrees. Moreover, the paper presents the income changes with…
Mortimer, Jeylan T.; Staff, Jeremy
2016-01-01
Rising costs of higher education have prompted debate about the value of college degrees. Using mixed effects panel models of data from the Youth Development Study (ages 31–37), we compare occupational outcomes (i.e., weekly hours worked, earnings, employment status, career attainment, and job security) between educational attainment categories within year, and within categories across years, from 2005 to 2011, capturing the period before, during, and in the aftermath of the Great Recession. Our findings demonstrate the long-term value of post-secondary degrees. Bachelor’s and Associate’s degree recipients, while experiencing setbacks at the height of recession, were significantly better off than those with some or no college attendance. Vocational-Technical degree holders followed a unique trajectory: pre-recession, they are mostly on par with Associate’s and Bachelor’s recipients, but they are hit particularly hard by the recession and then rebound somewhat afterwards. Our findings highlight the perils of starting but not finishing post-secondary educational programs. PMID:26973042
Vuolo, Mike; Mortimer, Jeylan T; Staff, Jeremy
2016-05-01
Rising costs of higher education have prompted debate about the value of college degrees. Using mixed effects panel models of data from the Youth Development Study (ages 31-37), we compare occupational outcomes (i.e., weekly hours worked, earnings, employment status, career attainment, and job security) between educational attainment categories within year, and within categories across years, from 2005 to 2011, capturing the period before, during, and in the aftermath of the Great Recession. Our findings demonstrate the long-term value of post-secondary degrees. Bachelor's and Associate's degree recipients, while experiencing setbacks at the height of recession, were significantly better off than those with some or no college attendance. Vocational-Technical degree holders followed a unique trajectory: pre-recession, they are mostly on par with Associate's and Bachelor's recipients, but they are hit particularly hard by the recession and then rebound somewhat afterwards. Our findings highlight the perils of starting but not finishing post-secondary educational programs. Copyright © 2016 Elsevier Inc. All rights reserved.
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
49 CFR 1542.113 - Airport tenant security programs.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 9 2012-10-01 2012-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...
2009-12-01
the degree of MASTER OF SCIENCE IN DEFENSE ANALYSIS From the NAVAL POSTGRADUATE SCHOOL December 2009 Author: C. Tim...rich agricultural production of wines , alcoholic beverages, and citrus fruits combined with its Black Sea coast tourist industry and black market...This U.S. assistance includes Freedom Support Act (FSA) programs, food aid (United States Department of Agriculture (USDA), Peace Corps, and security
Asymmetric Threat to U.S National Security to the Year 2010
2001-01-01
Director, Graduate Degree Programs Philip J. Brookes, Ph.D. The opinions and conclusions expressed herein are those of the...11Ashton Carter, John Deutch, and Philip Zelikow, “Catastrophic Terrorism: Tackling the New Danger,” Foreign Affairs 77,no. 6 (November-December 1998... Kotler , “Guerrillas to Study Curbing the Use of Terrifying Homemade Missiles,” Fort Worth Star-Telegram (13 February 2001), A3. 20V.K. Nair, War in the
NASA Astrophysics Data System (ADS)
Perry, William G.
2006-04-01
One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.
12 CFR 168.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...
12 CFR 568.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Security program. 568.3 Section 568.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...
12 CFR 391.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for business...
12 CFR 168.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...
12 CFR 391.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for business...
Purdue University graduate certificate program in Veterinary Homeland Security.
Amass, Sandra F; Blossom, Thaddaeus D; Ash, Marianne; McCay, Don; Mattix, Marc E
2008-01-01
Our nation lacks a critical mass of professionals trained to prevent and respond to food- and animal-related emergencies. Training veterinarians provides an immediate means of addressing this shortage of experts. Achievement of critical mass to effectively address animal-related emergencies is expedited by concurrent training of professionals and graduate students in related areas. Purdue University offers a Web-based Graduate Certificate in Veterinary Homeland Security to address this special area of need. The program is a collaborative effort among the Purdue University School of Veterinary Medicine, the Purdue Homeland Security Institute, the Indiana State Board of Animal Health, the Indiana State Police, and others with the overall goal of increasing capacity and preparedness to manage animal-related emergencies. Individuals with expertise in veterinary medicine, public health, animal science, or homeland security are encouraged to participate. The Web-based system allows courses to be delivered efficiently and effectively around the world and allows participants to continue their graduate education while maintaining full-time jobs. Participants enhance their understanding of natural and intentional threats to animal health, strengthen their skills in managing animal-health emergencies, and develop problem-solving expertise to become effective members of animal emergency response teams and of their communities. Students receive graduate credit from Purdue University that can be used toward the certificate and toward an advanced graduate degree. Currently, 70 participants from 28 states; Washington, DC; Singapore; and Bermuda are enrolled.
From Fault-Diagnosis and Performance Recovery of a Controlled System to Chaotic Secure Communication
NASA Astrophysics Data System (ADS)
Hsu, Wen-Teng; Tsai, Jason Sheng-Hong; Guo, Fang-Cheng; Guo, Shu-Mei; Shieh, Leang-San
Chaotic systems are often applied to encryption on secure communication, but they may not provide high-degree security. In order to improve the security of communication, chaotic systems may need to add other secure signals, but this may cause the system to diverge. In this paper, we redesign a communication scheme that could create secure communication with additional secure signals, and the proposed scheme could keep system convergence. First, we introduce the universal state-space adaptive observer-based fault diagnosis/estimator and the high-performance tracker for the sampled-data linear time-varying system with unanticipated decay factors in actuators/system states. Besides, robustness, convergence in the mean, and tracking ability are given in this paper. A residual generation scheme and a mechanism for auto-tuning switched gain is also presented, so that the introduced methodology is applicable for the fault detection and diagnosis (FDD) for actuator and state faults to yield a high tracking performance recovery. The evolutionary programming-based adaptive observer is then applied to the problem of secure communication. Whenever the tracker induces a large control input which might not conform to the input constraint of some physical systems, the proposed modified linear quadratic optimal tracker (LQT) can effectively restrict the control input within the specified constraint interval, under the acceptable tracking performance. The effectiveness of the proposed design methodology is illustrated through tracking control simulation examples.
Environmental control and life support system: Analysis of STS-1
NASA Technical Reports Server (NTRS)
Steines, G.
1980-01-01
The capability of the orbiter environmental control and life support system (ECLSS) to support vehicle cooling requirements in the event of cabin pressure reduction to 9 psia was evaluated, using the Orbiter versions of the shuttle environmental consumbles usage requirement evaluation (SECURE) program, and using heat load input data developed by the spacecraft electrical power simulator (SEPS) program. The SECURE model used in the analysis, the timeline and ECLSS configuration used in formulating the analysis, and the results of the analysis are presented. The conclusion which may be drawn drom these results. is summarized. There are no significant thermal problems with the proposed mission. There are, however, several procedures which could be optimized for better performance: setting the cabin HX air bypass and the interchanger water bypass to the zero flow position is of questionable efficacy; the cabin air pressure monitoring procedure should be re-evaluated; and the degree of equipment power down specified for this analysis and no problems were noted.
Chow, Chong Man; Ruhl, Holly; Buhrmester, Duane
2015-11-01
The formation of romantic relationships and friendships in adolescence is a defining milestone in the progression toward social maturity. Thus, examining adolescents' friendship and romantic experiences serves a vital role in understanding their psychological adjustment. The main purposes of the current study were to examine (a) whether romantic involvement, romantic security, and friendship closeness were independently predictive of late adolescents' depression and loneliness, and (b) whether friendship closeness would moderate the negative effects of adolescents' lower degrees of romantic involvement and romantic security on depression and loneliness. Data came from 12th grade adolescents (N = 110, 53 females) as well as their parents and a same-sex best friend. Adolescents reported on their romantic involvement, romantic security, and psychological distress. Parent reports of adolescents' depressive symptoms and friend reports of friendship closeness were also included. Higher degrees of romantic involvement and friendship closeness were related to lower degrees of loneliness. Higher degrees of romantic security were related to lower degrees of depression and loneliness. The effect of romantic involvement on depression and loneliness was moderated by friendship closeness. Also, the effect of romantic security on loneliness was moderated by friendship closeness. Future research should focus on the interactive roles that friendships and romantic relationships play in the emergence of psychopathology during adolescence. © The Author(s) 2015.
75 FR 18872 - Ginnie Mae Multiclass Securities Program Documents
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
... Securities Program Documents AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice. SUMMARY... with the Multiclass Securities Program. The intent of the Multiclass Securities program is to increase... Securities Program Documents. OMB Approval Number: 2503-0030. Form Numbers: None. Description of the Need for...
12 CFR 748.0 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security program...
12 CFR 748.0 - Security program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security program...
49 CFR 1546.103 - Form, content, and availability of security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Form, content, and availability of security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a...
49 CFR 1546.103 - Form, content, and availability of security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Form, content, and availability of security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a...
2003-06-06
Graduate Degree Programs Philip J. Brookes, Ph.D. The opinions and conclusions expressed herein are those of the student author and do not necessarily...hope I will be forgiven if I only mention a few: Prof. Ernest Evans, Dr. Philip Brookes, Mrs. Helen Davis, Mrs. Jacqueline Goulbourne, Ms. Mary Glaser...the Caribbean. Jamaica has had a number of confrontations, particularly with Honduras, regarding illegal fishing at its Pedro and Morant Cays. This
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
49 CFR 1548.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1987-12-31
This report also provides data on the initiatives being implemented as a result of the review of domestic airport security by the Secretary’s Safety...enforcement support for airline and airport security measures. Finally, the passengers-the ultimate beneficiaries of the security program--pay for...of these airports is required to implement a security program which provides a secure operating environment for these air carriers. Airport security programs
Effectiveness of the Civil Aviation Security Program.
1979-12-05
The airline and airport security measures currently in effect continue to provide increased safety for airline passengers and crews as well as...107 governing airport security . other ongoing programs which contributed significantly to airport security included the training of law enforce- ment...officers supporting airport security programs and the explosives detection K(9 team program. Highlights of these actions and programs are summarized
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
49 CFR 1542.111 - Exclusive area agreements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...
The ethical aspects of regulating production.
Swanson, J C
2008-02-01
Polls and surveys conducted within the United States show general agreement that there is public support for the protection of farm livestock and poultry. Concurrent with the growing public sentiment is the recent adoption of socially responsible corporate policies by major food retailers relative to animal welfare. The animal welfare assurance and audit programs developed by the private sector are an attempt to assure consumers that best practice measures and independent oversight result in a reasonable quality of life for food-producing animals. These programs represent voluntary self-regulation and arguably a market-based approach to secure the welfare of food-producing animals. Animal advocacy organizations historically seek regulatory oversight of animal care practice. Legislative routes that require government promulgation and enforcement of animal care regulations represent an involuntary form of animal welfare assurance. There are ethical considerations concerning the employment of voluntary or involuntary regulation of the welfare of food-producing animals. For example, degree of public endangerment, economic impact, viability of small to medium producers, food price, food quality, and food security are prominent among the ethical considerations in deliberating whether to impose regulatory mandates on production. In either regulatory approach, the public must be convinced that the welfare of food-producing animals can be secured in a transparent and convincing manner.
44 CFR 8.3 - Senior FEMA official responsible for the information security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the Security...
University of Texas Safeguards by Design Problem Statement
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rauch, Eric Benton; Scherer, Carolynn P.; Ruggiero, Christy E.
This document describes the problem statement that students at the University of Texas will use for their senior level capstone design class. The purpose of this project is to introduce students to Safeguards by Design concepts as part of their capstone design course at the culmination of their degree program. This work is supported by Los Alamos National Laboratory with FY17 and FY18 programmatic funding from the U. S. Department of Energy’s (DOE) National Nuclear Security Administration (NNSA), through the Office of Defense Nuclear Nonproliferation (DNN), Office of International Nuclear Safeguards (INS), Next Generation Safeguards Initiative (NGSI), Human Resource Developmentmore » Program, Safeguards by Design Project.« less
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1983-01-01
The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.
5 CFR 1312.12 - Security Program Review Committee.
Code of Federal Regulations, 2011 CFR
2011-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Security Program Review Committee. 1312...
5 CFR 1312.12 - Security Program Review Committee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security Program Review Committee. 1312...
[Ecological security early-warning in Zhoushan Islands based on variable weight model].
Zhou, Bin; Zhong, Lin-sheng; Chen, Tian; Zhou, Rui
2015-06-01
Ecological security early warning, as an important content of ecological security research, is of indicating significance in maintaining regional ecological security. Based on driving force, pressure, state, impact and response (D-P-S-I-R) framework model, this paper took Zhoushan Islands in Zhejiang Province as an example to construct the ecological security early warning index system, test degrees of ecological security early warning of Zhoushan Islands from 2000 to 2012 by using the method of variable weight model, and forecast ecological security state of 2013-2018 by Markov prediction method. The results showed that the variable weight model could meet the study needs of ecological security early warning of Zhoushan Islands. There was a fluctuant rising ecological security early warning index from 0.286 to 0.484 in Zhoushan Islands between year 2000 and 2012, in which the security grade turned from "serious alert" into " medium alert" and the indicator light turned from "orange" to "yellow". The degree of ecological security warning was "medium alert" with the light of "yellow" for Zhoushan Islands from 2013 to 2018. These findings could provide a reference for ecological security maintenance of Zhoushan Islands.
7 CFR 772.6 - Subordination of security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.6 Subordination of security. (a) Eligibility. The Agency shall grant a subordination of Minor Program loan security when the transaction will... still be adequately secured after the subordination, or the value of the loan security will be increased...
Mazerolle, Stephanie M; Dodge, Thomas M
2012-01-01
Anecdotally, we know that students select graduate programs based on location, finances, and future career goals. Empirically, however, we lack information on what attracts a student to these programs. To gain an appreciation for the selection process of graduate study. Qualitative study. Postprofessional programs in athletic training (PPATs) accredited by the National Athletic Trainers' Association. A total of 19 first-year PPAT students participated, representing 13 of the 16 accredited PPAT programs. All interviews were conducted via phone and transcribed verbatim. Analysis of the interview data followed the procedures as outlined by a grounded theory approach. Trustworthiness was secured by (1) participant checks, (2) participant verification, and (3) multiple analyst triangulations. Athletic training students select PPAT programs for 4 major reasons: reputation of the program or faculty (or both), career intentions, professional socialization, and mentorship from undergraduate faculty or clinical instructors (or both). Participants discussed long-term professional goals as the driving force behind wanting an advanced degree in athletic training. Faculty and clinical instructor recommendations and the program's prestige helped guide the decisions. Participants also expressed the need to gain more experience, which promoted autonomy, and support while gaining that work experience. Final selection of the PPAT program was based on academic offerings, the assistantship offered (including financial support), advanced knowledge of athletic training concepts and principles, and apprenticeship opportunities. Students who attend PPAT programs are attracted to advancing their entry-level knowledge, are committed to their professional development as athletic trainers, and view the profession of athletic training as a life-long career. The combination of balanced academics, clinical experiences, and additional professional socialization and mentorship from the PPAT program experience will help them to secure their desired career positions.
