Sample records for security program guides

  1. 75 FR 35508 - Draft Regulatory Guide: Issuance, Availability

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-22

    ... Systems and Networks,'' requires licensees to develop cyber-security plans and programs to protect critical digital assets, including digital safety systems, from malicious cyber attacks. Regulatory Guide 5.71, ``Cyber Security Programs for Nuclear Facilities,'' provides guidance to meet the requirements of...

  2. CNN Newsroom Classroom Guides. May 1-31, 1995.

    ERIC Educational Resources Information Center

    Cable News Network, Atlanta, GA.

    These classroom guides for the daily CNN (Cable News Network) Newsroom broadcasts for the month of May provide program rundowns, suggestions for class activities and discussion, student handouts, and a list of related news terms. Topics covered by the guide include: (1) security systems and security at the Olympics, drawing to scale, civil war in…

  3. The Complete Resource Guide for Summer Youth Programs. Program Ideas for Summer Youth Jobs Project Managers.

    ERIC Educational Resources Information Center

    National Alliance of Business, Inc., Washington, DC.

    This guide consists of suggestions, ideas, and tips intended to stimulate development of cooperative summer youth employment programs in local communities. Addressed in the individual sections of the guide are the following topics: tips on where to start, suggestions on how to get started, hints on securing resources, program resources, use of…

  4. Essential Strategies for School Security: A Practical Guide for Teachers and School Administrators.

    ERIC Educational Resources Information Center

    Haynes, Richard A.; Henderson, Catherine L.

    This self-help guide explores the many factors involved in implementing an effective program of protection for schools. It provides direction and answers to the many questions posed by crime and violence in schools by translating certain principles of security into applications for the campus setting. The guide explains the various protection…

  5. Joint Logistics Commanders Guide for the Management of Multinational Program,

    DTIC Science & Technology

    1981-07-01

    purchase of the A-300 Airbus and the 1977 record-breaking export performance of the French and UK aerospace industries of around $5 billion and $2 billion...DIS. They are the Defense Industrial Security Clearance Office ( DISCO ), the Defense Industrial Security Institute (DISI), and the Office of Industrial...Security International (ISI). Defense Industrial Security Clearance Office ( DISCO ) The Defense Industrial Security Program (DISP) establishes pro

  6. 14 CFR 1203.408 - Assistance by installation security classification officers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.408 Assistance by installation security classification officers. Installation Security Classification Officers, as the... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Assistance by installation security...

  7. 14 CFR 1203.408 - Assistance by installation security classification officers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.408 Assistance by installation security classification officers. Installation Security Classification Officers, as the... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Assistance by installation security...

  8. 75 FR 68811 - Recovery Publication, P-395, Fire Management Assistance Grant Program (FMAGP) Guide

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-09

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2010-0066] Recovery Publication, P-395, Fire Management Assistance Grant Program (FMAGP) Guide AGENCY: Federal... Emergency Management Agency (FEMA) is accepting comments on the Fire Management Assistance Grant Program...

  9. Report: EPA Improved Its National Security Information Program, but Some Improvements Still Needed

    EPA Pesticide Factsheets

    Report #16-P-0196, June 2, 2016. The EPA will continue to improve its national security information program by completing information classification guides that can be used uniformly and consistently throughout the agency.

  10. Legal Guide for Senior Citizens: Laws and Programs Affecting Kansas Senior Citizens.

    ERIC Educational Resources Information Center

    Hollinger, Judith A., Ed.

    This booklet is intended to inform (not advise) older Kansans about eligibility requirements and benefits provided by state and federal programs. Financial assistance programs discussed are Social Security, railroad retirements, veterans' benefits, unrestricted general assistance, Employee Retirement Income Security Act, food stamps, Low Income…

  11. 75 FR 1830 - Final Regulatory Guide: Issuance, Availability

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-13

    ... review of applications for permits and licenses. RG 5.71, ``Cyber Security Programs for Nuclear... NUCLEAR REGULATORY COMMISSION [NRC-2010-0009] Final Regulatory Guide: Issuance, Availability AGENCY: Nuclear Regulatory Commission. ACTION: Notice of Issuance and Availability of Regulatory Guide...

  12. Guia Legal para Ciudadanos Envejeciente: Leyes y Programas Afectando los Ciudadanos Envejeciente de Kansas. (Legal Guide for Senior Citizens: Laws and Programs Affecting Kansas Senior Citizens).

    ERIC Educational Resources Information Center

    Hollinger, Judith A.

    This booklet, translated into Spanish, is intended to inform (not advise) older Kansans about eligibility requirements and benefits provided by state and federal programs. Financial assistance programs discussed are Social Security, railroad retirements, veterans' benefits, unrestricted general assistance, Employee Retirement Income Security Act,…

  13. Making the Match: Finding Funding for after School Education and Safety Programs

    ERIC Educational Resources Information Center

    Sandel, Kate; Hayes, Cheryl; Anuszkiewicz, Brittany; Cohen, Carol; Deich, Sharon

    2007-01-01

    This guide aims to help California leaders in schools, school districts, and community-based organizations meet the After School Education and Safety (ASES) Program matching requirement and secure funding. This guide is filled with practical information on how to attract and work with school and community partners; how to adopt a strategic…

  14. 14 CFR 1203.411 - Restrictions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for... President through the National Security Council, classified information originating in one agency may not be...) Classified information shall not be disseminated outside the Executive Branch except under conditions that...

  15. 14 CFR 1203.411 - Restrictions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for... President through the National Security Council, classified information originating in one agency may not be...) Classified information shall not be disseminated outside the Executive Branch except under conditions that...

  16. Security Considerations for Archives: Rare Book, Manuscript, and Other Special Collections.

    ERIC Educational Resources Information Center

    Cupp, Christian M.

    The first of six sections in this guide to security for special collections in archives and libraries discusses the importance of security and the difficulty of preventing theft of archival materials. The second section, which focuses on planning, recommends an inservice training program for staff, a planned communications network between library…

  17. 14 CFR 1203.410 - Limitations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for... requires protection in the interest of national security; and (2) the information may reasonably be... agency; or to restrain competition. (b) Basic scientific research information not clearly related to the...

  18. 14 CFR 1203.407 - Duration of classification.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 1203.407 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.407 Duration of classification. (a) Information shall be classified as long as required by national security considerations. When it can be determined, a specific...

  19. 14 CFR 1203.407 - Duration of classification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Section 1203.407 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.407 Duration of classification. (a) Information shall be classified as long as required by national security considerations. When it can be determined, a specific...

  20. Stonix, Version 0.x

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2015-05-13

    STONIX is a program for configuring UNIX and Linux computer operating systems. It applies configurations based on the guidance from publicly accessible resources such as: NSA Guides, DISA STIGs, the Center for Internet Security (CIS), USGCB and vendor security documentation. STONIX is written in the Python programming language using the QT4 and PyQT4 libraries to provide a GUI. The code is designed to be easily extensible and customizable.

