Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-28
... Amendment to the National Market System Plan to Address Extraordinary Market Volatility, File No. 4-631... Market System Plan To Address Extraordinary Market Volatility). \\7\\ See Securities Exchange Act Release... requirements of the Plan are coupled with Trading Pauses to accommodate more fundamental price moves (as...
Security Considerations and Recommendations in Computer-Based Testing
Al-Saleem, Saleh M.
2014-01-01
Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee. PMID:25254250
Security considerations and recommendations in computer-based testing.
Al-Saleem, Saleh M; Ullah, Hanif
2014-01-01
Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee.
Renewable Energy Education in India
ERIC Educational Resources Information Center
Bajpai, Shrish; Kidwai, Naimur Rahman
2017-01-01
The issue of renewable energy sources that have great potential to give solutions to the longstanding energy problems of India has been considered. It has been stated that renewable energy sources are an important part of India's plan to increase energy security and provide new generation with ample job opportunities. India's plans to move towards…
A sequential-move game for enhancing safety and security cooperation within chemical clusters.
Pavlova, Yulia; Reniers, Genserik
2011-02-15
The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided. Copyright © 2010 Elsevier B.V. All rights reserved.
DOT National Transportation Integrated Search
2009-08-01
Every day almost a million shipments of hazardous materials move safely and securely along our nations transportation system, via any combination of modes. Only a small fraction of total shipments interrupt their planned journey due to an incident...
Homeland security: sharing and managing critical incident information
NASA Astrophysics Data System (ADS)
Ashley, W. R., III
2003-09-01
Effective critical incident response for homeland security requires access to real-time information from many organizations. Command and control, as well as basic situational awareness, are all dependant on quickly communicating a dynamically changing picture to a variety of decision makers. For the most part, critical information management is not unfamiliar or new to the public safety community. However, new challenges present themselves when that information needs to be seamlessly shared across multiple organizations at the local, state and federal level in real-time. The homeland security problem does not lend itself to the traditional military joint forces planning model where activities shift from a deliberate planning process to a crisis action planning process. Rather, the homeland security problem is more similar to a traditional public safety model where the current activity state moves from complete inactivity or low-level attention to immediate crisis action planning. More often than not the escalation occurs with no warning or baseline information. This paper addresses the challenges of sharing critical incident information and the impacts new technologies will have on this problem. The value of current and proposed approaches will be critiqued for operational value and areas will be identified for further development.
Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.
Sahi, Aqeel; Lai, David; Li, Yan
2016-11-01
Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects. Copyright © 2016 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Kiss, Elizabeth
2006-01-01
Earning, spending, saving and investing, and using credit are important aspects of money management that teens need to understand as they move into adulthood. Family and consumer sciences (FCS) professionals have a long history of addressing this important life skill. This brief article describes the High School Financial Planning Program (HSFPP),…
Plan now to make your retirement active, productive.
Schlepp, S
1989-12-01
In his book Planning to the Years Ahead, Lester I. Tenney, PhD, professor emeritus at Arizona State University, Tempe, links Abraham Maslow's hierarchy of needs to retirement planning. According to Maslow, economic and security needs can be achieved through a family environment (eg, food clothing, shelter), and social acceptance, self-worth, and self-satisfaction can be achieved from social interaction, work, or leisure activities. After the basic needs of food, clothing, and shelter have been achieved, people are able to move to the next level of achieving safety and security. The level of dependency that people have on satisfying these needs through work will determine how well they are at adapting to retirement. The more people depend on work alone, the harder will be the adjustment; people who are less dependent on work will find retirement easier to accept.
Dynamic Routing and Coordination in Multi-Agent Networks
2016-06-10
SECURITY CLASSIFICATION OF: Supported by this project, we designed innovative routing, planning and coordination strategies for robotic networks and...tasks partitioned among robots , in what order are they to be performed, and along which deterministic routes or according to which stochastic rules do...individual robots move. The fundamental novelties and our recent breakthroughs supported by this project are manifold: (1) the application 1
2013-08-14
Time-Varying (LTV); Clohessy - Wiltshire -Hill (CWH) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF...linearized Hill- Clohessy - Wiltshire (HCW) equations [15] approximate the relative motion of the spacecraft on a circular orbit as ẍ− 3n2x− 2nẏ = Fx mc
77 FR 44475 - Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-30
...-AA87 Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... Seafair Fleet Week Moving Vessels Security Zones from 12:00 p.m. on July 31, 2012 through 5:00 p.m. on August 6, 2012. These security zones are necessary to help ensure the security of the vessels from...
Davoren, Mary; O'Dwyer, Sarah; Abidin, Zareena; Naughton, Leena; Gibbons, Olivia; Doyle, Elaine; McDonnell, Kim; Monks, Stephen; Kennedy, Harry G
2012-07-13
We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Clinicians appear to decide moves based on combinations of current and imminent (dynamic) risk measured by HCR-20 dynamic score and historical seriousness of risk as measured by need for therapeutic security (DUNDRUM-1) in keeping with Scott's formulation of risk and seriousness. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales have utility as dynamic measures that can off-set perceived 'dangerousness'.
2012-01-01
Background We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. Methods This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. Results There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Conclusions Clinicians appear to decide moves based on combinations of current and imminent (dynamic) risk measured by HCR-20 dynamic score and historical seriousness of risk as measured by need for therapeutic security (DUNDRUM-1) in keeping with Scott's formulation of risk and seriousness. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales have utility as dynamic measures that can off-set perceived 'dangerousness'. PMID:22794187
Expanded managed care liability: what impact on employer coverage?
Studdert, D M; Sage, W M; Gresenz, C R; Hensler, D R
1999-01-01
Policymakers are considering legislative changes that would increase managed care organizations' exposure to civil liability for withholding coverage or failing to deliver needed care. Using a combination of empirical information and theoretical analysis, we assess the likely responses of health plans and Employee Retirement Income Security Act (ERISA) plan sponsors to an expansion of liability, and we evaluate the policy impact of those moves. We conclude that the direct costs of liability are uncertain but that the prospect of litigation may have other important effects on coverage decision making, information exchange, risk contracting, and the extent of employers' involvement in health coverage.
Heavy Lift for National Security: The Ares V
NASA Technical Reports Server (NTRS)
Sumrall, Phil
2009-01-01
The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.
An Advanced Tabu Search Approach to Solving the Mixed Payload Airlift Load Planning Problem
2009-03-01
cargo, and the problem therefore becomes trivial. 3. Shoring: Some cargo requires shoring which is small planks of plywood stacked on top of each...Integer Programming Method In 1989, Kevin Ng examined the bin-packing MPALP for Canada’s C-130 aircraft (Ng 1992). His goal was to move a set of... leadership & ethics [ ] warfighting [ ] international security [ ] doctrine [X] other (specify): Military Airlift
Redefining Tactical Operations for MER Using Cloud Computing
NASA Technical Reports Server (NTRS)
Joswig, Joseph C.; Shams, Khawaja S.
2011-01-01
The Mars Exploration Rover Mission (MER) includes the twin rovers, Spirit and Opportunity, which have been performing geological research and surface exploration since early 2004. The rovers' durability well beyond their original prime mission (90 sols or Martian days) has allowed them to be a valuable platform for scientific research for well over 2000 sols, but as a by-product it has produced new challenges in providing efficient and cost-effective tactical operational planning. An early stage process adaptation was the move to distributed operations as mission scientists returned to their places of work in the summer of 2004, but they would still came together via teleconference and connected software to plan rover activities a few times a week. This distributed model has worked well since, but it requires the purchase, operation, and maintenance of a dedicated infrastructure at the Jet Propulsion Laboratory. This server infrastructure is costly to operate and the periodic nature of its usage (typically heavy usage for 8 hours every 2 days) has made moving to a cloud based tactical infrastructure an extremely tempting proposition. In this paper we will review both past and current implementations of the tactical planning application focusing on remote plan saving and discuss the unique challenges present with long-latency, distributed operations. We then detail the motivations behind our move to cloud based computing services and as well as our system design and implementation. We will discuss security and reliability concerns and how they were addressed
76 FR 40617 - Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-11
...-AA87 Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington AGENCY... security zones around the HMCS WHITEHORSE (NCSM 705), HMCS NANAIMO (NCSM 702), and the USCGC MELLON (WHEC... August 8, 2011. These security zones are necessary to help ensure the security of the vessels from...
Assessment of global water security: moving beyond water scarcity assessment
NASA Astrophysics Data System (ADS)
Wada, Y.; Gain, A. K.; Giupponi, C.
2015-12-01
Water plays an important role in underpinning equitable, stable and productive societies, and the ecosystems on which we depend. Many international river basins are likely to experience 'low water security' over the coming decades. Hence, ensuring water security along with energy and food securities has been recognised as priority goals in Sustainable Development Goals (SDGs) by the United Nations. This water security is not rooted only in the limitation of physical resources, i.e. the shortage in the availability of freshwater relative to water demand, but also on social and economic factors (e.g. flawed water planning and management approaches, institutional incapability to provide water services, unsustainable economic policies). Until recently, advanced tools and methods are available for assessment of global water scarcity. However, integrating both physical and socio-economic indicators assessment of water security at global level is not available yet. In this study, we present the first global understanding of water security using a spatial multi-criteria analysis framework that goes beyond available water scarcity assessment. For assessing water security at global scale, the term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The Water security index is calculated by aggregating the indicators using both simple additive weighting (SAW) and ordered weighted average (OWA).
Vietnam: expanding the social security system.
Pruzin, D
1996-01-01
Viet Nam's shift toward a market-oriented economy has been associated with annual gross domestic product growth of more than 8% over the past 5 years. At the same time, the emergence of private-sector enterprises and subsequent closure of many state-run enterprises have had profound implications for Viet Nam's social protection systems. At present, only 5.6 million of the country's 33 million workers are covered under the state-run social insurance system. In 1995, the government moved to include private enterprises with 10 or more employees in its state benefits system. The International Labor Organization (ILO) has been working with the Vietnamese Government to design and implement a social security system that would extend coverage progressively to excluded sectors and provide support to workers who have become unemployed as a result of the economic transition process. At its Eighth National Congress, the Vietnamese Communist Party approved a 5-year social and economic plan calling for such an expansion of the social insurance system as well as for a guaranteed standard of living for pensioners. To facilitate anticipated changes, activities that were previously divided between the Ministry of Labor, Invalids, and Social Affairs and the Vietnam General Confederation of Labor have been assigned to the newly formed Vietnam Social Insurance (VSI) Organization. Under consideration is a plan to combine some VSI activities with those of the Vietnam Health Insurance Organization. The ILO will assist with training, computerization, and social security fund investing. Noncompliance is a major obstacle to planned expansion of the social security system; about 90% of private firms are still not paying into the system.
Analysis of Marine Corps Renewable Energy Planning to Meet Installation Energy Security Requirements
2013-12-03
experimentation eventually gives way to the era of ferment . A few new technologies break through in the industry and are applied to a growing number of niche...experimentation and ferment eventually give way to an era of incremental change, where the industry down-selects to the most successful and efficient...clearly in the later part of the era of incremental change. Most renewables, however, are only just now moving into the second phase, the era of ferment
33 CFR 103.510 - Area Maritime Security (AMS) Plan review and approval.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Area Maritime Security (AMS) Plan... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.510 Area Maritime Security (AMS) Plan review and approval. Each AMS Plan will be submitted...
77 FR 40521 - Security Zones, Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-10
... 1625-AA87 Security Zones, Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard, DHS. ACTION: Final rule. SUMMARY: The U.S. Coast Guard is establishing security zones around designated participating vessels that are not protected by the Naval Vessel Protection Zone in Seattle's...
The application of Markov decision process with penalty function in restaurant delivery robot
NASA Astrophysics Data System (ADS)
Wang, Yong; Hu, Zhen; Wang, Ying
2017-05-01
As the restaurant delivery robot is often in a dynamic and complex environment, including the chairs inadvertently moved to the channel and customers coming and going. The traditional Markov decision process path planning algorithm is not save, the robot is very close to the table and chairs. To solve this problem, this paper proposes the Markov Decision Process with a penalty term called MDPPT path planning algorithm according to the traditional Markov decision process (MDP). For MDP, if the restaurant delivery robot bumps into an obstacle, the reward it receives is part of the current status reward. For the MDPPT, the reward it receives not only the part of the current status but also a negative constant term. Simulation results show that the MDPPT algorithm can plan a more secure path.
Identifiable piezoelectric security system design
NASA Astrophysics Data System (ADS)
Li, Zhenyu; Zhang, Xiaoming
2017-10-01
Directing at the disadvantages of low environmental suitability, inferior anti-interference ability and being easy to be found and destroyed in existing security product, a kind of identifiable piezoelectric security system based on piezoelectric cable is designed. The present system gathers vibration signals of different moving bodies, such as human, vehicles, animals and so on, with piezoelectric cable buried under -ground and distinguishes the different moving bodies through recognition algorithm and thus giving an alarm. As is shown in experiments, the present system has the features of good concealment and high accuracy in distinguishing moving bodies.
49 CFR 659.23 - System security plan: contents.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...
Baker, Hallie E; Brown, Pamela Pitman
2015-01-01
The three-legged stool concept is widely used in gerontological and geriatric education as an explanation on how one should fiscally approach his or her retirement. Financial managers, planners, retirees, business owners, even the Social Security Administration uses this metaphor of fiscal soundness in retirement planning. Gerontologists are moving away from the "tripod of retirement income" and "three-legged stool" term, as more often market work is needed for financial security. This activity focuses on the tripod or three-legged stool concepts of retirement planning using active learning, allowing the students to work collaboratively in a group, reflect upon the activity, and most importantly have fun. The game also allows for an expansion of the tripod concepts into the four pillars of economic security, broaching the use of personal assets and the possible need for longer employment. Game scenarios also emphasize macro- and microlevel forces, such as race, gender, health status, education, or marital status, which can influence timing of retirement or the level of retirement income available. The authors include instructions on how to set up the learning experience including worksheets, as well as reflection questions posed throughout the process.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in paragraph (b) of this section and must submit the security plan as part of its REAL ID certification under § 37...
Code of Federal Regulations, 2011 CFR
2011-07-01
..., Saint Croix, U.S. Virgin Islands. (a) Location. A moving and fixed security zone is established that surrounds all cruise ships entering, departing, mooring or anchoring in the Port of Fredericksted, Saint Croix, U.S. Virgin Islands. The security zone extends from the cruise ship outward and forms a 50-yard...
Code of Federal Regulations, 2012 CFR
2012-07-01
..., Saint Croix, U.S. Virgin Islands. (a) Location. A moving and fixed security zone is established that surrounds all cruise ships entering, departing, mooring or anchoring in the Port of Fredericksted, Saint Croix, U.S. Virgin Islands. The security zone extends from the cruise ship outward and forms a 50-yard...
Code of Federal Regulations, 2014 CFR
2014-07-01
..., Saint Croix, U.S. Virgin Islands. (a) Location. A moving and fixed security zone is established that surrounds all cruise ships entering, departing, mooring or anchoring in the Port of Fredericksted, Saint Croix, U.S. Virgin Islands. The security zone extends from the cruise ship outward and forms a 50-yard...
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Saint Croix, U.S. Virgin Islands. (a) Location. A moving and fixed security zone is established that surrounds all cruise ships entering, departing, mooring or anchoring in the Port of Fredericksted, Saint Croix, U.S. Virgin Islands. The security zone extends from the cruise ship outward and forms a 50-yard...
Code of Federal Regulations, 2013 CFR
2013-07-01
..., Saint Croix, U.S. Virgin Islands. (a) Location. A moving and fixed security zone is established that surrounds all cruise ships entering, departing, mooring or anchoring in the Port of Fredericksted, Saint Croix, U.S. Virgin Islands. The security zone extends from the cruise ship outward and forms a 50-yard...
49 CFR 172.802 - Components of a security plan.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 2 2013-10-01 2013-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...
49 CFR 172.802 - Components of a security plan.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 2 2014-10-01 2014-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...
49 CFR 172.802 - Components of a security plan.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 2 2011-10-01 2011-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...
49 CFR 172.802 - Components of a security plan.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 2 2012-10-01 2012-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.500 General. (a) The Area Maritime... with the National Maritime Transportation Security Plan and the National Transportation Security Plan...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2012 CFR
2012-01-01
... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2013 CFR
2013-01-01
... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) A cyber security plan in accordance with the criteria set forth in § 73.54 of this chapter; (iv) A... cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan, shall protect the plans and...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2014 CFR
2014-01-01
... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...
49 CFR 659.25 - Annual review of system safety program plan and system security plan.
Code of Federal Regulations, 2010 CFR
2010-10-01
... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...
NASA Astrophysics Data System (ADS)
Ge, Linqiang; Yu, Wei; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik; Lu, Chao
2014-06-01
Most enterprise networks are built to operate in a static configuration (e.g., static software stacks, network configurations, and application deployments). Nonetheless, static systems make it easy for a cyber adversary to plan and launch successful attacks. To address static vulnerability, moving target defense (MTD) has been proposed to increase the difficulty for the adversary to launch successful attacks. In this paper, we first present a literature review of existing MTD techniques. We then propose a generic defense framework, which can provision an incentive-compatible MTD mechanism through dynamically migrating server locations. We also present a user-server mapping mechanism, which not only improves system resiliency, but also ensures network performance. We demonstrate a MTD with a multi-user network communication and our data shows that the proposed framework can effectively improve the resiliency and agility of the system while achieving good network timeliness and throughput performance.
2014-06-30
CAPE CANAVERAL, Fla. – Inside the Delta Operations Center near Space Launch Complex 37 on Cape Canaveral Air Force Station in Florida, the second stage for the United Launch Alliance Delta IV Heavy for Exploration Flight Test-1, or EFT-1, is secured in its cradle for the move to a test cell. At the Horizontal Integration Facility, all three booster stages will be processed and checked out before being moved to the nearby launch pad and hoisted into position. During the EFT-1 mission, Orion will travel farther into space than any human spacecraft has gone in more than 40 years. The data gathered during the flight will influence design decisions, validate existing computer models and innovative new approaches to space systems development, as well as reduce overall mission risks and costs for later Orion flights. Liftoff of Orion on EFT-1 is planned for fall 2014. Photo credit: NASA/Frankie Martin
Nuclear energy: Where do we go from here?
NASA Astrophysics Data System (ADS)
Muslim, Dato'Noramly, Dr
2015-04-01
As Malaysia progresses towards 2020, the depleting resource of oil and gas has forced a re-look at alternatives to replace fossil fuels as energy sources. Among the viable options is nuclear energy, enabling us to meet energy needs and sustain national development in the twenty-first century. Three essential steps Malaysia must take to introduce nuclear power into its energy mix are: energy planning, infrastructure development, and deployment. Malaysia has to face a series of challenges, including public acceptance, waste management, minimizing proliferation risk, and ensuring the security of nuclear plants and materials. Timely development of qualified and competent manpower is a key limiting factor in the development and transfer of nuclear technologies — and education and training take time, effort and money. There is a need for political will. Within the Asian region, China, Korea and Japan are in the forefront in utilizing nuclear power to meet electricity demands. Countries such as UAE, Bangladesh, Vietnam and Turkey are moving ahead with the nuclear option for electricity generation and they have begun planning and construction of nuclear power plants. Against this backdrop, what are Malaysia's moves? This paper discusses various options and challenges, obstacles and repercussions in meeting future energy demands.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Muslim, Dato’ Dr Noramly, E-mail: noramlymuslim@yahoo.com
As Malaysia progresses towards 2020, the depleting resource of oil and gas has forced a re-look at alternatives to replace fossil fuels as energy sources. Among the viable options is nuclear energy, enabling us to meet energy needs and sustain national development in the twenty-first century. Three essential steps Malaysia must take to introduce nuclear power into its energy mix are: energy planning, infrastructure development, and deployment. Malaysia has to face a series of challenges, including public acceptance, waste management, minimizing proliferation risk, and ensuring the security of nuclear plants and materials. Timely development of qualified and competent manpower ismore » a key limiting factor in the development and transfer of nuclear technologies — and education and training take time, effort and money. There is a need for political will. Within the Asian region, China, Korea and Japan are in the forefront in utilizing nuclear power to meet electricity demands. Countries such as UAE, Bangladesh, Vietnam and Turkey are moving ahead with the nuclear option for electricity generation and they have begun planning and construction of nuclear power plants. Against this backdrop, what are Malaysia’s moves? This paper discusses various options and challenges, obstacles and repercussions in meeting future energy demands.« less
49 CFR 659.21 - System security plan: general requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum, complies...
Moving to a New Town. A Relocation Guide.
ERIC Educational Resources Information Center
Rackliffe, Gary, Ed.; Pearson, Nancy, Ed.
Designed to help those who must consider relocating to secure employment, this relocation guide provides answers to a number of questions pertaining to moving, money management, and adjusting to a new community. Various aspects of deciding to move are covered, including reasons for moving, thinking of a move as permanent, feelings of homesickness,…
45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection... of the security standards. (a) Health plan. (1) A health plan that is not a small health plan must...
Davoren, Mary; Hennessy, Sarah; Conway, Catherine; Marrinan, Seamus; Gill, Pauline; Kennedy, Harry G
2015-03-28
Detention in a secure forensic psychiatric hospital may inhibit engagement and recovery. Having validated the clinician rated DUNDRUM-3 (programme completion) and DUNDRUM-4 (recovery) in a forensic hospital, we set out to draft and validate scales measuring the same programme completion and recovery items that patients could use to self-rate. Based on previous work, we hypothesised that self-rating scores might be predictors of objective progress including conditional discharge. We hypothesised also that the difference between patients' and clinicians' ratings of progress in treatment and other factors relevant to readiness for discharge (concordance) would diminish as patients neared discharge. We hypothesised also that this difference in matched scores would predict objective progress including conditional discharge. In a prospective naturalistic observational cohort study in a forensic hospital, we examined whether scores on the self-rated DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales or differences between clinician and patient ratings on the same scales (concordance) would predict moves between levels of therapeutic security and conditional discharge over the next twelve months. Both scales stratified along the recovery pathway of the hospital, but clinician ratings matched the level of therapeutic security more accurately than self ratings. The clinician rated scales predicted moves to less secure units and to more secure units and predicted conditional discharge but the self-rated scores did not. The difference between clinician and self-rated scores (concordance) predicted positive and negative moves and conditional discharge, but this was not always an independent predictor as shown by regression analysis. In regression analysis the DUNDRUM-3 predicted moves to less secure places though the HCR-20 C & R score dominated the model. Moves back to more secure places were predicted by lack of concordance on the DUNDRUM-4. Conditional discharge was predicted predominantly by the DUNDRUM-3. Patients accurately self-rate relative to other patients however their absolute ratings were consistently lower (better) than clinicians' ratings and were less accurate predictors of outcomes including conditional discharge. Quantifying concordance is a useful part of the recovery process and predicts outcomes but self-ratings are not accurate predictors.