Use of concept mapping to explore the influence of food security on food buying practices.
Walker, Renee E; Kawachi, Ichiro
2012-05-01
Paradoxically, individuals with food insecurity have been observed to have higher rates of obesity compared with their counterparts with food security. The factors influencing food purchasing behaviors in households with food security vs food insecurity are poorly understood. Using the mixed methods approach of concept mapping, we examined the perceptions and preferences driving the food purchasing behaviors of households with food security vs food insecurity. Twenty-six men and women with food security and 41 men and women with food insecurity from four neighborhoods in Boston, MA, completed the concept mapping process during 2010. Prevalence of overweight and obesity was greater among participants with food insecurity (80.5%) compared with those with food security (61.5%). Participants identified 163 unique factors that influenced their food purchasing behavior. Using multivariate analyses, these factors were grouped into eight unique concepts or clusters that reflected their perceptions of factors hindering healthy eating. Average cluster ratings were similar between participants with food security and food insecurity, suggesting that similar food purchasing behaviors are employed and are perceived similarly in how they hinder or promote healthy eating. The use of emergency food assistance programs may play a role in minimizing the burden of food insecurity while providing access to foods with varying degrees of nutritional quality that may be associated with increased risk of overweight and obesity observed in individuals and households with food insecurity. Copyright © 2012 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.
15 CFR 2008.16 - Security education program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures for...
2009-04-21
6 Intercity Passenger Rail Program (Amtrak) .....................................................................6... Intercity Bus Security Grant Program..............................................................................7 Trucking Security Program...continue security enhancements for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-16
... measure their effectiveness. Through its voluntary Corporate Security Review (CSR) Program, TSA's Highway... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Approval From OMB of One New Public Collection of Information: Security Program for Hazardous Materials Motor...
Exploring the youth experience about sense of social security: a qualitative study.
Chinekesh, Ahdieh; Hosseini, Seyed Ali; Mohammadi, Farahnaz; Motlagh, Mohammad Esmael; Eftekhari, Monir Baradaran; Ardalan, Gelayol; Djalalinia, Shirin
2017-12-01
Undoubtedly, one of the vital needs of man is security. Determinants and related factors to sense of social security is one of the most important research priorities, especially in adolescents and young people. To identify the factors affecting the social security of the youth. In 2017, using conventional content analysis, and benefiting from semi-structured in-depth interviews, we conducted a qualitative study exploring the opinions of young people about their feelings regarding social security. First, a targeted sampling method was determined to collect the data. Participants were young volunteers aged 18 to 30 who were selected from Tehran, the capital of Iran. Inclusion criteria for participants were willingness to participate in the study and ability to express their experiences. Data was extracted from 21 participants. The participants consisted of 21 young people who met the study inclusion criteria, of whom 12 participants were male. Their mean age was 24.4±0.41 years and their education varied from primary school to master's degree. Under two main categories of the need for economic and financial security and the need for a safe society, we extracted 11 subcategories following 32 codes. According to the findings, most participants agreed on the important role that sense of social security has in their lives and their health. The important role of sense of social security in participant's lives and health was the main important point of our findings, emphasized by most of participants. Based on the results; the assessment of the specific needs of different target groups, the design, development and implementation of health programs led to more effective interventions.
Security Science as an Applied Science?
ERIC Educational Resources Information Center
Smith, Clifton
2001-01-01
Describes the development of a security science degree as the emerging applied science of the protection of individuals and assets. Proposes the themes of physical, electronic, information security and facility management as scientific applications for the course. (Author/MM)
The role of optics in secure credentials
NASA Astrophysics Data System (ADS)
Lichtenstein, Terri L.
2006-02-01
The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.
77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-17
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...
78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-08
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1984-04-13
AD-fl143 023 SEMIANNUAL REPORT TO CONGRESS ON THEUEFFECTIVENESS OF i/i THE CIVIL AVIATION SECURITY PROGRAM(U) FEDERAL AVIATION ADMINISTRATION...Semiannual Report to O Congress on the US Deportmnent of TrasEffectiveness ofi of TransportationFedewl Avkffim Avao The Civil Aviation - Security Program... Aviation Security Program 8. Performing OrgniaetioNi RePwt Us. Aviation Security Division 9. Performing Organistion Name and Address 10. Work Unit No
High Data Rate Quantum Cryptography
NASA Astrophysics Data System (ADS)
Kwiat, Paul; Christensen, Bradley; McCusker, Kevin; Kumor, Daniel; Gauthier, Daniel
2015-05-01
While quantum key distribution (QKD) systems are now commercially available, the data rate is a limiting factor for some desired applications (e.g., secure video transmission). Most QKD systems receive at most a single random bit per detection event, causing the data rate to be limited by the saturation of the single-photon detectors. Recent experiments have begun to explore using larger degree of freedoms, i.e., temporal or spatial qubits, to optimize the data rate. Here, we continue this exploration using entanglement in multiple degrees of freedom. That is, we use simultaneous temporal and polarization entanglement to reach up to 8.3 bits of randomness per coincident detection. Due to current technology, we are unable to fully secure the temporal degree of freedom against all possible future attacks; however, by assuming a technologically-limited eavesdropper, we are able to obtain 23.4 MB/s secure key rate across an optical table, after error reconciliation and privacy amplification. In this talk, we will describe our high-rate QKD experiment, with a short discussion on our work towards extending this system to ship-to-ship and ship-to-shore communication, aiming to secure the temporal degree of freedom and to implement a 30-km free-space link over a marine environment.
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
32 CFR 322.1 - Purpose and applicability.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...
NASA Astrophysics Data System (ADS)
Wang, LiLi; Ma, WenPing; Wang, MeiLing; Shen, DongSu
2016-05-01
We present an efficient three-party quantum secure direct communication (QSDC) protocol with single photos in both polarization and spatial-mode degrees of freedom. The three legal parties' messages can be encoded on the polarization and the spatial-mode states of single photons independently with desired unitary operations. A party can obtain the other two parties' messages simultaneously through a quantum channel. Because no extra public information is transmitted in the classical channels, the drawback of information leakage or classical correlation does not exist in the proposed scheme. Moreover, the comprehensive security analysis shows that the presented QSDC network protocol can defend the outsider eavesdropper's several sorts of attacks. Compared with the single photons with only one degree of freedom, our protocol based on the single photons in two degrees of freedom has higher capacity. Since the preparation and the measurement of single photon quantum states in both the polarization and the spatial-mode degrees of freedom are available with current quantum techniques, the proposed protocol is practical.
Guidelines for Working with Law Enforcement Agencies
ERIC Educational Resources Information Center
Corn, Michael
2007-01-01
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
2010-04-30
5 Intercity Bus Security Grant Program...eligibility.22 This grant program includes funding for the Freight Rail Security Grant Program (FRSGP), and the Intercity Passenger Rail Program (IPR...eligible to receive funding to continue security enhancements for its intercity rail services between high-risk urban areas. 21 U.S. Department of
Security Assistance Dependence - Wielding American Power
2002-12-09
national security objectives. One vehicle of this power brokering is the well-developed international security assistance program – oftentimes...incorrectly referred to exclusively as foreign military sales. There is nothing simple about the security assistance program as it has developed today...For the USG, there are many agencies influencing today’s security assistance program to execute complex, integrated tasks directly impacting U.S
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2014 CFR
2014-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2011 CFR
2011-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2013 CFR
2013-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2012 CFR
2012-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2010 CFR
2010-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2014 CFR
2014-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2013 CFR
2013-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2012 CFR
2012-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2011 CFR
2011-10-01
... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
7 CFR 772.5 - Security maintenance.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security maintenance. 772.5 Section 772.5 Agriculture... SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.5 Security maintenance. (a) General. Borrowers are responsible for maintaining the collateral that is serving as security for their Minor Program loan in...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
7 CFR 772.5 - Security maintenance.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security maintenance. 772.5 Section 772.5 Agriculture... SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.5 Security maintenance. (a) General. Borrowers are responsible for maintaining the collateral that is serving as security for their Minor Program loan in...
Effectiveness of the Civil Aviation Security Program.
1980-05-22
SECURITY. - CONTINUED TRAINING OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. - SECURITY PROGRAMS IMPLEMENTED BY AIR FREIGHT...cooperation by all concerned. (See Exhibit 14) Airport Security - Ongoing activities which contributed significantly to airport security included full...implementation of the revised Federal Aviation Regulations (FAR) Part 107 governing airport security , training of law enforcement officers supporting
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2012 CFR
2012-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2012-10-01 2012-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
NASA Astrophysics Data System (ADS)
Wang, Lili; Ma, Wenping
2016-02-01
In this paper, we propose a new controlled quantum secure direct communication (CQSDC) protocol with single photons in both polarization and spatial-mode degrees of freedom. Based on the defined local collective unitary operations, the sender’s secret messages can be transmitted directly to the receiver through encoding secret messages on the particles. Only with the help of the third side, the receiver can reconstruct the secret messages. Each single photon in two degrees of freedom can carry two bits of information, so the cost of our protocol is less than others using entangled qubits. Moreover, the security of our QSDC network protocol is discussed comprehensively. It is shown that our new CQSDC protocol cannot only defend the outsider eavesdroppers’ several sorts of attacks but also the inside attacks. Besides, our protocol is feasible since the preparation and the measurement of single photon quantum states in both the polarization and the spatial-mode degrees of freedom are available with current quantum techniques.
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
2009-06-08
Security Grant Program ...............................................................................6 Intercity Passenger Rail Program (Amtrak...6 Intercity Bus Security Grant Program...fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services between high-risk
2009-08-05
Freight Rail Security Grant Program ...............................................................................6 Intercity Passenger Rail Program...Amtrak) .....................................................................6 Intercity Bus Security Grant Program...overview- fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...
78 FR 45452 - Mailing of Tickets Under the Ticket To Work Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-29
... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 411 [Docket No. SSA-2011-0034] RIN 0960-AH34 Mailing of Tickets Under the Ticket To Work Program AGENCY: Social Security Administration. ACTION: Final rule..., Office of Employment Support Programs, Social Security Administration, 6401 Security Boulevard, Baltimore...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2010 CFR
2010-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2014 CFR
2014-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2012 CFR
2012-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2013 CFR
2013-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2011 CFR
2011-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
What is Security? A perspective on achieving security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Atencio, Julian J.
This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.
ERIC Educational Resources Information Center
Comp, David J.
2013-01-01
The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…
Federal Funding for Health Security in FY2018.
Watson, Crystal; Watson, Matthew; Kirk Sell, Tara
This article is the latest in an annual series analyzing federal funding for health security programs. It examines proposed funding in the President's Budget Request for FY2018 and provides updated amounts for FY2017 and actual funding for FY2010 through FY2016. The proposed FY2018 budget for health security-related programs represents a significant decrease in funding from prior years and previous administrations. In total, the President's proposed FY2018 budget includes $12.45 billion for health security-related programs, an estimated decrease in funding of $1.25 billion, or 9%, from the estimated $13.71 billion in FY2017 and an 11% decrease from the FY2016 actual funding level of $13.99 billion. Most FY2018 health security funding ($6.67 billion, 54%) would go to programs with multiple-hazard and preparedness goals and missions, representing a 14% decrease in this funding compared to FY2017. Radiological and nuclear security programs would receive 20% ($2.48 billion) of all health security funding, a slight decrease of 2% from the prior year. Biosecurity programs would be funded at $1.53 billion (12% of health security funding) in FY2018, a decrease of 6% compared to FY2017. Chemical security programs would represent 3% ($389.7 million) of all health security funding in FY2018, a 9% decrease from the prior year. Finally, 11% of health security funding ($1.39 billion) would be dedicated to pandemic influenza and emerging infectious diseases programs, the only category of funding to see an increase (3%) above FY2017.
75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...
76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...
77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-01
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National... Information Security Oversight Office no later than Friday, March 16, 2012. The Information Security Oversight... FURTHER INFORMATION CONTACT: David O. Best, Senior Program Analyst, The Information Security Oversight...
76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-01
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 11...
76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-13
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...
75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-09
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...
Code of Federal Regulations, 2010 CFR
2010-01-01
... CURRENCY, DEPARTMENT OF THE TREASURY INVESTMENT SECURITIES Interpretations § 1.130 Type II securities... financing the construction or improvement of facilities at or used by a university or a degree-granting... construction or improvement of facilities used by a hospital may be eligible as a Type II security, if the...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-01
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0089] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that...
Effectiveness of the Civil Aviation Security Program.
1975-10-06
Results of the passenger screening procedures continue to reflect the success and effec- tiveness of airline and airport security programs. During the...airline and airport security programs. While it is impossible to estimate accurately just how many hijackings and related crimes were prevented, the...attempts might have occurred during 1974 and as many as 25 during the first 6 months of 1975, if current airline and airport security programs had not
Exploring the youth experience about sense of social security: a qualitative study
Chinekesh, Ahdieh; Mohammadi, Farahnaz; Motlagh, Mohammad Esmael; Eftekhari, Monir Baradaran; Ardalan, Gelayol; Djalalinia, Shirin
2017-01-01
Background Undoubtedly, one of the vital needs of man is security. Determinants and related factors to sense of social security is one of the most important research priorities, especially in adolescents and young people. Objective To identify the factors affecting the social security of the youth. Methods In 2017, using conventional content analysis, and benefiting from semi-structured in-depth interviews, we conducted a qualitative study exploring the opinions of young people about their feelings regarding social security. First, a targeted sampling method was determined to collect the data. Participants were young volunteers aged 18 to 30 who were selected from Tehran, the capital of Iran. Inclusion criteria for participants were willingness to participate in the study and ability to express their experiences. Data was extracted from 21 participants. Results The participants consisted of 21 young people who met the study inclusion criteria, of whom 12 participants were male. Their mean age was 24.4±0.41 years and their education varied from primary school to master’s degree. Under two main categories of the need for economic and financial security and the need for a safe society, we extracted 11 subcategories following 32 codes. According to the findings, most participants agreed on the important role that sense of social security has in their lives and their health. Conclusion The important role of sense of social security in participant’s lives and health was the main important point of our findings, emphasized by most of participants. Based on the results; the assessment of the specific needs of different target groups, the design, development and implementation of health programs led to more effective interventions. PMID:29560155
12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2011 CFR
2011-01-01
... Establishing Information Security Standards Table of Contents I. Introduction A. Scope B. Preservation of... Security Program B. Objectives III. Development and Implementation of Customer Information Security Program.... Introduction The Interagency Guidelines Establishing Information Security Standards (Guidelines) set forth...
14 CFR 1203.201 - Information security objectives.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...
14 CFR 1203.201 - Information security objectives.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...
76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-21
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR... Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the following Information...
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2014 CFR
2014-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2012 CFR
2012-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
14 CFR 1203.409 - Exceptional cases.
Code of Federal Regulations, 2010 CFR
2010-01-01
....409 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM... Information Security Program Committee, Security Division, Washington, DC 20546 for a classification..., to the Director, Information Security Oversight Office, GSA, for a determination. ...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 9 2012-10-01 2012-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...