  1. 32 CFR 2400.15 - Classification guides.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  2. 32 CFR 2400.15 - Classification guides.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  3. 32 CFR 2400.15 - Classification guides.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  4. 32 CFR 2400.15 - Classification guides.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  5. 32 CFR 2400.15 - Classification guides.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...

  6. [A guide to good practice for information security in the handling of personal health data by health personnel in ambulatory care facilities].

    PubMed

    Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel

    2014-04-01

    The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.

  7. CNN Newsroom Classroom Guides. May 1999.

    ERIC Educational Resources Information Center

    Turner Educational Services, Inc., Newtown, PA.

    These classroom guides, designed to accompany the daily CNN (Cable News Network) Newsroom broadcasts for the month of May, provide program rundowns, suggestions for class activities and discussion, links to related World Wide Web sites, and lists of related news terms. Top stories include: Reverend Jesse Jackson secures release of U.S. soldiers…

  8. CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 6

    DTIC Science & Technology

    2012-12-01

    Cyber Security Threat Definition Communicable Noncommunicable Based on Risky Behavior Coordinated Trojan horse programs Threats hidden in a...for Cyber Security Threats Cyber Security Threat Communicable Noncommunicable Risky Behaviors Coordinated Type of Intervention (at the System...types of data are breached. Further, educational materials on risky behaviors (e.g., for home Internet users) as well as recommended guide- lines for

  9. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1978-03-31

    Passenger Screening Results 12. Scope of Civil Aviation Security Program 13. Basic Policies 14. Explosives Detection Dog Teams 15. Explosives Detection... policies guiding the program recognize airline responsibilities for the safety of passengers, baggage and cargo in their care as well as for the...U *i * (U U Los -7 .cn cf) 1-4 ~~LL _m e- Hf LMU 0- u,-C -oL -ccJLL LII -~ LLIOL 0 _ CL. LLJ cr-L LCnIJ C ~ ~ CnCD C. ) &j 2ic- nc r JL AJ -L JC C.- L

  10. Program Office Guide to Ada. Edition 1

    DTIC Science & Technology

    1986-09-17

    publication. MARK V. ZIEMBA , 2Lt, USAF Project Officer, Software Engineering Tools & Methods ARTHUR G. DECELLES, Capt, USAF Program Manager, Computer...UNLIMITED G3 SAME AS RPT D DTIC USERS 21 ABSTRACT SECURITY CLASSIFICATION UNCLASSIFIED 22a. NAME OF RESPONSIBLE INDIVIDUAL M.V. Ziemba

  11. Maquiladoras and National Security: Design Theory as a Guide

    DTIC Science & Technology

    2011-10-25

    created in 1964 when the Mexican government established the Border Industrialization Program. Previously, under the Bracero program , large numbers...valve” for the Mexican economy in terms of unemployment. Previously, under the Bracero program , Mexican laborers were allowed temporary entry into...the United States to pursue seasonal labor opportunities. A guest worker program, perhaps modeled after the Bracero program that was discontinued in

  12. How To Create Safe Schools: Action Steps for the Community. A Workshop and Planning Guide To Help Communities Bring Security and Peace to Their Schools.

    ERIC Educational Resources Information Center

    National Educational Service, Bloomington, IN.

    This workshop and planning guide is designed to help stakeholders create safe schools for students. The guide is intended to be used with three 20-minute videotape programs that feature an inside look at two schools that actively involved their communities in improving school safety. The three videos--"Building the Team,""The Safe School…

  13. National Intelligence: A Consumer’s Guide

    DTIC Science & Technology

    2009-01-01

    execution of that budget. The National Intelligence Program (NIP), formerly known as the National Foreign Intelligence Program ( NFIP ), provides the...Clandestine Service NCTC: National Counterterrorism Center NDIC: National Defense Intelligence College (DIA – formerly JMIC) NFIP : National Foreign...Center (ODNI) NIE: National Intelligence Estimate NIP: National Intelligence Program (formerly NFIP ) NIPRNet: Non-Secure Internet Protocol Router

  14. A Comparative Analysis of Selected Federal Programs Serving Young Children. Steps toward Making These Programs Work in Your State.

    ERIC Educational Resources Information Center

    Smith, Barbara J.

    Intended to help state planners understand and coordinate their program efforts, the guide provides an analysis of major federally funded programs for handicapped and at-risk children from birth to age 6. The following programs and their legislative authority are considered: Medicaid (Title XIX of the Social Security Act); The Early and Periodic…

  15. Safety in Riding Programs: A Director's Guide.

    ERIC Educational Resources Information Center

    Kpachavi, Teresa

    1996-01-01

    Camp riding programs should be examined regularly for liability and risk management issues. Elements of a basic safety assessment include requiring proper safety apparel, removing obstructions from riding rings, ensuring doors and gates are closed, requiring use of lead ropes, securing equine medications, banning smoking, posting written…

  16. 2009 National Intelligence: A Consumer’s Guide

    DTIC Science & Technology

    2009-04-01

    Program (NIP), formerly known as the National Foreign Intelligence Program ( NFIP ), provides the resources needed to develop and maintain...Clandestine Service NCTC: National Counterterrorism Center NDIC: National Defense Intelligence College (DIA – formerly JMIC) NFIP : National Foreign...Coordination Center (ODNI) NIE: National Intelligence Estimate NIP: National Intelligence Program (formerly NFIP ) NIPRNet: Non-Secure Internet Protocol Router

  17. The $$ Game: A Guidebook on the Funding of Law-Related Educational Programs. Working Notes, No. 7.

    ERIC Educational Resources Information Center

    White, Charles J., III, Ed.

    This document addresses itself to the securing of funds necessary to maintain or fund law-related education projects. Drawing on the expertise of project directors who have been successful in securing funds, this document was put together as a guide to the funding process. Essays provide guidance to locating funding sources, writing proposals,…

  18. Building Global Peace, Conflict, and Security Curricula at Undergraduate Institutions: A Curriculum Development Guide for Colleges and Universities

    ERIC Educational Resources Information Center

    Smith, David J.

    2007-01-01

    A central mission of the United States Institute of Peace (USIP) is the promotion of international conflict resolution education by assisting and supporting colleges and universities in their efforts at developing and offering programs, courses, and activities that focus on international peace, conflict, and security. Over the years, a number of…

  19. Operations & Maintenance Best Practices - A Guide to Achieving Operational Efficiency Release 3.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This Operations and Maintenance (O&M) Best Practices Guide was developed under the direction of the U.S. Department of Energy’s Federal Energy Management Program (FEMP). The mission of FEMP is to facilitate the Federal Government’s implementation of sound, cost effective energy management and investment practices to enhance the nation’s energy security and environmental stewardship.