Birds of a Feather: Supporting Secure Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Braswell III, H V
2006-04-24
Over the past few years Lawrence Livermore National Laboratory has begun the process of moving to a diskless environment in the Secure Computer Support realm. This movement has included many moving targets and increasing support complexity. We would like to set up a forum for Security and Support professionals to get together from across the Complex and discuss current deployments, lessons learned, and next steps. This would include what hardware, software, and hard copy based solutions are being used to manage Secure Computing. The topics to be discussed include but are not limited to: Diskless computing, port locking and management,more » PC, Mac, and Linux/UNIX support and setup, system imaging, security setup documentation and templates, security documentation and management, customer tracking, ticket tracking, software download and management, log management, backup/disaster recovery, and mixed media environments.« less
Köppel, Johann; Dahmen, Marie; Helfrich, Jennifer; Schuster, Eva; Bulling, Lea
2014-10-01
Wildlife planning for renewable energy must cope with the uncertainties of potential wildlife impacts. Unfortunately, the environmental policies which instigate renewable energy and those which protect wildlife are not coherently aligned-creating a green versus green dilemma. Thus, climate mitigation efforts trigger renewable energy development, but then face substantial barriers from biodiversity protection instruments and practices. This article briefly reviews wind energy and wildlife interactions, highlighting the lively debated effects on bats. Today, planning and siting of renewable energy are guided by the precautionary principle in an attempt to carefully address wildlife challenges. However, this planning attitude creates limitations as it struggles to negotiate the aforementioned green versus green dilemma. More adaptive planning and management strategies and practices hold the potential to reconcile these discrepancies to some degree. This adaptive approach is discussed using facets of case studies from policy, planning, siting, and operational stages of wind energy in Germany and the United States, with one case showing adaptive planning in action for solar energy as well. This article attempts to highlight the benefits of more adaptive approaches as well as the possible shortcomings, such as reduced planning security for renewable energy developers. In conclusion, these studies show that adaptive planning and operation strategies can be designed to supplement and enhance the precautionary principle in wildlife planning for green energy.
NASA Astrophysics Data System (ADS)
Köppel, Johann; Dahmen, Marie; Helfrich, Jennifer; Schuster, Eva; Bulling, Lea
2014-10-01
Wildlife planning for renewable energy must cope with the uncertainties of potential wildlife impacts. Unfortunately, the environmental policies which instigate renewable energy and those which protect wildlife are not coherently aligned—creating a green versus green dilemma. Thus, climate mitigation efforts trigger renewable energy development, but then face substantial barriers from biodiversity protection instruments and practices. This article briefly reviews wind energy and wildlife interactions, highlighting the lively debated effects on bats. Today, planning and siting of renewable energy are guided by the precautionary principle in an attempt to carefully address wildlife challenges. However, this planning attitude creates limitations as it struggles to negotiate the aforementioned green versus green dilemma. More adaptive planning and management strategies and practices hold the potential to reconcile these discrepancies to some degree. This adaptive approach is discussed using facets of case studies from policy, planning, siting, and operational stages of wind energy in Germany and the United States, with one case showing adaptive planning in action for solar energy as well. This article attempts to highlight the benefits of more adaptive approaches as well as the possible shortcomings, such as reduced planning security for renewable energy developers. In conclusion, these studies show that adaptive planning and operation strategies can be designed to supplement and enhance the precautionary principle in wildlife planning for green energy.
How to keep cool in tough times.
Muller-Smith, P
1999-02-01
Reengineering is no longer an event that has a beginning and an end. It is an ongoing process of change that continues to occur in all types of businesses. Because there is no longer the sense of security that doing a job well will guarantee continued employment, workers have to approach career planning from a different perspective. Moving up the career ladder in a single organization can no longer serve as the benchmark of success. The contemporary approach to success will be more geared toward the ability to constantly reinvent your unique set of job skills that are transferable from one job setting to another, thus ensuring employability.
2012-06-28
CAPE CANAVERAL, Fla. - Secured inside a transportation container, the Orion crew module is moved through the open high-bay door to the Operations and Checkout Building at NASA's Kennedy Space Center in Florida. Slated for Exploration Flight Test-1, an uncrewed mission planned for 2014, the capsule will travel farther into space than any human spacecraft has gone in more than 40 years. NASA's Michoud Assembly Facility in New Orleans built the crew module pressure vessel. The Orion production team will prepare the module for flight by installing heat-shielding thermal protection systems, avionics and other subsystems. For more information, visit http://www.nasa.gov/orion. Photo credit: NASA/Jim Grossmann
From Empiricism to Total Quality Management in Greek Education
NASA Astrophysics Data System (ADS)
Karavasilis, Ioannis; Samoladas, Ioannis; Nedos, Apostolos
Nowadays the education system in Greece moves towards democratization and decentralization. School unit is the cell and the base of the education system. Principal's role is highly demanding, multi-dimensional, and a critical determinant of school performance and effectiveness. The paper proposes an effective organizational plan of school units in Primary Education based on basic administration processes and Total Quality Management. Using theory of emotional intelligence and Blake-Mouton's grid it emphasizes the impact of Principal's leadership on democratizing the school unit, on creating a safe and secure environment and positive school climate and motivating teachers committee to participate in the decision making process.
Tissera, Shaluni R; Silva, S N
2016-01-01
Sri Lanka is planning to move towards an Electronic Health Record (EHR) system. This research argues that the public preparedness should be considered in order to implement a functioning and an effective EHR system in a country. When asked about how concerned the participants were about the security of their health records, 40.5% stated they were concerned and 38.8% were very concerned. They were asked to rate the 'level of trust' they have on health institutes in Sri Lanka on a scale from 1 to 10 (1 lowest level of trust and 10 highest), 66.1% rated at level 5 or less.
33 CFR 104.405 - Format of the Vessel Security Plan (VSP).
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Communications; (9) Security systems and equipment maintenance; (10) Security measures for access control... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Format of the Vessel Security... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Plan (VSP) § 104.405 Format of the...
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.
Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang
2015-09-25
Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.
Employment prospects and trends for gastroenterology trainees in Canada: A nationwide survey
Razik, Roshan; Cino, Maria; Nguyen, Geoffrey C
2013-01-01
BACKGROUND: Many gastroenterology (GI) trainees face a variety of barriers to stable employment and are finding it increasingly difficult to secure employment in their chosen field. OBJECTIVE: To elucidate factors that contribute to the burden of unemployment and underemployment, and to examine solutions that may remedy this growing problem in the field of GI. METHODS: A nationwide survey of current, incoming and recently graduated individuals of GI training programs in Canada was conducted. Trainees in pediatric GI programs and those enrolled in sub-specialty programs within GI were also included. RESULTS: The response rate was 62%, with 93% of respondents enrolled in an adult GI training program. Many (73%) respondents planned to pursue further subspecialty training and the majority (53%) reported concerns regarding job security after graduation as contributory factors. Only 35% of respondents were confident that they would secure employment within six months of completing their training. Regarding barriers to employment, the most cited perceived reasons were lack of funding (both from hospitals and provincial governments) and senior physicians who continue to practice beyond retirement years. Sixty-nine per cent perceived a greater need for career guidance and 49% believed there were too many GI trainees relative to the current job market in their area. Most residents had a contingency plan if they remained unemployed >18 months, which often included moving to another province or to the United States. CONCLUSION: GI trainees throughout Canada reported substantial concerns about securing employment, citing national retirement trends and lack of funding as primary barriers to employment. Although these issues are not easily modifiable, certain problems should be targeted including optimizing training quotas, tailoring career guidance to the needs of the population, and emphasizing credentialing and quality control in endoscopy. PMID:24199210
An unusual kind of complex synchronizations and its applications in secure communications
NASA Astrophysics Data System (ADS)
Mahmoud, Emad E.
2017-11-01
In this paper, we talk about the meaning of complex anti-syncrhonization (CAS) of hyperchaotic nonlinear frameworks comprehensive complex variables and indeterminate parameters. This sort of synchronization can break down just for complex nonlinear frameworks. The CAS contains or fuses two sorts of synchronizations (complete synchronization and anti-synchronization). In the CAS the attractors of the master and slave frameworks are moving opposite or orthogonal to each other with a similar form; this phenomenon does not exist in the literature. Upon confirmation of the Lyapunov function and a versatile control strategy, a plan is made to play out the CAS of two indistinguishable hyperchaotic attractors of these frameworks. The adequacy of the obtained results is shown by a simulation case. Numerical issues are plotted to decide state variables, synchronization errors, modules errors, and phases errors of those hyperchaotic attractors after synchronization to determine that the CAS is accomplished. The above outcomes will present the possible establishment to the secure communication applications. The CAS of hyperchaotic complex frameworks in which a state variable of the master framework synchronizes with an alternate state variable of the slave framework is an encouraging kind of synchronization as it contributes fantastic security in secure communications. Amid this secure communications, the synchronization between transmitter and collector is shut and message signs are recouped. The encryption and reclamation of the signs are reproduced numerically.
33 CFR 106.405 - Format and content of the Facility Security Plan (FSP).
Code of Federal Regulations, 2010 CFR
2010-07-01
...; (9) Security systems and equipment maintenance; (10) Security measures for access control; (11... Facility Security Plan (FSP). 106.405 Section 106.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... Interpretive bulletin relating to investments by employee benefit plans in securities of registered investment.... That section provides that an investment by an employee benefit plan in securities issued by an...
49 CFR 1542.301 - Contingency plan.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Contingency plan. 1542.301 Section 1542.301..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...
Multiobjective optimization of urban water resources: Moving toward more practical solutions
NASA Astrophysics Data System (ADS)
Mortazavi, Mohammad; Kuczera, George; Cui, Lijie
2012-03-01
The issue of drought security is of paramount importance for cities located in regions subject to severe prolonged droughts. The prospect of "running out of water" for an extended period would threaten the very existence of the city. Managing drought security for an urban water supply is a complex task involving trade-offs between conflicting objectives. In this paper a multiobjective optimization approach for urban water resource planning and operation is developed to overcome practically significant shortcomings identified in previous work. A case study based on the headworks system for Sydney (Australia) demonstrates the approach and highlights the potentially serious shortcomings of Pareto optimal solutions conditioned on short climate records, incomplete decision spaces, and constraints to which system response is sensitive. Where high levels of drought security are required, optimal solutions conditioned on short climate records are flawed. Our approach addresses drought security explicitly by identifying approximate optimal solutions in which the system does not "run dry" in severe droughts with expected return periods up to a nominated (typically large) value. In addition, it is shown that failure to optimize the full mix of interacting operational and infrastructure decisions and to explore the trade-offs associated with sensitive constraints can lead to significantly more costly solutions.
Namoğlu, Nihan; Ulgen, Yekta
2013-01-01
Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects.
33 CFR 103.520 - Recordkeeping.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 103.520 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.520 Recordkeeping. (a) All records pertaining to the Area Maritime Security (AMS) Assessment and AMS Plan will be retained by...
33 CFR 103.510 - Area Maritime Security (AMS) Plan review and approval.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Area Maritime Security (AMS) Plan review and approval. 103.510 Section 103.510 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF...) Plan § 103.510 Area Maritime Security (AMS) Plan review and approval. Each AMS Plan will be submitted...
33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...
33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...
33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...
33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...
33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...
Evolving the Role of Campus Security
ERIC Educational Resources Information Center
May, Vern
2008-01-01
One of the problems security professionals see in security is that there are few benchmarks to quantify the effectiveness of proactive security initiatives. This hurts them with funding support and also with ensuring community buy-in outside of crisis situations. The reactive nature of many institutions makes it difficult to move forward with…
75 FR 10328 - Wolf Creek Nuclear Operating Corporation, Wolf Creek Generating Station; Exemption
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-05
... Plan, Safeguards Contingency Plan, and Cyber Security Plan referred to collectively hereafter as... its security plans. Pursuant to 10 CFR 51.32, ``Finding of no significant impact,'' the Commission has... by designing and implementing comprehensive site security programs. The amendments to 10 CFR 73.55...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.41...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.41...
2011-05-04
Nations General Assembly. China looks to secure the support and votes of these African states to help influence international politics moving forward. 1S...support and votes of th~se African states to help influence international politics moving forward. . . Conclusion: China’s declaration of their... international focus with the recognition of a new advei·sary. The attack on the World Trade Center brought telTorism to the forefront of the natiohal security
49 CFR 1542.301 - Contingency plan.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...
49 CFR 1542.301 - Contingency plan.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...
49 CFR 1542.301 - Contingency plan.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...
49 CFR 1542.301 - Contingency plan.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
... procedures, physical security plan, guard training and qualification plan, or cyber security plan for the... Power Plant Unit 1, Exemption From Certain Security Requirements 1.0 Background DTE Energy (DTE) is the... atmospheric pressure. In November 1972, the Power Reactor Development Company (PRDC), the licensee at that...
Code of Federal Regulations, 2010 CFR
2010-04-01
... for its employee benefit plans. 247.776 Section 247.776 Commodity and Securities Exchanges SECURITIES... effecting certain excepted or exempted transactions in a company's securities for its employee benefit plans... benefit of an employee benefit plan account; (3) Any such security is obtained directly from: (i) The...
Strategy to Enhance International Supply Chain Security
2007-07-01
airports as part of the effort to secure air passenger travel . The security assessment crew traveling by air, land or sea cannot be considered only a... travel security issue. The assessment of a container ship’s crew or of a driver moving a truck into the secure area of a port are also supply chain...threats through its traveler screening and worker credentialing programs. The strategy to secure the supply chain reflects the larger security
33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...
33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...
33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...
33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...
33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...
The Continuing Evolution of Effective IT Security Practices
ERIC Educational Resources Information Center
Voloudakis, John
2006-01-01
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
33 CFR 128.300 - What is required to be in a Terminal Security Plan?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false What is required to be in a Terminal Security Plan? 128.300 Section 128.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF... for Terminal Security § 128.300 What is required to be in a Terminal Security Plan? (a) If your...
33 CFR 128.300 - What is required to be in a Terminal Security Plan?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false What is required to be in a Terminal Security Plan? 128.300 Section 128.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF... for Terminal Security § 128.300 What is required to be in a Terminal Security Plan? (a) If your...
33 CFR 128.300 - What is required to be in a Terminal Security Plan?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false What is required to be in a Terminal Security Plan? 128.300 Section 128.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF... for Terminal Security § 128.300 What is required to be in a Terminal Security Plan? (a) If your...
Code of Federal Regulations, 2010 CFR
2010-04-01
... to certain employee benefit plans. 230.416 Section 230.416 Commodity and Securities Exchanges... provisions and interests to be issued pursuant to certain employee benefit plans. (a) If a registration... pursuant to an employee benefit plan, including interests in such plan that constitute separate securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-29
...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...
48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...
48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...
48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...
48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...
49 CFR 1544.301 - Contingency plan.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND... notified of any changes. (c) Participate in an airport-sponsored exercise of the airport contingency plan...
49 CFR 1544.301 - Contingency plan.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND... notified of any changes. (c) Participate in an airport-sponsored exercise of the airport contingency plan...
49 CFR 1544.301 - Contingency plan.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND... notified of any changes. (c) Participate in an airport-sponsored exercise of the airport contingency plan...
49 CFR 1544.301 - Contingency plan.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND... notified of any changes. (c) Participate in an airport-sponsored exercise of the airport contingency plan...
Project MOVE Program Planning Kit.
ERIC Educational Resources Information Center
Farris, Charlotte J.
This program planning kit contains information and activities on evaluation, change, leadership, and sex stereotyping which provided the basis for planning Project MOVE (Maximizing Options in Vocational Education) programs but which can be generalized and adapted for use in planning other programs. Assumptions ano guidelines based upon theory and…
High speed and adaptable error correction for megabit/s rate quantum key distribution.
Dixon, A R; Sato, H
2014-12-02
Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90-94% of the ideal secure key rate over all fibre distances from 0-80 km.
High speed and adaptable error correction for megabit/s rate quantum key distribution
Dixon, A. R.; Sato, H.
2014-01-01
Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90–94% of the ideal secure key rate over all fibre distances from 0–80 km. PMID:25450416
Goldsmith, Timothy J; Culhane, Marie Rene; Sampedro, Fernando; Cardona, Carol J
2016-01-01
Animal diseases such as foot-and-mouth disease (FMD) have the potential to severely impact food animal production systems. Paradoxically, the collateral damage associated with the outbreak response may create a larger threat to the food supply, social stability, and economic viability of rural communities than the disease itself. When FMD occurs in domestic animals, most developed countries will implement strict movement controls in the area surrounding the infected farm(s). Historically, stopping all animal movements has been considered one of the most effective ways to control FMD and stop disease spread. However, stopping all movements in an area comes at a cost, as there are often uninfected herds and flocks within the control area. The inability to harvest uninfected animals and move their products to processing interrupts the food supply chain and has the potential to result in an enormous waste of safe, nutritious animal products, and create animal welfare situations. In addition, these adverse effects may negatively impact agriculture businesses and the related economy. Effective disease control measures and the security of the food supply thus require a balanced approach based on science and practicality. Evaluating the risks associated with the movement of live animals and products before an outbreak happens provides valuable insights for risk management plans. These plans can optimize animal and product movements while preventing disease spread. Food security benefits from emergency response plans that both control the disease and keep our food system functional. Therefore, emergency response plans must aim to minimize the unintended negative consequence to farmers, food processors, rural communities, and ultimately consumers.
Code of Federal Regulations, 2012 CFR
2012-10-01
... WILDLIFE REFUGE SYSTEM GEOLOGICAL AND GEOPHYSICAL EXPLORATION OF THE COASTAL PLAIN, ARCTIC NATIONAL... a surety bond of not less than $100,000, or other security satisfactory to the Service, to secure... needed to secure performance of its exploration plan and plan(s) of operation and compliance with the...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 42 Public Health 1 2012-10-01 2012-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 1 2011-10-01 2011-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 5 2013-01-01 2013-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. Link... register under this part must develop and implement a written security plan. The security plan must be...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 42 Public Health 1 2014-10-01 2014-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 42 Public Health 1 2013-10-01 2013-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...
Code of Federal Regulations, 2010 CFR
2010-04-01
... under the Securities Act of 1933 of securities to be offered to employees pursuant to employee benefit... employee benefit plans. (a) Any registrant that, immediately prior to the time of filing a registration... benefit plan. The form also is available for the exercise of employee benefit plan options by an employee...
33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; St. Thomas, U.S....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas...
33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.
Code of Federal Regulations, 2014 CFR
2014-07-01
....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas, U.S. Virgin Islands. The security zone for a cruise ship entering port is activated when the vessel...
33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.
Code of Federal Regulations, 2012 CFR
2012-07-01
....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas, U.S. Virgin Islands. The security zone for a cruise ship entering port is activated when the vessel...
33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.
Code of Federal Regulations, 2011 CFR
2011-07-01
....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas, U.S. Virgin Islands. The security zone for a cruise ship entering port is activated when the vessel...
33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.
Code of Federal Regulations, 2013 CFR
2013-07-01
....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas, U.S. Virgin Islands. The security zone for a cruise ship entering port is activated when the vessel...
78 FR 15797 - Service Delivery Plan
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0048] Service Delivery Plan AGENCY: Social... information, such as Social Security numbers or medical information. 1. Internet: We strongly recommend that... Regulations and Reports Clearance, Social Security Administration, 107 Altmeyer Building, 6401 Security...
Safe teleradiology: information assurance as project planning methodology
NASA Astrophysics Data System (ADS)
Collmann, Jeff R.; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2003-05-01
This project demonstrates use of OCTAVE, an information security risk assessment method, as an approach to the safe design and planning of a teleradiology system. By adopting this approach to project planning, we intended to provide evidence that including information security as an intrinsic component of project planning improves information assurance and that using information assurance as a planning tool produces and improves the general system management plan. Several considerations justify this approach to planning a safe teleradiology system. First, because OCTAVE was designed as a method for retrospectively assessing and proposing enhancements for the security of existing information management systems, it should function well as a guide to prospectively designing and deploying a secure information system such as teleradiology. Second, because OCTAVE provides assessment and planning tools for use primarily by interdisciplinary teams from user organizations, not consultants, it should enhance the ability of such teams at the local level to plan safe information systems. Third, from the perspective of sociological theory, OCTAVE explicitly attempts to enhance organizational conditions identified as necessary to safely manage complex technologies. Approaching information system design from the perspective of information security risk management proactively integrates health information assurance into a project"s core. This contrasts with typical approaches that perceive "security" as a secondary attribute to be "added" after designing the system and with approaches that identify information assurance only with security devices and user training. The perspective of health information assurance embraces so many dimensions of a computerized health information system"s design that one may successfully deploy a method for retrospectively assessing information security risk as a prospective planning tool. From a sociological perspective, this approach enhances the general conditions as well as establishes specific policies and procedures for reliable performance of health information assurance.
2015-01-21
In the Astrotech payload processing facility on Vandenberg Air Force Base in California, technicians secure a transportation canister around NASA Soil Moisture Active Passive SMAP spacecraft for its move to the launch pad.
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
What moves you Arizona : long-range transportation plan : 2010-2035.
DOT National Transportation Integrated Search
2011-11-01
"What Moves You Arizona is the Arizona Department of Transportations (ADOT) Long-Range Transportation Plan (LRTP). The LRTP, or Plan, defines visionary, yet pragmatic, investment choices Arizona will make over the next 25 years to maintain a...