78 FR 31966 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: [FEMA-2013-0019... Security Initiative (UASI) Nonprofit Security Grant Program (NSGP). DATES: Comments must be submitted on or... Urban Areas Security Initiative (UASI) Nonprofit Security Grant Program (NSGP) provides funding support...
Code of Federal Regulations, 2014 CFR
2014-01-01
... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...
Code of Federal Regulations, 2012 CFR
2012-01-01
... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...
49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
Code of Federal Regulations, 2011 CFR
2011-01-01
... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...
49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2013 CFR
2013-10-01
...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...
49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2014 CFR
2014-10-01
...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...
49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2012 CFR
2012-10-01
...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...
49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...
49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2011 CFR
2011-10-01
...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program
1991-02-01
enforcement support for airline and airport security measures. Airline passengers, as the ultimate beneficiaries of the security program. pay for the...environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 4(02 airports. 18...essential to many passengers. " FAA is currently reviewing Parts 107 and 108 of the Federal Aviation Regulations, covering airport security and airplane
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less
46 CFR 169.675 - Generators and motors.
Code of Federal Regulations, 2010 CFR
2010-10-01
... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS... designed for an ambient temperature of 50 degrees C. (122 degrees F.). (g) A generator or motor may be designed for an ambient temperature of 40 degrees C. (104 degrees F.) if the vessel is designed so that the...
ERIC Educational Resources Information Center
Cianciolo, Patricia K.; Henderson, Tammy L.
2003-01-01
Describes modules on Social Security and Medicare for gerontology policy courses. Discusses collaborative exercises in which students explore Internet resources on Social Security and health care finance, identity major concerns about reforms, and enact scenarios about retirees with varying degrees of income and health care security. (Contains 33…
ERIC Educational Resources Information Center
Francois, Michael T.
2016-01-01
Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…
Applying your corporate compliance skills to the HIPAA security standard.
Carter, P I
2000-01-01
Compliance programs are an increasingly hot topic among healthcare providers. These programs establish policies and procedures covering billing, referrals, gifts, confidentiality of patient records, and many other areas. The purpose is to help providers prevent and detect violations of the law. These programs are voluntary, but are also simply good business practice. Any compliance program should now incorporate the Health Insurance Portability and Accountability Act (HIPAA) security standard. Several sets of guidelines for development of compliance programs have been issued by the federal government, and each is directed toward a different type of healthcare provider. These guidelines share certain key features with the HIPAA security standard. This article examines the common areas between compliance programs and the HIPAA security standard to help you to do two very important things: (1) Leverage your resources by combining compliance with the security standard with other legal and regulatory compliance efforts, and (2) apply the lessons learned in developing your corporate compliance program to developing strategies for compliance with the HIPAA security standard.
Code of Federal Regulations, 2011 CFR
2011-04-01
... who is responsible for implementation and oversight of information security programs and procedures... complaints regarding all elements of the information security program shall be directed to the Director of... UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION National Security...
14 CFR 1203.901 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...
14 CFR 1203.603 - Systematic review for declassification.
Code of Federal Regulations, 2010 CFR
2010-01-01
... INFORMATION SECURITY PROGRAM Declassification and Downgrading § 1203.603 Systematic review for... review guidelines. The Chairperson, NASA Information Security Program Committee, shall develop, in... custodian and referred to the Chairperson, NASA Information Security Program Committee. This listing shall...
14 CFR 1203.901 - Responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...
14 CFR 1203.202 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...
14 CFR 1203.202 - Responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...
7 CFR 764.255 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.255 Section 764.255... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Operating Loan Program § 764.255 Security requirements. An OL... operating purposes, loans must be secured by a first lien on farm property or products having a security...
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... banking office; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES...
12 CFR 568.3 - Security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...
2011-08-25
Security Cooperation Agency INL Bureau of International Narcotics and Law Enforcement Affairs JSSP Justice Sector Security Program PAE Pacific...regional training centers. The programs were the Justice Sector Security Program ( JSSP ), the Corrections System Support Program (CSSP), and the...Civilian Police International. JSSP and CSSP are considered rule of law programs. Rule of law is most commonly understood to be a foundational
2009-12-01
6 Intercity Passenger Rail Program (Amtrak) .....................................................................7 Intercity Bus Security Grant...20 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services between high-risk urban...Research Service 7 Intercity Passenger Rail Program (Amtrak) The Intercity Passenger Rail Program (IPR) is designed to enhance security of the
ERIC Educational Resources Information Center
Al-Anani, Hanan Abd Al-Hameed
2015-01-01
The purpose of this study was to identify the degree of parental abuse and psychological security of the child, as well as the degree differences of these variables, based on the gender, the age and place of residency. The aim of this study also was to detect the relationship between parental abuse and the psychological security of the child. The…
14 CFR 1203.604 - Mandatory review for declassification.
Code of Federal Regulations, 2011 CFR
2011-01-01
... requestor may submit the request to: (i) The Chairperson, NASA Information Security Program Committee; or... determination to the Chairperson, NASA Information Security Program Committee, National Aeronautics and Space... Chairperson, NASA Information Security Program Committee, for final resolution and appropriate response. (f...
14 CFR 1203.604 - Mandatory review for declassification.
Code of Federal Regulations, 2010 CFR
2010-01-01
... requestor may submit the request to: (i) The Chairperson, NASA Information Security Program Committee; or... determination to the Chairperson, NASA Information Security Program Committee, National Aeronautics and Space... Chairperson, NASA Information Security Program Committee, for final resolution and appropriate response. (f...
48 CFR 3019.705-1 - General support for the program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS SMALL BUSINESS PROGRAMS The Small Business Subcontracting Program 3019.705-1 General support for the program. In any...
46 CFR 111.01-9 - Degrees of protection.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS General § 111.01-9 Degrees of protection. (a) Interior electrical equipment exposed... service intended. (b) Electrical equipment in locations requiring exceptional degrees of protection as...
46 CFR 111.01-9 - Degrees of protection.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS General § 111.01-9 Degrees of protection. (a) Interior electrical equipment exposed... service intended. (b) Electrical equipment in locations requiring exceptional degrees of protection as...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-29
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-15
... to certain issues of securities in DTC's Fast Automated Securities Transfer program (``FAST''). For securities that are part of the FAST program, the transfer agents hold the securities registered in the name...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, G.; Mansur, D.L.; Ruhter, W.D.
1994-10-01
This report presents the details of the Lawrence Livermore National Laboratory safeguards and securities program. This program is focused on developing new technology, such as x- and gamma-ray spectrometry, for measurement of special nuclear materials. This program supports the Office of Safeguards and Securities in the following five areas; safeguards technology, safeguards and decision support, computer security, automated physical security, and automated visitor access control systems.
Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2014 CFR
2014-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2012 CFR
2012-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2010 CFR
2010-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2011 CFR
2011-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2013 CFR
2013-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-27
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0071] National Protection and Programs Directorate; Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security.... SUMMARY: The Department of Homeland Security, National Protection and Programs Directorate, Office of...
Code of Federal Regulations, 2010 CFR
2010-10-01
... requested by TSA concerning Security Threat Assessments. (ix) A statement acknowledging and ensuring that each employee and agent will successfully complete a Security Threat Assessment under § 1548.15 before... training and Security Threat Assessments by relevant personnel. (4) Duration of security program. The...
Focusing America’s National Powers
2006-04-14
governments with market economies. 15. SUBJECT TERMS National Security, National Powers, Sources of Power, National Security Council, National Security... Strategy , Six-phased Campaign Plan, JIACG, DIME 16. SECURITY CLASSIFICATION OF: Unclassified 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME...satisfaction of the requirements of a Master of Science Degree in Joint Campaign Planning and Strategy . The contents of this paper reflect my own
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
ERIC Educational Resources Information Center
New York State Office of the Comptroller, Albany.
Findings of an audit of the New York State Education Department's procedures to maintain security over Pupil Evaluation Program (PEP) and Program Evaluation Test (PET) examination materials are presented in this report. The audit sought to determine whether the department's security procedures adequately prevented unauthorized access to exam…
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 2 2011-10-01 2011-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 2 2014-10-01 2012-10-01 true What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 2 2013-10-01 2012-10-01 true What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 2 2012-10-01 2012-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 2 2010-10-01 2010-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...
Zhao, Hong-Bo; Ma, Yan-Ji
2014-02-01
According to the cultivated land ecological security in major grain production areas of Northeast China, this paper selected 48 counties of Jilin Province as the research object. Based on the PSR-EES conceptual framework model, an evaluation index system of cultivated land ecological security was built. By using the improved TOPSIS, Markov chains, GIS spatial analysis and obstacle degree models, the spatial-temporal pattern of cultivated land ecological security and the obstacle factors were analyzed from 1995 to 2011 in Jilin Province. The results indicated that, the composite index of cultivated land ecological security appeared in a rising trend in Jilin Province from 1995 to 2011, and the cultivated land ecological security level changed from being sensitive to being general. There was a pattern of 'Club Convergence' in cultivated land ecological security level in each county and the spatial discrepancy tended to become larger. The 'Polarization' trend of cultivated land ecological security level was obvious. The distributions of sensitive level and critical security level with ribbon patterns tended to be dispersed, the general security level and relative security levels concentrated, and the distributions of security level scattered. The unstable trend of cultivated land ecological security level was more and more obvious. The main obstacle factors that affected the cultivated land ecological security level in Jilin Province were rural net income per capita, economic density, the proportion of environmental protection investment in GDP, degree of machinery cultivation and the comprehensive utilization rate of industrial solid wastes.
Interactive Programming Support for Secure Software Development
ERIC Educational Resources Information Center
Xie, Jing
2012-01-01
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
78 FR 15734 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0010] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...
78 FR 15733 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0008] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...
Rupp, Kalman; Strand, Alexander; Davies, Paul; Sears, Jim
2007-01-01
Both target effectiveness and administrative simplicity are desirable properties in the design of minimum benefit packages for public retirement programs. The federal benefit rate (FBR) of the Supplemental Security Income (SSI) program has been proposed by some analysts as a potentially attractive basis of establishing a new minimum benefit for Social Security on both of these grounds. This type of proposal is related to a broader array of minimum benefit proposals that would establish a Social Security benefit floor based on the poverty rate. In contrast to Social Security, the SSI program is means tested, including both an income and asset screen and also a categorical eligibility screen (the requirement to qualify as aged or disabled). The SSI FBR provides an inflation-adjusted, guaranteed income floor for aged and disabled people with low assets. The FBR has been perceived by proponents as a minimal measure of Social Security benefit adequacy because it represents a subpoverty income level for a family of one or two depending on marital status. For this same reason it has been seen as a target-effective tool of designing a minimum Social Security benefit. An FBR-based minimum benefit has also been viewed as administratively simple to implement; the benefit can be calculated from Social Security administrative records using a completely automated electronic process. Therefore-in contrast to the SSI program itself-an FBR-based minimum benefit would incur virtually no ongoing administrative costs, would not require a separate application for a means-tested program, and would avoid the perception of welfare stigma. While these ideas have been discussed in the literature and among policymakers in the United States over the years, and similar proposals have been considered or implemented in several foreign countries, there have been no previous analyses measuring the size of the potentially affected beneficiary population. Nor has there been any systematic assessment of the FBR as a measure of benefit adequacy or the tradeoffs between potential target effectiveness and administrative simplicity. Based on a series of simulations, we assess the FBR as a potential foundation for minimum Social Security benefits and we examine the tradeoffs between administrative simplicity and target effectiveness using microdata from the 1996 panel of the Survey of Income and Program Participation (SIPP). Our empirical analysis is limited to Social Security retired-worker beneficiaries aged 65 or older. We start with the assessment of the FBR as a measure of benefit adequacy. We are particularly concerned about two types of error: (1) incorrectly identifying some Social Security beneficiaries as "economically vulnerable," and (2) incorrectly identifying others as "not economically vulnerable." Operationally we measure economic vulnerability by two alternative standards. One of our measures considers beneficiaries with family income below the official poverty threshold as vulnerable. Our second measure is more restrictive; it uses a family income threshold equal to 75 percent of the official poverty threshold. We find that a substantial minority of retired workers have Social Security benefits below the FBR. The results also show that the FBR-based measure of Social Security benefit adequacy is very imprecise in terms of identifying economically vulnerable people. We estimate that the vast majority of beneficiaries with Social Security benefits below the FBR are not economically vulnerable. Conversely, an FBR-level Social Security benefit threshold fails to identify some beneficiaries who are economically vulnerable. Thus an FBR-level minimum benefit would be poorly targeted in terms of both types of errors we are concerned about. An FBR-level minimum benefit would provide minimum Social Security benefits to many people who are clearly not poor. Conversely, an FBR-level minimum benefit would not provide any income relief to some who are poor. The administrative simplicity behind these screening errors also results in additional program cost that may be perceived as substantial. We estimate that an FBR-level minimum benefit would increase aggregate program cost for retired workers aged 65 or older by roughly 2 percent. There are two fundamental reasons for these findings. First, the concept of an FBR-level minimum benefit looks at the individual or married couple in artificial isolation; however, the family is the main consumption unit in our society. The income of an unmarried partner or family members other than a married spouse is ignored. Second, individuals and couples may also have income from sources other than Social Security or SSI, which is also ignored by a simple FBR-based minimum benefit concept. The substantial empirical magnitude of measurement error arising from these conceptual simplifications naturally leads to the assessment of the tradeoff between target effectiveness and administrative simplicity. To facilitate this analysis, we simulate the potential effect of alternative screening methods designed to increase target effectiveness; while reducing program cost, such alternatives also may increase administrative complexity. For example, considering the combined Social Security benefit of a married couple (rather than looking at the husband and wife in isolation) might substantially increase target effectiveness with a relatively small increase in administrative complexity. Adding a family income screen might increase administrative complexity to a greater degree, but also would increase target effectiveness dramatically. The results also suggest that at some point adding new screens-such as a comprehensive asset test-may drastically increase administrative complexity with diminishing returns in terms of increased target effectiveness and reduced program cost. Whether a broad-based minimum benefit concept that is not tied to previous work experience is perceived by policymakers as desirable or not may depend on several factors not addressed in this article. However, to the extent that this type of minimum benefit design is regarded as potentially desirable, the tradeoffs between administrative simplicity and target effectiveness need to be considered.
78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 8, 2013. ISOO...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-05
... DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate [Docket No. DHS-2010-0071] Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office...
Strategies for online test security.
Hart, Leigh; Morgan, Lesley
2009-01-01
As online courses continue to increase, maintaining academic integrity in student evaluation is a challenge. The authors review several strategies, with varying degrees of cost and technology, to improve test security in the online classroom.