  20. Food for Education Indicator Guide. Food and Nutrition Technical Assistance.

    ERIC Educational Resources Information Center

    Bergeron, Gilles; Del Rosso, Joy Miller

    As defined by the U.S. Agency for International Development, food security is attained "when all people at all times have both physical and economic access to sufficient food to meet their dietary needs for a productive and healthy life." In this guide, Food for Education (FFE) is defined as a program using food as a resource to improve…

  1. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...

  2. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...

  3. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...

  4. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...

  5. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Securities Act industry guides... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry... claims and claim adjustment expenses of property-casualty insurance underwriters. (g) Guide 7...

  6. Keeping Kids on Track: Impacts of a Parenting-Focused Early Head Start Program on Attachment Security and Cognitive Development

    ERIC Educational Resources Information Center

    Roggman, Lori A.; Boyce, Lisa K.; Cook, Gina A.

    2009-01-01

    Research Findings: The home-based Early Head Start program in this local study aimed to promote children's early attachment and cognitive development by establishing supportive relationships with parents and guiding responsive parenting and positive parent-child play interactions. To test the effectiveness of this approach, we studied the…

  7. 77 FR 68162 - Advisory Committee on Reactor Safeguards (ACRS); Meeting of the ACRS Subcommittee on Regulatory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-15

    ... Water Reactors,'' Revision 2, and Regulatory Guide 1.79.1, ``Initial Test Program of Emergency Core... White Flint North building, 11555 Rockville Pike, Rockville, MD. After registering with security, please...

  8. 14 CFR 1203.405 - Proprietary information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... PROGRAM Guides for Original Classification § 1203.405 Proprietary information. Proprietary information made available to NASA is subject to examination for classification purposes under the criteria set... the proposal but believes that security classification would be appropriate under the criteria of...

  9. Characteristics of State Plans for Aid to Families with Dependent Children Under the Social Security Act Title IV-A (and for Guam, Puerto Rico, & Virgin Islands).

    ERIC Educational Resources Information Center

    Miller, Catherine M., Ed.; Chief, Elizabeth H., Ed.

    This program guide covers in outline form the characteristics of state public assistance plans for operating programs of Aid to Families with Dependent Children. The information for each state is presented in a series of pages with four subdivisions: Administration, Eligibility Requirements, Need Determination, and Extension of the Program. In…

  10. 17 CFR 202.8 - Small entity compliance guides.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Small entity compliance guides. 202.8 Section 202.8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND OTHER PROCEDURES § 202.8 Small entity compliance guides. The following small entity compliance guides...

  11. 17 CFR 202.8 - Small entity compliance guides.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Small entity compliance guides. 202.8 Section 202.8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND OTHER PROCEDURES § 202.8 Small entity compliance guides. The following small entity compliance guides...

  12. 14 CFR 1203.401 - Effect of open publication.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Effect of open publication. 1203.401 Section 1203.401 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.401 Effect of open publication. Public disclosure...

  13. 14 CFR 1203.401 - Effect of open publication.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Effect of open publication. 1203.401 Section 1203.401 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.401 Effect of open publication. Public disclosure...

  14. 14 CFR 1203.401 - Effect of open publication.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Effect of open publication. 1203.401 Section 1203.401 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.401 Effect of open publication. Public disclosure...

  15. 14 CFR 1203.401 - Effect of open publication.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Effect of open publication. 1203.401 Section 1203.401 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.401 Effect of open publication. Public disclosure...

  16. The Dynamics of Relationships: A Guide for Developing Self-Esteem and Coping Skills for Teens and Young Adults. Teacher Manual Books 1 and 2.

    ERIC Educational Resources Information Center

    Kramer, Patricia; Hockman, Fyllis, Ed.

    The "Dynamics of Relationships" program was originally designed as a preventive approach to the many social ills affecting young people and families today. This teacher's manual for the program provides objectives and activities for helping students develop and maintain a strong and secure self-image, effective communication and coping…

  17. Guide to NavyFOAM V1.0

    DTIC Science & Technology

    2011-04-01

    NavyFOAM has been developed using an open-source CFD software tool-kit ( OpenFOAM ) that draws heavily upon object-oriented programming. The...numerical methods and the physical models in the original version of OpenFOAM have been upgraded in an effort to improve accuracy and robustness of...computational fluid dynamics OpenFOAM , Object Oriented Programming (OOP) (CFD), NavyFOAM, 16. SECURITY CLASSIFICATION OF: a. REPORT UNCLASSIFIED b

  18. Port Security: A National Planning Guide

    DOT National Transportation Integrated Search

    1997-01-01

    Port Security: A National Planning Guide has been produced for the purpose of conveying the United States Department of Transportations policy perspective on port security to the maritime community. This guide provides an overview of the essential as...

  19. Alcohol Outlet Workers and Managers: Focus Groups on Responsible Service Practices.

    ERIC Educational Resources Information Center

    Gehan, John P.; Toomey, Traci L.; Jones-Webb, Rhonda; Rothstein, Catherine; Wagenaar, Alexander C.

    1999-01-01

    Reports on focus group discussions with managers, bartenders, waitstaff, and security staff of retail alcohol establishments. Purpose of the focus groups was to identify beliefs, attitudes, behaviors, and practices among management and staff to guide development of training programs. Results indicate that, compared to management, staff had…

  20. 14 CFR § 1203.401 - Effect of open publication.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Effect of open publication. § 1203.401 Section § 1203.401 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.401 Effect of open publication. Public...

  1. Responding to Campus Rape: A Practical Guide for College Administrators.

    ERIC Educational Resources Information Center

    Fossey, Richard; Smith, Michael Clay

    1996-01-01

    In addressing rape on campus, colleges and universities should provide a rape awareness program, a campus sexual harassment policy, a campus security plan focusing on prevention, procedures for notifying the community about criminal activity, adequate disciplinary procedures, and protection for minor children with whom campus employees work. A…

  2. 14 CFR § 1203.407 - Duration of classification.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Duration of classification. § 1203.407... SECURITY PROGRAM Guides for Original Classification § 1203.407 Duration of classification. (a) At the time of original classification, the original classification authority shall establish a specific date or...

  3. Evaluating Realized Impacts of DOE/EERE R&D Programs. Standard impact evaluation method

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ruegg, Rosalie; O'Connor, Alan C.; Loomis, Ross J.

    2014-08-01

    This document provides guidance for evaluators who conduct impact assessments of research and development (R&D) programs for the U.S. Department of Energy’s (DOE) Office of Energy Efficiency and Renewable Energy (EERE). It is also targeted at EERE program staff responsible for initiating and managing commissioned impact studies. The guide specifies how to estimate economic benefits and costs, energy saved and installed or generated, environmental impacts, energy security impacts, and knowledge impacts of R&D investments in advanced energy technologies.

  4. 17 CFR 229.802 - Exchange Act industry guides.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...

  5. 17 CFR 229.802 - Exchange Act industry guides.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...

  6. 17 CFR 229.802 - Exchange Act industry guides.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...

  7. 17 CFR 229.802 - Exchange Act industry guides.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...