[Compliance with guidelines by state plans for food and nutritional security in Brazil].
Machado, Mick Lennon; Gabriel, Cristine Garcia; Soar, Claudia; Mamed, Gisele Rockenbach; Machado, Patrícia Maria de Oliveira; Lacerda, Josimari Telino de; Martins, Milena Corrêa; Marcon, Maria Cristina
2018-02-05
A descriptive and documental study was performed from August to October 2016 to analyze compliance by state plans for food and nutritional security (PlanSAN) with the guidelines set by the Brazilian National Policy for Food and Nutritional Security (PNSAN). The state plans were accessed via the websites of the Inter-Ministerial Chamber for Food and Nutritional Security (CAISAN) or the state governments, plus complementary data collection at the state level. All the states of Brazil joined the National System for Food and Nutritional Security (SISAN), while fewer than half (13 states, 48%) had drafted their plans. Of these, 5 (38%) of the PlanSAN had schedules that coincided with the same state's pluriannual plan, 5 (38%) of the PlanSAN specified the budget requirements for meeting the proposed targets, 7 (54%) specified mechanisms for monitoring the plan, and only 2 (15%) defined methodologies for monitoring food and nutritional security. The recent existence of (and adherence to) the CAISAN appear to be related to the lack of state plans in half the states. Although most of the states that did have plans met some of the guidelines laid out by the PNSAN, these mechanisms become weak and impractical when they lack earmarked budget funds to meet their targets. Since the PNSAN is structurally inter-sectorial, the development of plans requires collective work by various government departments. Importantly, the items analyzed here are all guidelines, which implies the need for mechanisms to monitor their actual implementation.
49 CFR 172.802 - Components of a security plan.
Code of Federal Regulations, 2010 CFR
2010-10-01
... from origin to destination, including shipments stored incidental to movement. (b) The security plan must also include the following: (1) Identification by job title of the senior management official... business and must make the security plan available upon request, at a reasonable time and location, to an...
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
41 CFR 102-192.80 - How do we develop written security policies and plans?
Code of Federal Regulations, 2014 CFR
2014-01-01
... service and/or the Federal Protective Service to develop agency mail security policies and plans. The... written security policies and plans? 102-192.80 Section 102-192.80 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...
41 CFR 102-192.80 - How do we develop written security policies and plans?
Code of Federal Regulations, 2013 CFR
2013-07-01
... service and/or the Federal Protective Service to develop agency mail security policies and plans. The... written security policies and plans? 102-192.80 Section 102-192.80 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...
41 CFR 102-192.80 - How do we develop written security policies and plans?
Code of Federal Regulations, 2012 CFR
2012-01-01
... service and/or the Federal Protective Service to develop agency mail security policies and plans. The... written security policies and plans? 102-192.80 Section 102-192.80 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...
41 CFR 102-192.80 - How do we develop written security policies and plans?
Code of Federal Regulations, 2011 CFR
2011-01-01
... service and/or the Federal Protective Service to develop agency mail security policies and plans. The... written security policies and plans? 102-192.80 Section 102-192.80 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-11
.... ML111940200), which approved the RBS Cyber Security Plan and associated implementation milestone schedule. The Cyber Security Plan Implementation Schedule contained in the licensee's letter dated April 4, 2011... consequences of an accident previously evaluated? Response: No. The proposed change to the Cyber Security Plan...
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
33 CFR 104.415 - Amendment and audit.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Amendment and audit. 104.415 Section 104.415 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Plan (VSP) § 104.415 Amendment and audit. (a) Amendments. (1) Amendments to a Vessel Security Plan...
Federal Plan for Cyber Security and Information Assurance Research and Development
2006-04-01
Security Systems 103 varieties of the BB84 scheme have been developed, and other forms of quantum key distribution have been proposed. Rapid progress has led... key . Capability Gaps Existing quantum cryptographic protocols may also have weaknesses. Although BB84 is generally regarded as secure , researchers...complement agency-specific prioritization and R&D planning efforts in cyber security and information assurance. The Plan also describes the key Federal
Heterogeneous Vision Data Fusion for Independently Moving Cameras
2010-03-01
target detection , tracking , and identification over a large terrain. The goal of the project is to investigate and evaluate the existing image...fusion algorithms, develop new real-time algorithms for Category-II image fusion, and apply these algorithms in moving target detection and tracking . The...moving target detection and classification. 15. SUBJECT TERMS Image Fusion, Target Detection , Moving Cameras, IR Camera, EO Camera 16. SECURITY
Plans, Patterns, and Move Categories Guiding a Highly Selective Search
NASA Astrophysics Data System (ADS)
Trippen, Gerhard
In this paper we present our ideas for an Arimaa-playing program (also called a bot) that uses plans and pattern matching to guide a highly selective search. We restrict move generation to moves in certain move categories to reduce the number of moves considered by the bot significantly. Arimaa is a modern board game that can be played with a standard Chess set. However, the rules of the game are not at all like those of Chess. Furthermore, Arimaa was designed to be as simple and intuitive as possible for humans, yet challenging for computers. While all established Arimaa bots use alpha-beta search with a variety of pruning techniques and other heuristics ending in an extensive positional leaf node evaluation, our new bot, Rat, starts with a positional evaluation of the current position. Based on features found in the current position - supported by pattern matching using a directed position graph - our bot Rat decides which of a given set of plans to follow. The plan then dictates what types of moves can be chosen. This is another major difference from bots that generate "all" possible moves for a particular position. Rat is only allowed to generate moves that belong to certain categories. Leaf nodes are evaluated only by a straightforward material evaluation to help avoid moves that lose material. This highly selective search looks, on average, at only 5 moves out of 5,000 to over 40,000 possible moves in a middle game position.
Security and health research databases: the stakeholders and questions to be addressed.
Stewart, Sara
2006-01-01
Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.
Securing your financial future.
Kachalia, Parag R
2009-04-01
Securing one's financial future requires dedication and planning. A clear plan must be implemented and continually re-examined to assure an individual remains on track to achieve this security. True success of the plan will be dependent upon taking the appropriate steps to protecting one's assets against unfortunate events along with building assets with a clear end goal in mind. This article will cover the fundamental steps an individual can take to secure their financial future.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-03
... requirements similar to those previously imposed by Commission orders issued after the terrorist attacks of... Security Plan, Training and Qualification Plan, Safeguards Contingency Plan, and Cyber Security Plan...
Code of Federal Regulations, 2010 CFR
2010-04-01
... RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption for offers and sales of securities pursuant to certain compensatory benefit plans and contracts relating to compensation...
45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.
Code of Federal Regulations, 2013 CFR
2013-10-01
... of Electronic Protected Health Information § 164.318 Compliance dates for the initial implementation of the security standards. (a) Health plan. (1) A health plan that is not a small health plan must... the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES...
45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.
Code of Federal Regulations, 2012 CFR
2012-10-01
... of Electronic Protected Health Information § 164.318 Compliance dates for the initial implementation of the security standards. (a) Health plan. (1) A health plan that is not a small health plan must... the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES...
Information security management system planning for CBRN facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.
The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-20
...). The proposed amendment would approve the cyber security plan and implementation schedule, and revise... maintain in effect all provisions of the NRC-approved cyber security plan. Basis for proposed no... [facility operating license] to implement and maintain a Cyber Security Plan as part of Energy Northwest's...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-09
...-safeguards information (SUNSI). The amendments would approve the proposed Cyber Security Plan and... Commission-approved Cyber Security Plan as required by 10 CFR 73.54. Basis for proposed no significant... Facility Operating License (FOL) to implement and maintain a Cyber Security Plan as part of the facility's...
Ramifications of DARPA’s Programming Computation on Encrypted Data Program
2014-01-01
use quasi-cryptographic channels to move the information—e.g., Tor for moving data and some digital currency to pay for data services. the Decision...October 14, 2013: http://www.cybersecurity.ru/ crypto /173218.html Damgård, Ivan, and Tomas Toft, “Trading Sugar Beet Quotas—Secure Multiparty...will Double in 5 Years”], CyberSecurity.ru, 2013. As of June 4, 2013: http://www.cybersecurity.ru/ crypto /173218.html People’s Liberty Army Daily, “广州
1987-04-01
security deposit action is described in the regulation as follows: h. Security Deposits (DACF and DACA ). (1) Issue. PCS moves create financial hardships...General Wickham, The Army Chief of Staff, specified a philosophy toward the family in the Army Family White Paper. General Wickham’s action was in...security deposits arose. 1 The Army’s action to the issue of security deposits will be thoroughly discussed in this paper. The Army’s action comes now
FY 2016 - Stockpile Stewardship and Management Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2015-03-01
This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-13
... for OMB Review; Comment Request; Securities Lending by Employee Benefit Plans ACTION: Notice. SUMMARY...) sponsored information collection request (ICR) titled, ``Securities Lending by Employee Benefit Plans,'' [email protected] . Authority: 44 U.S.C. 3507(a)(1)(D). SUPPLEMENTARY INFORMATION: The Securities Lending by...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-15
... information about the vessel or persons on board, whether they pose a threat to the submarine. The security...-AA87 Security Zone; Escorted U.S. Navy Submarines in Sector Honolulu Captain of the Port Zone AGENCY... establishing a moving security zone around all U.S. Navy submarines that are operating in the Sector Honolulu...
A terrorism response plan for hospital security and safety officers.
White, Donald E
2002-01-01
Security and Safety managers in today's healthcare facilities need to factor terrorism response into their emergency management plans, separate from the customary disaster plans and the comparatively recent security plans. Terrorism incidents will likely be security occurrences that use a weapon of mass destruction to magnify the incidents into disasters. Facility Y2K Plans can provide an excellent framework for the detailed contingency planning needed for terrorism response by healthcare facilities. Tabbed binder notebooks, with bulleted procedures and contact points for each functional section, can provide security and safety officers with at-a-glance instructions for quick 24/7 implementation. Each functional section should focus upon what activities or severity levels trigger activation of the backup processes. Network with your countywide, regional, and/or state organizations to learn what your peers are doing. Comprehensively inventory your state, local, and commercial resources so that you have alternate providers readily available 24/7 to assist your facility upon disasters.
33 CFR 165.813 - Security Zones; Ports of Houston and Galveston, TX.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Security Zones; Ports of Houston and Galveston, TX. (a) Location. Within the Ports of Houston and Galveston, Texas, moving security zones are established encompassing all waters within 500 yards of a cruise ship... entire transit of the cruise ship and continues while the cruise ship is moored or anchored. (b...
33 CFR 165.813 - Security Zones; Ports of Houston and Galveston, TX.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Security Zones; Ports of Houston and Galveston, TX. (a) Location. Within the Ports of Houston and Galveston, Texas, moving security zones are established encompassing all waters within 500 yards of a cruise ship... entire transit of the cruise ship and continues while the cruise ship is moored or anchored. (b...
33 CFR 165.813 - Security Zones; Ports of Houston and Galveston, TX.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Security Zones; Ports of Houston and Galveston, TX. (a) Location. Within the Ports of Houston and Galveston, Texas, moving security zones are established encompassing all waters within 500 yards of a cruise ship... entire transit of the cruise ship and continues while the cruise ship is moored or anchored. (b...
33 CFR 165.813 - Security Zones; Ports of Houston and Galveston, TX.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Security Zones; Ports of Houston and Galveston, TX. (a) Location. Within the Ports of Houston and Galveston, Texas, moving security zones are established encompassing all waters within 500 yards of a cruise ship... entire transit of the cruise ship and continues while the cruise ship is moored or anchored. (b...
33 CFR 165.813 - Security Zones; Ports of Houston and Galveston, TX.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Security Zones; Ports of Houston and Galveston, TX. (a) Location. Within the Ports of Houston and Galveston, Texas, moving security zones are established encompassing all waters within 500 yards of a cruise ship... entire transit of the cruise ship and continues while the cruise ship is moored or anchored. (b...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-31
...-AA87 Security Zone: Passenger Vessels, Sector Southeastern New England Captain of the Port Zone AGENCY... extending the effective period for temporary fixed and moving security zones around certain passenger vessels in the Sector Southeastern New England Captain of the Port Zone through October 1, 2011. Temporary...
Port Security: A National Planning Guide
DOT National Transportation Integrated Search
1997-01-01
Port Security: A National Planning Guide has been produced for the purpose of conveying the United States Department of Transportations policy perspective on port security to the maritime community. This guide provides an overview of the essential as...
Lopez-Ridaura, Santiago; Frelat, Romain; van Wijk, Mark T; Valbuena, Diego; Krupnik, Timothy J; Jat, M L
2018-01-01
One of the great challenges in agricultural development and sustainable intensification is the assurance of social equity in food security oriented interventions. Development practitioners, researchers, and policy makers alike could benefit from prior insight into what interventions or environmental shocks might differentially affect farmers' food security status, in order to move towards more informed and equitable development. We examined the food security status and livelihood activities of 269 smallholder farm households (HHs) in Bihar, India. Proceeding with a four-step analysis, we first applied a multivariate statistical methodology to differentiate five primary farming system types. We next applied an indicator of food security in the form of HH potential food availability (PFA), and examined the contribution of crop, livestock, and on- and off-farm income generation to PFA within each farm HH type. Lastly, we applied scenario analysis to examine the potential impact of the adoption of 'climate smart' agricultural (CSA) practices in the form of conservation agriculture (CA) and improved livestock husbandry, and environmental shocks on HH PFA. Our results indicate that compared to livestock interventions, CA may hold considerable potential to boost HH PFA, though primarily for wealthier and medium-scale cereal farmers. These farm HH types were however considerably more vulnerable to food insecurity risks resulting from simulated drought, while part-time farmers and resource-poor agricultural laborers generating income from off-farm pursuits were comparatively less vulnerable, due in part to their more diversified income sources and potential to migrate in search of work. Our results underscore the importance of prior planning for development initiatives aimed at increasing smallholder food security while maintaining social equity, while providing a robust methodology to vet the implications of agricultural interventions on an ex ante basis.
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1983-01-01
This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.
Code of Federal Regulations, 2012 CFR
2012-10-01
... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...
Code of Federal Regulations, 2014 CFR
2014-10-01
... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...
Code of Federal Regulations, 2013 CFR
2013-10-01
... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...
Code of Federal Regulations, 2011 CFR
2011-10-01
... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...
Code of Federal Regulations, 2010 CFR
2010-10-01
... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...
Code of Federal Regulations, 2010 CFR
2010-01-01
... certain excepted or exempted transactions in a company's securities for its employee benefit plans. (a) A... an employee benefit plan account; (3) Any such security is obtained directly from: (i) The company; or (ii) An employee benefit plan of the company; and (4) Any such security is transferred only to: (i...
Avoid Disaster: Use Firewalls for Inter-Intranet Security.
ERIC Educational Resources Information Center
Charnetski, J. R.
1998-01-01
Discusses the use of firewalls for library intranets, highlighting the move from mainframes to PCs, security issues and firewall architecture, and operating systems. Provides a glossary of basic networking terms and a bibliography of suggested reading. (PEN)
Congress and National Security: Interest, Influence and Speed
2010-03-01
impact of these variables in two case studies of security agency organizational reform. The Intelligence Reform and Terrorism Prevention Act of 2004...all the stars in order to move fast on an issue of national security. Instead the positive impact of one or two variables combined with the... impact of these variables in two case studies of security agency organizational reform. The Intelligence Reform and Terrorism Prevention Act of 2004 and
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-24
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62125; File No. SR-ISE-2010-48] Self-Regulatory Organizations; Notice of Filing of Proposed Rule Change by International Securities Exchange LLC To Amend ISE Rule 2102 To Provide for a Trading Pause for Individual Securities When the Price Moves Ten Percent or...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
..., in the aggregate, or by the private sector of $100,000,000 (adjusted for inflation) or more in any... Security Zone: Passenger Vessels, Sector Southeastern New England Captain of the Port Zone AGENCY: Coast... moving security zones around passenger vessels in the Sector Southeastern New England Captain of the Port...
ERIC Educational Resources Information Center
Srinivasan, Deepa
2013-01-01
Recent rapid malware growth has exposed the limitations of traditional in-host malware-defense systems and motivated the development of secure virtualization-based solutions. By running vulnerable systems as virtual machines (VMs) and moving security software from inside VMs to the outside, the out-of-VM solutions securely isolate the anti-malware…
Determinants, Health Problems, and Food Insecurity in Urban Areas of the Largest City in Cape Verde.
Craveiro, Isabel; Alves, Daniela; Amado, Miguel; Santos, Zélia; Fortes, Argentina Tomar; Delgado, António Pedro; Correia, Artur; Gonçalves, Luzia
2016-11-22
Urbanization processes are intertwined with nutritional transition because there is easier access to food of low nutritional quality at reduced prices, changing dietary patterns and leading to an increase of non-communicable chronic diseases. This study aims to understand the perceptions for high blood pressure, obesity, and alcoholism, describing some interactions of these dimensions in the problem of food security in the city of Praia. A qualitative study was carried out under the framework of the research project "UPHI-STAT: Urban Planning and Health Inequalities-moving from macro to micro statistics". Ten focus groups were conducted in three urban areas with distinct characteristics in the city of Praia, with a total of 48 participants. Participants reported frequent consumption of foods with poor nutritional quality, understanding the potential danger in terms of food security in the city of Praia. Easy access to and high levels of alcohol consumption, and poor quality of traditional drinks were mentioned by participants in the study areas. The impact of the economic situation on the possibility of access to safe and healthy options emerged as a differentiating factor.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-26
... NUCLEAR REGULATORY COMMISSION [NRC-2010-0184] Office of New Reactors: Proposed NUREG-0800; Standard Review Plan Section 13.6.6, Draft Revision 0 on Cyber Security Plan AGENCY: Nuclear Regulatory... Plants,'' on a proposed Standard Review Plan (SRP) Section 13.6.6 on ``Cyber Security Plan'' (Agencywide...
29 CFR 2530.201-2 - Plans covered by part 2530.
Code of Federal Regulations, 2010 CFR
2010-07-01
... employee welfare benefit plan as defined in section 3(1) of the Act and § 2510.3-1; (b) A plan which is... Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR MINIMUM STANDARDS FOR EMPLOYEE PENSION BENEFIT PLANS UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY...
DOT National Transportation Integrated Search
2003-09-16
The objective of this Hazardous Material (HazMat) Transportation Safety and Security Field Operational Test (FOT) Final Detailed Test Plans evaluation is to measure the impact of technology solutions on the safety, security, and operational efficienc...
17 CFR 200.552 - NEPA planning.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false NEPA planning. 200.552 Section 200.552 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Protection of the Environment...
Two Stage Sibling Cycle Compressor/Expander.
1994-02-01
documents, follow the procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1 -R, Information Security Program Regulation...procedures in DoD 5200.22-M, Industrial Security Manual, Section 11-19 or DoD 5200.1-R, Information Security Program Regulation, Chapter IX. For...Spae Piston rotation periodically connects channels from expansion/ compresion ces to ports P1Port B2 Heat Exchangers B Piston moves Ports Process Al
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.
Automated Support for Rapid Coordination of Joint UUV Operation
2015-03-01
automata , dead-reckoning, static plan, nmtime plan, rapid deployment, GPS 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...STATE MACHINES, MOORE AUTOMATA ..........................................9 A. MOORE AUTOMATA ...9 B. UUV PLANS AS MOORE AUTOMATA ...................................................11 C. SAMPLING RATE
Planning high security/high profile events.
McCafferty, Mike
2013-01-01
The author who has lead in the planning and implementation of some of the most notorious trials and events, both in Canada and internationally, describes how such these experiences could be applied to focused high security planning in the health care industry.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-14
... To Move the Time at Which It Runs Its Daily Morning Pass March 8, 2011. Pursuant to Section 19(b)(1... Backed Securities Division (``MBSD'') intends to move the time at which it runs its daily morning pass... notify participants that MBSD intends to move the time at which it runs its daily morning pass from 10:30...
Social Security Administration
... Plan Costs my Social Security Check out your Social Security Statement , change your address & manage your benefits online today. Social Security Number Your Social Security number remains your ...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
49 CFR 15.7 - Covered persons.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...
Focusing America’s National Powers
2006-04-14
governments with market economies. 15. SUBJECT TERMS National Security, National Powers, Sources of Power, National Security Council, National Security... Strategy , Six-phased Campaign Plan, JIACG, DIME 16. SECURITY CLASSIFICATION OF: Unclassified 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME...satisfaction of the requirements of a Master of Science Degree in Joint Campaign Planning and Strategy . The contents of this paper reflect my own
49 CFR 659.23 - System security plan: contents.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 7 2014-10-01 2014-10-01 false System security plan: contents. 659.23 Section 659.23 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the State Oversight Agency § 659.23 System security...
17 CFR 230.405 - Definitions of terms.
Code of Federal Regulations, 2013 CFR
2013-04-01
... purchased for the account of plan participants, at prices not in excess of current market prices at the time... specified in the plan and based upon average or current market prices at the time of purchase. Electronic... maintain a market for the registrant's securities. Equity security. The term equity security means any...
17 CFR 230.405 - Definitions of terms.
Code of Federal Regulations, 2012 CFR
2012-04-01
... purchased for the account of plan participants, at prices not in excess of current market prices at the time... specified in the plan and based upon average or current market prices at the time of purchase. Electronic... maintain a market for the registrant's securities. Equity security. The term equity security means any...
17 CFR 230.405 - Definitions of terms.
Code of Federal Regulations, 2014 CFR
2014-04-01
... purchased for the account of plan participants, at prices not in excess of current market prices at the time... specified in the plan and based upon average or current market prices at the time of purchase. Electronic... maintain a market for the registrant's securities. Equity security. The term equity security means any...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-19
... Insured Credit Unions to maintain an information security program and an incident response plan that... Federally Insured Credit Unions to maintain an information security program and an incident response plan... credit unions to develop a written security program to safeguard sensitive member information. This...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-06
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70793; File No. S7-24-89] Joint Industry Plan..., Consolidation and Dissemination of Quotation and Transaction Information for Nasdaq-Listed Securities Traded on... Exchange, Inc., Financial Industry Regulatory Authority, Inc., International Securities Exchange LLC...