Heidarian, Ali Reza; Jafari Kelarijani, Seyed Ebrahim; Jamshidi, Reza; Khorshidi, Mohamad
2015-01-01
Health worker motivation has the potential to have a large impact on health system performance, and this depends on some factors. The purpose of this study was to determine the factors affecting this motivation. From Winter 2013 to Spring 2014, 1046 employees and physicians (439 males and 607 females) with a mean age of 36 and 37.2 years in men and women, respectively were chosen in selected hospitals of Social Security Organization (SSO). They were randomly categorized into six different classes of service record, age education class of hiring (permanent and contractual), marital status, and gender. The variables assessed via the classification groups were as follows: interpersonal relations, working conditions, equity, pay, job security, supervision, advancement, recognition, responsibility, and attractiveness of job, educational and organizational policies. Bachelor's degree (65%) or higher were the education degrees of most participants. Significant relations were observed regarding age, marital status, hiring, gender and years of service with promotion, recognition, responsibility, attractiveness of job, education, relations, working condition, equity, salary, job security, supervision and organizational policies. There were significant relations with hire status and degree with advancement and other variables. There were significant relations between marital status, gender, years of service and age with the above variables. The results show that the important variables that influence motivational factors are academic degree, hire status, marital status, gender, age and years of service.
Code of Federal Regulations, 2010 CFR
2010-07-01
... threat of an unlawful act against a vessel or terminal is, though possible, not likely. Security Level II... area, or against a type of vessel or terminal. Security Level III means the degree of security... that is a felony under U.S. federal law, under the laws of the States where the vessel is located, or...
ERIC Educational Resources Information Center
Brooks, Nita G.; Greer, Timothy H.; Morris, Steven A.
2018-01-01
The authors' focus was the assessment of skill requirements for information systems security positions to understand expectations for security jobs and to highlight issues relevant to curriculum management. The analysis of 798 job advertisements involved the exploration of domain-related and soft skills as well as degree and certification…
NASA Astrophysics Data System (ADS)
Hughes, M. H.; Gray, K.; Drostin, M.
2016-12-01
For under-represented minority (URM) students, opportunities to meaningfully participate in academic communities and develop supportive relationships with faculty and peers influence persistence in STEM majors (Figueroa, Hurtado, & Wilkins, 2015; PCAST, 2012; Tsui, 2007). Creating such opportunities is even more important in the geosciences, where a lower percentage of post-secondary degrees are awarded to URM students than in other STEM fields (NSF, 2015; O'Connell & Holmes, 2011; NSF, 2011). Since 2011, Increasing Diversity and Enhancing Academia (IDEA), a program of the UNC-Chapel Hill Institute for the Environment (UNC-IE), has provided 39 undergraduates (predominantly URM and female students) with career-relevant research experiences and professional development opportunities, including a culminating experience of presenting their research at a campus-wide research symposium. External evaluation data have helped to characterize the effectiveness of the IDEA program. These data included pre- and post-surveys assessing students' interest in geosciences, knowledge of career pathways, and perceptions of their abilities related to a specific set of scientific research skills. Additionally, progress towards degrees and dissemination outcomes were tracked. In this presentation, we will share quantitative and qualitative data that demonstrate that participation in the IDEA program has influenced students' interest and persistence in geosciences research and careers. These data range from self-reported competencies in a variety of scientific skills (such as organizing and interpreting data and reading and interpreting science literature) to documentation of student participation in geoscience study and professions. About 69% of participants continued research begun during their internships beyond the internship; and about 38% pursued graduate degrees and secured jobs in geoscience and other STEM fields. (Nearly half are still in school.) Overall, these evaluation data have shown that the IDEA research experience, combined with program elements focused on professional development, reinforces students' sense of their science abilities, connects them to a network of supportive students and professionals and contributes to their sense of belonging within the geosciences.
78 FR 38724 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-27
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0006] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... Agreement that establishes a computer matching program between the Department of Homeland Security/U.S...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2011 CFR
2011-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2010 CFR
2010-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2012 CFR
2012-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2013 CFR
2013-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
Effectiveness of the Civil Aviation Security Program.
1976-09-20
commerce--a pr per balance appears to exist. Moreover, airline and airport security programs appear to be capable of responding to changes in the nature...Moreover, airline and airport security programs appear to be capable of responding to changes in the nature and level of current and future threats. The...delays and diversions were experienced. Airline and airport security measures continued to afford the necessary level of protection to U.S. air
Implementing the global health security agenda: lessons from global health and security programs.
Paranjape, Suman M; Franz, David R
2015-01-01
The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.
Administrator, National Security Education Program
1993-01-19
1. Administer, direct, and manage the resources for the lit program. 2. Establish and direct an international education center, as approved by the...approve the hiring of, and evaluate the performance of personnel who staff the international education center. 4. Ensure appropriate internal management...Administrator, National Security Education Program * References: (a) DoD Directive 1025.2 , "National Security * Education Program," January 13, 1993
48 CFR 3019.705 - Responsibilities for the contracting officer under the subcontracting program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS SMALL BUSINESS PROGRAMS The Small Business Subcontracting Program 3019.705...
49 CFR 1549.101 - Acceptance, screening, and transfer of cargo.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO SCREENING PROGRAM Operations § 1549.101 Acceptance, screening, and transfer of cargo. (a) Preventing or... facilities, equipment, and procedures described in its security program to prevent or deter the carriage...
78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, July 12, 2013. ISOO will...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
7 CFR 772.8 - Sale or exchange of security property.
Code of Federal Regulations, 2014 CFR
2014-01-01
..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...
7 CFR 772.8 - Sale or exchange of security property.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...
7 CFR 772.8 - Sale or exchange of security property.
Code of Federal Regulations, 2012 CFR
2012-01-01
..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...
7 CFR 772.8 - Sale or exchange of security property.
Code of Federal Regulations, 2013 CFR
2013-01-01
..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...
An Innovative Community College Program and Partnership in Information Security.
ERIC Educational Resources Information Center
Howard, Barbara C; Morneau, Keith A.
This report describes an innovative network security program initiated by Northern Virginia Community College and funded with a grant from the Northern Virginia Regional Partnership. The program educates and trains students in the instillation, configuration, and troubleshooting of the hardware and software infrastructure of information security.…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-19
... Insured Credit Unions to maintain an information security program and an incident response plan that... Federally Insured Credit Unions to maintain an information security program and an incident response plan... credit unions to develop a written security program to safeguard sensitive member information. This...
77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-11
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...
Huang, Jin; Kim, Youngmi; Barnidge, Ellen
2016-11-20
The National School Lunch Program (NSLP) is one of the most important food assistance programs in the United States to ensure children's food security and healthy development. Previous studies have offered mixed results and challenges in estimating the effects of program participation. This study assesses NSLP's effect on household food security using data from the Survey of Income and Program Participation (SIPP). SIPP collects information on food security that covers four reference months, including both summer (June, July, August) and nonsummer months. The number of summer months in these four reference months varies by SIPP rotation group. These unique features allow this study to address the potential selection bias in the research of NSLP and food security by examining a seasonal difference in program participation. The analysis found that one more summer month in the reference period increases the difference in low food security rates by about 1.5 percentage points between recipients and nonrecipients eligible for free or reduced-price lunch. Findings have important social work and health policy implications for increasing food security among low-income households with children. © 2016 National Association of Social Workers.
12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2011 CFR
2011-01-01
... Part 364—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...
76 FR 65107 - Recovery of Delinquent Debts-Treasury Offset Program Enhancements
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-20
... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404, 408, 416, and 422 [Docket No. SSA-2010-0010] RIN 0960-AH19 Recovery of Delinquent Debts--Treasury Offset Program Enhancements AGENCY: Social Security... Recovery Policy, Social Security Administration, 6401 Security Boulevard, Baltimore, MD 21235-6401, (410...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-01
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration (SSA). ACTION: Notice of renewal of an existing...
10 CFR 37.43 - General security program requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... overall security strategy to ensure the integrated and effective functioning of the security program required by this subpart. The security plan must, at a minimum: (i) Describe the measures and strategies... lessons learned; (iii) Relevant results of NRC inspections; and (iv) Relevant results of the licensee's...
Federal funding for health security in FY2015.
Boddie, Crystal; Sell, Tara Kirk; Watson, Matthew
2014-01-01
Previous articles in this series have provided funding information for federal civilian biodefense programs and programs focused on radiological and nuclear preparedness and consequence management. This year the authors have expanded the focus of the analysis to US federal funding for health security. This article provides proposed funding amounts for FY2015, estimated amounts for FY2014, and actual amounts for FY2010 through FY2013 in 5 domains critical to health security: biodefense programs, radiological and nuclear programs, chemical programs, pandemic influenza and emerging infectious disease programs, and multiple-hazard and preparedness programs.
Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.
Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less
Effectiveness of the Civil Aviation Security Program.
1980-10-14
CEASE FUNDING OF TRAINING"OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. F. FEDERAL AIR MARSHALS PROVIDE LAW ENFORCEMENT SUPPORT...enforcement officer authority through special deputations by the U.S. Marshals Service on an annual basis. Airport Security - Continuing activities...which contributed signifi- cantly to airport security include the training of local law enforcement officers supporting airport security programs, the
Effectiveness of the Civil Aviation Security Program.
1977-04-05
diversions. Perhaps the best evidence of the effectiveness of airline and airport security measures is the number of hijackings and related crimes prevented...airports. Consideration is being given to include a provision in the airport security regulation which would prohibit the introduction of...Security Program. A complete revision of the regulation that established basic airport security requirements is currently underway. One of the more
Global Security Contingency Fund: Summary and Issue Overview
2014-04-04
Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance
[Infants' attachment security in a vulnerable French sample].
Tereno, S; Guedeney, N; Dugravier, R; Greacen, T; Saïas, T; Tubach, F; Ulgen, S; Matos, I; Guédeney, A
2017-04-01
Attachment is a long lasting emotional link established between infants and their caregivers. The quality of early relationships allows infants to safely explore their environment and contribute to the establishment of a broad range of social skills. Several intervention programs targeting infant attachment have been implemented in different contexts, showing diverse degrees of efficacy. The present paper describes, for the first time, children's attachment quality distributions in a French multi-risk population, with a preventive intervention, usual or reinforced. In the CAPEDP study (Parenting and Attachment in Early Childhood: reducing mental health disorder risks and promoting resilience), a sub-sample of 117 women was recruited to assess the effects of this home-visiting program on children's attachment security. With that intent, the Strange Situation Paradigm was used when infants were between 12 and 16 months of age. In the intervention group, 63% (n=41) of the infants were coded as secure, while 15% (n=10) of them were coded as insecure-avoidant and 22% (n=14) as insecure-ambivalent/resistant. 56% (n=29) of control group infants (usual care) were coded as secure, while 27% (n=14) were coded as insecure-avoidant and 17% (n=9) as insecure-ambivalent/resistant. Even if the percentage of children with a secure attachment in the reinforced intervention group was higher than that of the control group, this difference did not reach the threshold of significance [Chi 2 (2)=2.40, P=0.30]. Intervention group distributions were closer to normative samples, and these distributions show the clinical impact of our program. In general, preventive interventions focused on attachment quality have moderate effects but, in our case, several factors might have contributed to lower the statistical impact of the program. Firstly, the control group cannot be considered has having received zero intervention for two reasons: (a) the French usual perinatal health system (Maternal and Infant Protection System) is particularly generous and (b) the effect of this usual system might have been increased by the project intensive assessment protocol (6 visits during 28 months). Secondly, it is possible that the full effect of the intervention had not yet been detected because, when a child's attachment was assessed, only two thirds of the intervention visits had been performed (29 of 44 visits). A "sleeper effect" is still possible: we hope that a more clear result will be seen when children are assessed again, at 48 months, in our follow-up study (CAPEDP-A II). By clarifying the mechanisms involved in the development of a secure attachment, our study aims to contribute and refine the development of early preventive intervention strategies in high perinatal and psychosocial vulnerability contexts. Copyright © 2016 L’Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1999-01-01
The Tribal Colleges Initiatives in Science and Environmental Education (TCI) was developed in collaboration with the Partnership for Environmental Technology Education (PETE). This program is focused on long-term, systematic change through assisting tribally-controlled colleges in improving science and technology infrastructure, faculty and curricula. The goals are to: develop new or enhance existing science and technology education programs within tribally-controlled colleges and affiliates with a focus on environmental education and technology; establish and maintain clearly defined and secure educational pathways for Native American students; produce more Native American environmental and advanced degree graduates who can contribute to meeting the environmental/natural resourcemore » management and economic development goals of Indian Nations; and enhance the general level of Native American scientific literacy through improved public access to information.« less
46 CFR 111.01-9 - Degrees of protection.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Degrees of protection. 111.01-9 Section 111.01-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS General § 111.01-9 Degrees of protection. (a) Interior electrical equipment exposed...
Stress Indices and Flexibility Factors for 90-Degree Piping Elbows with Straight Pipe Extensions.
1982-02-01
Laboratory, Oak Ridge, Tennessee (March 1972). 5. The M.W. Kellogg Company , Design of Piping Systems, Second Edition, John Wiley and Sons, Inc., New York (1964...FLEXIBILITY FACTORS FOR 90-DEGREE PIPING ELBOWS WITH STRAIGHT PIPE EXTENSIONS 6. PERFORMING OrG. REPORT NUMBER = 7. AUTHOR(e S . CONTRACT OR GRANT NUMBER(e...UNCLASSIFIED S /N 0102-LF-014-6601 SECURITY CLAUIFICAION OF THII PAGE (Sie. Det Shtee.E) SECURITY CLASSIFICATION OF THIS PACE (When Does Sat* .*) (Block 20
NASA Astrophysics Data System (ADS)
González, M. R.; Lambán, M. P.
2012-04-01
This paper presents the result of designing the subject Quality Engineering and Security of the Product, belonging to the Degree of Engineering in Industrial Design and Product Development, on the basis of the case methodology. Practical sessions of this subject are organized using the whole documents of the Quality System Management of the virtual company BeaLuc S.A.
44 CFR 8.3 - Senior FEMA official responsible for the information security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official... Senior FEMA official responsible for the information security program. The Director of the Security Division, has been designated as the senior official to direct and administer the FEMA information security...
41 CFR 101-26.507 - Security equipment.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true Security equipment. 101... PROGRAM 26.5-GSA Procurement Programs § 101-26.507 Security equipment. Federal agencies and other activities authorized to purchase security equipment through GSA sources shall do so in accordance with the...
7 CFR 764.235 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.235 Section 764.235... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Conservation Loan Program § 764.235 Security requirements. (a... estate may be taken as additional security if needed. (c) Loans of $25,000 of less for real estate...
24 CFR 880.608 - Security deposits.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Security deposits. 880.608 Section... PROGRAM) SECTION 8 HOUSING ASSISTANCE PAYMENTS PROGRAM FOR NEW CONSTRUCTION Management § 880.608 Security... a security deposit in an amount equal to one month's Total Tenant Payment or $50, whichever is...
41 CFR 101-26.507 - Security equipment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true Security equipment. 101... PROGRAM 26.5-GSA Procurement Programs § 101-26.507 Security equipment. Federal agencies and other activities authorized to purchase security equipment through GSA sources shall do so in accordance with the...
7 CFR 764.355 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.355 Section 764.355... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Emergency Loan Program § 764.355 Security requirements. (a) EM loans made under § 764.351(a)(1) must comply with the general security requirements established at...
41 CFR 101-26.507 - Security equipment.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true Security equipment. 101... PROGRAM 26.5-GSA Procurement Programs § 101-26.507 Security equipment. Federal agencies and other activities authorized to purchase security equipment through GSA sources shall do so in accordance with the...