  8. 17 CFR 229.802 - Exchange Act industry guides.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...

  9. The New Jersey Cooperative Home Economics Education Handbook. Part B: The Curriculum.

    ERIC Educational Resources Information Center

    Spencer, Dorothy

    This guide is intended for use with students enrolled in cooperative occupational home economics programs. The following topics are covered in the individual modules: the basic principles of cooperative home economics; preparation for the world of work (choosing, finding, applying for, and exploring a job); safety, security, and sanitation (on and…

  10. Head Start and Hurricane Recovery: Using a Family Outcomes Measure to Assess the Impact of Program Services

    ERIC Educational Resources Information Center

    Janiak, Richard

    2007-01-01

    In Head Start, family service workers facilitate the process for guiding and assisting families in securing services needed for specific family issues regarding health care, housing, employment, education, and/or crisis management. These services were particularly important to families following Hurricane Charley and the subsequent recovery…

  11. 32 CFR Appendix C to Part 154 - Tables for Requesting Investigations

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Tables for Requesting Investigations C Appendix... DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. C Appendix C to Part 154—Tables for Requesting Investigations Guide for Requesting Background Investigations (BI) (Table 1) A B C If the...

  12. 32 CFR Appendix C to Part 154 - Tables for Requesting Investigations

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Tables for Requesting Investigations C Appendix... DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. C Appendix C to Part 154—Tables for Requesting Investigations Guide for Requesting Background Investigations (BI) (Table 1) A B C If the...

  13. 32 CFR Appendix C to Part 154 - Tables for Requesting Investigations

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Tables for Requesting Investigations C Appendix... DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. C Appendix C to Part 154—Tables for Requesting Investigations Guide for Requesting Background Investigations (BI) (Table 1) A B C If the...

  14. 32 CFR Appendix C to Part 154 - Tables for Requesting Investigations

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Tables for Requesting Investigations C Appendix... DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. C Appendix C to Part 154—Tables for Requesting Investigations Guide for Requesting Background Investigations (BI) (Table 1) A B C If the...

  15. A guide to Social Security money's worth issues.

    PubMed

    Leimer, D R

    1995-01-01

    This article discusses some of the major issues associated with the question of whether workers receive their money's worth from the Social Security program. An effort is made to keep the discussion as nontechnical as possible, with explanations provided for many of the technical terms and concepts found in the money's worth literature. Major assumptions, key analytical methods, and money's worth measures used in the literature are also discussed. Finally, the key findings of money's worth studies are summarized, with some cautions concerning the limitations and appropriate usage of money's worth analyses.

  16. The 60 Minute Network Security Guide (First Steps Towards a Secure Network Environment)

    DTIC Science & Technology

    2001-10-16

    default/ passwd file in UNIX. Administrators should obtain and run password-guessing programs (i.e., “John the Ripper,’’ “L0phtCrack,” and “Crack...system on which it is running, it is a good idea to transfer the encrypted passwords (the dumped SAM database for Windows and the /etc/ passwd and /etc...ownership by root and group sys. The /etc/ passwd file should have permissions 644 with owner root and group root. n Be cracked every month to find

  17. Second Line of Defense: Electronic Maintenance Reports, Local Maintenance Provider User Guide, Rev. 3

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leigh, Richard J.

    2012-09-01

    The Electronic Maintenance Report forms allow Local Maintenance Providers (LMP) and other program staff to enter maintenance information into a simple and secure system. This document describes the features and information required to complete the Maintenance Report forms. It is expected that all Corrective Maintenance Reports from LMPs will be submitted electronically into the SLD Portal. As an exception (e.g., when access to the SLD Portal is unavailable), Maintenance Reports can be submitted via a secure Adobe PDF form available through the Sustainability Manager assigned to each country.

  18. Transit Security Procedures Guide

    DOT National Transportation Integrated Search

    1994-12-01

    To protect passenger, employees, revenue, and property, transit systems are encouraged to take a proactive, prevention-oriented systems approach to transit security. This guide is a compilation of materials for planning and improving transit security...

  19. 17 CFR 202.8 - Small entity compliance guides.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Small entity compliance guides. 202.8 Section 202.8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND...: Small Business and the SEC. 1 1 These items are also available on the Securities and Exchange Commission...

  20. 17 CFR 202.8 - Small entity compliance guides.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Small entity compliance guides. 202.8 Section 202.8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND...: Small Business and the SEC. 1 1 These items are also available on the Securities and Exchange Commission...

  1. 17 CFR 202.8 - Small entity compliance guides.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Small entity compliance guides. 202.8 Section 202.8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND...: Small Business and the SEC. 1 1 These items are also available on the Securities and Exchange Commission...

  2. What are the determinants of food security among regional and remote Western Australian children?

    PubMed

    Godrich, Stephanie L; Davies, Christina R; Darby, Jill; Devine, Amanda

    2017-01-22

    To explore how determinants of food security affect children in regional and remote Western Australia (WA), across food availability, access and utilisation dimensions. The Determinants of Food Security framework guided the thematic analysis (using NVivo 10) of semi-structured interviews with 20 key informants. Food availability factors included availability, price, promotion, quality, location of outlets and variety. Food access factors included social support, financial resources, transport to food outlets, distance to food outlets and mobility. Food utilisation factors included nutrition knowledge and skills, children's food preferences, storage facilities, preparation and cooking facilities and time to purchase food. Key food availability recommendations include increasing local food supply options. Food access recommendations include ensuring equitable formal social support and empowering informal support options. Food utilisation recommendations include prioritising food literacy programs focusing on quick, healthy food preparation and budgeting skills. Implications for public health: Policymakers should invest in local food supply options, equitable social support services and experiential food literacy programs. Practitioners should focus child/parent programs on improving attitude, knowledge and skills. © 2017 Public Health Association of Australia.

  3. Metering Best Practices, A Guide to Achieving Utility Resource Efficiency, Release 2.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sullivan, Greg; Hunt, W. D.; Pugh, Ray

    2011-08-31

    This release is an update and expansion of the information provided in Release 1.0 of the Metering Best Practice Guide that was issued in October 2007. This release, as was the previous release, was developed under the direction of the U.S. Department of Energy's Federal Energy Management Program (FEMP). The mission of FEMP is to facilitate the Federal Government's implementation of sound cost-effective energy management and investment practices to enhance the nation's energy security and environmental stewardship. Each of these activities is directly related to achieving requirements set forth in the Energy Policy Acts of 1992 and 2005, the Energymore » Independence and Security Act (EISA) of 2007, and the goals that have been established in Executive Orders 13423 and 13514 - and also those practices that are inherent in sound management of Federal financial and personnel resources.« less