National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook
NASA Technical Reports Server (NTRS)
Roback, E.
1991-01-01
The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.
77 FR 45354 - Notification of Single Source Cooperative Agreement Award for Project Hope
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-31
... Support of National Health Security Strategy (2009) and Implementation Plan (2012) and Homeland Security... Directive-21 (2007) and the National Health Security Strategy (2009) and Implementation Plan (2012). In the... of a Health Affairs thematic issue that will identify, explore and propose policy options for...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... Interim Implementation Guide for the National Health Security Strategy of the United States of America...
The Louis Stokes Health Sciences Library: the Howard University move experience.
Bryant, Darcel A
2004-04-01
The Louis Stokes Health Sciences Library attributes its successful move to early planning and preparation. Professional literature on the subject as well as consultation with other experienced library personnel also proved beneficial. Utilizing these resources, the committees devised a strategy that supported the library's mission to provide excellent and complete information services for the advancement of health sciences. This paper describes the Howard University Health Sciences Library move experience and offers practical advice for planning a library move. We hope that the information shared will assist other libraries facing a similar challenge.
ERIC Educational Resources Information Center
Maryland State Department of Education, 2016
2016-01-01
With this Strategic Plan, the Division of Special Education/ Early Intervention Services recommits to "Moving Maryland Forward"--introduced in 2013. With the shifting in the national, State, and local education landscape, Maryland has revisited the initial Plan to sharpen the steadfast focus to narrow the gaps for children with…
The Relationship of Social Security Benefits and the Military Survivors Benefit Plan.
1980-07-09
profound effect on the social security offset from the military survivors benefit plan (SBP). This study demonstrates the new social security computation...AD-ABO 088 AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB ON SCHOOL-ETC F/B 513 THE RELATIONSHIP OF SOCIAL SECURITY BENEFITS AND THE MILITARY S-ETC(U...JUL 80 W C LETZKUS. C R MARGENTHALER UNCLASSIFIED AFIT-LS-80-3 I fllflfflffl..fl fl ’IilllllNO] LEVE1L 0 9THE RELATIONSHIP OF SOCIAL SECURITY BENEFITS
Staying Secure for School Safety
ERIC Educational Resources Information Center
Youngkin, Minu
2012-01-01
Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…
MOVES Workshops and Presentations
The U.S. EPA held a three-day workshop including EPA presentations on MOVES 2010 algorithms and default data, information on ways to use MOVES more efficiently for various purposes, and discussion of ideas and plans for MOVES future development.
Moving toward energy security and sustainability in 2050 by reconfiguring biofuel production
USDA-ARS?s Scientific Manuscript database
To achieve energy security and sustainability by 2050 requires reconfiguring biofuel production both by building on current infrastructure and existing technology and also by making substantial improvements and changes in the feedstocks used, the process technologies applied, and the fuels produced....
Comparing replacement rates under private and federal retirement systems.
Martin, Patricia P
One measure of the adequacy of retirement income is replacement rate - the percentage of pre-retirement salary that is available to a worker in retirement. This article compares salary replacement rates for private-sector employees of medium and large private establishments with those for federal employees under the Civil Service Retirement System and the Federal Employees Retirement System. Because there is no standard benefit formula to represent the variety of formulas available in the private sector, a composite defined benefit formula was developed using the characteristics of plans summarized in the Bureau of Labor Statistics Medium and Large Employer Plan Survey. The resulting "typical" private-sector defined benefit plan, with an accompanying defined contribution plan, was then compared with the two federal systems. The Civil Service Retirement System (CSRS) is a stand-alone defined benefit plan whose participants are not covered by Social Security. Until passage of the 1983 Amendments to Social Security Act, it was the only retirement plan for most federal civilian employees. Provisions of the 1983 Amendments were designed to restore long-term financial stability to the Social Security trust funds. One provision created the Federal Employees Retirement System (FERS), which covers federal employees hired after 1983. It was one of the provisions designed to restore long-term financial stability to the Social Security trust funds. FERS employees contribute to and are covered by Social Security. FERS, which is a defined benefit plan, also includes a basic benefit and a 401(k)-type plan known as the Thrift Savings Plan (TSP). To compare how retirees would fare under the three different retirement systems, benefits of employees retiring at age 65 with 35 years of service were calculated using hypothetical workers with steady earnings. Workers were classified according to a percentage of the average wage in the economy: low earners (45 percent), average earners (100 percent) high earners (160 percent), and maximum earners (earnings at the taxable maximum amount). Overall, this analysis found that: Excluding Social Security benefits and TSP and defined contribution annuities, CSRS retirees have a higher pre-retirement salary replacement rate than either FERS or private-sector retirees. Private-sector retirees, however, have higher replacement rate than their FERS counterparts. Including Social Security benefits but not TSP and defined contribution plan annuities, CSRS retirees who are maximum earners have a higher pre-retirement salary replacement rate (despite receiving no Social Security benefits) than FERS retirees with the same earnings. Private-sector retirees in all earnings categories have a higher replacement rate than federal retirees with the same earnings. Including Social Security and TSP and defined contribution plan annuities, private-sector retirees in all earnings categories have a higher replacement rate than federal retirees, but their rate is close to that of FERS retirees. The rate is higher for FERS retirees than for CSRS retirees in all earnings categories. This analysis shows that replacement creates could exceed 100 percent for FERS employees who contribute who contribute 6 percent of earnings to the TSP over full working career. Private-sector replacement rates were quite similar for those with both a defined benefit and a defined contribution pension plan. Social Security replacement rates make up the highest proportion of benefits for th private sector's lowest income quartile group. The replacement rate for 401(k) plans and the TSP account for a higher proportion of benefits than does Social Security for all other income groups, assuming the absence of a defined benefit plan.
Homeland Security - Can It be Done?
2003-04-07
and get past the shenanigans in Congress and implement homeland security strategies.ř The new DHS is scheduled to move 22 federal agencies and...uniform laws to license and regulate certain financial services, since terrorists exploit such services. The strategy also takes care with definitions...initiative from organizations interested in the security of sensitive information, such as financial services, healthcare, and government. 47Joseph R. Barnes
Moving Large Wiring-Harness Boards
NASA Technical Reports Server (NTRS)
Shepherd, Samuel D.; Gurman, Isaac
1990-01-01
Carrier for wiring-harness fabrication boards enables lone operator to move board easily and safely. Holds harness while operator fabricating, while being stored, and being transported to equipment frame for mounting. When positioned for assembly of wiring harness, board and carrier give operator easy and convenient access to wires and cables, when positioned for transfer of wiring harness to or from storage area, carrier holds board securely while moved by one person.
Optimizing Security of Cloud Computing within the DoD
2010-12-01
information security governance and risk management; application security; cryptography; security architecture and design; operations security; business ...governance and risk management; application security; cryptography; security architecture and design; operations security; business continuity...20 7. Operational Security (OPSEC).........................................................20 8. Business Continuity Planning (BCP) and Disaster
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC. Information Management and Technology Div.
As required by the Computer Security Act of 1987, federal agencies have to identify systems that contain sensitive information and develop plans to safeguard them. The planning process was assessed in 10 civilian agencies as well as the extent to which they had implemented planning controls described in 22 selected plans. The National Institute of…
Managing the construction bidding process : a move to simpler construction plan sets
DOT National Transportation Integrated Search
2001-01-31
This project was conducted to determine whether construction plan sets could be significantly simplified to speed the process of moving projects to construction. The work steps included a literature review, a telephone survey of highway agencies in s...
31 CFR 10.6 - Enrollment as an enrolled agent or enrolled retirement plan agent.
Code of Federal Regulations, 2011 CFR
2011-07-01
... or enrolled retirement plan agent's name, prior address, new address, social security number or tax... individuals licensed to practice before the Internal Revenue Service who have a social security number or tax... Internal Revenue Service who have a social security number or tax identification number that ends with the...
Security Considerations for Archives: Rare Book, Manuscript, and Other Special Collections.
ERIC Educational Resources Information Center
Cupp, Christian M.
The first of six sections in this guide to security for special collections in archives and libraries discusses the importance of security and the difficulty of preventing theft of archival materials. The second section, which focuses on planning, recommends an inservice training program for staff, a planned communications network between library…
Planning for Effective Security at Campus Special Events.
ERIC Educational Resources Information Center
Bromley, Max L.
1984-01-01
Factors to consider in assuring security for student events on campus are discussed, based on the experience of the University of South Florida, which has developed, tested, and critiqued a system of planning security. Even though special events vary significantly in type and purpose, some questions should be answered in advance, with the…
32 CFR 199.8 - Double coverage.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., except in the case of a plan administered under title XIX of the Social Security Act (42 U.S.C. 1396 et... not include: (i) Plans administered under title XIX of the Social Security Act (Medicaid); (ii... under Title XIX of the Social Security Act (Medicaid) are never considered to be available in the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-12
... amendment requests approval of the Exelon Cyber Security Plan, provides an Implementation Schedule, and adds... require Exelon to fully implement and maintain in effect all provisions of the approved Cyber Security..., Revision 6, ``Cyber Security Plan for Nuclear Power Reactors.'' Basis for proposed no significant hazards...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-12
... Operating Licenses include: (1) The proposed Cyber Security Plan for CCNPP, Ginna, and NMPNS, (2) an... provisions of the Nuclear Regulatory Commission-approved Cyber Security Plan for CCNPP, Ginna, and NMPNS as... Communication Systems and Networks,'' establish the requirements for a cyber security program. This regulation...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-24
... Standard Review Plan, Section 13.6.2, Revision 1 on Physical Security--Design Certification AGENCY: Nuclear... comment on NUREG-0800, ``Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants,'' on a proposed Revision 1 to Standard Review Plan (SRP), Section 13.6.2 on ``Physical Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-01
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70764; File No. 4-443] Joint Industry Plan; Notice of Filing and Immediate Effectiveness of Amendment to the Plan for the Purpose of Developing and Implementing Procedures Designed To Facilitate the Listing and Trading of Standardized Options To Add Miami International Securities Exchange, LLC (...
Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Oehmen, Christopher S.
This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF canmore » be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-05
...This Request for Information (RFI) notice informs the public that the Department of Homeland Security's (DHS) Science and Technology Directorate (S&T) is currently developing a National Critical Infrastructure Security and Resilience Research and Development Plan (NCISR R&D Plan) to conform to the requirements of Presidential Policy Directive 21, Critical Infrastructure Security and Resilience. As part of a comprehensive national review process, DHS solicits public comment on issues or language in the NCISR R&D Plan that need to be included. Critical infrastructure includes both cyber and physical components, systems, and networks for the sixteen established ``critical infrastructures''.
NASA Astrophysics Data System (ADS)
Kessler, Aad; van Duivenbooden, Niek; van Beek, Christy
2014-05-01
Extreme poverty in Burundi's rural area and tensions between families with limited access to arable land hinder development towards a more stable and peaceful society. Due to these tensions and a rapid population growth, agricultural land is currently subject to increased degradation and low agricultural productivity. A whole range of other limiting factors contributes to this, such as: poor seed quality, poor nutrient management combined with low soil fertility, inadequate agronomic practices, pests and crop diseases, poorly developed supply chains, health problems, difficult access to credit, and insecurity. Solving one of these problems will not solve the chain that eventually leads to low food production; it will simply move the emphasis to the next constraining factor. An integrated rural development approach is therefore required to break this vicious circle. The project Fanning the Spark, a Public-Private-Partnership between Achmea Foundation, Alterra of Wageningen University and Research Centre, and HealthNet-TPO in Burundi started in September 2013 with an intervention in several rural villages in Gitega. The project's objective is to increase food production at village level, by means of investments in crop production, a family (income) insurance package that protects rural families against the financial consequences of catastrophic events (natural and health) and making micro-credits available. This will enhance farmers' workability and generate income from agricultural activities in order to break the poverty cycle and enhance food security. The insurance package comprises agricultural and health insurances, and will be jointly implemented with the sustainable agriculture component. The latter component focuses on Integrated Farm Management and the use of innovative soil management practices. Farmer-to-farmer training and scaling-up are crucial components, and in the first phase of the project "innovative farmer groups" have a central role in the project. Each innovative farmer formulates and implements an Integrated Farm Management plan. This is a tool for farmers to plan, reflect and learn about sustainable land management, and particularly about the integration of all farm activities and how these contribute together to enhanced food security. Activities considered in these Integrated Farm Management plans are related to agriculture, livestock, infrastructure, agroforestry, soil conservation and training. The first results of the acceptance and impact of the strategy are now available, and in the next phase all innovative farmers will implement their plans and train fellow farmers to start planning their own Integrated Farm Management.
75 FR 45055 - Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-02
... security zones surrounding the HMCS NANAIMO (NCSM 702), HMCS EDMONTON (NCSM 703), and the HMCS BRANDON...), HMCS EDMONTON (NCSM 703), and the HMCS BRANDON (NCSM 710) while underway in the Puget Sound COTP AOR... 703), and the [[Page 45057
Learning the Lessons and Moving Ahead
ERIC Educational Resources Information Center
Grush, Mary
2007-01-01
Despite intensive security measures, institutions are still suffering breaches--sometimes quite painful and costly ones. After a major breach was reported at UCLA this past November, the author spoke with "Educause" security expert Rodney Petersen, to get his perspective and advice for higher education leadership. This article presents…
2010-01-01
strategic partnerships, national security planning (and theater security cooperation) and US Africa Command (AFRICOM) in securing long term access to...A potential constraint on the supply of strategic minerals is the lack of a US industrial policy and contingency plans in case the flow of... planning for various contingencies, particularly for the 2020s and beyond. The region contains high concentrations of platinum group metals (PGMs
41 CFR 102-192.70 - What security policies and plans must we have?
Code of Federal Regulations, 2014 CFR
2014-01-01
... and plans must we have? 102-192.70 Section 102-192.70 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION ADMINISTRATIVE PROGRAMS... plans must we have? (a) You must have a written mail security policy that applies throughout the agency...
41 CFR 102-192.70 - What security policies and plans must we have?
Code of Federal Regulations, 2010 CFR
2010-07-01
... and plans must we have? 102-192.70 Section 102-192.70 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION ADMINISTRATIVE PROGRAMS... plans must we have? (a) You must have a written mail security policy that applies throughout the agency...
41 CFR 102-192.70 - What security policies and plans must we have?
Code of Federal Regulations, 2011 CFR
2011-01-01
... and plans must we have? 102-192.70 Section 102-192.70 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION ADMINISTRATIVE PROGRAMS... plans must we have? (a) You must have a written mail security policy that applies throughout the agency...
41 CFR 102-192.70 - What security policies and plans must we have?
Code of Federal Regulations, 2012 CFR
2012-01-01
... and plans must we have? 102-192.70 Section 102-192.70 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION ADMINISTRATIVE PROGRAMS... plans must we have? (a) You must have a written mail security policy that applies throughout the agency...
75 FR 27927 - Diversification Requirements for Certain Defined Contribution Plans
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-19
... section 414(l) with respect to any other defined benefit plan or defined contribution plan maintained by... disclosure of the fund's portfolio holdings (for example, Form N-CSR, ``Certified Shareholder Report of... securities, as well as a direct or indirect benefit that is conditioned on investment in employer securities...
Safe teleradiology: information assurance as project planning methodology.
Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2005-01-01
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.
The Louis Stokes Health Sciences Library: the Howard University move experience
Bryant, Darcel A.
2004-01-01
The Louis Stokes Health Sciences Library attributes its successful move to early planning and preparation. Professional literature on the subject as well as consultation with other experienced library personnel also proved beneficial. Utilizing these resources, the committees devised a strategy that supported the library's mission to provide excellent and complete information services for the advancement of health sciences. This paper describes the Howard University Health Sciences Library move experience and offers practical advice for planning a library move. We hope that the information shared will assist other libraries facing a similar challenge. PMID:15098055
Transformation Concepts for National Security in the 21st Century
2002-09-01
The famous Confederate General Stonewall Jackson noted that To move swiftly, strike vigorously, and secure all the fruits of the victory is the ... secret of successful war. This observation is at the very heart of the current discussion and experimentation on how the transformed joint services of the
Moving Secure Software Assurance into Higher Education: A Roadmap for Change
2011-06-02
Summarized: The Issue: 6/2/20118 Software defects are currently a fact of life Software defects are avenues of security vulnerabilities that cyber ... criminals , terrorists, or hostile nations can exploit. We (THE ENTIRE INDUSTY) need to change the way we build systems Decrease the number of defects
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-24
... Standard Review Plan Section 13.6.3, Revision 1 on Physical Security--Early Site Permit AGENCY: Nuclear... comment on NUREG-0800, ``Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants,'' on a proposed Revision 1 to Standard Review Plan (SRP), Section 13.6.3 on ``Physical Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
... the Final Staff Guidance; Standard Review Plan, Section 13.6.6, Revision 0 on Cyber Security Plan... Reports for Nuclear Power Plants,'' Section 13.6.6, Revision 0 on ``Cyber Security Plan'' (Agencywide.... Disposition: On May 13, 2010, the NRC staff issued the proposed Revision 0 on SRP Section 13.6.6 on ``Cyber...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Troy Hiltbrand; Daniel Jones
As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.
Strategic planning for national security: Lessons from business experience. Interim report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bracken, P.
1990-02-01
United States defense planning is at a crossroads and it is therefore useful to review not only discrete issues, but even basic concepts of strategic planning. This Note reviews concepts used in the business world to build insights about how to view current and prospective problems, opportunities, and choices. The author draws upon the business literature for both ideas and metaphors. He observes that U.S. national security planning could profit greatly from an approach that distinguishes among core, environmental, and hedging strategies, and that considers security analogs to such business concepts as defining the business, dealing with new competitors, controllingmore » the intensity of competition, entry and exit barriers, and the need to redeploy assets and restructure the organization. He then relates these concepts to specific problems of national security interest.« less
Generating capacity in US electric utilities: How is it used? How much is needed over the decade
NASA Astrophysics Data System (ADS)
Keelin, T. W.; Oatman, E. N.; Gent, M. R.
1982-10-01
This report addresses: how US generating capacity is used to supply today's consumers with electricity; whether new capacity planned over the next decade is enough to provide a secure supply of electricity; how delays and cancellations of planned capacity would result in higher electricity costs and threaten the security of electricity supply; and how today's decisions determine electricity supply for the next decade and beyond. It is concluded that there is not an electricity supply crisis currently, but there is a planning crisis. This conclusion is based on the following: existing capacity supplies current needs, but provides little room for economic growth; new capacity is planned to provide a secure supply of electricity for the demand projected by utilities; if demand is lower, planned capacity will reduce costs and, if demand is higher, planned capacity will not be adequate; planned capacity may not be realized.
Effects of Contoured Pallets on AMC Mission Efficiency
2011-06-01
carrier moves it on a B-747-100 as if it was a B-747-400, all while not planning to take advantage of the additional cargo capacity of the newer...nature of the cargo being moved and determine if opportunities existed to take advantage of increased MD-11 airlift. Each model had different...types of cargo can help efficiency by planning contoured requirements to take advantage of the fact that while moving these pallets underutilizes
Migration plans and hours of work in Malaysia.
Gillin, E D; Sumner, D A
1985-01-01
"This article describes characteristics of prospective migrants in the Malaysian Family Life Survey and investigates how planning to move affects hours of work. [The authors] use ideas about intertemporal substitution...to discuss the response to temporary and permanent wage expectations on the part of potential migrants. [An] econometric section presents reduced-form estimates for wage rates and planned migration equations and two-stage least squares estimates for hours of work. Men currently planning a move were found to work fewer hours. Those originally planning only a temporary stay at their current location work more hours." excerpt
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)
2003-01-01
The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote access from outside of NASA centers. A SAFE enabled IPG can enable IPG capabilities to be available to NASA mission design teams across different NASA center and partner company firewalls. This paper will first discuss some of the potential security issues for IPG to work across NASA center firewalls. We will then present the SAFE federated security model. Finally we will present the concept of the architecture of a SAFE enabled IPG and how it can benefit NASA mission development.
Determinants, Health Problems, and Food Insecurity in Urban Areas of the Largest City in Cape Verde
Craveiro, Isabel; Alves, Daniela; Amado, Miguel; Santos, Zélia; Fortes, Argentina Tomar; Delgado, António Pedro; Correia, Artur; Gonçalves, Luzia
2016-01-01
Urbanization processes are intertwined with nutritional transition because there is easier access to food of low nutritional quality at reduced prices, changing dietary patterns and leading to an increase of non-communicable chronic diseases. This study aims to understand the perceptions for high blood pressure, obesity, and alcoholism, describing some interactions of these dimensions in the problem of food security in the city of Praia. A qualitative study was carried out under the framework of the research project “UPHI-STAT: Urban Planning and Health Inequalities—moving from macro to micro statistics”. Ten focus groups were conducted in three urban areas with distinct characteristics in the city of Praia, with a total of 48 participants. Participants reported frequent consumption of foods with poor nutritional quality, understanding the potential danger in terms of food security in the city of Praia. Easy access to and high levels of alcohol consumption, and poor quality of traditional drinks were mentioned by participants in the study areas. The impact of the economic situation on the possibility of access to safe and healthy options emerged as a differentiating factor. PMID:27879689
19 CFR 123.26 - Transshipment of merchandise moving through Canada or Mexico.
Code of Federal Regulations, 2010 CFR
2010-04-01
... or Mexico. 123.26 Section 123.26 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS RELATIONS WITH CANADA AND MEXICO Shipments in Transit Through Canada or Mexico § 123.26 Transshipment of merchandise moving through Canada or Mexico. (a...
19 CFR 123.26 - Transshipment of merchandise moving through Canada or Mexico.
Code of Federal Regulations, 2013 CFR
2013-04-01
... or Mexico. 123.26 Section 123.26 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CBP RELATIONS WITH CANADA AND MEXICO Shipments in Transit Through Canada or Mexico § 123.26 Transshipment of merchandise moving through Canada or Mexico. (a...