41 CFR 101-26.507 - Security equipment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Security equipment. 101... PROGRAM 26.5-GSA Procurement Programs § 101-26.507 Security equipment. Federal agencies and other activities authorized to purchase security equipment through GSA sources shall do so in accordance with the...
7 CFR 764.355 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.355 Section 764.355... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Emergency Loan Program § 764.355 Security requirements. Link... comply with the general security requirements established at §§ 764.103, 764.104 and 764.155(b). (b) EM...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-18
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0055] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration. ACTION: Notice of a renewal of an existing...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... Prevention Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of... to establish a new system of records titled, ``Department of Homeland Security/Transportation Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...
NASA Technical Reports Server (NTRS)
Labrune, Yves; Labbe, X.; Roussel, A.; Vielcanet, P.
1994-01-01
In the context of the CNES SPOT4 program CISI is particularly responsible for the development of the SPOT4 Management Centre, part of the SPOT4 ground control system located at CNES Toulouse (France) designed to provide simultaneous control over two satellites. The main operational activities are timed to synchronize with satellite visibilities (ten usable passes per day). The automatic capability of this system is achieved through agenda services (sequence of operations as defined and planned by operator). Therefore, the SPOT4 Management Centre offers limited, efficient and secure human interventions for supervision and decision making. This paper emphasizes the main system characteristics as degree of automation, level of dependability and system parameterization.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-08
... 1974; Department of Homeland Security U.S. Citizenship and Immigration Services -011 E-Verify Program... ``Department of Homeland Security/United States Citizenship and Immigration Services--011 E- Verify Program System of Records.'' The United States Citizenship and Immigration Services E-Verify Program allows...
49 CFR 1546.103 - Form, content, and availability of security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... security program is acceptable only if TSA finds that the security program provides a level of protection similar to the level of protection provided by U.S. aircraft operators serving the same airports. Foreign... the same airport, if TSA determines that such procedures are necessary to provide a similar level of...
ERIC Educational Resources Information Center
Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William
2016-01-01
The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…
31 CFR 1023.210 - Anti-money laundering program requirements for brokers or dealers in securities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... requirements for brokers or dealers in securities. 1023.210 Section 1023.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.210 Anti-money laundering program...
31 CFR 1023.210 - Anti-money laundering program requirements for brokers or dealers in securities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... requirements for brokers or dealers in securities. 1023.210 Section 1023.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.210 Anti-money laundering program...
31 CFR 1023.210 - Anti-money laundering program requirements for brokers or dealers in securities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... requirements for brokers or dealers in securities. 1023.210 Section 1023.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.210 Anti-money laundering program...
31 CFR 1023.210 - Anti-money laundering program requirements for brokers or dealers in securities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... requirements for brokers or dealers in securities. 1023.210 Section 1023.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.210 Anti-money laundering program...
2016-09-01
League (EPL), football, mass gatherings, National Football League (NFL), safety manuals, soccer , sports security, soccer , terrorism, terrorist...fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL...kurtbadenhausen/2015/07/15/the-worlds-50-most-valuable-sports- teams-2015/. 3 professional league, the English Premier soccer league, earns $2.7 billion.6 In
Joint Logistics Commanders Guide for the Management of Multinational Program,
1981-07-01
purchase of the A-300 Airbus and the 1977 record-breaking export performance of the French and UK aerospace industries of around $5 billion and $2 billion...DIS. They are the Defense Industrial Security Clearance Office ( DISCO ), the Defense Industrial Security Institute (DISI), and the Office of Industrial...Security International (ISI). Defense Industrial Security Clearance Office ( DISCO ) The Defense Industrial Security Program (DISP) establishes pro
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of certain direct participation program securities from the arranging provisions of sections 7(c) and 11(d)(1). 240.3a12-9 Section 240.3a12-9 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL...
ERIC Educational Resources Information Center
Marmaras, Judy; Neri, Pat
The Tech-Prep Associate Degree Program (TPAD) at the Community College of Rhode Island (CCRI) in Warwick, is a high school/community college partnership providing high school students with an alternative program of study focused on goal setting, basic academic skills development, and the skills needed to pursue a career in a technical, business or…
NASA Astrophysics Data System (ADS)
Flores, Ramon
This study used a web-based survey collected data from 28 first-generation Latino engineers who participated in the Mathematics, Engineering, Science, Achievement (MESA) program during their high school years. From the set of 28 respondents, 5 volunteered to participate in an optional telephone interview. The purpose of this study was to describe the critical attributes and characteristics of the MESA program that lead to success at both the high school and college levels for first-generation Latino students. Success at the high school level was operationally defined as successfully graduating with a high school diploma. Success at the college level was operationally defined here as college graduation with an engineering degree. Using a mixed-methods technique, the researcher attempted to secure consensus of opinion from a sample population of 28 first-generation Latino engineers. The mixed-methods technique was chosen since it allowed the researcher to draw on the strengths of quantitative and qualitative approaches. According to the findings, the typical respondent felt that mentoring was the attribute of the MESA program that most prepared him to graduate from high school. The respondents felt that the following MESA attributes most helped them transition into an undergraduate engineering program: Academic and University Advising; Enrichment Activities; Career Advising; Field Trips; Mentoring; Scholarship Incentive Awards; and Speakers. The respondents viewed study groups as the MESA attribute that best prepared them to graduate college with an engineering degree. This study was purposefully designed as a descriptive study. Future research is required to extend this work into an evaluative study. This would allow for the generalization of the critical attributes to the general student population serviced by the MESA program.
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1983-10-21
Aviation Security Program -s fro January 1 -June 30, 1983 c> CD C_3 LU DTIC ELECTE NOV 1 8 1983 D <sS^ B Washington, O.C. 20691 October...Effectiveness of the Civil Aviation Security Program 7. A-.W.) Aviation Security Division V. P»tf»m..»» 0>|fi •« Nam» «n4 Aa^rai» DOT/Federal...Aviation Administration Office of Civil Aviation Security 800 Independence Avenue, SW. Washington, P.C. 20591 1. ••€•*.»•<•’• Caiala*. Na. S.
46 CFR 503.53 - Oversight Committee.
Code of Federal Regulations, 2011 CFR
2011-10-01
... FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security... provisions of Executive Order 13526 and directives of the Information Security Oversight Office. The program... and complaints concerning the Commission's information security program; (d) Recommend appropriate...
46 CFR 503.53 - Oversight Committee.
Code of Federal Regulations, 2010 CFR
2010-10-01
... FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security... provisions of Executive Order 12958 and directives of the Information Security Oversight Office. The program... and complaints concerning the Commission's information security program; (d) Recommend appropriate...
FAA computer security : recommendations to address continuing weaknesses
DOT National Transportation Integrated Search
2000-12-01
In September, testimony before the Committee on Science, House of Representatives, focused on the Federal Aviation Administration's (FAA) computer security program. In brief, we reported that FAA's agency-wide computer security program has serious, p...
TealLock 5.20 security software program for handheld devices.
Tahil, Fatimah A
2004-07-01
The TealLock has a simple graphic interface, and the program is user-friendly with well thought out options to customize security settings. The program is inexpensive and works seamlessly with the Palm OS platform's built-in basic Security application. The developer offers a 30-day free trial version and there is no downside to trying it to see if it meets your needs. It seems to be an effective security software program for psychiatrists who keep confidential and sensitive patient information on their PDAs. In keeping with HIPAA regulations, the TealLock bolsters security for protected health information stored on PDAs or other handheld devices by providing safeguards that address authentication, access control, encryption, and selected aspects of transmission.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-23
...] Revision of Agency Information Collection Activity Under OMB Review: Secure Flight Program AGENCY... operators and foreign air carriers submit to Secure Flight for the purposes of watch list matching... screening checkpoint which airport operators will submit to Secure Flight, and a survey of certain general...
Evaluation of Participant Needs in a Regional Center for Security Studies
ERIC Educational Resources Information Center
Schmoker, Oliver E., III.
2009-01-01
This research study was implemented within the subject headquarters of a regional center, an organization responsible for security cooperation in Europe and Eurasia. The focus of the study was the center's program of security education. This program was designed to support evolving security objectives of foreign countries in order to increase the…
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1985-11-07
hijackings since 1973 during any comparable 6-month period. (See Exhibits 1, 2, and 3) Air carrier and airport security measures required by the FAA have...enforcement support for airline passenger boarding and airport security measures. The passengers, who are the principal beneficiaries of the security program
6 CFR 13.1 - Basis, purpose, scope and effect.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Basis, purpose, scope and effect. 13.1 Section 13.1 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL... Security on or after October 12, 2005. (2) Program fraud cases initiated by any component of the Department...
Cultural Awareness in Nuclear Security Programs: A Critical Link
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nasser, Al-Sharif Nasser bin; Auda, Jasmine; Bachner, Katherine
Nuclear security programs that offer training and capacity building opportunities to practitioners working in nuclear facilities play a central role in strengthening the global nuclear security architecture. There is often a significant divide, however, between both the development of these programs and their implementation, and between the programs’ intended and actual outcomes. This article argues that this disconnect can often be attributed to an absence of cultural awareness and an inability for internationally-designed programs to effectively resonate with local audiences. Furthermore, the importance of the role of cultural awareness in implementing nuclear security programs will be assessed, and its applicationsmore » in the Jordanian context will be presented.« less
Cultural Awareness in Nuclear Security Programs: A Critical Link
Nasser, Al-Sharif Nasser bin; Auda, Jasmine; Bachner, Katherine
2016-11-20
Nuclear security programs that offer training and capacity building opportunities to practitioners working in nuclear facilities play a central role in strengthening the global nuclear security architecture. There is often a significant divide, however, between both the development of these programs and their implementation, and between the programs’ intended and actual outcomes. This article argues that this disconnect can often be attributed to an absence of cultural awareness and an inability for internationally-designed programs to effectively resonate with local audiences. Furthermore, the importance of the role of cultural awareness in implementing nuclear security programs will be assessed, and its applicationsmore » in the Jordanian context will be presented.« less
The research of computer network security and protection strategy
NASA Astrophysics Data System (ADS)
He, Jian
2017-05-01
With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.
Federal Funding for Health Security in FY2015
Sell, Tara Kirk; Watson, Matthew
2014-01-01
Previous articles in this series have provided funding information for federal civilian biodefense programs and programs focused on radiological and nuclear preparedness and consequence management. This year the authors have expanded the focus of the analysis to US federal funding for health security. This article provides proposed funding amounts for FY2015, estimated amounts for FY2014, and actual amounts for FY2010 through FY2013 in 5 domains critical to health security: biodefense programs, radiological and nuclear programs, chemical programs, pandemic influenza and emerging infectious disease programs, and multiple-hazard and preparedness programs. PMID:24988432
Heidarian, Ali Reza; Jafari Kelarijani, Seyed Ebrahim; Jamshidi, Reza; Khorshidi, Mohamad
2015-01-01
Background: Health worker motivation has the potential to have a large impact on health system performance, and this depends on some factors. The purpose of this study was to determine the factors affecting this motivation. Methods: From Winter 2013 to Spring 2014, 1046 employees and physicians (439 males and 607 females) with a mean age of 36 and 37.2 years in men and women, respectively were chosen in selected hospitals of Social Security Organization (SSO). They were randomly categorized into six different classes of service record, age education class of hiring (permanent and contractual), marital status, and gender. The variables assessed via the classification groups were as follows: interpersonal relations, working conditions, equity, pay, job security, supervision, advancement, recognition, responsibility, and attractiveness of job, educational and organizational policies. Results: Bachelor’s degree (65%) or higher were the education degrees of most participants. Significant relations were observed regarding age, marital status, hiring, gender and years of service with promotion, recognition, responsibility, attractiveness of job, education, relations, working condition, equity, salary, job security, supervision and organizational policies. There were significant relations with hire status and degree with advancement and other variables. There were significant relations between marital status, gender, years of service and age with the above variables. Conclusion: The results show that the important variables that influence motivational factors are academic degree, hire status, marital status, gender, age and years of service. PMID:26644886
ERIC Educational Resources Information Center
Wilshusen, Gregory C.; Melvin, Valerie C.
2009-01-01
The Veterans Benefits, Health Care, and Information Technology Act of 2006 authorizes the Secretary of Veterans Affairs to establish an educational assistance program for information security. The Information Security Education Assistance Program is envisioned as a means for the Department of Veterans Affairs (VA) to attract and retain individuals…
Report: EPA’s National Security Information Program Could Be Improved
Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
5 CFR 9701.107 - Program evaluation.
Code of Federal Regulations, 2010 CFR
2010-01-01
....107 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.107 Program evaluation. (a) DHS will establish...
Pelfrey, William V; Pelfrey, William V
2009-02-01
Although most academic disciplines evolve at a measured pace, the emerging field of homeland security must, for reasons of safety and security, evolve rapidly. The Department of Homeland Security sponsored the establishment of a graduate educational program for key officials holding homeland security roles. Because homeland security is a nascent field, the establishment of a program curriculum was forced to draw from a variety of disciplines. Curriculum evaluation was complicated by the rapid changes occurring in the emerging discipline, producing response shift bias, and interfering with the pre-post assessments. To compensate for the validity threat associated with response shift bias, a retrospective pretest-posttest evaluative methodology was used. Data indicate the program has evolved in a significant and orderly fashion and these data support the use of this innovative evaluation approach in the development of any discipline.
Effectiveness of the Civil Aviation Security Program.
1976-04-19
AD-AtA 424 FEDERAL AVIATION ADMINISTRATION WASHINGToN DC OFFICE 7 ETC F/6 1/2 EFFECTIVENESS OF THE CIVIL AVIATION SECURITY PROGRAM. U) APR 76...April 19, 1976 Semiannual Report to Congress -on the Effectiveness 6. Pefom,-g o,qn.st.,n Cad of the Civil Aviation Security Program __._. P..I.,mng O,oon...Aviatio’n Administration Office of Civil Aviation Security 1i. C0a,,,c , ,No. 0800 Independence Avenue, SW. Washington, D.C. 20591 13. 7ype of Row iaend Pe
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program
1988-11-01
secure Zround environment and for providing local law enforcement support for airline and airport security measures. Finally, the passengers, the...operating environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 402 airports...assistance during this project. Responding to urgent requests from the Government of Liberia for onsite training of its airport security forces, FAA
Tao, Jinyuan; Gunter, Glenda; Tsai, Ming-Hsiu; Lim, Dan
2016-01-01
Recently, the many robust learning management systems, and the availability of affordable laptops, have made secure laptop-based testing a reality on many campuses. The undergraduate nursing program at the authors' university began to implement a secure laptop-based testing program in 2009, which allowed students to use their newly purchased laptops to take quizzes and tests securely in classrooms. After nearly 5 years' secure laptop-based testing program implementation, a formative evaluation, using a mixed method that has both descriptive and correlational data elements, was conducted to seek constructive feedback from students to improve the program. Evaluation data show that, overall, students (n = 166) believed the secure laptop-based testing program helps them get hands-on experience of taking examinations on the computer and gets them prepared for their computerized NCLEX-RN. Students, however, had a lot of concerns about laptop glitches and campus wireless network glitches they experienced during testing. At the same time, NCLEX-RN first-time passing rate data were analyzed using the χ2 test, and revealed no significant association between the two testing methods (paper-and-pencil testing and the secure laptop-based testing) and students' first-time NCLEX-RN passing rate. Based on the odds ratio, however, the odds of students passing NCLEX-RN the first time was 1.37 times higher if they were taught with the secure laptop-based testing method than if taught with the traditional paper-and-pencil testing method in nursing school. It was recommended to the institution that better quality of laptops needs to be provided to future students, measures needed to be taken to further stabilize the campus wireless Internet network, and there was a need to reevaluate the Laptop Initiative Program.