  4. Small Technology Business Incubation Needs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    2007-12-31

    This report contains a summary of typical business incubation needs of small technology companies. This document will serve as a guide in the design and implementation of services offered by the National Security Technology Incubator (NSTI), an incubator program being designed and developed as part of the National Security Preparedness Project (NSPP), performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the methodology used to perform the needs assessment and services proposed to meet the needs of client companies. The purpose of the NSPP is to promote national security technologiesmore » through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland.« less

  5. Governance and Purchasing Function under Social Health Insurance in Nepal: Looking Back and Moving Forward.

    PubMed

    Sapkota, V P; Bhusal, U P

    2017-01-01

    Nepal is pursuing Social Health Insurance as a way of mobilizing revenues to achieve Universal Health Coverage. The Social Health Insurance governance encourages service providers to maintain quality and efficiency in services provision by practicing strategic purchasing. Social Health Security Programme is a social protection program which aspires to achieve the goals of Social Health Insurance. Social Health Security Development Committee needs to consider following experiences to function as a strategic purchaser. The Social Health Security Development Committee need to be an independent body instead of falling under Ministry of Health. Similarly, purchasing of health services needs to be made strategic, i.e., Social Health Security Development Committee should use its financial power to guide the provider behavior that will eventually contribute to achieving the goals of quality and efficiency in service provision. The other social health security funds should be merged with Social Health Security Development Committee and develop a single national fund. Finally, the state has to regulate and monitor the performance of the SHI agency.

  6. CMS Software: Installation Guide and User Manual.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Straut, Christine

    A Chemical Inventory Management System (CIMS) is a system or program that is used to track chemicals at a facility or institution. An effective CIMS begins tracking these chemicals at the point of procurement and continues through use and disposal. The management of chemicals throughout the life cycle (procurement to disposal) is a key concept for the secure management of chemicals at any institution.

  7. Development of a universally applicable household food insecurity measurement tool: process, current status, and outstanding issues.

    PubMed

    Swindale, Anne; Bilinsky, Paula

    2006-05-01

    The United States Public Law 480 Title II food aid program is the largest U.S. government program directed at reducing hunger, malnutrition, and food insecurity in the developing world. USAID and Title II implementing partners face challenges in measuring the success of Title II programs in reducing household food insecurity because of the technical difficulty and cost of collecting and analyzing data on traditional food security indicators, such as per capita income and caloric adequacy. The Household Food Insecurity Access Scale (HFIAS) holds promise as an easier and more user-friendly approach for measuring the access component of household food security. To support the consistent and comparable collection of the HFIAS, efforts are under way to develop a guide with a standardized questionnaire and data collection and analysis instructions. A set of domains have been identified that is deemed to capture the universal experience of the access component of household food insecurity across countries and cultures. Based on these domains, a set of questions has been developed with wording that is deemed to be universally appropriate, with minor adaptation to local contexts. These underlying suppositions, based on research in multiple countries, are being verified by potential users of the guide. The key remaining issue relates to the process for creating a categorical indicator of food insecurity status from the HFIAS.

  8. Understanding Country Planning: A Guide for Air Force Component Planners

    DTIC Science & Technology

    2012-01-01

    TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND...example, Jefferson P. Marquis, Richard E. Darilek, Jasen J. Castillo, Cathryn Quantic Thurston, Anny Wong, Cynthia Huger, Andrea Mejia, Jennifer D. P...2006; Jennifer D. P. Moroney, Jefferson P. Marquis, Cathryn Quantic Thurston, and Gregory F. Treverton, A Framework to Assess Programs for Building

  9. What are we assessing when we measure food security? A compendium and review of current metrics.

    PubMed

    Jones, Andrew D; Ngure, Francis M; Pelto, Gretel; Young, Sera L

    2013-09-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics.

  10. What Are We Assessing When We Measure Food Security? A Compendium and Review of Current Metrics12

    PubMed Central

    Jones, Andrew D.; Ngure, Francis M.; Pelto, Gretel; Young, Sera L.

    2013-01-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics. PMID:24038241

  11. Security management techniques and evaluative checklists for security force effectiveness. Technical report (final) Sep 80-Jul 81

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schurman, D.L.; Datesman, G.H. Jr; Truitt, J.O.

    The report presents a system for evaluating and correcting deficiencies in security-force effectiveness in licensed nuclear facilities. There are four checklists which security managers can copy directly, or can use as guidelines for developing their own checklists. The checklists are keyed to corrective-action guides found in the body of the report. In addition to the corrective-action guides, the report gives background information on the nature of security systems and discussions of various special problems of the licensed nuclear industry.

  12. A governor's guide to emergency management. Volume two : homeland security

    DOT National Transportation Integrated Search

    2002-09-19

    Homeland security is a complex challenge that demands significant investment; collaboration among local, state, and federal governments; and integration with the private sector. The purpose of A Governor's Guide to Emergency Management Volume Two: Ho...

  13. The public transportation system security and emergency preparedness planning guide

    DOT National Transportation Integrated Search

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  14. High-Altitude Electromagnetic Pulse (HEMP) Testing

    DTIC Science & Technology

    2011-11-10

    Security Classification Guide ( SCG ). b. The HEMP simulation facility shall have a measured map of the peak amplitude waveform of the...Quadripartite Standardization Agreement s, sec second SCG security classification guide SN serial number SOP Standard Operating Procedure

  15. [Analysis of the mainstreaming of the perspective of the Human Right to Adequate Food in the institutional design of the National School Nutrition Program].

    PubMed

    de Siqueira, Renata Lopes; Cotta, Rosângela Minardi Mitre; Ribeiro, Rita de Cássia Lanes; Sperandio, Naiara; Priore, Sílvia Eloíza

    2014-01-01

    Being a signatory to international agreements that recognize the Human Right to Adequate Food (HRAF) and having enshrined this right into its Constitution, the Brazilian state imposes a duty to provide, protect and promote the HRAF. For this it is necessary to incorporate the principles of the HRAF into the process of planning and executing the actions of Food and Nutrition Security (FNS). The objective was to analyze the process of mainstreaming of the HRAF in the new institutional design of the National School Nutrition Program (NSNP). This is in line with the principles laid down in General Comment No 12 of the Guide for Policy Analysis and Public Programs and nutritional Food Security under the Perspective of Human Rights and the Organic Law on Food and Nutrition Security (OLFNS). The results show that the new regulatory framework of the NSNP indicates a paradigm shift that is characterized by a gradual decline in the perception of NSNP as policy of a welfare nature. Concomitantly, there is an increase in the concept of the benefit of school food as a right, with the caveat that the construction of a new regulatory framework, although essential, is not sufficient for full implementation of the HRAF.