19 CFR 123.26 - Transshipment of merchandise moving through Canada or Mexico.
Code of Federal Regulations, 2012 CFR
2012-04-01
... or Mexico. 123.26 Section 123.26 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CBP RELATIONS WITH CANADA AND MEXICO Shipments in Transit Through Canada or Mexico § 123.26 Transshipment of merchandise moving through Canada or Mexico. (a...
19 CFR 123.26 - Transshipment of merchandise moving through Canada or Mexico.
Code of Federal Regulations, 2011 CFR
2011-04-01
... or Mexico. 123.26 Section 123.26 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CBP RELATIONS WITH CANADA AND MEXICO Shipments in Transit Through Canada or Mexico § 123.26 Transshipment of merchandise moving through Canada or Mexico. (a...
19 CFR 123.26 - Transshipment of merchandise moving through Canada or Mexico.
Code of Federal Regulations, 2014 CFR
2014-04-01
... or Mexico. 123.26 Section 123.26 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CBP RELATIONS WITH CANADA AND MEXICO Shipments in Transit Through Canada or Mexico § 123.26 Transshipment of merchandise moving through Canada or Mexico. (a...
Greenberg, Michael; Lioy, Paul; Ozbas, Birnur; Mantell, Nancy; Isukapalli, Sastry; Lahr, Michael; Altiok, Tayfur; Bober, Joseph; Lacy, Clifton; Lowrie, Karen; Mayer, Henry; Rovito, Jennifer
2013-11-01
We built three simulation models that can assist rail transit planners and operators to evaluate high and low probability rail-centered hazard events that could lead to serious consequences for rail-centered networks and their surrounding regions. Our key objective is to provide these models to users who, through planning with these models, can prevent events or more effectively react to them. The first of the three models is an industrial systems simulation tool that closely replicates rail passenger traffic flows between New York Penn Station and Trenton, New Jersey. Second, we built and used a line source plume model to trace chemical plumes released by a slow-moving freight train that could impact rail passengers, as well as people in surrounding areas. Third, we crafted an economic simulation model that estimates the regional economic consequences of a variety of rail-related hazard events through the year 2020. Each model can work independently of the others. However, used together they help provide a coherent story about what could happen and set the stage for planning that should make rail-centered transport systems more resistant and resilient to hazard events. We highlight the limitations and opportunities presented by using these models individually or in sequence. © 2013 Society for Risk Analysis.
Greenberg, Michael; Lioy, Paul; Ozbas, Birnur; Mantell, Nancy; Isukapalli, Sastry; Lahr, Michael; Altiok, Tayfur; Bober, Joseph; Lacy, Clifton; Lowrie, Karen; Mayer, Henry; Rovito, Jennifer
2014-01-01
We built three simulation models that can assist rail transit planners and operators to evaluate high and low probability rail-centered hazard events that could lead to serious consequences for rail-centered networks and their surrounding regions. Our key objective is to provide these models to users who, through planning with these models, can prevent events or more effectively react to them. The first of the three models is an industrial systems simulation tool that closely replicates rail passenger traffic flows between New York Penn Station and Trenton, New Jersey. Second, we built and used a line source plume model to trace chemical plumes released by a slow-moving freight train that could impact rail passengers, as well as people in surrounding areas. Third, we crafted an economic simulation model that estimates the regional economic consequences of a variety of rail-related hazard events through the year 2020. Each model can work independently of the others. However, used together they help provide a coherent story about what could happen and set the stage for planning that should make rail-centered transport systems more resistant and resilient to hazard events. We highlight the limitations and opportunities presented by using these models individually or in sequence. PMID:23718133
Office of Command Security Total Quality Management Plan
1989-07-01
outlines the Office of Command Security instruction for TQM implementation. Keywords: TQM (Total Quality Management ), DLA Office of Command Security, Continuous process improvement, Automatic data processing security.
2009-02-02
CAPE CANAVERAL, Fla. – At the Astrotech payload processing facility, technicians secure the protective cover over NASA's Kepler spacecraft. Kepler will be moved to the Hazardous Processing Facility for fueling. Kepler is designed to survey more than 100,000 stars in our galaxy to determine the number of sun-like stars that have Earth-size and larger planets, including those that lie in a star's "habitable zone," a region where liquid water, and perhaps life, could exist. If these Earth-size worlds do exist around stars like our sun, Kepler is expected to be the first to find them and the first to measure how common they are. The liftoff of Kepler aboard a Delta II rocket is currently planned for 10:48 p.m. EST March 5 from Space Launch Complex 17 on Cape Canaveral Air Force Station. Photo credit: NASA/Jack Pfaller
NASA Astrophysics Data System (ADS)
Singh, Navneet K.; Singh, Asheesh K.; Tripathy, Manoj
2012-05-01
For power industries electricity load forecast plays an important role for real-time control, security, optimal unit commitment, economic scheduling, maintenance, energy management, and plant structure planning
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rhodie, K B; Mailhiot, C; Eaglesham, D
Lawrence Livermore National Laboratory's mission is as clear today as it was in 1952 when the Laboratory was founded--to ensure our country's national security and the safety and reliability of its nuclear deterrent. As a laboratory pursuing applied science in the national interest, we strive to accomplish our mission through excellence in science and technology. We do this while developing and implementing sound and robust business practices in an environment that emphasizes security and ensures our safety and the safety of the community around us. Our mission as a directorate derives directly from the Laboratory's charter. When I accepted themore » assignment of Associate Director for Chemistry and Materials Science (CMS), I talked to you about the need for strategic balance and excellence in all our endeavors. We also discussed how to take the directorate to the next level. The long-range CMS strategic plan presented here was developed with this purpose in mind. It also aligns with the Lab's institutional long-range science and technology plan and its 10-year facilities and infrastructure site plan. The plan is aimed at ensuring that we fulfill our directorate's two governing principles: (1) delivering on our commitments to Laboratory programs and sponsors, and (2) anticipating change and capitalizing on opportunities through innovation in science and technology. This will require us to attain a new level of creativity, agility, and flexibility as we move forward. Moreover, a new level of engagement in partnerships with other directorates across the Laboratory as well as with universities and other national labs will also be required. The group of managers and staff that I chartered to build a strategic plan identified four organizing themes that define our directorate's work and unite our staff with a set of common goals. The plan presented here explains how we will proceed in each of these four theme areas: (1) Materials properties and performance under extreme conditions--Fundamental investigations of the properties and performance of states of matter under extreme dynamic, environmental, and nanoscale conditions, with an emphasis on materials of interest to Laboratory programs and mission needs. (2) Chemistry under extreme conditions and chemical engineering to support national security programs--Insights into the chemical reactions of energetic materials in the nuclear stockpile through models of molecular response to extreme conditions of temperature and pressure, advancing a new technique for processing energetic materials by using sol-gel chemistry, providing materials for NIF optics, and furthering developments to enhance other high-power lasers. (3) Science supporting national objectives at the intersection of chemistry, materials science, and biology--Multidisciplinary research for developing new technologies to combat chemical and biological terrorism, to monitor changes in the nation's nuclear stockpile, and to enable the development and application of new physical-science-based methodologies and tools for fundamental biology studies and human health applications. (4) Applied nuclear science for human health and national security: Nuclear science research that is used to develop new methods and technologies for detecting and attributing nuclear materials, assisting Laboratory programs that require nuclear and radiochemical expertise in carrying out their missions, discovering new elements in the periodic table, and finding ways of detecting and understanding cellular response to radiation.« less
2008-06-19
ground troop component of a deployed contingency, and not a stationary infrastructure. With respect to fast- moving vehicles and aircraft, troops...the rapidly- moving user. In fact, the Control Group users could have been randomly assigned the Stationary , Sea, or 134 Ground Mobility Category...additional re-keying on the non- stationary users, just as they induce no re-keying on the Stationary users (assuming those fast- moving aircraft have the
Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S
2003-01-01
A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.
2014-01-01
Government of Kenya stakeholders with providing a framework for analysis by engaging with a wide range of border security experts from key donor states...holistic national border security action plan and gap analysis were necessary to simultaneously deal with the global WMD nonproliferation agenda and...efforts from a research and analysis vantage point. The underlying idea was that Kenya, through this border security action plan and gap analysis , would
The Operational Manager - Enemy or Hero of Secure Business Practice?
NASA Astrophysics Data System (ADS)
Goucher, Wendy
This paper will investigate the role of the non-IT manager in information security. He can, for example, be the reason why sensitive work is carried out on the move and security focused spending is given a low priority in the budget. Alternatively, he can also be the driving force behind empowering the team to have a dynamic attitude to protecting data both at work and at home. Now is the time for managers to stop pushing information security issues away from their desk and into the in-tray of the IT department.
Security and privacy issues of personal health.
Blobel, Bernd; Pharow, Peter
2007-01-01
While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.
National Security Technology Incubation Strategic Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achievingmore » sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.« less
The public transportation system security and emergency preparedness planning guide
DOT National Transportation Integrated Search
2003-01-01
Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...
9. Photocopy of engineering drawing. SECURITY UPGRADES, SLC17: PLANS, SECTIONS, ...
9. Photocopy of engineering drawing. SECURITY UPGRADES, SLC17: PLANS, SECTIONS, AND DETAILS, JANUARY 1993. - Cape Canaveral Air Station, Launch Complex 17, Facility 28425, East end of Lighthouse Road, Cape Canaveral, Brevard County, FL
Code of Federal Regulations, 2012 CFR
2012-10-01
..., each Federal department and agency shall prepare its national security emergency preparedness plans and... preparedness plans and programs to provide appropriate and effective response options for consideration in... Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY...
ERIC Educational Resources Information Center
Boletin del Centro Nacional de Documentacion e Informacion Educativa, 1971
1971-01-01
This article discusses the education provisions established in the Argentine Plan for Development and Security (1971-1975). The statements on educational development call for a diagnostic study of the current cultural and educational situation, the establishment of objectives and strategies, goals for each level of education, steps for the…
The Role of Simultaneous Counternarcotics and Counterterrorism Operations in the Afghan Coin Model
2014-05-22
COIN model, which was developed through Plan Colombia and the security policies of Alvaro Uribe to target terrorists and narco-traffickers...theory by examining the Colombian COIN model, which was developed through Plan Colombia and the security policies of Alvaro Uribe to target terrorists...28 Plan Colombia and Alvaro Uribe .............................................................................................. 32
City encounter and desert encounter: two sources of American regional planning thought
DOE Office of Scientific and Technical Information (OSTI.GOV)
Guttenberg, A.Z.
1978-10-01
Referring to the American experience, the historian, Richard Hofstadter wrote, The US was born in the country and has moved to the city, but this is only part of the story. At the turn of the century while some Americans were moving to the city others were moving to the arid West. As different as they were in many respects, the city encounter and the desert encounter were alike in that both resulted in planned attempts to establish rural institutions and values in inhospitable environments. In the urban East the basis for regional planning was the neighborhood concept. In themore » arid West it was the cooperative colony and the scientific family farm. This article is a study of the similarity-in-diversity which characterized American planning in its original phase. 60 references.« less
Securing clean water: A secret to success
Michael Somerville; Dino DeSimone
2000-01-01
Securing clean water is a primary goal for many agencies, organizations, and concerned citizens. To achieve that goal, agencies have traditionally taken a mostly regulatory approach. In recent years, however, a major trend in government has been to move decision-making and action-taking to the local level. Conservation Districts, watershed organizations, and other...
77 FR 5747 - Security Zones, Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... establishment of security zones. We seek any comments or information that may lead to the discovery of a... This proposed rule would call for no new collection of information under the Paperwork Reduction Act of..., design, or operation; test methods; sampling procedures; and related management systems practices) that...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... Homeland Security System of Records and will consist of information that is created and used by the... classified, sensitive, and unclassified information; system location to reflect the move of the History... interested individuals for research in writing dissertations, articles, books, and other documents for...
Code of Federal Regulations, 2010 CFR
2010-07-01
... and the risk to population or infrastructure. (d) Informational broadcasts. The Captain of the Port... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... the Captain of the Port Houston-Galveston Zone commencing at U.S. territorial waters through the...
45 CFR 261.12 - What is an individual responsibility plan?
Code of Federal Regulations, 2010 CFR
2010-10-01
...: (a) Should set an employment goal and a plan for moving immediately into private-sector employment... doing other things that will help the individual become or remain employed in the private sector; (c) Should be designed to move the individual into whatever private-sector employment he or she is capable of...
Collaborative e-Learning: e-Portfolios for Assessment, Teaching and Learning
ERIC Educational Resources Information Center
Luchoomun, Dharmadeo; McLuckie, Joe; van Wesel, Maarten
2010-01-01
This paper presents an innovative approach to e-learning by exploring a number of initiatives where there is a move towards collaborative use of Personal Development Plans (PDPs) integrated with e-portfolios as mechanisms for delivering such plans. It considers whether such a move towards more product orientated assessment might enhance student…
2016-05-26
makers. The third case study, on Nigeria , will provide an analysis of a peaceful transition of power. Finally, the structure for a proposed Post...15. SUBJECT TERMS Regime Change, National Security Council, Kosovo, Libya, Nigeria , transition of power, post-regime change planning. 16. SECURITY...conflation that exists between the planning element and politically appointed decision makers. The third case study, on Nigeria , will provide an analysis of
Marketing Plan for the National Security Technology Incubator
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubatormore » program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.« less
Risk Unbound: Threat, Catastrophe, and the End of Homeland Security
2015-09-01
Defense (DOD) models ) is now the prevalent model for developing plans.63 Capabilities- based within the national preparedness system is defined as...capabilities- based planning is the accounting for scenarios through organizational capability development , and the search for commonality and structure...of providing perfect security, and demonstrate the limitations of risk- based security practices. This thesis presents an argument in three parts
Homeland Security Strategic Research Action Plan 2012 - 2016
EPA’s Homeland Security research plan outline and how it will address science and technological gaps and improve the Agency’s ability to carry out its responsibilities associated with preparing for and responding to, terrorist attacks, and other disasters.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-26
... received by December 19, 2012. SUMMARY: This Request For Comments (RFC) is issued by the Cyber Security and... plan was developed under the leadership of the Cyber Security and Information Assurance Research and...
Achieving built-environment and active living goals through Music City Moves.
Omishakin, Adetokunbo A; Carlat, Jennifer L; Hornsby, Shannon; Buck, Tracy
2009-12-01
Nashville, Tennessee, formed Music City Moves (MCM), an interdisciplinary, countywide partnership to implement its vision for the community: a metropolitan region where routine physical activity is a fundamental part of daily life for all residents. Music City Moves' main focus was the pursuit of changes in community planning policies to help shape Nashville's built environment and facilitate walking and bicycling. To complement this focus, MCM developed a suite of health programs to support physical activity in high-risk populations and a countywide promotional campaign designed to increase awareness and get people active through event participation. Nashville made considerable strides in improving policies and regulations related to building and site design to improve the built environment for pedestrians and cyclists, including passage of (1) specific plan zoning; (2) revised subdivision regulations that introduced a "walkable subdivision" option for developers; and (3) a community-character manual that will guide future land-use planning. Programs and promotions have increased awareness and participation, and the Tour de Nash bike/walk event showcases yearly changes in the built environment. Political leadership has been critical to MCM's success. Leadership of the partnership by the planning department facilitated regulatory changes in planning policies. Music City Moves has accelerated Nashville's movement to improve the built environment and encourage active living. The beneficial impact of policy changes will continue to be manifested in coming years; however, ongoing political support and education of stakeholders in the planning process will be necessary to ensure that planning policies are fully implemented.
Adshead, Gwen; Pyszora, Natalie; Wilson, Claire; Gopie, Ramesh; Thomas, Deryk; Smith, Julia; Glorney, Emily; Moore, Estelle; Tapp, James
2017-04-01
Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.
Nuclear and radiological Security: Introduction.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, James Christopher
Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of themore » various entities involved in nuclear security.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
... the move of this datacenter to an ISE facility, and to adopt a corresponding disaster recovery network... rent cabinet space in the ISE facility, and to adopt a corresponding disaster recovery network fee... datacenter is not operational. As the Exchange is moving its hardware to an ISE-run facility, the Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-08
... Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA; Correction AGENCY: Coast Guard...-mail ENS Anthony P. LaBoy, Coast Guard Sector Puget Sound, Waterways Management Division; telephone 206-217- 6323, e-mail SectorPugetSound[email protected] . Correction In the temporary final rule FR Doc. 2011...
75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...
76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...
76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-13
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...
75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-09
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...
Creation of a Homeland Security Jail Information Model
2012-03-01
that several core members of the cell were arrested in Los Angeles County for robbery ( America at a Crossroads, n.d.). “The effort to impact ‘homegrown...later moved to Chicago, Illinois, where he was first incarcerated. Padilla was a member of the Latin Kings street gang and was convicted of aggravated...incorporated any focus on homeland security. There is not a single proven homeland security jail intelligence model in America today. According to the
Robust mobility in human-populated environments
NASA Astrophysics Data System (ADS)
Gonzalez, Juan Pablo; Phillips, Mike; Neuman, Brad; Likhachev, Max
2012-06-01
Creating robots that can help humans in a variety of tasks requires robust mobility and the ability to safely navigate among moving obstacles. This paper presents an overview of recent research in the Robotics Collaborative Technology Alliance (RCTA) that addresses many of the core requirements for robust mobility in human-populated environments. Safe Interval Path Planning (SIPP) allows for very fast planning in dynamic environments when planning timeminimal trajectories. Generalized Safe Interval Path Planning extends this concept to trajectories that minimize arbitrary cost functions. Finally, generalized PPCP algorithm is used to generate plans that reason about the uncertainty in the predicted trajectories of moving obstacles and try to actively disambiguate the intentions of humans whenever necessary. We show how these approaches consider moving obstacles and temporal constraints and produce high-fidelity paths. Experiments in simulated environments show the performance of the algorithms under different controlled conditions, and experiments on physical mobile robots interacting with humans show how the algorithms perform under the uncertainties of the real world.
Code of Federal Regulations, 2010 CFR
2010-04-01
... plan may provide that any such document may be transferred to microfilm or other recording medium after... years or at such earlier date as is specified in a plan for the destruction or disposition of any such documents if such plan has been filed with the Commission by such exchange, association, clearing agency or...
41 CFR 102-192.75 - Why must we have written security policies and plans?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Why must we have written security policies and plans? 102-192.75 Section 102-192.75 Public Contracts and Property Management Federal... terrorist attacks, and this is spelled out in the Postal and Shipping Sector Plan, which is part of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-04
... the Final Staff Guidance Standard Review Plan Section 13.6.3, Revision 1 on Physical Security--Early... NRC is issuing its Final Revision 1 to NUREG-0800, ``Standard Review Plan (SRP) for the Review of Safety Analysis Reports for Nuclear Power Plants,'' Section 13.6.3, Revision 1 on Physical Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-04
... the Final Staff Guidance Standard Review Plan Section 13.6.2, Revision 1 on Physical Security--Design... issuing its Final Revision 1 to NUREG-0800, ``Standard Review Plan (SRP) for the Review of Safety Analysis Reports for Nuclear Power Plants,'' Section 13.6.2, Revision 1 on Physical Security--Design Certification...
Home equity conversion plans as a source of retirement income.
Springer, P B
1985-09-01
This article describes in detail a variety of home equity conversion plans and discusses their relevance for social security beneficiaries, as well as for the aged in general. Under these plans, a dormant asset--accumulated home equity--is converted into current retirement income. The plans vary: Some are debt instruments; others involve the sale and leaseback of the residence. Some provide income for a fixed term; others offer a lifetime annuity. Some include a public subsidy; others are free of governmental involvement. The advantages and disadvantages of these plans, as well as examples of how they operate and their respective income potential, are discussed in this article. The relevance of home equity conversion plans for social security beneficiaries is illustrated by means of data from the Retirement History Study. These data allow comparison of various demographic groups in terms of their dependence on social security benefits. Each group is examined in terms of available home equity and home equity potential under several conversion plans.
Hiner, Jacqueline; Pyka, Jeanine; Burks, Colleen; Pisegna, Lily; Gador, Rachel Ann
2012-01-01
Ensuring the safety of infants born in a hospital is a top priority and, therefore, requires a solid infant security plan. Using an interdisciplinary approach and a systematic change process, nursing leadership in collaboration with clinical nurses and security personnel analyzed the infant security program at this community hospital to identify vulnerabilities. By establishing an interdisciplinary approach to infant security, participants were able to unravel a complicated concept, systematically analyze the gaps, and agree to a plan of action. This resulted in improved communication and clarification of roles between the nursing and security divisions. Supply costs decreased by 17.4% after the first year of implementation. Most importantly, this project enhanced and strengthened the existing infant abduction prevention measures, hard wired the importance of infant security, and minimized vulnerabilities.
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2012 CFR
2012-01-01
... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning... management; and management and implementation level training in system/application life cycle management...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...
Code of Federal Regulations, 2013 CFR
2013-10-01
... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...
Code of Federal Regulations, 2014 CFR
2014-10-01
... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...
Code of Federal Regulations, 2012 CFR
2012-10-01
... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...
[Planning a Health Residence for Prison Security Measures, Tuscany (Italy)].
Porfido, Eugenio; Colombai, Renato; Scarpa, Franco; Totaro, Michele; Tani, Luca; Baldini, Claudio; Baggiani, Angelo
2016-01-01
Health Residences for Prison Security Measures are facilities hosting psychotic persons who have committed crimes and providing them with personalized rehabilitation and treatment plans to promote their reinstatement in society. The aim of this study was to describe the criteria for planning and designing a prison health residence in the Tuscany region (Italy), to be managed by the regional healthcare service, in line with current regulations, with dedicated staff for providing specific treatment plans and programmes.
Enhancing infrastructure resilience through business continuity planning.
Fisher, Ronald; Norman, Michael; Klett, Mary
2017-01-01
Critical infrastructure is crucial to the functionality and wellbeing of the world around us. It is a complex network that works together to create an efficient society. The core components of critical infrastructure are dependent on one another to function at their full potential. Organisations face unprecedented environmental risks such as increased reliance on information technology and telecommunications, increased infrastructure interdependencies and globalisation. Successful organisations should integrate the components of cyber-physical and infrastructure interdependencies into a holistic risk framework. Physical security plans, cyber security plans and business continuity plans can help mitigate environmental risks. Cyber security plans are becoming the most crucial to have, yet are the least commonly found in organisations. As the reliance on cyber continues to grow, it is imperative that organisations update their business continuity and emergency preparedness activities to include this.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...