Leveraging Trade Agreements to Meet U.S. Security Aims
2016-04-08
TO MEET U.S. SECURITY AIMS 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd. PROJECT NUMBER LTC Allysa A. Kropp (USARNG) Se. TASK NUMBER 5f...Sanctions Programs and Country Information,” under “Resource Center, Financial Sanctions, Programs ,” https’.//wwiv.treasurv.gov/resource center/sanctions... Program , and economic integration of former adversaries through U.S. trade policy.7 In the National Security Strategy, President Obama underscored the
The Effect of Knowledge of Online Security Risks on Consumer Decision Making in B2C e-Commerce
ERIC Educational Resources Information Center
Wang, Ping An
2010-01-01
This dissertation research studied how different degrees of knowledge of online security risks affect B2C (business-to-consumer) e-commerce consumer decision making. Online information security risks, such as identity theft, have increasingly become a major factor inhibiting the potential growth of e-commerce. On the other hand, e-commerce…
Psychological Security and Self-Efficacy among Syrian Refugee Students inside and outside the Camps
ERIC Educational Resources Information Center
ALharbi, Bassam H. M.
2017-01-01
The present study aimed to identify the degree of psychological security and self-efficacy among the Syrian refugee students inside and outside the camps. The sample consisted of 600 students from Syrian refugees inside and outside the camps in the second semester of the academic year 2014-2015. Scales for psychological security and self-efficacy…
14 CFR 1203.603 - Systematic review for declassification.
Code of Federal Regulations, 2011 CFR
2011-01-01
... National Security Agency. (3) Systematic review for declassification of classified information pertaining... coordinated through the Central Intelligence Agency. (4) The Chairperson, NASA Information Security Program... guidelines. The Chairperson, NASA Information Security Program Committee, shall develop, in coordination with...
Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.
ERIC Educational Resources Information Center
Hungerford, Thomas L.
2006-01-01
The Social Security Trustees project that the Social Security program faces longterm financing difficulties. Several proposals that have been offered to shore-up the finances of the Social Security program would create individual retirement accounts funded with part of the payroll tax. The authors of many of these proposals claim that future…
49 CFR 659.25 - Annual review of system safety program plan and system security plan.
Code of Federal Regulations, 2010 CFR
2010-10-01
... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...
46 CFR 111.01-19 - Inclination of the vessel.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Inclination of the vessel. 111.01-19 Section 111.01-19 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS...) 15 degrees static list, 22.5 degrees dynamic roll; and (2) 7.5 degrees static trim. (b) All emergency...
ERIC Educational Resources Information Center
Cabrera, Alberto F.; Burkum, Kurt R.; La Nasa, Steven M.
The High School Sophomore Cohort of 1980 followed nine different pathways to a 4-year college degree. These paths were formed by a combination of different levels of academic preparation secured in high school and the first type of postsecondary institution attended. The pathway most likely to lead to a 4-year degree is one defined by acquiring…
Rural income transfer programs and rural household food security in Ethiopia.
Uraguchi, Zenebe B
2012-01-01
Based on household food security surveys conducted in Ethiopia, this study seeks to understand the roles and limitations of income transfer projects as determinants of households’ food security. By covering the Food-For-Work Programs (FFWPs) and the Productive Safety Net Programs (PSNPs), the study shows that these programs served as temporary safety nets for food availability, but they were limited in boosting the dietary diversity of households and their coping strategies. Households which participated in the programs increased their supply of food as a temporary buffer to seasonal asset depletion. However, participation in the programs was marred by inclusion error (food-secure households were included) and exclusion error (food-insecure households were excluded). Income transfer projects alone were not robust determinants of household food security. Rather, socio-demographic variables of education and family size as well as agricultural input of land size were found to be significant in accounting for changes in households’ food security. The programs in the research sites were funded through foreign aid, and the findings of the study imply the need to reexamine the approaches adopted by bilateral donors in allocating aid to Ethiopia. At the same time the study underscores the need to improve domestic policy framework in terms of engendering rural local institutional participation in project management.
Landscape ecological security response to land use change in the tidal flat reclamation zone, China.
Zhang, Runsen; Pu, Lijie; Li, Jianguo; Zhang, Jing; Xu, Yan
2016-01-01
As coastal development becomes a national strategy in Eastern China, land use and landscape patterns have been affected by reclamation projects. In this study, taking Rudong County, China as a typical area, we analyzed land use change and its landscape ecological security responses in the tidal flat reclamation zone. The results show that land use change in the tidal flat reclamation zone is characterized by the replacement of natural tidal flat with agricultural and construction land, which has also led to a big change in landscape patterns. We built a landscape ecological security evaluation system, which consists of landscape interference degree and landscape fragile degree, and then calculated the landscape ecological security change in the tidal flat reclamation zone from 1990 to 2008 to depict the life cycle in tidal flat reclamation. Landscape ecological security exhibited a W-shaped periodicity, including the juvenile stage, growth stage, and maturation stage. Life-cycle analysis demonstrates that 37 years is required for the land use system to transform from a natural ecosystem to an artificial ecosystem in the tidal flat reclamation zone.
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
6 CFR 29.5 - Requirements for protection.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL... PCII Program Manager or the PCII Program Manager's designee; (2) The information is submitted for... information initially provided received by the PCII Program Manager or the PCII Program Manager's designee...
6 CFR 29.5 - Requirements for protection.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL... PCII Program Manager or the PCII Program Manager's designee; (2) The information is submitted for... information initially provided received by the PCII Program Manager or the PCII Program Manager's designee...
14 CFR 1203.200 - Background and discussion.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 1203.200 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.200 Background and discussion. (a) In establishing a... public inspection of that information that is classified to protect the national security. (b) In...
14 CFR 1203.900 - Establishment.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.900 Establishment. Pursuant to Executive Order 12958, “National Security Information,” and the National Aeronautics and Space Act of 1958, as amended, there is established...
Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.
Programs That Support Safety and Security for the Transit Industry
DOT National Transportation Integrated Search
2001-03-01
FTA's Office of Safety and Security (Office) directly supports the U.S. Department of Transportation's safety goals through a series of programs designed to maintain continuous improvement in the safety and security of our nation's transit systems. T...
Code of Federal Regulations, 2010 CFR
2010-01-01
... establish an industrial security program for the purpose of safeguarding classified information under the... Agent for the National Industrial Security Program. Commission means the Nuclear Regulatory Commission... designated by the Executive Director for Operations, is eligible for a security clearance for access to...
14 CFR 1203.200 - Background and discussion.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 1203.200 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.200 Background and discussion. (a) In establishing a... public inspection of that information that is classified to protect the national security. (b) In...
14 CFR 1203.900 - Establishment.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.900 Establishment. Pursuant to Executive Order 12958, “National Security Information,” and the National Aeronautics and Space Act of 1958, as amended, there is established...
Creation of security engineering programs by the Southwest Surety Institute
NASA Astrophysics Data System (ADS)
Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn
1998-12-01
The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.
Standardized development of computer software. Part 1: Methods
NASA Technical Reports Server (NTRS)
Tausworthe, R. C.
1976-01-01
This work is a two-volume set on standards for modern software engineering methodology. This volume presents a tutorial and practical guide to the efficient development of reliable computer software, a unified and coordinated discipline for design, coding, testing, documentation, and project organization and management. The aim of the monograph is to provide formal disciplines for increasing the probability of securing software that is characterized by high degrees of initial correctness, readability, and maintainability, and to promote practices which aid in the consistent and orderly development of a total software system within schedule and budgetary constraints. These disciplines are set forth as a set of rules to be applied during software development to drastically reduce the time traditionally spent in debugging, to increase documentation quality, to foster understandability among those who must come in contact with it, and to facilitate operations and alterations of the program as requirements on the program environment change.
Job satisfaction among recent graduates of schools of nursing.
Munro, B H
1983-01-01
Using a randomly selected national sample and multiple regression analysis, the correlates of job satisfaction among recent graduates of nursing programs were investigated. Factor analysis was used to test the validity of Herzberg's theory of job satisfaction/dissatisfaction. For these 329 employed RNs, responsibility (the importance and challenge of the work) was the most important determinant of job satisfaction, and working conditions was the second strongest predictor. Graduates from diploma, associate degree, and baccalaureate programs did not differ in terms of job satisfaction. Support was given for the validity of Herzberg's dual-factor theory in relation to all five motivators included in the analysis (achievement, work itself, responsibility, advancement, and growth) and for the hygiene salary. The validity of four other hygienes (supervision, working conditions, status, and security) was not established. The results imply that administrators need to appeal to nurses' needs for important challenging jobs and opportunities to grow and develop professionally.
75 FR 39423 - National Institute on Disability and Rehabilitation Research (NIDRR)-Disability and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
... (VR) State Grants program; the Social Security Disability Insurance and Supplemental Security Income programs; health care initiatives; and other Federal or State programs affect employment rates for...
75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-10
... Education Program; 1101 Wilson Blvd., Suite 1210; Rosslyn, VA 22219. FOR FURTHER INFORMATION CONTACT: Dr. Kevin Gormley, Program Officer, National Security Education Program, 1101 Wilson Boulevard, Suite 1210...
Security Risks: Management and Mitigation in the Software Life Cycle
NASA Technical Reports Server (NTRS)
Gilliam, David P.
2004-01-01
A formal approach to managing and mitigating security risks in the software life cycle is requisite to developing software that has a higher degree of assurance that it is free of security defects which pose risk to the computing environment and the organization. Due to its criticality, security should be integrated as a formal approach in the software life cycle. Both a software security checklist and assessment tools should be incorporated into this life cycle process and integrated with a security risk assessment and mitigation tool. The current research at JPL addresses these areas through the development of a Sotfware Security Assessment Instrument (SSAI) and integrating it with a Defect Detection and Prevention (DDP) risk management tool.
Kaliningrad and Baltic Security
2001-06-01
Kennedy-Minott, Thesis Co-Advisor ___________________________________________ James Wirtz , Chairman Department of National Security Affairs iv...39 Jochen Prantl, �Security and Stability in Northern Europe � A Threat Assessment,� Program on the Northern Dimension of the CFSP, 29...www.usis.usemb.se/ wireless/500/eur508.htm Prantl, Jochen . �Security and Stability in Northern Europe � A Threat Assessment.� Program on the Northern Dimension
17 CFR 38.605 - Requirements for financial surveillance program.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Requirements for financial surveillance program. 38.605 Section 38.605 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... financial surveillance program. A designated contract market's financial surveillance program for futures...
17 CFR 38.605 - Requirements for financial surveillance program.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Requirements for financial surveillance program. 38.605 Section 38.605 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... financial surveillance program. A designated contract market's financial surveillance program for futures...
Developing a computer security training program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1990-01-01
We all know that training can empower the computer protection program. However, pushing computer security information outside the computer security organization into the rest of the company is often labeled as an easy project or a dungeon full of dragons. Used in part or whole, the strategy offered in this paper may help the developer of a computer security training program ward off dragons and create products and services. The strategy includes GOALS (what the result of training will be), POINTERS (tips to ensure survival), and STEPS (products and services as a means to accomplish the goals).
Measuring Security Effectiveness and Efficiency at U.S. Commercial Airports
2013-03-01
formative program evaluation and policy analysis to investigate current airport security programs. It identifies innovative public administration and...policy-analysis tools that could provide potential benefits to airport security . These tools will complement the System Based Risk Management framework if
7 CFR 764.155 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.155 Section 764.155 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Farm Ownership Loan Program § 764.155 Security requirements...
7 CFR 764.235 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.235 Section 764.235 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Conservation Loan Program § 764.235 Security requirements. (a...
7 CFR 764.205 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.205 Section 764.205 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Downpayment Loan Program § 764.205 Security requirements. A...
7 CFR 764.155 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.155 Section 764.155 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Farm Ownership Loan Program § 764.155 Security requirements...
7 CFR 764.205 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.205 Section 764.205 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Downpayment Loan Program § 764.205 Security requirements. A...
Interactive Synthesis of Code Level Security Rules
2017-04-01
Interactive Synthesis of Code-Level Security Rules A Thesis Presented by Leo St. Amour to The Department of Computer Science in partial fulfillment...of the requirements for the degree of Master of Science in Computer Science Northeastern University Boston, Massachusetts April 2017 DISTRIBUTION...Abstract of the Thesis Interactive Synthesis of Code-Level Security Rules by Leo St. Amour Master of Science in Computer Science Northeastern University
Comparative Analysis of Curricula for Bachelor's Degree in Cyber Security in the USA and Ukraine
ERIC Educational Resources Information Center
Bystrova, Bogdana
2017-01-01
At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of…
Bartfeld, Judith S; Ahn, Hong-Min
2011-03-01
The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.
NNSA Program Develops the Next Generation of Nuclear Security Experts
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brim, Cornelia P.; Disney, Maren V.
2015-09-02
NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.
7 CFR 772.7 - Leasing minor program loan security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 7 2010-01-01 2010-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan... property for Minor Program loans to a third party when: (1) Leasing is the only feasible way to continue to...
7 CFR 772.7 - Leasing minor program loan security.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 7 2011-01-01 2011-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan... property for Minor Program loans to a third party when: (1) Leasing is the only feasible way to continue to...
Neller, Daniel J; Vitacco, Michael J; Magaletta, Philip R; Phillips-Boyles, A Brooke
2016-03-01
Research supports the effectiveness of the Risk-Needs-Responsivity model for reducing criminal recidivism. Yet programming interests of inmates--one facet of responsivity--remain an understudied phenomenon. In the present study, we explored the programming interests of 753 federal inmates housed across three levels of security. Results suggest that inmates, as a group, prefer specific programs over others, and that some of their interests may differ by security level. We discuss possible implications of these findings. © The Author(s) 2014.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
... Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Infrastructure Security Compliance... submitted by mail to the DHS/NPPD/ IP/ISCD CFATS Program Manager at the Department of Homeland Security, 245...
78 FR 15730 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... 1974; Computer Matching Program AGENCY: U.S. Citizenship and Immigration Services, Department of... Matching Program between the Department of Homeland Security, U.S. Citizenship and Immigration Services and... computer matching program between the Department of Homeland Security, U.S. Citizenship and Immigration...
An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012
NASA Astrophysics Data System (ADS)
Li, X. S.; Peng, Z. Y.; Li, T. T.
2016-08-01
This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.
77 FR 61771 - Facility Security Officer Training Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-11
... Security Officer training program, with the primary focus on developing the curriculum for such a program... Administrator of the Department of Transportation in developing the FSO training curriculum. The purpose of the...) to establish comprehensive FSO training requirements designed to provide full security training that...