  16. Guide for the Management of Multinational Programs. A Handbook for Managers Entering the World of International Acquisition. Second Edition

    DTIC Science & Technology

    1987-05-11

    Labor Stability and Ccupensation Practices . . . . 4-9 Management Styles . . . . . . . . . . . . . . . . 4-12 Canadian Relationship to The US...Systýem (PAPS) Milestones and Phases ...... _ . . . 3-8 3-4 Phased Armaments Programminq System(PAPS)/ DoD Systems Acquisition Structural Relationship ...sharing o Armaments cooperation o An understanding of the relationship between economics and security. In concert with the above efforts were various allied

  17. Research Summary: Projecting Vegetation and Wildfire Response to Changing Climate and Fire Management in Interior Alaska

    DTIC Science & Technology

    2016-08-21

    USER GUIDE Research Summary: Projecting Vegetation and Wildfire Response to Changing Climate and Fire Management in Interior Alaska SERDP Project...Summary: Projecting Vegetation and Wildfire Response to Changing Climate and Fire Management in Interior Alaska 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...forecast landscape change in response to projected changes in climate , fire regime, and fire management. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF

  18. Developing an interdisciplinary community-based sports concussion management program.

    PubMed

    LoGalbo, Anthony; Salinas, Christine M; Dougherty, Michael; Field, Mel

    2014-01-01

    The increasing incidence and associated consequences of sport-related concussion have been at the forefront of public health concerns in recent years, prompting the need for safe and effective management guidelines and availability of appropriately trained healthcare providers. In this report we provide practical and user-friendly information regarding several important factors to consider when developing a sports concussion program, including how to select relevant team members, assess community needs and available resources, provide concussion education, secure and nurture partnerships with athletic programs, implement management strategies that align with current practice standards, and cater to athletes' unique needs in terms of program accessibility. It is hoped that the knowledge shared and proposed recommendations will be beneficial for guiding both newly developing and established concussion programs alike. © 2014 S. Karger AG, Basel.

  19. Common Criteria Evaluation and Validation Scheme for Information Technology Security: Guidance to Validators of IT Security Evaluations

    DTIC Science & Technology

    2002-02-01

    NVLAP procedures are compatible with, among others, the most recent official publications of ISO / IEC 17025 (formally ISO / IEC Guide 25), ISO Guides 2, 30... IEC Guide 17025 and the relevant requirements of ISO 9002-1994. NVLAP Handbook 150-20 contains information that is specific to Common Criteria...Evaluation Technical Report EAP Evaluation Acceptance Package IEC International Electrotechnical Commission ISO International

  20. Stemless ball valve

    NASA Technical Reports Server (NTRS)

    Burgess, Kevin (Inventor); Yakos, David (Inventor); Walthall, Bryan (Inventor)

    2012-01-01

    A stemless ball valve comprising: a right flange; left flange; ball with an axis pin and two travel pins; ball seal on either side of the ball; guide sleeve with inner walls comprising two channels; cartridge guide holder; inner magnetic cartridge; and outer magnetic cartridge. The ball is situated inside of the guide sleeve, and a travel pin is located in each of the two channels. The guide sleeve is situated inside of the cartridge guide holder, which is located adjacent to and outside of the inner magnetic cartridge and secured to the inner magnetic cartridge such that when the inner magnetic cartridge rotates, the cartridge guide holder also rotates. The cartridge guide holder is secured to the guide sleeve such that when the cartridge guide holder rotates, the travel pins move within the channels in the inner walls of the guide sleeve, thereby causing the ball to rotate.

  1. Looking for Trouble: A Policymaker’s Guide to Biosensing

    DTIC Science & Technology

    2004-06-01

    impacted the continental United States and Canada include Legionnaires ’ disease (1977), HIV/AIDS (1981), West Nile virus (1999), and SARS (2003...5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR( S ) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME... S ) AND ADDRESS(ES) National Defense University,Center for Technology and National Security Policy,300 5th Avenue SW, Fort Lesley J. McNair,Washington

  2. Suspect/Counterfeit Items Information Guide for Subcontractors/Suppliers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tessmar, Nancy D.; Salazar, Michael J.

    2012-09-18

    Counterfeiting of industrial and commercial grade items is an international problem that places worker safety, program objectives, expensive equipment, and security at risk. In order to prevent the introduction of Suspect/Counterfeit Items (S/CI), this information sheet is being made available as a guide to assist in the implementation of S/CI awareness and controls, in conjunction with subcontractor's/supplier's quality assurance programs. When it comes to counterfeit goods, including industrial materials, items, and equipment, no market is immune. Some manufactures have been known to misrepresent their products and intentionally use inferior materials and processes to manufacture substandard items, whose properties can significantlymore » cart from established standards and specifications. These substandard items termed by the Department of Energy (DOE) as S/CI, pose immediate and potential threats to the safety of DOE and contractor workers, the public, and the environment. Failure of certain systems and processes caused by an S/CI could also have national security implications at Los Alamos National Laboratory (LANL). Nuclear Safety Rules (federal Laws), DOE Orders, and other regulations set forth requirements for DOE contractors to implement effective controls to assure that items and services meet specified requirements. This includes techniques to implement and thereby minimizing the potential threat of entry of S/CI to LANL. As a qualified supplier of goods or services to the LANL, your company will be required to establish and maintain effective controls to prevent the introduction of S/CI to LANL. This will require that your company warrant that all items (including their subassemblies, components, and parts) sold to LANL are genuine (i.e. not counterfeit), new, and unused, and conform to the requirements of the LANL purchase orders/contracts unless otherwise approved in writing to the Los Alamos National Security (LANS) contract administrator/procurements specialist.« less

  3. Governance: The Mission Ingredient in Security Cooperation

    DTIC Science & Technology

    2017-06-09

    assistance guiding principle of “do-no-harm,” should be included in the future DOS guidance. Seven do-no-harm lessons include: (1) norms and... principle of “do-no-harm.” 15. SUBJECT TERMS Security cooperation, security assistance, defense institution building, USAID, best practices...foreign assistance guiding principle of “do-no-harm,” should be included in the future DOS guidance. Seven do-no-harm lessons include: (1) norms and

  4. Defining a risk-informed framework for whole-of-government lessons learned: A Canadian perspective.

    PubMed

    Friesen, Shaye K; Kelsey, Shelley; Legere, J A Jim

    Lessons learned play an important role in emergency management (EM) and organizational agility. Virtually all aspects of EM can derive benefit from a lessons learned program. From major security events to exercises, exploiting and applying lessons learned and "best practices" is critical to organizational resilience and adaptiveness. A robust lessons learned process and methodology provides an evidence base with which to inform decisions, guide plans, strengthen mitigation strategies, and assist in developing tools for operations. The Canadian Safety and Security Program recently supported a project to define a comprehensive framework that would allow public safety and security partners to regularly share event response best practices, and prioritize recommendations originating from after action reviews. This framework consists of several inter-locking elements: a comprehensive literature review/environmental scan of international programs; a survey to collect data from end users and management; the development of a taxonomy for organizing and structuring information; a risk-informed methodology for selecting, prioritizing, and following through on recommendations; and standardized templates and tools for tracking recommendations and ensuring implementation. This article discusses the efforts of the project team, which provided "best practice" advice and analytical support to ensure that a systematic approach to lessons learned was taken by the federal community to improve prevention, preparedness, and response activities. It posits an approach by which one might design a systematic process for information sharing and event response coordination-an approach that will assist federal departments to institutionalize a cross-government lessons learned program.