1989-08-01
Include in this plan the role of the Defense Technical Information Center (DTIC), the Defense Technology Security Administration ( DTSA ), and ODDR&E’s...DTIC = Defense Technical Information Center DTSA = Defense Technology Security Administration DUSD = Deputy Under Secretary of Defense Gloss. 2 DUSD...technologically sensitive requests. The Defense Technology Security Administi ation ( DTSA ) is developing a large system to track foreign military sales
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-18
... Proposed Information Collection to OMB; Moving to Work Demonstration AGENCY: Office of the Chief... required to submit annual plans, however, PHAs with Moving to Work demonstration agreements (29 at the time... Following Information Title of Proposal: Moving to Work Demonstration. OMB Approval Number: 2577-0216. Form...
ERIC Educational Resources Information Center
Murphy, Garrett
2014-01-01
This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-02
... Time at Which the Mortgage-Backed Securities Division Runs Its Daily Morning Pass September 26, 2012. I... FICC proposes to move the time at which its Mortgage-Backed Securities Division (``MBSD'') runs its... processing passes. MBSD currently runs its first processing pass of the day (historically referred to as the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-29
...: Background Ensuring cargo security as it flows through supply chains is a challenge faced by industry and... into the supply chain while facilitating the flow of legal commerce. A solution that provides greater security and facilitation of legal commerce is tracking the cargo conveyance as it moves through the supply...
Wireless networking for the dental office: current wireless standards and security protocols.
Mupparapu, Muralidhar; Arora, Sarika
2004-11-15
Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.
29 CFR 2580.412-1 - Statutory provisions.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., officer and employee of any employee welfare benefit plan or of any employee pension benefit plan subject... Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY BONDING RULES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974 TEMPORARY BONDING RULES...
49 CFR 172.804 - Relationship to other Federal requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... MATERIALS TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.804 Relationship to other Federal... 49 Transportation 2 2011-10-01 2011-10-01 false Relationship to other Federal requirements. 172...
49 CFR 172.804 - Relationship to other Federal requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... MATERIALS TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.804 Relationship to other Federal... 49 Transportation 2 2014-10-01 2014-10-01 false Relationship to other Federal requirements. 172...
49 CFR 172.804 - Relationship to other Federal requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... MATERIALS TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.804 Relationship to other Federal... 49 Transportation 2 2013-10-01 2013-10-01 false Relationship to other Federal requirements. 172...
49 CFR 172.804 - Relationship to other Federal requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... MATERIALS TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.804 Relationship to other Federal... 49 Transportation 2 2012-10-01 2012-10-01 false Relationship to other Federal requirements. 172...
49 CFR 172.804 - Relationship to other Federal requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... MATERIALS TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.804 Relationship to other Federal... 49 Transportation 2 2010-10-01 2010-10-01 false Relationship to other Federal requirements. 172...
6 CFR 27.210 - Submissions schedule.
Code of Federal Regulations, 2010 CFR
2010-01-01
... in any subsequent Federal Register notice. (2) Security Vulnerability Assessment. Unless otherwise notified, a covered facility must complete and submit a Security Vulnerability Assessment within 90... Department's approval of the facility's Site Security Plan. (2) Security Vulnerability Assessment. Unless...
DOT National Transportation Integrated Search
1999-11-01
This plan describes coordinated long-term research initiatives to bring about advances in aviation that will be required in the opening decades of the next century. The White House Commission on Aviation Safety and Security and the National Civil Avi...
DOT National Transportation Integrated Search
1999-11-01
This plan describes coordinated long-term research initiatives to bring about advances in aviation that will be required in the opening decades of the next century. The White House Commission on Aviation Safety and Security and the National Civil Avi...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-14
... DEPARTMENT OF LABOR Employee Benefits Security Administration Proposed Extension of Information Collection; Comment Request; Employee Benefit Plan Claims Procedures Under ERISA AGENCY: Employee Benefits... Employee Benefits Security Administration (EBSA) is soliciting comments on a proposed extension of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-02
... Standards and Technology's (NIST) Computer Security Division maintains a Computer Security Resource Center... Regarding Driver History Record Information Security, Continuity of Operation Planning, and Disaster... (SDLAs) to support their efforts at maintaining the security of information contained in the driver...
Examining Long Term Climate Related Security Risks through the Use of Gaming and Scenario Planning
2016-10-24
114 Examining Long-Term Climate-Related Security Risks through the Use of Gaming and Scenario Planning Catherine M. Schkoda, Shawna G. Cuan, and...E. D. McGrady Abstract: This paper examines four possible climate change-related security risks that emerged from an international game and scenario...potential for an emerging disparity between regions over the consensus and control of climate change-related technologies. Keywords: gaming , scenario
Defense Technology Security Administration Strategic Plan 2009-2010
2008-12-22
NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Technology Security Administration ( DTSA ),Washington,DC 8. PERFORMING ORGANIZATION...Security Administration This document is unclassifi ed in its entirety. Photography courtesy of Defense Link and DTSA . Document printed 2009. DTSA ...STRATEGIC PLAN 2009-2010 C O N T E N T S Message from the Director 2 Envisioning 2010 3 Our Way Ahead 5 We Are DTSA 18 Metrics Matrix 24 DTSA
Daykin, Chris
2002-01-01
Contracting-out was introduced in the United Kingdom in 1978 as part of the arrangements for the State Earnings-Related Pension Scheme (SERPS) in order to avoid duplication with the existing well-developed defined benefit occupational pension plan sector. Members and sponsors of contracted-out schemes were able to save on their social security contributions in recognition of the fact that they were accruing equivalent benefits through an occupational pension plan. Later on this concept was extended to those with individual money purchase pension plans. This article considers a brief history of contracting-out, the principles of contracting-out, some problems associated with contracting-out, the implications of the introduction of stakeholder pensions and State Second Pension, and the latest rebate review and rebate orders. It examines how U.K. pensions policy since 1978 has been based on a partnership between social security and private pension plans.
Security Measures to Protect Mobile Agents
NASA Astrophysics Data System (ADS)
Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh
2010-11-01
The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.
Twenty-Five Year Site Plan FY2013 - FY2037
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, William H.
2012-07-12
Los Alamos National Laboratory (the Laboratory) is the nation's premier national security science laboratory. Its mission is to develop and apply science and technology to ensure the safety, security, and reliability of the United States (U.S.) nuclear stockpile; reduce the threat of weapons of mass destruction, proliferation, and terrorism; and solve national problems in defense, energy, and the environment. The fiscal year (FY) 2013-2037 Twenty-Five Year Site Plan (TYSP) is a vital component for planning to meet the National Nuclear Security Administration (NNSA) commitment to ensure the U.S. has a safe, secure, and reliable nuclear deterrent. The Laboratory also usesmore » the TYSP as an integrated planning tool to guide development of an efficient and responsive infrastructure that effectively supports the Laboratory's missions and workforce. Emphasizing the Laboratory's core capabilities, this TYSP reflects the Laboratory's role as a prominent contributor to NNSA missions through its programs and campaigns. The Laboratory is aligned with Nuclear Security Enterprise (NSE) modernization activities outlined in the NNSA Strategic Plan (May 2011) which include: (1) ensuring laboratory plutonium space effectively supports pit manufacturing and enterprise-wide special nuclear materials consolidation; (2) constructing the Chemistry and Metallurgy Research Replacement Nuclear Facility (CMRR-NF); (3) establishing shared user facilities to more cost effectively manage high-value, experimental, computational and production capabilities; and (4) modernizing enduring facilities while reducing the excess facility footprint. Th is TYSP is viewed by the Laboratory as a vital planning tool to develop an effi cient and responsive infrastructure. Long range facility and infrastructure development planning are critical to assure sustainment and modernization. Out-year re-investment is essential for sustaining existing facilities, and will be re-evaluated on an annual basis. At the same time, major modernization projects will require new line-item funding. This document is, in essence, a roadmap that defines a path forward for the Laboratory to modernize, streamline, consolidate, and sustain its infrastructure to meet its national security mission.« less
Security breaches: tips for assessing and limiting your risks.
Coons, Leeanne R
2011-01-01
As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.
Security Event Recognition for Visual Surveillance
NASA Astrophysics Data System (ADS)
Liao, W.; Yang, C.; Yang, M. Ying; Rosenhahn, B.
2017-05-01
With rapidly increasing deployment of surveillance cameras, the reliable methods for automatically analyzing the surveillance video and recognizing special events are demanded by different practical applications. This paper proposes a novel effective framework for security event analysis in surveillance videos. First, convolutional neural network (CNN) framework is used to detect objects of interest in the given videos. Second, the owners of the objects are recognized and monitored in real-time as well. If anyone moves any object, this person will be verified whether he/she is its owner. If not, this event will be further analyzed and distinguished between two different scenes: moving the object away or stealing it. To validate the proposed approach, a new video dataset consisting of various scenarios is constructed for more complex tasks. For comparison purpose, the experiments are also carried out on the benchmark databases related to the task on abandoned luggage detection. The experimental results show that the proposed approach outperforms the state-of-the-art methods and effective in recognizing complex security events.
A Security Checklist for ERP Implementations
ERIC Educational Resources Information Center
Hughes, Joy R.; Beer, Robert
2007-01-01
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
77 FR 44306 - Service Delivery Plan
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-27
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0048] Service Delivery Plan AGENCY: Social... publicly available. Do not include in your comments any personal information, such as Social Security... function of the Web page to find docket number SSA-2012-0048. The system will issue you a tracking number...
Security's role in morgue operations: needed--a foolproof plan.
White, John M
2012-01-01
If handling the remains of dead patients is a responsibility of your security department, or you are being pressured to take on the role because of budget cuts, the need to anticipate and plan for complications which may arise is critical, the author points out.
29 CFR 2530.201-1 - Coverage; general.
Code of Federal Regulations, 2010 CFR
2010-07-01
... section 3(3) of the Act and § 2510.3-3. (See also the definitions of employee welfare benefit plan... Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR MINIMUM STANDARDS FOR EMPLOYEE PENSION BENEFIT PLANS UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-11
..., Consolidation and Dissemination of Quotation and Transaction Information for Nasdaq-Listed Securities Traded on... Exchange, Inc., Financial Industry Regulatory Authority, Inc., International Securities Exchange LLC...-Regulatory Organization Plan Governing the Collection, Consolidation, and Dissemination of Quotation and...
Report: Survey Results on Information Used by Water Utilities to Conduct Vulnerability Assessments
Report #2004-M-0001, November 21, 2003. EPA developed a Strategic Plan for Homeland Security (Plan), dated Sept 2002, which states that EPA will work with the States, tribes, drinking water utilities, and others to enhance the security of water utilities.
The European cooperative approach to securing critical information infrastructure.
Purser, Steve
2011-10-01
This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.
Marketing Plan for Demonstration and Validation Assets
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
The National Security Preparedness Project (NSPP), is to be sustained by various programs, including technology demonstration and evaluation (DEMVAL). This project assists companies in developing technologies under the National Security Technology Incubator program (NSTI) through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. This report documents the DEMVAL marketing and visibility plan, which will focus on collecting information about, and expanding the visibility of, DEMVAL assets serving businesses with national security technology applications in southern New Mexico.
Higher Stakes--The Hidden Risks of School Security Fences for Children's Learning Environments
ERIC Educational Resources Information Center
Rooney, Tonya
2015-01-01
In a move away from the open or low-fenced grounds that have traditionally been a feature of Australian school design, the last decade has seen a growth in the installation of high-security fences around schools. These structures, far from being passive and neutral, act to redefine the possibilities for movement and connectivity in the local…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-24
... second by comparing each last consolidated sale price of a security (``Trigger Trade'') during the...-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing of a Proposed Rule Change Adding Rule 80C To Provide for a Trading Pause for Individual Securities When the Price Moves 10 Percent or More...
Code of Federal Regulations, 2013 CFR
2013-07-01
..., Southwest Pass Sea Buoy to Mile Marker 96.0, New Orleans, LA. (a) Location. Within the Lower Mississippi River and Southwest Pass, moving security zones are established around all cruise ships between the... encompass all waters within 500 yards of a cruise ship. These zones remain in effect during the entire...
Code of Federal Regulations, 2011 CFR
2011-07-01
..., Southwest Pass Sea Buoy to Mile Marker 96.0, New Orleans, LA. (a) Location. Within the Lower Mississippi River and Southwest Pass, moving security zones are established around all cruise ships between the... encompass all waters within 500 yards of a cruise ship. These zones remain in effect during the entire...
Code of Federal Regulations, 2014 CFR
2014-07-01
..., Southwest Pass Sea Buoy to Mile Marker 96.0, New Orleans, LA. (a) Location. Within the Lower Mississippi River and Southwest Pass, moving security zones are established around all cruise ships between the... encompass all waters within 500 yards of a cruise ship. These zones remain in effect during the entire...
Code of Federal Regulations, 2012 CFR
2012-07-01
..., Southwest Pass Sea Buoy to Mile Marker 96.0, New Orleans, LA. (a) Location. Within the Lower Mississippi River and Southwest Pass, moving security zones are established around all cruise ships between the... encompass all waters within 500 yards of a cruise ship. These zones remain in effect during the entire...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-24
... imbalance at the end of a trading pause, Nasdaq may delay the re-opening of a security. Nasdaq will issue a notification if it cannot resume trading for a reason other than a significant imbalance. Price moves under... Period, Nasdaq detects an [liquidity] order imbalance in the security, Nasdaq will extend the Display...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-07
...: Temporary final rule. SUMMARY: The Captain of the Port of New Orleans (COTP New Orleans) has established... need of escort protection by the COTP New Orleans for security reasons. No person or vessel is... COTP New Orleans. DATES: This rule is effective from January 1, 2012, through March 31, 2012. ADDRESSES...
78 FR 261 - Moving Security Zone Around Escorted Vessels on the Lower Mississippi River
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-03
... Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Captain of the Port of New Orleans (COTP New... of the COTP New Orleans or the on-scene Coast Guard or enforcement agency asset to enter the security... COTP New Orleans or the on-scene asset. The COTP New Orleans will inform the public of the existence or...
P.L. 110-140, "Energy Independence and Security Act of 2007" (2007)
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-13
An act to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.
Planning Considerations for Secure Network Protocols
1999-03-01
distribution / management ) requirements needed to support network security services are examined. The thesis concludes by identifying tactical user network requirements and suggests security issues to be considered in concert with network
6 CFR 27.255 - Recordkeeping requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... audit required under § 27.225(e)) or Security Vulnerability Assessment, a record of the audit, including... retain records of submitted Top-Screens, Security Vulnerability Assessments, Site Security Plans, and all...
Security Systems Consideration: A Total Security Approach
NASA Astrophysics Data System (ADS)
Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.
2007-12-01
The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... operations center for the Department of Homeland Security.'' Through the NOC, OPS provides real-time...-003 Operations Collection, Planning, Coordination, Reporting, Analysis, and Fusion System of Records... System of Records.'' The DHS/OPS-003 Operations Collection, Planning, Coordination, Reporting, Analysis...
42 CFR 56.603 - Project elements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... of the Social Security Act, obtain or make every reasonable effort to obtain a written agreement with... entitled to insurance benefits under title XVIII of the Social Security Act, to medical assistance under a State plan approved under title XIX of such Act, to social services and family planning under title XX...
Managing Campus Security Programs in the 80's.
ERIC Educational Resources Information Center
Kimble, Joseph Paul
After presenting an imaginative depiction of the fiscal and administrative changes that may overwhelm community colleges during the 1980's, this paper looks at several factors that should be considered in planning and managing campus security departments. The paper offers suggestions related to: (1) the development of master parking plans which…
29 CFR 2580.412-2 - Plans exempt from the coverage of section 13.
Code of Federal Regulations, 2010 CFR
2010-07-01
... whole or in part, of dealing with employers concerning an employee welfare or pension benefit plan, or... Section 2580.412-2 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY BONDING RULES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF...
76 FR 80205 - Instituting a National Action Plan On Women, Peace, And Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-23
... peace by promoting and strengthening women's rights and effective leadership and substantive... Instituting a National Action Plan On Women, Peace, And Security By the authority vested in me as President by...: Section 1. Policy. (a) The United States recognizes that promoting women's participation in conflict...
76 FR 2142 - Employee Benefits Security Administration
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-12
...Notice is hereby given that the Employee Benefits Security Administration will hold a hearing to consider issues attendant to adopting a regulation defining when a person is considered to be a ``fiduciary'' by reason of giving investment advice to an employee benefit plan or to a plan's participants and beneficiaries.
78 FR 69745 - Safety and Security Plans for Class 3 Hazardous Materials Transported by Rail
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... Security Plans for Class 3 Hazardous Materials Transported by Rail AGENCY: Pipeline and Hazardous Materials... characterization, classification, and selection of a packing group for Class 3 materials, and the corresponding...
12 CFR 390.203 - What definitions apply to this subpart?
Code of Federal Regulations, 2012 CFR
2012-01-01
... not include securities issued by an investment company registered under the Investment Company Act of..., other than a put, call, straddle, option, or privilege: (i) That is traded on one or more national... operated by a registered securities association. Investment company plan means any plan under which: (1) A...
123. ARAI Substation (ARA726) plan, elevation, security fence details, and ...
123. ARA-I Substation (ARA-726) plan, elevation, security fence details, and sections. Norman Engineering Company 961-area/SF-726-E-1. Date: January 1959. Ineel index code no. 068-0726-10-613-102778. - Idaho National Engineering Laboratory, Army Reactors Experimental Area, Scoville, Butte County, ID
OAS - Organization of American States: Democracy for peace, security, and
Information Offices in the Member States Our History Logo Authorities Services Legal Protocol Topics A Access Knowledge-based Society L Labor Legal Services M MACCIH MAPP Migration Multidimensional Security O Estate Strategy Financial Reports Annual Operating Plan Legal Services Ombudsperson Strategic Plan
12 CFR 226.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2014 CFR
2014-01-01
... SYSTEM (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and... to a credit card account under an open-end (not home-secured) consumer credit plan, based on the... new credit card accounts under an open-end (not home-secured) consumer credit plan. (2) Rate increases...
12 CFR 226.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2013 CFR
2013-01-01
... SYSTEM (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and... to a credit card account under an open-end (not home-secured) consumer credit plan, based on the... new credit card accounts under an open-end (not home-secured) consumer credit plan. (2) Rate increases...
20 CFR 416.1260 - Special resource provision for recipients under a State plan.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Special resource provision for recipients under a State plan. 416.1260 Section 416.1260 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1260 Special...
29 CFR 2590.606-4 - Notice requirements for plan administrators.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Coverage, Qualified Medical Child Support Orders, Coverage for Adopted Children § 2590.606-4 Notice... child; (v) An explanation of the plan's procedures for electing continuation coverage, including an... the Social Security Administration, under title II or XVI of the Social Security Act (42 U.S.C. 401 et...
Distance estimation and collision prediction for on-line robotic motion planning
NASA Technical Reports Server (NTRS)
Kyriakopoulos, K. J.; Saridis, G. N.
1991-01-01
An efficient method for computing the minimum distance and predicting collisions between moving objects is presented. This problem has been incorporated in the framework of an in-line motion planning algorithm to satisfy collision avoidance between a robot and moving objects modeled as convex polyhedra. In the beginning the deterministic problem, where the information about the objects is assumed to be certain is examined. If instead of the Euclidean norm, L(sub 1) or L(sub infinity) norms are used to represent distance, the problem becomes a linear programming problem. The stochastic problem is formulated, where the uncertainty is induced by sensing and the unknown dynamics of the moving obstacles. Two problems are considered: (1) filtering of the minimum distance between the robot and the moving object, at the present time; and (2) prediction of the minimum distance in the future, in order to predict possible collisions with the moving obstacles and estimate the collision time.
ERIC Educational Resources Information Center
Rosow, Jerome M.; Zager, Robert
This volume, Interim Report No. 3 in a 3-year study, considers literacy programs designed to qualify employees for promotions or professional advancement. It adopts a multidimensional definition of moving ahead, one that extends to monetary rewards, career development, and employment security. The volume is divided into two parts: report and case…
Successful Transitions: Making the Move to High School. PHP-c108
ERIC Educational Resources Information Center
PACER Center, 2005
2005-01-01
Moving from middle school to high school can be challenging and exciting, but students with special needs may need to begin preparing for the move earlier than other students. As with other major changes in a child's life, the move to high school will go more smoothly if parents gather information and do some planning. A good time to begin…
Code of Federal Regulations, 2013 CFR
2013-07-01
... dissemination of unclassified information pertaining to security measures, including security plans, procedures... security by significantly increasing the likelihood of the illegal production of nuclear weapons or the... the public or the common defense and security. (d) This part and title 10 of the Code of Federal...
Code of Federal Regulations, 2014 CFR
2014-07-01
... dissemination of unclassified information pertaining to security measures, including security plans, procedures... security by significantly increasing the likelihood of the illegal production of nuclear weapons or the... the public or the common defense and security. (d) This part and title 10 of the Code of Federal...
6 CFR 27.225 - Site security plans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... meet the following standards: (1) Address each vulnerability identified in the facility's Security Vulnerability Assessment, and identify and describe the security measures to address each such vulnerability; (2... updates, revises or otherwise alters its Security Vulnerability Assessment pursuant to § 27.215(d), the...
Introduction to Retail Security.
ERIC Educational Resources Information Center
Thomas, James E., Ed.
This collection consists of 15 articles dealing with retail security. Included in the volume are the following papers: "Retail Security--an Introduction," by Andrew J. Thacker and Linda Cressman; "Systematic Planning and Retail Security," by Linda T. Thomas; "Identifying Potentially Dishonest Employees," by James E.…
48 CFR 606.302-6 - National security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...
48 CFR 606.302-6 - National security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...
48 CFR 606.302-6 - National security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...
48 CFR 606.302-6 - National security.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...
48 CFR 606.302-6 - National security.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...
77 FR 14525 - Statement of Organization, Functions, and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-12
... maintains the CDC Computer Security Incident Response Team; (4) performs cyber security incident reporting... systems planning and support; internal security and emergency preparedness; and management analysis and... security; education, training, and workforce development in information and IT disciplines; development and...