2009-02-26
6 Intercity Passenger Rail Program (Amtrak...6 Intercity Bus Security Grant Program................................................................................. 7...for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency Management Agency
22 CFR 9.3 - Senior agency official.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.3 Senior agency official. The... senior agency official to direct and administer its information security program. The Department's senior... carrying out the provisions of the Executive Order and the Department's information security program by the...
77 FR 66880 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-07
... the database that stores information for the Lost and Stolen Securities Program. We estimate that 26... Lost and Stolen Securities Program database will be kept confidential. The Commission may not conduct... SECURITIES AND EXCHANGE COMMISSION Submission for OMB Review; Comment Request Upon Written Request...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.5 Procedures. (a) The Director of... for the FOIA/PA office is: National Security Agency, ATTN: FOIA/PA Services (DC321), 9800 Savage Road...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
32 CFR 322.6 - Establishing exemptions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.6 Establishing... the National Security Agency shall be prohibited to the extent authorized by Pub. L. No. 86-36 (1959...
7 CFR 764.255 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.255 Section 764.255 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Operating Loan Program § 764.255 Security requirements. An OL...
7 CFR 764.305 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.305 Section 764.305 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Youth Loan Program § 764.305 Security requirements. A first...
7 CFR 764.305 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.305 Section 764.305 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Youth Loan Program § 764.305 Security requirements. A first...
78 FR 48697 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-09
... INFORMATION: FEMA's Homeland Security Grant Program (HSGP) is an important part of the Administration's larger... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0034... concerning the collection of information to administer the Homeland Security Grant Program (HSGP). DATES...
34 CFR 361.63 - Program income.
Code of Federal Regulations, 2011 CFR
2011-07-01
... supported under this part. (b) Sources. Sources of program income include, but are not limited to, payments from the Social Security Administration for assisting Social Security beneficiaries and recipients to... earned when it is received. (2) Payments provided to a State from the Social Security Administration for...
34 CFR 361.63 - Program income.
Code of Federal Regulations, 2010 CFR
2010-07-01
... supported under this part. (b) Sources. Sources of program income include, but are not limited to, payments from the Social Security Administration for assisting Social Security beneficiaries and recipients to... earned when it is received. (2) Payments provided to a State from the Social Security Administration for...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2012 CFR
2012-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2011 CFR
2011-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2014 CFR
2014-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2013 CFR
2013-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
45 CFR 303.30 - Securing medical support information.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 2 2013-10-01 2012-10-01 true Securing medical support information. 303.30... (CHILD SUPPORT ENFORCEMENT PROGRAM), ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES STANDARDS FOR PROGRAM OPERATIONS § 303.30 Securing medical support information. (a) If...
45 CFR 303.30 - Securing medical support information.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 2 2011-10-01 2011-10-01 false Securing medical support information. 303.30... (CHILD SUPPORT ENFORCEMENT PROGRAM), ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES STANDARDS FOR PROGRAM OPERATIONS § 303.30 Securing medical support information. (a) If...
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215... FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...-risk, the facility must complete a Security Vulnerability Assessment. A Security Vulnerability...
2011-02-08
CAPE CANAVERAL, Fla. -- In Orbiter Processing Facility-1 at NASA's Kennedy Space Center in Florida, a thermal protection system technician secures a newly installed heat shield tile in place under space shuttle Atlantis. The tiles are part of the Orbiter Thermal Protection System, thermal shields to protect against temperatures as high as 3,000 degrees Fahrenheit, which are produced during descent for landing. Atlantis is being prepared for the STS-135 mission, which will deliver the Raffaello multi-purpose logistics module packed with supplies, logistics and spare parts to the International Space Station. STS-135 is targeted to launch June 28, and will be the last spaceflight for the Space Shuttle Program. Photo credit: NASA/Jack Pfaller
2011-02-17
CAPE CANAVERAL, Fla. -- In Orbiter Processing Facility-1 at NASA's Kennedy Space Center in Florida, a thermal protection system technician closely inspects a heat shield tile for space shuttle Atlantis before securing it into position. The tiles are part of the Orbiter Thermal Protection System that protects the shuttle against temperatures as high as 3,000 degrees Fahrenheit, which are produced during descent for landing. Atlantis is being prepared for the STS-135 mission, which will carry the Raffaello multi-purpose logistics module packed with supplies, logistics and spare parts to the International Space Station. STS-135 is targeted to launch June 28, and will be the last flight for the Space Shuttle Program. Photo credit: NASA/Jack Pfaller
41 CFR 105-62.101 - Security classification categories.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Security classification... classification categories. As set forth in Executive Order 12065, official information or material which requires... three categories: Namely, Top Secret, Secret, or Confidential, depending on its degree of significance...
41 CFR 105-62.101 - Security classification categories.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Security classification... classification categories. As set forth in Executive Order 12065, official information or material which requires... three categories: Namely, Top Secret, Secret, or Confidential, depending on its degree of significance...
41 CFR 105-62.101 - Security classification categories.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Security classification... classification categories. As set forth in Executive Order 12065, official information or material which requires... three categories: Namely, Top Secret, Secret, or Confidential, depending on its degree of significance...
Effectiveness of the Civil Aviation Security Program.
1981-04-15
on item were processed through the screening system daily. The airline and airport security measures developed continue to provide increased safety...United States or Puerto Rico. None of these 16 hijackings resulted from insufficient airport security measures or a breakdown in the FAA-approved airport ... airport security programs is conducted at the Transportation Safety Institute in Oklahoma City, Oklahoma. The course provides in-depth coverage of civil
Supporting secure programming in web applications through interactive static analysis.
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2014-07-01
Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bachner, Katherine M.; Mladineo, Stephen V.
The NNSA Material Protection, Control, and Accounting (MPC&A) program has been engaged for fifteen years in upgrading the security of nuclear materials in Russia. Part of the effort has been to establish the conditions necessary to ensure the long-term sustainability of nuclear security. A sustainable program of nuclear security requires the creation of an indigenous infrastructure, starting with sustained high level government commitment. This includes organizational development, training, maintenance, regulations, inspections, and a strong nuclear security culture. The provision of modern physical protection, control, and accounting equipment to the Russian Federation alone is not sufficient. Comprehensive infrastructure projects support themore » Russian Federation's ability to maintain the risk reduction achieved through upgrades to the equipment. To illustrate the contributions to security, and challenges of implementation, this paper discusses the history and next steps for an indigenous Tamper Indication Device (TID) program, and a Radiation Portal Monitoring (RPM) program.« less
Supporting secure programming in web applications through interactive static analysis
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2013-01-01
Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513
Exploring Public Health's roles and limitations in advancing food security in British Columbia.
Seed, Barbara A; Lang, Tim M; Caraher, Martin J; Ostry, Aleck S
2014-07-22
This research analyzes the roles and limitations of Public Health in British Columbia in advancing food security through the integration of food security initiatives into its policies and programs. It asks the question, can Public Health advance food security? If so, how, and what are its limitations? This policy analysis merges findings from 38 key informant interviews conducted with government and civil society stakeholders involved in the development of food security initiatives, along with an examination of relevant documents. The Population Health Template is used to delineate and analyze Public Health roles in food security. Public Health was able to advance food security in some ways, such as the adoption of food security as a core public health program. Public Health's leadership role in food security is constrained by a restricted mandate, limited ability to collaborate across a wide range of sectors and levels, as well as internal conflict within Public Health between Food Security and Food Protection programs. Public Health has a role in advancing food security, but it also faces limitations. As the limitations are primarily systemic and institutional, recommendations to overcome them are not simple but, rather, require movement toward embracing the determinants of health and regulatory pluralism. The results also suggest that the historic role of Public Health in food security remains salient today.
1985-01-01
jurisdiction over all U.S. DOD personnel and their dependents in Turkey. Security Assistance The U.S. Security Assistance Program in Turkey consists of a...variety of related activities. a. The Foreign Military Sales (FMS) and Military Assistance Pro- gram (MAP). These programs are designed to help...training. The FY85 IMET program for Turkey is about $3.1 million. [An expanded discussion of these security assistance activities is provided in the
Independent Review of Aviation Technology and Research Information Analysis System (ATRIAS) Database
1994-02-01
capability to support the Federal Aviation Administration (FAA)/ Aviation Security Research and Development Service’s (ACA) Explosive Detection...Systems (EDS) programs and Aviation Security Human Factors Program (ASHFP). This review was conducted by an independent consultant selected by the FAA...sections 2 and 3 of the report. Overall, ATRIAS was found to address many technology application areas relevant to the FAA’s aviation security programs
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 2 2012-07-01 2012-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 2 2011-07-01 2011-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 2 2014-07-01 2014-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 2 2013-07-01 2013-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...
78 FR 1275 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-08
... Social Security Administration (Computer Matching Agreement 1071). SUMMARY: In accordance with the... of its new computer matching program with the Social Security Administration (SSA). DATES: OPM will... conditions under which SSA will disclose Social Security benefit data to OPM via direct computer link. OPM...
[Welfare and health in the century of social security].
Westin, S
1999-12-10
Great achievements for public health in this century include penicillin, oral contraception, vaccination and transplantation, but the greatest contribution to the health of Norwegians may have been made by social security and the welfare state policies. The beneficial effects of social security include: less social inequality, a factor which in itself makes for better health, some degree of financial security for people who are ill and unable to support themselves or their families, universal availability of medical and health services. This paper explores the ideas and sources from which present-day social security legislation stems. The emergence of state based welfare legislation was inspired by developments in Germany under Bismarck; accident insurance for industrial workers was the first to be introduced in 1894. Several periods of active social security legislation followed at times when labour unions and socialist ideas were strong, supported, to some degree, by radical clergy and public health doctors. Social democratic governments, inspired by the British Beveridge plan towards the end of World War II, took the lead during the long post-war period until the mid 1970s. The Scandinavian model of social security is based on universal coverage and a single payer system. However, since the 1980s, as in other countries of Northern Europe, the social security system has come under pressure from market liberalism. Now at the turn of the century, increasing social inequalities cause some concern for the future of the welfare state.
Early diagnosis of diabetic retinopathy in primary care.
Jimenez-Baez, Maria Valeria; Marquez-Gonzalez, Horacio; Barcenas-Contreras, Rodolfo; Morales Montoya, Carlos; Espinosa-Garcia, Laura Fatima
2015-01-01
To evaluate the impact of a strategy for early detection of diabetic retinopathy in patients with type 2 diabetes mellitus (DMT2) in Quintana Roo, México. Study transversal, observational, prospective, analytical, eight primary care units from Mexican Social Security Institute in the northern delegation of the State of Quintana Roo, Mexico were included. A program for early detection of diabetic retinopathy (DR) in adult 376,169 was designed. Were diagnosed 683 cases of type 2 diabetes, in 105 patients randomized was conducted to direct ophthalmoscopy were subjected to a secondary hospital were assigned. Will determine the degree of diabetic retinopathy and macular edema was performed. In population were 55.2% female, mean age 48+11.1 years, 23.8 % had some degree of DR, 28.0% with mild non- proliferative diabetic retinopathy 48.0 % moderate 16.0% and severe and 8.0% showed proliferative diabetic retinopathy. Those over age 30 are 2.8 times more risk of developing DR, OR= 2.8; 95%CI: 0.42-18.0, and OR= 1.7; 95%CI: 1.02-2.95 women. The implementation of programs aimed at the early detection of debilitating conditions such as diabetic retinopathy health impact beneficiaries, effective links between primary care systems and provide second level positive health outcomes for patient diseases.
Early diagnosis of diabetic retinopathy in primary care
Jimenez-Baez, Maria Valeria; Barcenas-Contreras, Rodolfo; Morales Montoya, Carlos; Espinosa-Garcia, Laura Fatima
2015-01-01
Objective: To evaluate the impact of a strategy for early detection of diabetic retinopathy in patients with type 2 diabetes mellitus (DMT2) in Quintana Roo, México. Methods: Study transversal, observational, prospective, analytical, eight primary care units from Mexican Social Security Institute in the northern delegation of the State of Quintana Roo, Mexico were included. A program for early detection of diabetic retinopathy (DR) in adult 376,169 was designed. Were diagnosed 683 cases of type 2 diabetes, in 105 patients randomized was conducted to direct ophthalmoscopy were subjected to a secondary hospital were assigned. Will determine the degree of diabetic retinopathy and macular edema was performed. Results: In population were 55.2% female, mean age 48+11.1 years, 23.8 % had some degree of DR, 28.0% with mild non- proliferative diabetic retinopathy 48.0 % moderate 16.0% and severe and 8.0% showed proliferative diabetic retinopathy. Those over age 30 are 2.8 times more risk of developing DR, OR= 2.8; 95%CI: 0.42-18.0, and OR= 1.7; 95%CI: 1.02-2.95 women. Conclusions: The implementation of programs aimed at the early detection of debilitating conditions such as diabetic retinopathy health impact beneficiaries, effective links between primary care systems and provide second level positive health outcomes for patient diseases. PMID:26019380
Security Data Warehouse Application
NASA Technical Reports Server (NTRS)
Vernon, Lynn R.; Hennan, Robert; Ortiz, Chris; Gonzalez, Steve; Roane, John
2012-01-01
The Security Data Warehouse (SDW) is used to aggregate and correlate all JSC IT security data. This includes IT asset inventory such as operating systems and patch levels, users, user logins, remote access dial-in and VPN, and vulnerability tracking and reporting. The correlation of this data allows for an integrated understanding of current security issues and systems by providing this data in a format that associates it to an individual host. The cornerstone of the SDW is its unique host-mapping algorithm that has undergone extensive field tests, and provides a high degree of accuracy. The algorithm comprises two parts. The first part employs fuzzy logic to derive a best-guess host assignment using incomplete sensor data. The second part is logic to identify and correct errors in the database, based on subsequent, more complete data. Host records are automatically split or merged, as appropriate. The process had to be refined and thoroughly tested before the SDW deployment was feasible. Complexity was increased by adding the dimension of time. The SDW correlates all data with its relationship to time. This lends support to forensic investigations, audits, and overall situational awareness. Another important feature of the SDW architecture is that all of the underlying complexities of the data model and host-mapping algorithm are encapsulated in an easy-to-use and understandable Perl language Application Programming Interface (API). This allows the SDW to be quickly augmented with additional sensors using minimal coding and testing. It also supports rapid generation of ad hoc reports and integration with other information systems.
(Congressional Interest) Network Information and Space Security Center
2011-09-30
Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb , Croatia officials to structure terms for a...partnership with UCCS. In the short-term, UCCS will develop and deliver several courses in homeland security and assist the University of Zagreb in... Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees in homeland security. Hosted a group of
USSOF OPERATIONS IN AFRICA: PROSPECTS FOR FUTURE ENGAGEMENTS IN THE SAHEL
2017-04-03
Mechanical Engineering. He also obtained a Master of Arts degree in Terrorism , Organized Crime and Global Security from the Coventry University, United...was a staff officer in the Headquarters Nigerian Air Force, Abuja. iv Abstract As part of the Global War on Terror , AFRICOM was established...to secure the US security interests in Africa. AFRICOM, through the Trans-Saharan Counter Terrorism Partnership uses USSOF to engage Sahelian
ERIC Educational Resources Information Center
Miller, Steven E.; Seiberling, Chris
2004-01-01
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…
Strong tobacco control program requirements and secure funding are not enough: lessons from Florida.