  5. Emerging national space launch programs: Economics and safeguards

    NASA Astrophysics Data System (ADS)

    Chow, Brian G.

    Most ballistic missile nonproliferation studies have focused on trends in the numbers and performance of missiles and the resulting security threats. This report concentrates on the economic viability of emerging national space launch programs and the prospects for imposing effective safeguards against the use of space launch technology for military missiles. For the convenience of discussion in this report, a reference to ballistic missiles hereafter means surface-to-surface guided ballistic missiles only. Space launch vehicles (SLV's) are surface-to-space ballistic missiles, and they will be referred to explicitly as 'space launch vehicles' or 'space launchers'. Surface-to-surface unguided ballistic missiles will be referred to as 'rockets.'

  6. Nevada National Security Site Radiation Protection Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statementsmore » that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.« less

  7. Consumable Guide Electroslag Welding of 4 to 24 Inch Thick Carbon Steel Castings (The National Shipbuilding Research Program)

    DTIC Science & Technology

    1986-08-01

    aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 168 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT...States, nor the Maritime Administration, nor any person acting on behalf of the Maritime Administration (A) makes any warranty or representation, expressed

  8. Project Manager’s Guide to the Scientific and Technical Information (STINFO) Program and Technical Publications Process

    DTIC Science & Technology

    1993-12-01

    Iaporta .. y be definitive for the tubjoct proaentod, exploratory in natura, or an evaluation of critical Aubayato• or of technical problema , 4...International Security 9 Social and Natural Science Studies Field 41 Edit: (Type 3) -Entry of an invalid code when Performance Type is "C" or "M" will...analysis SF Foreign area social science research SP Foreign area policy planAing research BF Identifies databases with data on foreign forces or

  9. Guide to the NITRD Program FY 2004-FY 2005. Supplement to the President’s Budget for FY 2005

    DTIC Science & Technology

    2004-12-01

    electronic medical records systems . At the core of such systems is the concept of a secure, patient-centered electronic health record ( EHR ) that: 1...support the development of an NHII that includes an Electronic Health Record System ( EHRS ). The EHRS will be a longitudinal collection of electronic... health information for and about persons. It will allow electronic access to person- and population-level information by authorized users. The system

  10. Nuclear security policy in the context of counter-terrorism in Cambodia

    NASA Astrophysics Data System (ADS)

    Khun, Vuthy; Wongsawaeng, Doonyapong

    2016-01-01

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.

  11. Assessment of Performance Measures for Security of the Maritime Transportation Network, Port Security Metrics : Proposed Measurement of Deterrence Capability

    DOT National Transportation Integrated Search

    2007-01-03

    This report is the thirs in a series describing the development of performance measures pertaining to the security of the maritime transportation network (port security metrics). THe development of measures to guide improvements in maritime security ...

  12. 32 CFR 2001.15 - Classification guides.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...

  13. 32 CFR 2001.15 - Classification guides.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...

  14. 32 CFR 2001.15 - Classification guides.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...

  15. 32 CFR 2001.15 - Classification guides.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...

  16. 32 CFR 2001.15 - Classification guides.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...

  17. 32 CFR 2700.22 - Classification guides.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Classification guides. 2700.22 Section 2700.22... SECURITY INFORMATION REGULATIONS Derivative Classification § 2700.22 Classification guides. OMSN shall issue classification guides pursuant to section 2-2 of E.O. 12065. These guides, which shall be used to...

  18. 32 CFR 2700.22 - Classification guides.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Classification guides. 2700.22 Section 2700.22... SECURITY INFORMATION REGULATIONS Derivative Classification § 2700.22 Classification guides. OMSN shall issue classification guides pursuant to section 2-2 of E.O. 12065. These guides, which shall be used to...

  19. 32 CFR 2700.22 - Classification guides.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Classification guides. 2700.22 Section 2700.22... SECURITY INFORMATION REGULATIONS Derivative Classification § 2700.22 Classification guides. OMSN shall issue classification guides pursuant to section 2-2 of E.O. 12065. These guides, which shall be used to...

  20. 32 CFR 2700.22 - Classification guides.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Classification guides. 2700.22 Section 2700.22... SECURITY INFORMATION REGULATIONS Derivative Classification § 2700.22 Classification guides. OMSN shall issue classification guides pursuant to section 2-2 of E.O. 12065. These guides, which shall be used to...

  1. U.S. Army War College Guide to National Security Issues. Third Edition, Volume 2. National Security Policy and Strategy

    DTIC Science & Technology

    2008-06-01

    183 14. Ethical Issues in War: An Overview Martin L. Cook...185 15. Ethics and War in Comparative Religious Perspective...be guided by values and ethics with the intent of doing some type of good for parts of the international system, or the overall system in general

  2. Career Ladder and Curriculum Guide: Housing Management. Resident Selection and Occupancy Trainee, Resident Security Aide, Resident Security Officer, Security Officer II, Community Security Aide. Instructor's Manual.

    ERIC Educational Resources Information Center

    Allen, Archibald; Hailey, Pleasant L., Jr.

    This instructor's manual contains job analysis and training curriculum for the positions of Resident Selection and Occupancy Trainee, Resident Security Aide, Resident Security Officer, Security Officer II, and Community Security Aide. The two sections of the manual and their parts are as follows: Section I: A Model Curriculum for Resident…

  3. Toward Assessing Attachment on an Emotional Security Continuum: Comment on Fraley and Spieker (2003).

    ERIC Educational Resources Information Center

    Cummings, E. Mark

    2003-01-01

    Advocates renewed efforts toward assessing attachment on a single continuum of emotional security. Contends that theory is essential to guide attachment assessment and that the constructs of secure base and emotional security provide the needed conceptual foundation. Addresses challenges to the scoring of attachment on a security continuum.…

  4. Transboundary natural area protection: Broadening the definition of national security

    Treesearch

    Haven B. Cook

    2007-01-01

    This paper looks at the definition and concept of national security, and examines how the environment is linked with national security. The traditional, state view of national security that guides most foreign policy includes the concepts of military power, sovereignty and geopolitical stability. This paper advocates broadening the definition of security to include...