Johnson, Mark B; Voas, Robert; Miller, Brenda A; Byrnes, Hilary; Bourdeau, Beth
2016-02-01
There is substantial evidence that heavy drinking is associated with aggression and violence. Most managers of drinking establishments are required to maintain a security staff to deal with disruptive patrons who threaten an organization's business or legal status. However, managers may focus little on minor instances of aggression even though these may escalate into more serious events. We hypothesize that proactive security efforts may positively affect patrons' perceptions of nighttime safety and influence their decisions to return to the club, thereby affecting the club's bottom line. Data for this study were collected from entry and exit surveys with 1714 attendees at 70 electronic music dance events at 10 clubs in the San Francisco Bay Area (2010-2012). Participants were asked to report on observations and experiences with aggressive behavior while in the club, their overall perception of club safety, and their plans to return to the same club in the next 30 days. Mediational multiple regression analysis was used to relate observations of club security to perceptions of personal safety and plans to return to the club. Reported observations of an active club security staff were positively related to perceptions of personal safety. Safety perceptions, in turn, were significantly related to plans to return to the club. The indirect path between perceptions of security and plans to return was significant as well. The results suggest that an active security presence inside clubs can encourage club attendance by providing an environment where minor altercations are minimized, contributing to the perception of club safety. Evidence that proactive security efforts appear to increase return customers might motivate managers to implement better security policies. Copyright © 2015 Elsevier Ltd and National Safety Council. All rights reserved.
Johnson, Mark B.; Voas, Robert; Miller, Brenda A.; Byrnes, Hilary; Bourdeau, Beth
2017-01-01
Introduction There is substantial evidence that heavy drinking is associated with aggression and violence. Most managers of drinking establishments are required to maintain a security staff to deal with disruptive patrons who threaten an organization’s business or legal status. However, managers may focus little on minor instances of aggression even though these may escalate into more serious events. We hypothesize that proactive security efforts may positively affect patron’s perceptions of nighttime safety and influence their decisions to return to the club, thereby affecting the club’s bottom line. Method Data for this study were collected from entry and exit surveys with 1,714 attendees at 70 electronic music dance events at 10 clubs in the San Francisco Bay Area (2010–2012). Participants were asked to report on observations and experiences with aggressive behavior while in the club, their overall perception of club safety, and their plans to return to the same club in the next 30 days. Mediational multiple regression analysis was used to relate observations of club security to perceptions of personal safety and plans to return to the club. Results Reported observations of an active club security staff were positively related to perceptions of personal safety. Safety perceptions, in turn, were significantly related to plans to return to the club. The indirect path between perceptions of security and plans to return was significant as well. Conclusions The results suggest that an active security presence inside clubs can encourage club attendance by providing an environment where minor altercations are minimized, contributing to the perception of club safety. Practical Applications Evidence that proactive security efforts appear to increase return customers might motivate managers to implement better security policies. PMID:26875162
Robot environment expert system
NASA Technical Reports Server (NTRS)
Potter, J. L.
1985-01-01
The Robot Environment Expert System uses a hexidecimal tree data structure to model a complex robot environment where not only the robot arm moves, but also the robot itself and other objects may move. The hextree model allows dynamic updating, collision avoidance and path planning over time, to avoid moving objects.
6 CFR 27.235 - Alternative security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1... Tier 3 facilities may not submit an ASP in lieu of a Security Vulnerability Assessment. (b) The... Security Vulnerability Assessment or using the procedure specified in § 27.245 if the ASP is intended to...
2008-07-28
continue to be beyond our technical ability to realize aggresively pursue advanced technical solutions to stay at the leading edge of technological...inherent to each caf Way and to seek continual improvement through exploration of innovative concepts, advanced capabilities, game -changing...available online at the air force portal: https://wwwd.my.af.mil/afknprod/strat_plan COMBAT AIR FORCE STRATEGIC PLAN Points of Contact securing the high
Transit Security Procedures Guide
DOT National Transportation Integrated Search
1994-12-01
To protect passenger, employees, revenue, and property, transit systems are encouraged to take a proactive, prevention-oriented systems approach to transit security. This guide is a compilation of materials for planning and improving transit security...
National Security Technology Incubator Business Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-30
... the Standard Review Plan (SRP), concerning the physical security reviews of design certification... NRC staff with the physical security review of applications for design certifications, incorporate... NUCLEAR REGULATORY COMMISSION [NRC-2013-0225] Proposed Revision to Physical Security--Standard...
Knopf, Antje-Christin; Stützer, Kristin; Richter, Christian; Rucinski, Antoni; da Silva, Joakim; Phillips, Justin; Engelsman, Martijn; Shimizu, Shinichi; Werner, Rene; Jakobi, Annika; Göksel, Orçun; Zhang, Ye; Oshea, Tuathan; Fast, Martin; Perrin, Rosalind; Bert, Christoph; Rinaldi, Ilaria; Korevaar, EriK; McClelland, Jamie
2016-07-01
Since 2009, a 4D treatment planning workshop has taken place annually, gathering researchers working on the treatment of moving targets, mainly with scanned ion beams. Topics discussed during the workshops range from problems of time resolved imaging, the challenges of motion modelling, the implementation of 4D capabilities for treatment planning, up to different aspects related to 4D dosimetry and treatment verification. This report gives an overview on topics discussed at the 4D workshops in 2014 and 2015. It summarizes recent findings, developments and challenges in the field and discusses the relevant literature of the recent years. The report is structured in three parts pointing out developments in the context of understanding moving geometries, of treating moving targets and of 4D quality assurance (QA) and 4D dosimetry. The community represented at the 4D workshops agrees that research in the context of treating moving targets with scanned ion beams faces a crucial phase of clinical translation. In the coming years it will be important to define standards for motion monitoring, to establish 4D treatment planning guidelines and to develop 4D QA tools. These basic requirements for the clinical application of scanned ion beams to moving targets could e.g. be determined by a dedicated ESTRO task group. Besides reviewing recent research results and pointing out urgent needs when treating moving targets with scanned ion beams, the report also gives an outlook on the upcoming 4D workshop organized at the University Medical Center Groningen (UMCG) in the Netherlands at the end of 2016. Copyright © 2016 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.
Deceleration-Limiting Roadway Barrier
NASA Technical Reports Server (NTRS)
Schneider, William C. (Inventor); Locke, P. James (Inventor)
2006-01-01
Roadway barrier system and method are disclosed for decelerating a moving vehicle in a controlled manner and for retaining the decelerated vehicle. A net or mesh of the roadway barrier system receives and captures the moving vehicle. The net or mesh is secured to anchors by energy absorbing straps. The energy absorbing straps deploy under a tensional load to decelerate the moving vehicle, the straps providing a controlled resistance to the tensional load over a predefined displacement or stroke to bring the moving vehicle to rest. Additional features include a sacrificial panel or sheet in front of the net that holds up the net or mesh while deflecting vehicles that collide only tangentially with the roadway barrier system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.
Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems,more » and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.« less
A Laboratory for Characterizing the Efficacy of Moving Target Defense
2016-10-25
of William and Mary are developing a scalable, dynamic, adaptive security system that combines virtualization , emulation, and mutable network...goal with the resource constraints of a small number of servers, and making virtual nodes “real enough” from the view of attackers. Unfortunately, with...we at College of William and Mary are developing a scalable, dynamic, adaptive security system that combines virtualization , emulation, and mutable
Williams, Gary L.; Goin, Jr., Jesse L.; Kirby, Patrick G.; McKenna, John P.
1997-01-01
The invention is a motorized linkage for operating a door strike. A six volt power source, controlled by a security code, rotates a small electric motor when a proper security code is given. The motor rotates a shaft which engages a coil spring. This moves a locking cam. When a catch on the locking cam separates from the locking lever catch, the latch bolt keeper may be manipulated by a user.
Code of Federal Regulations, 2010 CFR
2010-07-01
... River, Southwest Pass Sea Buoy to Mile Marker 96.0, New Orleans, LA. 165.812 Section 165.812 Navigation..., Southwest Pass Sea Buoy to Mile Marker 96.0, New Orleans, LA. (a) Location. Within the Lower Mississippi... Lower Mississippi River mile marker 96.0 in New Orleans, Louisiana. These moving security zones...
The ASEAN Political-Security Community: Enhancing Defense Cooperation
2015-12-01
Yoong Lee, ASEAN Matters: Reflecting on the Association of Southeast Asian Nations (Singapore; Hackensack, NJ: World Scientific., 2011), i, http...from becoming overpopulated —by moving Javanese to low-density islands: Kalimantan, Sumatera, Papua, and Sulawesi. 58 Collins, Security and Southeast...In the mid-2000s, the increasing number of piracy and armed robbery activities in the Malacca Straits attracted world attention and attributed to the
SAFETY AND SECURITY BUILDING, TRA614. FLOOR, ROOF, AND FOUNDATION PLANS. ...
SAFETY AND SECURITY BUILDING, TRA-614. FLOOR, ROOF, AND FOUNDATION PLANS. ROOM FUNCTIONS. DOOR AND ROOM FINISH SCHEDULE. BLAW-KNOX 3150-814-1, 3/1950. INL INDEX NO. 531-0614-00-098-100702, REV. 6. - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
42 CFR 56.303 - Project elements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... furnished by or through the center is to be reimbursed under title XIX or title XX of the Social Security... insurance benefits under title XVIII of the Social Security Act, to medical assistance under a State plan approved under title XIX of such Act, to social services and family planning under title XX of such Act, or...
29 CFR 2510.3-101 - Definition of “plan assets”-plan investments.
Code of Federal Regulations, 2011 CFR
2011-07-01
...-offered security nor a security issued by an investment company registered under the Investment Company... other than the investment of capital. The term “operating company” includes an entity which is not...) The date on which the company makes a “new portfolio investment”, or (B) The expiration of 10 years...
20 CFR 416.1181 - What is a plan to achieve self-support (PASS)?
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false What is a plan to achieve self-support (PASS)? 416.1181 Section 416.1181 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Rules for Helping Blind and Disabled Individuals Achieve...
20 CFR 416.1182 - When we begin to count the income excluded under the plan.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false When we begin to count the income excluded under the plan. 416.1182 Section 416.1182 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Rules for Helping Blind and Disabled...
20 CFR 416.1182 - When we begin to count the income excluded under the plan.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false When we begin to count the income excluded under the plan. 416.1182 Section 416.1182 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Rules for Helping Blind and Disabled...
20 CFR 416.1181 - What is a plan to achieve self-support (PASS)?
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false What is a plan to achieve self-support (PASS)? 416.1181 Section 416.1181 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Rules for Helping Blind and Disabled Individuals Achieve...
20 CFR 416.1182 - When we begin to count the income excluded under the plan.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false When we begin to count the income excluded under the plan. 416.1182 Section 416.1182 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Rules for Helping Blind and Disabled...
20 CFR 416.1181 - What is a plan to achieve self-support (PASS)?
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false What is a plan to achieve self-support (PASS)? 416.1181 Section 416.1181 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Rules for Helping Blind and Disabled Individuals Achieve...
20 CFR 416.1181 - What is a plan to achieve self-support (PASS)?
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false What is a plan to achieve self-support (PASS)? 416.1181 Section 416.1181 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Rules for Helping Blind and Disabled Individuals Achieve...
20 CFR 416.1182 - When we begin to count the income excluded under the plan.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false When we begin to count the income excluded under the plan. 416.1182 Section 416.1182 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Rules for Helping Blind and Disabled...
12 CFR 226.53 - Allocation of payments.
Code of Federal Regulations, 2013 CFR
2013-01-01
... (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End... periodic payment for a credit card account under an open-end (not home-secured) consumer credit plan, the... program. When a balance on a credit card account under an open-end (not home-secured) consumer credit plan...
12 CFR 226.53 - Allocation of payments.
Code of Federal Regulations, 2012 CFR
2012-01-01
... TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End Credit... payment for a credit card account under an open-end (not home-secured) consumer credit plan, the card... program. When a balance on a credit card account under an open-end (not home-secured) consumer credit plan...
12 CFR 226.53 - Allocation of payments.
Code of Federal Regulations, 2011 CFR
2011-01-01
... TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End Credit... payment for a credit card account under an open-end (not home-secured) consumer credit plan, the card.... When a balance on a credit card account under an open-end (not home-secured) consumer credit plan is...
12 CFR 226.53 - Allocation of payments.
Code of Federal Regulations, 2014 CFR
2014-01-01
... (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End... periodic payment for a credit card account under an open-end (not home-secured) consumer credit plan, the... program. When a balance on a credit card account under an open-end (not home-secured) consumer credit plan...
12 CFR 226.52 - Limitations on fees.
Code of Federal Regulations, 2011 CFR
2011-01-01
... TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End Credit... charges any fees to a credit card account under an open-end (not home-secured) consumer credit plan during... of a credit card account under an open-end (not home-secured) consumer credit plan unless the dollar...
75 FR 47306 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-05
... OMB Review; Comment Request Title: Case Plan Requirement, Title IV-E of the Social Security Act. OMB No.: 0980-0140. Description: Under section 471(a)(16) of title IV-E of the Social Security Act (the... development of a case plan for each child for whom the State receives foster care maintenance payments and...
75 FR 55792 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-14
... OMB Review; Comment Request Title: Case Plan Requirement, Title IV-E of the Social Security Act. OMB No.: 0980-0140. Description: Under section 471(a)(16) of title IV-B of the Social Security Act (the... development of a case plan for each child for whom the State receives foster care maintenance payments and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-24
... NUCLEAR REGULATORY COMMISSION [NRC-2010-0228] Office of New Reactors; Proposed Revision to Standard Review Plan Section 13.6.1, Revision 1 on Physical Security--Combined License and Operating...), Section 13.6.1 on ``Physical Security--Combined License and Operating Reactors,'' (Agencywide Documents...
49 CFR 659.11 - Confidentiality of investigation reports and security plans.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 7 2010-10-01 2010-10-01 false Confidentiality of investigation reports and security plans. 659.11 Section 659.11 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the State § 659.11...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-09
.... Therefore, pursuant to 10 CFR 51.22(b), no environmental impact statement or environmental assessment need... provisions of the NRC-approved Cyber Security Plan. The proposed change is consistent with Nuclear Energy...-approved Cyber Security Plan. The proposed change is consistent with Nuclear Energy Institute (NEI) 08-09...
20 CFR 416.1264 - Spouse ineligible under a State plan in December 1973.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Spouse ineligible under a State plan in December 1973. 416.1264 Section 416.1264 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1264 Spouse ineligible...
Sensor planning for moving targets
NASA Astrophysics Data System (ADS)
Musman, Scott A.; Lehner, Paul; Elsaesser, Chris
1994-10-01
Planning a search for moving ground targets is difficult for humans and computationally intractable. This paper describes a technique to solve such problems. The main idea is to combine probability of detection assessments with computational search heuristics to generate sensor plans which approximately maximize either the probability of detection or a user- specified knowledge function (e.g., determining the target's probable destination; locating the enemy tanks). In contrast to super computer-based moving target search planning, our technique has been implemented using workstation technology. The data structures generated by sensor planning can be used to evaluate sensor reports during plan execution. Our system revises its objective function with each sensor report, allowing the user to assess both the current situation as well as the expected value of future information. This capability is particularly useful in situations involving a high rate of sensor reporting, helping the user focus his attention on sensors reports most pertinent to current needs. Our planning approach is implemented in a three layer architecture. The layers are: mobility analysis, followed by sensor coverage analysis, and concluding with sensor plan analysis. It is possible using these layers to describe the physical, spatial, and temporal characteristics of a scenario in the first two layers, and customize the final analysis to specific intelligence objectives. The architecture also allows a user to customize operational parameters in each of the three major components of the system. As examples of these performance options, we briefly describe the mobility analysis and discuss issues affecting sensor plan analysis.
49 CFR 193.2715 - Training: security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...
49 CFR 193.2715 - Training: security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 3 2012-10-01 2012-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...
49 CFR 193.2715 - Training: security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 3 2011-10-01 2011-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...
17 CFR 230.145 - Reclassification of securities, mergers, consolidations and acquisitions of assets.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., mergers, consolidations and acquisitions of assets. 230.145 Section 230.145 Commodity and Securities... § 230.145 Reclassification of securities, mergers, consolidations and acquisitions of assets.... A statutory merger or consolidation or similar plan or acquisition in which securities of such...
10 CFR 37.43 - General security program requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... overall security strategy to ensure the integrated and effective functioning of the security program required by this subpart. The security plan must, at a minimum: (i) Describe the measures and strategies... lessons learned; (iii) Relevant results of NRC inspections; and (iv) Relevant results of the licensee's...
NASA Astrophysics Data System (ADS)
Nair, Nirmal-Kumar
As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.
1989-07-01
FUNDING NUMBERS DRMS Total Quality Management (TQM) Implementation Plan 6. AUTHOR(S) 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING...OF PAGES TOM (Total Quality Management ), Continuous Process Improvement. ’f’ - Management 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY...7540-01-280-5500 Standard Form 298 (Rev. 2-89) Pr"cried by ANi SWt 139-i 296-101 DRMS TOTAL QUALITY MANAGEMENT (TQM) IMPLEMENTATION PLAN PURPOSE The
The Counter-Piracy JIATF: Getting AFRICOM into the Piracy Fight
2009-05-04
Action Plan, 6. 16 James Kraska and Brian Wilson, “Maritime Piracy in East Africa,” 57. 6 Horn of Africa: Partnership and Action Plan ( CPAP ...12 Piracy off the Horn of Africa: Partnership and Action Plan ( CPAP ), provide this important national-level direction. The NSMS clearly states that...the safety and economic security of the United States depends upon the secure use of the world‟s oceans.” 38 CPAP provides even more detailed
A DICOM based radiotherapy plan database for research collaboration and reporting
NASA Astrophysics Data System (ADS)
Westberg, J.; Krogh, S.; Brink, C.; Vogelius, I. R.
2014-03-01
Purpose: To create a central radiotherapy (RT) plan database for dose analysis and reporting, capable of calculating and presenting statistics on user defined patient groups. The goal is to facilitate multi-center research studies with easy and secure access to RT plans and statistics on protocol compliance. Methods: RT institutions are able to send data to the central database using DICOM communications on a secure computer network. The central system is composed of a number of DICOM servers, an SQL database and in-house developed software services to process the incoming data. A web site within the secure network allows the user to manage their submitted data. Results: The RT plan database has been developed in Microsoft .NET and users are able to send DICOM data between RT centers in Denmark. Dose-volume histogram (DVH) calculations performed by the system are comparable to those of conventional RT software. A permission system was implemented to ensure access control and easy, yet secure, data sharing across centers. The reports contain DVH statistics for structures in user defined patient groups. The system currently contains over 2200 patients in 14 collaborations. Conclusions: A central RT plan repository for use in multi-center trials and quality assurance was created. The system provides an attractive alternative to dummy runs by enabling continuous monitoring of protocol conformity and plan metrics in a trial.
Wolowodiuk, W.; Anelli, J.; Dawson, B.E.
1974-01-01
A heat exchanger in which tubes are secured to a tube sheet by internal bore welding is described. The tubes may be moved into place in preparation for welding with comparatively little trouble. A number of segmented tube support plates are provided which allow a considerable portion of each of the tubes to be moved laterally after the end thereof has been positioned in preparation for internal bore welding to the tube sheet. (auth)
Analysis of the Security and Privacy Requirements of Cloud-Based Electronic Health Records Systems
Fernández, Gonzalo; López-Coronado, Miguel
2013-01-01
Background The Cloud Computing paradigm offers eHealth systems the opportunity to enhance the features and functionality that they offer. However, moving patients’ medical information to the Cloud implies several risks in terms of the security and privacy of sensitive health records. In this paper, the risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed. To protect the confidentiality of patient information and facilitate the process, some suggestions for health care providers are made. Moreover, security issues that Cloud service providers should address in their platforms are considered. Objective To show that, before moving patient health records to the Cloud, security and privacy concerns must be considered by both health care providers and Cloud service providers. Security requirements of a generic Cloud service provider are analyzed. Methods To study the latest in Cloud-based computing solutions, bibliographic material was obtained mainly from Medline sources. Furthermore, direct contact was made with several Cloud service providers. Results Some of the security issues that should be considered by both Cloud service providers and their health care customers are role-based access, network security mechanisms, data encryption, digital signatures, and access monitoring. Furthermore, to guarantee the safety of the information and comply with privacy policies, the Cloud service provider must be compliant with various certifications and third-party requirements, such as SAS70 Type II, PCI DSS Level 1, ISO 27001, and the US Federal Information Security Management Act (FISMA). Conclusions Storing sensitive information such as EHRs in the Cloud means that precautions must be taken to ensure the safety and confidentiality of the data. A relationship built on trust with the Cloud service provider is essential to ensure a transparent process. Cloud service providers must make certain that all security mechanisms are in place to avoid unauthorized access and data breaches. Patients must be kept informed about how their data are being managed. PMID:23965254
Analysis of the security and privacy requirements of cloud-based electronic health records systems.
Rodrigues, Joel J P C; de la Torre, Isabel; Fernández, Gonzalo; López-Coronado, Miguel
2013-08-21
The Cloud Computing paradigm offers eHealth systems the opportunity to enhance the features and functionality that they offer. However, moving patients' medical information to the Cloud implies several risks in terms of the security and privacy of sensitive health records. In this paper, the risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed. To protect the confidentiality of patient information and facilitate the process, some suggestions for health care providers are made. Moreover, security issues that Cloud service providers should address in their platforms are considered. To show that, before moving patient health records to the Cloud, security and privacy concerns must be considered by both health care providers and Cloud service providers. Security requirements of a generic Cloud service provider are analyzed. To study the latest in Cloud-based computing solutions, bibliographic material was obtained mainly from Medline sources. Furthermore, direct contact was made with several Cloud service providers. Some of the security issues that should be considered by both Cloud service providers and their health care customers are role-based access, network security mechanisms, data encryption, digital signatures, and access monitoring. Furthermore, to guarantee the safety of the information and comply with privacy policies, the Cloud service provider must be compliant with various certifications and third-party requirements, such as SAS70 Type II, PCI DSS Level 1, ISO 27001, and the US Federal Information Security Management Act (FISMA). Storing sensitive information such as EHRs in the Cloud means that precautions must be taken to ensure the safety and confidentiality of the data. A relationship built on trust with the Cloud service provider is essential to ensure a transparent process. Cloud service providers must make certain that all security mechanisms are in place to avoid unauthorized access and data breaches. Patients must be kept informed about how their data are being managed.