Kennedy, Allison; Sullivan, Sarah; Hendlin, Yogi; Barnes, Richard; Glantz, Stanton
2012-05-01
Florida's Tobacco Pilot Program (TPP; 1998-2003), with its edgy Truth media campaign, achieved unprecedented youth smoking reductions and became a model for tobacco control programming. In 2006, 3 years after the TPP was defunded, public health groups restored funding for tobacco control programming by convincing Florida voters to amend their constitution. Despite the new program's strong legal structure, Governor Charlie Crist's Department of Health implemented a low-impact program. Although they secured the program's strong structure and funding, Florida's nongovernmental public health organizations did not mobilize to demand a high-impact program. Implementation of Florida's Amendment 4 demonstrates that a strong programmatic structure and secure funding are insufficient to ensure a successful public health program, without external pressure from nongovernmental groups.
Code of Federal Regulations, 2010 CFR
2010-04-01
... UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION National Security Information § 201.43 Program. The Director of Administration is designated as the official of the Commission who is responsible for implementation and oversight of information security programs and procedures...
12 CFR Appendix D-2 to Part 208 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2010 CFR
2010-01-01
... Relationships Risk Management Principles,” Nov. 1, 2001; FDIC FIL 68-99, Risk Assessment Tools and Practices for.... Definitions II. Standards for Safeguarding Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of...
12 CFR Appendix F to Part 225 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2010 CFR
2010-01-01
... Relationships Risk Management Principles,” Nov. 1, 2001; FDIC FIL 68-99, Risk Assessment Tools and Practices for.... Standards for Safeguarding Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B...
Mental Retardation: Determining Eligibility for Social Security Benefits.
ERIC Educational Resources Information Center
Reschly, Daniel J., Ed.; Myers, Tracy G., Ed.; Hartel, Christine R., Ed.
The Social Security Administration (SSA) provides income support and medical benefits for adults with mental retardation unable to perform substantial gainful activity through the Disability Insurance (DI) program and the Supplemental Security Income (SSI) program. SSI benefits are also provided to families of children and adolescents who evidence…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-09
... 1974; Department of Homeland Security/United States Citizenship and Immigration Services--DHS/USCIS-011... ``Department of Homeland Security/United States Citizenship and Immigration Services--011 E- Verify Program System of Records.'' The United States Citizenship and Immigration Services E-Verify Program allows...
32 CFR 321.9 - Appeal of initial amendment decision.
Code of Federal Regulations, 2011 CFR
2011-07-01
... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...
32 CFR 321.9 - Appeal of initial amendment decision.
Code of Federal Regulations, 2010 CFR
2010-07-01
... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...
32 CFR 321.9 - Appeal of initial amendment decision.
Code of Federal Regulations, 2012 CFR
2012-07-01
... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...
32 CFR 321.9 - Appeal of initial amendment decision.
Code of Federal Regulations, 2014 CFR
2014-07-01
... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...
32 CFR 321.9 - Appeal of initial amendment decision.
Code of Federal Regulations, 2013 CFR
2013-07-01
... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...
76 FR 6596 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
.... The Food Security Act of 1985 permits the states to establish ``central filing systems.'' These... in section 1324 of the Food Security Act of 1985. The information received from the State is... responsibility for the Clear Title Program (Section 1324 of the Food Security Act of 1985. Clear Title Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... Collection Activity Under OMB Review: Highway Baseline Assessment for Security Enhancement (BASE) Program... Assessment for Security Enhancement (BASE) Program. Type of Request: New collection. OMB Control Number: Not yet assigned. Form(s): Highway Baseline Assessment for Security Enhancement (BASE). Affected Public...
Code of Federal Regulations, 2013 CFR
2013-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.200 General. Brokers or dealers in securities are subject to the program requirements set forth and cross referenced in this subpart. Brokers or dealers in securities should also refer to subpart B of part 1010 of...
Code of Federal Regulations, 2011 CFR
2011-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.200 General. Brokers or dealers in securities are subject to the program requirements set forth and cross referenced in this subpart. Brokers or dealers in securities should also refer to subpart B of part 1010 of...
Code of Federal Regulations, 2014 CFR
2014-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.200 General. Brokers or dealers in securities are subject to the program requirements set forth and cross referenced in this subpart. Brokers or dealers in securities should also refer to subpart B of part 1010 of...
Code of Federal Regulations, 2012 CFR
2012-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.200 General. Brokers or dealers in securities are subject to the program requirements set forth and cross referenced in this subpart. Brokers or dealers in securities should also refer to subpart B of part 1010 of...
Education and the Degree of Data Security
ERIC Educational Resources Information Center
Spears, Phillip Dewitt
2013-01-01
New technology development has researchers inundated with a plethora of data security issues linked to cyber attacks and hackers' ability to transmogrify their techniques. The present research focused on the information technology managing officers' (ITMOs') level of education, size of organization, organization's industry, and effect they have on…
Epstein, Gerald L
2009-12-01
Over his entire career, Gerald Epstein has toiled at the nexus of science, technology, and security. From 2003 to 2009, he was Senior Fellow for Science and Security at the Center for Strategic and International Studies Homeland Security Program, where he worked on reducing biological weapons threats, improving national preparedness, and easing potential tensions between the scientific research and national security communities. Epstein came to CSIS from the Institute for Defense Analyses. From 1996 to 2001, he served in the White House Office of Science and Technology Policy. And from 1983 to 1989, and again from 1991 until its demise in 1995, Epstein worked at the Congressional Office of Technology Assessment, where he directed a study on the proliferation of weapons of mass destruction, alongside research on other global security topics. A recognized expert in biological risk reduction, Epstein was actually trained as a physicist, having received SB degrees in physics and electrical engineering from MIT, and a PhD in physics from the University of California at Berkeley. How, then, did he come to study the evolving threat from bioterrorism? "What compelled me about bioterrorism was that it was a stellar example of a topic that would lead to a train wreck between the scientific community and the security community unless they figured out how to work together," he said. "The distance between a laboratory and a very large consequence event is a lot shorter in biology than in any other field. I got into bioterrorism to help make sure that the security community doesn't get so scared of the science that it shuts it down, and that the science community isn't so oblivious of security concerns that it pays no attention to them." Epstein spoke on November 6, 2009, with contributing writer Madeline Drexler, author of Emerging Epidemics: The Menace of New Infections (Penguin, 2009), an updated version of an earlier volume. Drexler holds a visiting appointment at the Harvard School of Public Health and is a senior fellow at Brandeis University's Schuster Institute for Investigative Journalism.
Cyber security evaluation of II&C technologies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Ken
The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.« less
New active control nano-system to use in composites structure
NASA Astrophysics Data System (ADS)
Arche, M. R.
2012-09-01
The present abstract, is a brief description about our project (NEDEA). We considered this project as very important, because it reunites in his development, several basic technologies: electronics, communications, software and new materials, all very interesting in the European industry. The project is developed in the CSIC (Spanish Researcher Center). We are involved. Across the project, in the development of nano-sensors, specialized in detecting defects, difficulties or problems in structures of composed materials. These materials are being used, and in the future more, in applications where a high degree of security is necessary. Some fields in the system usage are Aeronautical and military applications whit a necessary high security degree. The development proposed, is based in nano-sensors and active devices. They are installed into the material structure. The information from sensors is transmitted by optical fibers, to a radio transmitter, equally installed into the material. An external receptor picks up those data and transmits them to an external device. This external device presents/displays all the information across an interface GUI, in real time, to the supervisor. He can see than is happening in the material, in real time. Alarms can be programmed, by the supervisor. Is possible a tracking for the problem. All the devices and software are in develop in our laboratories. We think that this development will be used by the industry of materials, and that gradually, it will have other applications in the transport area (like new vehicles, wagons of train and metro, etc.).
Implementing an Information Security Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.
The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to covermore » information security best practices, planning for an information security management system, and implementing security controls for information security.« less
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
THE LONG REACH OF EDUCATION: EARLY RETIREMENT.
Venti, Steven; Wise, David A
2015-12-01
The goal of this paper is to draw attention to the long lasting effect of education on economic outcomes. We use the relationship between education and two routes to early retirement - the receipt of Social Security Disability Insurance (DI) and the early claiming of Social Security retirement benefits - to illustrate the long-lasting influence of education. We find that for both men and women with less than a high school degree the median DI participation rate is 6.6 times the participation rate for those with a college degree or more. Similarly, men and women with less than a high school education are over 25 percentage points more likely to claim Social Security benefits early than those with a college degree or more. We focus on four critical "pathways" through which education may indirectly influence early retirement - health, employment, earnings, and the accumulation of assets. We find that for women health is the dominant pathway through which education influences DI participation. For men, the health, earnings, and wealth pathways are of roughly equal magnitude. For both men and women the principal channel through which education influences early Social Security claiming decisions is the earnings pathway. We also consider the direct effect of education that does not operate through these pathways. The direct effect of education is much greater for early claiming of Social Security benefits than for DI participation, accounting for 72 percent of the effect of education for men and 67 percent for women. For women the direct effect of education on DI participation is not statistically significant, suggesting that the total effect may be through the four pathways.
Frohde, Kenny; Brooks, David J
Emergency management (EM) and business continuity management (BCM) frameworks incorporate various strategic and operational measures. Defined within a number of national and international standards and guidelines, such concepts may be integrated within one another to provide increased resilience to disruptive events. Nevertheless, there is a degree of dispute regarding concept integration among security and EM professionals and bodies of knowledge. In line with cognitive psychology exemplar-based concepts, such disputes may be associated with a lack of precision in communality in the approach to EM and BCM. This paper presents a two-stage study, where stage 1 critiqued national and international literature and stage 2 applied semi-structured interviews with security managers in Western Australia. Findings indicate the existence of contradictory views on EM and its integration within BCM. As such, this study concludes that EM is considered a vital component of BCM by the majority of security managers. However, there is broader dispute regarding its degree of integration. Understanding the underpinnings of such disputes will aid in raising the standards and application of professionalism within security, EM and BCM domains, supporting clarification and definition of professional boundaries.
32 CFR 154.61 - Security education.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...
32 CFR 154.61 - Security education.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...
32 CFR 154.61 - Security education.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...
32 CFR 154.61 - Security education.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...
32 CFR 154.61 - Security education.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-25
... program under title XIX of the Social Security Act, (3) the Children's Health Insurance Program (CHIP... program under title XIX of the Social Security Act; (3) the Children's Health Insurance Program (CHIP... qualified health plans in which the taxpayers or a member of the taxpayers family (coverage family) is...
ERIC Educational Resources Information Center
Grossman, Michael; Schortgen, Francis
2016-01-01
This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-30
... notice of its renewal of an ongoing computer-matching program with the Social Security Administration... computer-matching program with the Committee on Homeland Security and Governmental Affairs of the Senate... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as amended; Notice of Computer Matching Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-10
... notice of its renewal of an ongoing computer-matching program with the Social Security Administration... computer-matching program with the Committee on Homeland Security and Governmental Affairs of the Senate... RAILROAD RETIREMENT BOARD Privacy Act of 1974, as Amended; Notice of Computer Matching Program...
ERIC Educational Resources Information Center
Ayers, David F.; Miller-Dyce, Cherrel; Carlone, David
2008-01-01
Researchers asked 17 participants in a job-training program to describe their personal struggles following an economic restructuring. Examined through a critical theoretical lens, findings indicate that the learners enrolled in the program to reclaim security, dignity, meaningful work, and caring relationships. Program planners at community…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-28
... 253 Administrative practice and procedure, Food assistance programs, Grant programs, Social programs... title XVI of the Social Security Act or disability or blindness payments under titles I, II, X, XIV, or XVI of the Social Security Act; (2) Receives federally- or State-administered supplemental benefits...
Federal Funding for Health Security in FY2016.
Boddie, Crystal; Sell, Tara Kirk; Watson, Matthew
2015-01-01
This article assesses US government funding in 5 domains critical to strengthening health security: biodefense programs, radiological and nuclear programs, chemical programs, pandemic influenza and emerging infectious disease programs, and multiple-hazard and preparedness programs. This year's article also highlights the emergency funding appropriated in FY2015 to enable the international and domestic response to the Ebola outbreak in West Africa.
Federal Funding for Health Security in FY2016
Sell, Tara Kirk; Watson, Matthew
2015-01-01
This article assesses US government funding in 5 domains critical to strengthening health security: biodefense programs, radiological and nuclear programs, chemical programs, pandemic influenza and emerging infectious disease programs, and multiple-hazard and preparedness programs. This year's article also highlights the emergency funding appropriated in FY2015 to enable the international and domestic response to the Ebola outbreak in West Africa. PMID:26042863
Two Stage Sibling Cycle Compressor/Expander.
1994-02-01
documents, follow the procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1 -R, Information Security Program Regulation...procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1-R, Information Security Program Regulation, Chapter IX. For...Spae Piston rotation periodically connects channels from expansion/ compresion ces to ports P1Port B2 Heat Exchangers B Piston moves Ports Process Al
Safe teleradiology: information assurance as project planning methodology.
Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2005-01-01
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.
The Use of Electronic Book Theft Detection Systems in Libraries.
ERIC Educational Resources Information Center
Witt, Thomas B.
1996-01-01
Although electronic book theft detection systems can be a deterrent to library material theft, no electronic system is foolproof, and a total security program is necessary to ensure collection security. Describes how book theft detection systems work, their effectiveness, and the problems inherent in technology. A total security program considers…
7 CFR 774.18 - Interest rate, terms and security requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 7 2010-01-01 2010-01-01 false Interest rate, terms and security requirements. 774.18..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS EMERGENCY LOAN FOR SEED PRODUCERS PROGRAM § 774.18 Interest rate, terms and security requirements. (a) Interest rate. (1) The interest rate on the loan will be zero...
12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2010 CFR
2010-01-01
... Relationships Risk Management Principles,” Nov. 1, 2001; FDIC FIL 68-99, Risk Assessment Tools and Practices for... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
...; Department of Homeland Security Transportation Security Administration-023 Workplace Violence Prevention... Administration-023 Workplace Violence Prevention Program System of Records and this proposed rulemaking. In this... Privacy Act (5 U.S.C. 552a) titled, DHS/TSA-023 Workplace Violence Prevention Program System of Records...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-27
... the provisions of the Department of Defense National Industrial Security Program Operating Manual, an... Department of Defense National Industrial Security Program Operating Manual (unless such requirements are in..., Arms Control and International Security, Department of State. [FR Doc. 2010-21450 Filed 8-26-10; 8:45...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-20
... Request; Secure Supply Chain Pilot Program AGENCY: Food and Drug Administration, HHS. ACTION: Notice... identified with the title Secure Supply Chain Pilot Program. Also include the FDA docket number found in... following proposed collection of information to OMB for review and clearance: ``Secure Supply Chain Pilot...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...
An economic and feasible Quantum Sealed-bid Auction protocol
NASA Astrophysics Data System (ADS)
Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan
2018-02-01
We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.