NASA Astrophysics Data System (ADS)
Yoo, Seung Hoon; Son, Jae Man; Yoon, Myonggeun; Park, Sung Yong; Shin, Dongho; Min, Byung Jun
2018-06-01
A moving phantom is manufactured for mimicking lung model to study the dose uncertainty from CT number-stopping power conversion and dose calculation in the soft tissue, light lung tissue and bone regions during passive proton irradiation with compensator smearing value. The phantom is scanned with a CT system, and a proton beam irradiation plan is carried out with the use of a treatment planning system (Eclipse). In the case of the moving phantom, a RPM system is used for respiratory gating. The uncertainties in the dose distribution between the measured data and the planned data are investigated by a gamma analysis with 3%-3 mm acceptance criteria. To investigate smearing effect, three smearing values (0.3 cm, 0.7 cm, 1.2 cm) are used to for fixed and moving phantom system. For both fixed and moving phantom, uncertainties in the light lung tissue are severe than those in soft tissue region in which the dose uncertainties are within clinically tolerable ranges. As the smearing value increases, the uncertainty in the proton dose distribution decreases.
Dominion. A game exploring information exploitation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hobbs, Jacob Aaron
FlipIt is a game theoretic framework published in 2012[1] to investigate optimal strategies for managing security resources in response to Advanced Persistent Threats. It is a two-player game wherein a resource is controlled by exactly one player at any time. A player may move at any time to capture the resource, incurring a move cost, and is informed of the last time their opponent has moved only upon completing their move. Thus, moves may be wasted and takeover is considered \\stealthy", with regard to the other player. The game is played for an unlimited period of time, and the goalmore » of each player is to maximize the amount of time they are in control of the resource minus their total move cost, normalized by the current length of play. Marten Van Dijk and others[1] provided an analysis of various player strategies and proved optimal results for certain subclasses of players. We extend their work by providing a reformulation of the original game, wherein the optimal player strategies can be solved exactly, rather than only for certain subclasses. We call this reformulation Dominion, and place it within a broader framework of stealthy move games. We de ne Dominion to occur over a nite time scale (from 0 to 1), and give each player a certain number of moves to make within the time frame. Their expected score in this new scenario is the expected amount of time they have control, and the point of the game is to dominate as much of the unit interval as possible. We show how Dominion can be treated as a two player, simultaneous, constant sum, unit square game, where the gradient of the bene t curves for the players are linear and possibly discontinuous. We derive Nash equilibria for a basic version of Dominion, and then further explore the roles of information asymmetry in its variants. We extend these results to FlipIt and other cyber security applications.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-30
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230 and 270 [Release No. 33-9503; IC-30845...; Applications Regarding Joint Enterprises or Arrangements and Certain Profit-Sharing Plans AGENCY: Securities and Exchange Commission. ACTION: Final rule; technical amendments. SUMMARY: The Securities and...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 5 2012-01-01 2012-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 5 2011-01-01 2011-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan...
48 CFR 908.7106 - Security cabinets.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Security cabinets. 908... ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Special Items 908.7106 Security cabinets. (a) Acquisitions of security cabinets shall be in accordance with FPMR 41 CFR 101-26.507 and the...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 5 2010-01-01 2010-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan...
48 CFR 908.7106 - Security cabinets.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Security cabinets. 908... ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Special Items 908.7106 Security cabinets. (a) Acquisitions of security cabinets shall be in accordance with FPMR 41 CFR 101-26.507 and the...
48 CFR 908.7106 - Security cabinets.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Security cabinets. 908... ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Special Items 908.7106 Security cabinets. (a) Acquisitions of security cabinets shall be in accordance with FPMR 41 CFR 101-26.507 and the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-11
... Review (CFSR) Form. The CFSR will differ from TSA's Corporate Security Review (CSR) in that a CSR looks at corporate or company-wide security management plans and practices while the CFSR will look at... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2010 CFR
2010-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2014 CFR
2014-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2012 CFR
2012-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2013 CFR
2013-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions
Code of Federal Regulations, 2011 CFR
2011-07-01
..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 5 2014-01-01 2014-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan...
6 CFR 27.250 - Inspections and audits.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.250 Inspections and audits. (a) Authority. In order to... directed by § 27.245(b) in “Review and Approval of Site Security Plans.” (c) Time and Manner. Authorized...
6 CFR 27.250 - Inspections and audits.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.250 Inspections and audits. (a) Authority. In order to... directed by § 27.245(b) in “Review and Approval of Site Security Plans.” (c) Time and Manner. Authorized...
Frames of reference in action plan recall: influence of hand and handedness.
Seegelke, Christian; Hughes, Charmayne M L; Wunsch, Kathrin; van der Wel, Robrecht; Weigelt, Matthias
2015-10-01
Evidence suggests that people are more likely to recall features of previous plans and use them for subsequent movements, rather than generating action plans from scratch for each movement. The information used for plan recall during object manipulation tasks is stored in extrinsic (object-centered) rather than intrinsic (body-centered) coordinates. The present study examined whether action plan recall processes are influenced by manual asymmetries. Right-handed (Experiment 1) and left-handed (Experiment 2) participants grasped a plunger from a home position using either the dominant or the non-dominant hand and placed it at one of the three target positions located at varying heights (home-to-target moves). Subsequently, they stepped sideways down from a podium (step-down podium), onto a podium (step-up podium), or without any podium present (no podium), before returning the plunger to the home platform using the same hand (target-back-to-home moves). The data show that, regardless of hand and handedness, participants grasped the plunger at similar heights during the home-to-target and target-back-to-home moves, even if they had to adopt quite different arm postures to do so. Thus, these findings indicate that the information used for plan recall processes in sequential object manipulation tasks is stored in extrinsic coordinates and in an effector-independent manner.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY... government to meet essential defense and civilian needs during any national security emergency. Accordingly, each Federal department and agency shall prepare its national security emergency preparedness plans and...
Energy Security: Emerging Challenges and Opportunities
2010-08-01
46 Appendix A: Electrical Capacity Margins...options........................................................................................ 21 6 Net electrical capacity compared to the North...Energy Security The Army Energy and Water Campaign Plan for Installations defines energy security as: the capacity to avoid adverse impact of energy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rizzo, Davinia; Blackburn, Mark
Complex systems are comprised of technical, social, political and environmental factors as well as the programmatic factors of cost, schedule and risk. Testing these systems for enhanced security requires expert knowledge in many different fields. It is important to test these systems to ensure effectiveness, but testing is limited to due cost, schedule, safety, feasibility and a myriad of other reasons. Without an effective decision framework for Test and Evaluation (T&E) planning that can take into consideration technical as well as programmatic factors and leverage expert knowledge, security in complex systems may not be assessed effectively. Therefore, this paper coversmore » the identification of the current T&E planning problem and an approach to include the full variety of factors and leverage expert knowledge in T&E planning through the use of Bayesian Networks (BN).« less
Protected transitional solution to transformational satellite communications
NASA Astrophysics Data System (ADS)
Brand, Jerry C.
2005-06-01
As the Warfighter progresses into the next generation battlefield, transformational communications become evident as an enabling technology. Satellite communications become even more vital as the battles range over greater non-contiguous spaces. While current satellite communications provide suitable beyond line-of-sight communications and the Transformational Communications Architecture (TCA) sets the stage for sound information exchange, a realizable transition must occur to ensure successful succession to this higher level. This paper addresses the need for a planned escalation to the next generation satellite communications architecture and offers near-term alternatives. Commercial satellite systems continue to enable the Warfighter to reach back to needed information resources, providing a large majority of available bandwidth. Four areas of concentration for transition include encrypted Telemetry, Tracking and Control (or Command) (TT&C), encrypted and covered data, satellite attack detection and protection, and operational mobility. Solution methodologies include directly embedding COMSEC devices in the satellites and terminals, and supplementing existing terminals with suitable equipment and software. Future satellites planned for near-term launches can be adapted to include commercial grade and higher-level secure equipment. Alternately, the expected use of programmable modems (Software Defined Radios (SDR)) enables incorporation of powerful cipher methods approaching military standards as well as waveforms suitable for on-the-move operation. Minimal equipment and software additions on the satellites can provide reasonable attack detection and protection methods in concert with the planned satellite usage. Network management suite modifications enable cohesive incorporation of these protection schemes. Such transitional ideas offer a smooth and planned transition as the TCA takes life.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-05
... DEPARTMENT OF LABOR Employee Benefits Security Administration 29 CFR Part 2520 Technical Revisions... Alternatives Under Pension Relief Act of 2010 AGENCY: Employee Benefits Security Administration, Labor. ACTION... 5500 Annual Return/Report of Employee Benefit Plan have been adopted in IRS Notice 2010-83 (2010-51 I.R...
1986-08-01
victims of some of the most vicious terrorist acts occurring in the past year, airport security has come under increasing scrutiny by television...operations and contingency planning can be the weapons which airport security managers use to successfully battle the increasing trend of terrorist acts on airports today. (Author)
Biosafety practices associated with potential agents of biocrime and biowarfare.
Burnett, LouAnn C
2006-12-01
Conducting research in a manner that guards against theft and intentional misuse of biological materials requires a process of hazard identification and risk assessment to most effectively identify and implement a risk management plan. Procedures describing physical security, personnel reliability, and material control and accountability define a security plan for this type of research.
77 FR 7960 - Unified Agenda of Federal Regulatory and Deregulatory Actions
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-13
... Identifier No. 373 Secure Handling of 1601-AA52 Ammonium Nitrate Program (Reg Plan Seq No. 53). 374 Homeland...) Proposed Rule Stage 373. Secure Handling of Ammonium Nitrate Program Regulatory Plan: This entry is Seq. No... performance standards to 33 CFR part 151, subparts C and D, for discharges of ballast water. It supports the...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Farnham, Irene; Rehfeldt, Kenneth
The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix
Social Security: A Present Value Analysis of Old Age Survivors Insurance (OASI) Taxes and Benefits.
1995-12-01
private sector plans and provides a spreadsheet model for making this comparison of plans using different assumptions. The investigation was done by collecting data from various books, Government publications, and various Government agencies to conduct a spreadsheet analysis of three different wage-earning groups, assuming various real interest rates potentially earned in the private sector . A comparison of Social Security with alternative private sector plans is important to the DoD/DoN because less constrained budgets could
Definitions of Tactical and Strategic: An Informal Study
NASA Technical Reports Server (NTRS)
Schutte, Paul C.
2004-01-01
Seventeen subject matter experts defined tactical and strategic within the aviation domain. They provided five verbs and a sentence describing both behaviors. The verbs for strategic behavior were Plan, Think, Arrange, Formulate, Intend, Devise, Anticipate, and Order. The verbs for tactical behavior were Act, Fly, Respond, Do, Avoid, Control, React, and Move. Verbs that were common to both were Get Information, Navigate, Know, Execute, Manage, Perceive, Understand, Direct, Concentrate, and Point. The responses highlight the difference between planning (strategic) and carrying out those plans (tactical). Tactical verbs are more action-oriented that change the state of the world after they have been accomplished. Strategic verbs are more prescriptive in that they do not change the state of the world but offer a procedure or program for changing the world. The pilot is in a tactical mode when actually moving the aircraft and in a strategic mode when thinking about moving it.
Tests to Help Plan Opportunity Moves
2005-05-06
Rover engineers check how a test rover moves in material chosen to simulate some difficult Mars driving conditions. The scene is inside the In-Situ Instrument Laboratory at NASA Jet Propulsion Laboratory, Pasadena, Calif.
Distance estimation and collision prediction for on-line robotic motion planning
NASA Technical Reports Server (NTRS)
Kyriakopoulos, K. J.; Saridis, G. N.
1992-01-01
An efficient method for computing the minimum distance and predicting collisions between moving objects is presented. This problem is incorporated into the framework of an in-line motion-planning algorithm to satisfy collision avoidance between a robot and moving objects modeled as convex polyhedra. In the beginning, the deterministic problem where the information about the objects is assumed to be certain is examined. L(1) or L(infinity) norms are used to represent distance and the problem becomes a linear programming problem. The stochastic problem is formulated where the uncertainty is induced by sensing and the unknown dynamics of the moving obstacles. Two problems are considered: First, filtering of the distance between the robot and the moving object at the present time. Second, prediction of the minimum distance in the future in order to predict the collision time.
ERIC Educational Resources Information Center
DiMattia, Susan S.
2001-01-01
Describes procedures followed by librarians whose special libraries were destroyed or otherwise affected by the September 11 terrorist attacks. Discusses plans used from Y2K planning; the importance of having a disaster plan in place; moving locations; teamwork; and duplicating data in duplicate locations. Provides a list of pertinent resources.…
ERIC Educational Resources Information Center
Benson, Allen C.
This handbook is designed to help readers identify and eliminate security risks, with sound recommendations and library-tested security software. Chapter 1 "Managing Your Facilities and Assessing Your Risks" addresses fundamental management responsibilities including planning for a secure system, organizing computer-related information, assessing…
33 CFR 106.415 - Amendment and audit.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Amendment and audit. 106.415 Section 106.415 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Plan (FSP) § 106.415 Amendment and...
33 CFR 105.415 - Amendment and audit.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Amendment and audit. 105.415 Section 105.415 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Plan (FSP) § 105.415 Amendment and audit. (a) Amendments. (1) Amendments to a Facility Securit...
45 CFR 205.52 - Furnishing of social security numbers.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 2 2010-10-01 2010-10-01 false Furnishing of social security numbers. 205.52... GENERAL ADMINISTRATION-PUBLIC ASSISTANCE PROGRAMS § 205.52 Furnishing of social security numbers. The State plan under title I, IV-A, X, XIV, or CVI (AABD) of the Social Security Act must provide that: (a...
Computer and Network Security in Small Libraries: A Guide for Planning.
ERIC Educational Resources Information Center
Williams, Robert L.
This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…
Understand the Big Picture So You Can Plan for Network Security
ERIC Educational Resources Information Center
Cervone, Frank
2005-01-01
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
Optimal motion planning for collision avoidance of mobile robots in non-stationary environments
NASA Technical Reports Server (NTRS)
Kyriakopoulos, K. J.; Saridis, G. N.
1992-01-01
An optimal control formulation of the problem of collision avoidance of mobile robots moving in general terrains containing moving obstacles is presented. A dynamic model of the mobile robot and the dynamic constraints are derived. Collision avoidance is guaranteed if the minimum distance between the robot and the object is nonzero. A nominal trajectory is assumed to be known from off-line planning. The main idea is to change the velocity along the nominal trajectory so that collisions are avoided. Time consistency with the nominal plan is desirable. A numerical solution of the optimization problem is obtained. A perturbation control type of approach is used to update the optimal plan. Simulation results verify the value of the proposed strategy.
Water Shortage: Lessons in Conservation From the Great California Drought, 1976-1977
NASA Astrophysics Data System (ADS)
Showstack, Randy
Legislation moving quickly through both houses of the U.S. Congress would establish a fund to promote and support research and development to increase the security of the nation's water infrastructure from source to faucet.The House of Representatives bill, "The Water Infrastructure Security and Research and Development Act" (HR 3178), would provide $12 million per year for fiscal years 2002-2006 for a number of research areas. These include assessing water supply systems for physical vulnerabilities, including biological, chemical, and radiological contamination; devising real-time systems to monitor water for contamination; determining mitigation options; and upgrading security technologies.
48 CFR 908.7106 - Security cabinets.
Code of Federal Regulations, 2010 CFR
2010-10-01
....7106 Section 908.7106 Federal Acquisition Regulations System DEPARTMENT OF ENERGY COMPETITION ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Special Items 908.7106 Security...) Fixed-price prime contractors and lower tier subcontractors may use GSA acquisition sources for security...
OSD CALS Architecture Master Plan Study. Concept Paper. Security. Volume 38
DOT National Transportation Integrated Search
1989-07-01
Developing and executing a well-thought-out security policy is critical to the success of CALS. Without appropriate security measures, the integration of technology, organizations, functions, and data envisioned as Phase II CALS can not occur. Theref...
Desktop Security ... Now More than Ever
ERIC Educational Resources Information Center
Huber, Joe
2005-01-01
Desktop security is the foundation of your overall security plan in K-12 education. National Educational Technology Standards (NETS) mainly states that students at all grade levels should know to make changes in the default settings for the operating system and its applications.
Hospital security: "protecting the business".
Maas, Jos
2013-01-01
Implementing management science into security isn't hard and is more necessary than ever according to the author who presents and illustrates a five point plan that he says will get the security job done easier and with more commitment from the Board.
Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis (Fact Sheet)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2014-01-01
This fact sheet describes the Transportation Secure Data Center (TSDC) - an NREL-operated resource that provides secure access to detailed GPS travel data for valuable research purposes in a way that protects original participant privacy.
Mayor de Blasio: Comprehensive Homeless Services Plan Increases Focus on
HRA management structure based on the veterans move out initiative will focus on finding permanent structure based on the veterans move out initiative to promote move outs to reduce the shelter census Focus on Prevention & Rehousing Result of 90-day review includes streamlined management structure
Counterintuitive and Alternative Moves Choice in the Water Jug Task
ERIC Educational Resources Information Center
Carder, Hassina P.; Handley, Simon J.; Perfect, Timothy J.
2008-01-01
MOVE problems, like the Tower of London (TOL) or the Water Jug (WJ) task, are planning tasks that appear structurally similar and are assumed to involve similar cognitive processes. Carder et al. [Carder, H.P., Handley, S.J., & Perfect, T.J. ( 2004). Deconstructing the Tower of London: Alternative moves and conflict resolution as predictors of…
Measuring Stability and Security in Iraq
2010-03-01
development, generating 27 signed investment licenses totaling $2 billion for the tourism and hospitality industries, with 13 projects under...continue to plan and execute the responsible drawdown of U.S. military forces from Iraq. By August 31, 2010, U.S. forces will have transitioned... planning and budgeting, procurement, and information technology. In summary, political, rule-of-law, economic and energy, and security trends in Iraq
20 CFR 416.1227 - When the resources excluded under a plan to achieve self-support begin to count.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false When the resources excluded under a plan to achieve self-support begin to count. 416.1227 Section 416.1227 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1227...
Challenges of Moving IPG into Production
NASA Technical Reports Server (NTRS)
Schulbach, Cathy
2004-01-01
Over the past 5-6 years, NASA has been developing the Information Power Grid and has a persistent testbed currently based on GT2.4.2. This presentation will begin with an overview of IPG status and services, discuss key milestones in IPG development, and present early as well as expected applications. The presentation will discuss some of the issues encountered in developing a grid including the tension between providing centralized and distributed computing. These issues also affect how the grid is moved into full production. Finally, the presentation will provide current plans for moving IPG into full production, including gaining broad user input, developing acceptance criteria from the production operations group, planning upgrades, and training users.
The experience of a new deanship for two Robert Wood Johnson Foundation executive nurse fellows.
Mainous, Rosalie O; Cavanagh, Stephen J
2012-12-01
With the graying of the professoriate, many deans in nursing are moving toward retirement, which provides an opportunity for emerging leaders to move into deanships. New deans move through predictable stages and enjoy a honeymoon, allowing for some mistakes that might not be tolerated later. Early wins are essential in addition to planned changes so as not to overwhelm faculty with change. It is critical to learn the new culture, identify leaders, perform a thorough assessment as the basis for a strategic plan, and be honest and transparent. The ability to mobilize a cohesive, functioning team is critical to success. Copyright © 2012 Elsevier Inc. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-04
... Promulgation of Air Quality Implementation Plans; Indiana; South Bend-Elkhart, Indiana Ozone Maintenance Plan..., Indiana 1997 8-hour ozone maintenance air quality State Implementation Plan (SIP) by replacing the... Vehicle Emissions Simulator (MOVES) 2010a emissions model. Indiana submitted this request to EPA for...
Richmond, Jonathan Y; Nesby-O'Dell, Shanna L
2002-12-06
In recent years, concern has increased regarding use of biologic materials as agents of terrorism, but these same agents are often necessary tools in clinical and research microbiology laboratories. Traditional biosafety guidelines for laboratories have emphasized use of optimal work practices, appropriate containment equipment, well-designed facilities, and administrative controls to minimize risk of worker injury and to ensure safeguards against laboratory contamination. The guidelines discussed in this report were first published in 1999 (U.S. Department of Health and Human Services/CDC and National Institutes of Health. Biosafety in microbiological and biomedical laboratories [BMBL]. Richmond JY, McKinney RW, eds. 4th ed. Washington, DC: US Department of Health and Human Services, 1999 [Appendix F]). In that report, physical security concerns were addressed, and efforts were focused on preventing unauthorized entry to laboratory areas and preventing unauthorized removal of dangerous biologic agents from the laboratory. Appendix F of BMBL is now being revised to include additional information regarding personnel risk assessments, and inventory controls. The guidelines contained in this report are intended for laboratories working with select agents under biosafety-level 2, 3, or 4 conditions as described in Sections II and III of BMBL. These recommendations include conducting facility risk assessments and developing comprehensive security plans to minimize the probability of misuse of select agents. Risk assessments should include systematic, site-specific reviews of 1) physical security; 2) security of data and electronic technology systems; 3) employee security; 4) access controls to laboratory and animal areas; 5) procedures for agent inventory and accountability; 6) shipping/transfer and receiving of select agents; 7) unintentional incident and injury policies; 8) emergency response plans; and 9) policies that address breaches in security. The security plan should be an integral part of daily operations. All employees should be well-trained and equipped, and the plan should be reviewed annually, at least.