  5. Security Recommendations for mHealth Apps: Elaboration of a Developer's Guide.

    PubMed

    Morera, Enrique Pérez; de la Torre Díez, Isabel; Garcia-Zapirain, Begoña; López-Coronado, Miguel; Arambarri, Jon

    2016-06-01

    Being the third fastest-growing app category behind games and utilities, mHealth apps are changing the healthcare model, as medicine today involves the data they compile and analyse, information known as Big Data. However, the majority of apps are lacking in security when gathering and dealing with the information, which becomes a serious problem. This article presents a guide regarding security solution, intended to be of great use for developers of mHealth apps. In August 2015 current mobile health apps were sought out in virtual stores such as Android Google Play, Apple iTunes App Store etc., in order to classify them in terms of usefulness. After this search, the most widespread weaknesses in the field of security in the development of these mobile apps were examined, based on sources such as the "OWASP Mobile Security Project, the initiative recently launched by the Office of Civil Rights (OCR), and other articles of scientific interest. An informative, elemental guide has been created for the development of mHealth apps. It includes information about elements of security and its implementation on different levels for all types of mobile health apps based on the data that each app manipulates, the associated calculated risk as a result of the likelihood of occurrence and the threat level resulting from its vulnerabilities - high level (apps for monitoring, diagnosis, treatment and care) from 6 ≤ 9, medium level (calculator, localizer and alarm) from 3 ≤ 6 and low level (informative and educational apps) from 0 ≤ 3. The guide aims to guarantee and facilitate security measures in the development of mobile health applications by programmers unconnected to the ITC and professional health areas.

  6. Pocket guide to transportation, 2004

    DOT National Transportation Integrated Search

    2004-01-01

    The Bureau of Transportation Statistics compiled the data in this guide from multiple sources. The guide is divided into six sections and a glossary: (1) Transportation System Extent and Use, (2) Transportation Safety, (3) Transportation Security, (4...

  7. Pocket guide to transportation, 2005

    DOT National Transportation Integrated Search

    2005-01-01

    The Bureau of Transportation Statistics compiled the data in this guide from multiple sources. The guide is divided into six sections and a glossary: (1) Transportation System Extent and Use, (2) Transportation Safety, (3) Transportation Security, (4...

  8. Pocket guide to transportation, 2003

    DOT National Transportation Integrated Search

    2003-01-01

    The Bureau of Transportation Statistics compiled the data in this guide from multiple sources. The guide is divided into six sections and a glossary: (1) Transportation System Extent and Use, (2) Transportation Safety, (3) Transportation Security, (4...

  9. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...

  10. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...

  11. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...

  12. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...

  13. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...

  14. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...

  15. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Airport tenant security programs. 1542.113 Section... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant...

  16. Nuclear security policy in the context of counter-terrorism in Cambodia

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Khun, Vuthy, E-mail: vuthy.khun@gmail.com; Wongsawaeng, Doonyapong

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the contextmore » of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.« less

  17. Pocket guide to transportation, 2007

    DOT National Transportation Integrated Search

    2007-01-01

    The Bureau of Transportation Statistics compiled the data in this guide from multiple sources. The guide is divided into six sections and a glossary: (1) System Extent and Use, (2) Safety, (3) Security, (4) Mobility, (5) Economy, (6) Environment, and...

  18. Pocket guide to transportation, 2006

    DOT National Transportation Integrated Search

    2006-01-01

    The Bureau of Transportation Statistics compiled the data in this guide from multiple sources. The guide is divided into six sections and a glossary: (1) System Extent and Use, (2) Safety, (3) Security, (4) Mobility, (5) Economy, (6) Environment, and...

  19. Pocket guide to transportation, 2008

    DOT National Transportation Integrated Search

    2008-02-01

    The Bureau of Transportation Statistics compiled the data in this guide from multiple sources. The guide is divided into six sections and a glossary: (1) System Extent and Use, (2) Safety, (3) Security, (4) Mobility, (5) Economy, (6) Environment, and...

  20. Conceptual Architecture for Obtaining Cyber Situational Awareness

    DTIC Science & Technology

    2014-06-01

    1-893723-17-8. [10] SKYBOX SECURITY. Developer´s Guide. Skybox View. Manual.Version 11. 2010. [11] SCALABLE Network. EXata communications...E. Understanding command and control. Washington, D.C.: CCRP Publication Series, 2006. 255 p. ISBN 1-893723-17-8. • [10] SKYBOX SECURITY. Developer...s Guide. Skybox View. Manual.Version 11. 2010. • [11] SCALABLE Network. EXata communications simulation platform. Available: <http://www.scalable

  1. 12 CFR 168.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...

  2. 12 CFR 568.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Security program. 568.3 Section 568.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...

  3. 12 CFR 391.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for business...

  4. 12 CFR 168.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for...

  5. 12 CFR 391.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for business...

  6. Computer and Network Security in Small Libraries: A Guide for Planning.

    ERIC Educational Resources Information Center

    Williams, Robert L.

    This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…

  7. 32 CFR 2700.22 - Classification guides.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY INFORMATION REGULATIONS Derivative Classification § 2700.22 Classification guides. OMSN shall... direct derivative classification, shall identify the information to be protected in specific and uniform...

  8. 17 CFR 200.507 - Declassification dates on derivative documents.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... derivative documents. 200.507 Section 200.507 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... of National Security Information and Material § 200.507 Declassification dates on derivative... derivative document that derives its classification from the approved use of the classification guide of...

  9. State Security Breach Response Laws: State-by-State Summary Table. Using Data to Improve Education: A Legal Reference Guide to Protecting Student Privacy and Data Security

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2011

    2011-01-01

    Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…

  10. National Athletic Trainers' Association-accredited postprofessional athletic training education: attractors and career intentions.

    PubMed

    Mazerolle, Stephanie M; Dodge, Thomas M

    2012-01-01

    Anecdotally, we know that students select graduate programs based on location, finances, and future career goals. Empirically, however, we lack information on what attracts a student to these programs. To gain an appreciation for the selection process of graduate study. Qualitative study. Postprofessional programs in athletic training (PPATs) accredited by the National Athletic Trainers' Association. A total of 19 first-year PPAT students participated, representing 13 of the 16 accredited PPAT programs. All interviews were conducted via phone and transcribed verbatim. Analysis of the interview data followed the procedures as outlined by a grounded theory approach. Trustworthiness was secured by (1) participant checks, (2) participant verification, and (3) multiple analyst triangulations. Athletic training students select PPAT programs for 4 major reasons: reputation of the program or faculty (or both), career intentions, professional socialization, and mentorship from undergraduate faculty or clinical instructors (or both). Participants discussed long-term professional goals as the driving force behind wanting an advanced degree in athletic training. Faculty and clinical instructor recommendations and the program's prestige helped guide the decisions. Participants also expressed the need to gain more experience, which promoted autonomy, and support while gaining that work experience. Final selection of the PPAT program was based on academic offerings, the assistantship offered (including financial support), advanced knowledge of athletic training concepts and principles, and apprenticeship opportunities. Students who attend PPAT programs are attracted to advancing their entry-level knowledge, are committed to their professional development as athletic trainers, and view the profession of athletic training as a life-long career. The combination of balanced academics, clinical experiences, and additional professional socialization and mentorship from the PPAT program experience will help them to secure their desired career positions.

  11. 75 FR 18872 - Ginnie Mae Multiclass Securities Program Documents

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... Securities Program Documents AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice. SUMMARY... with the Multiclass Securities Program. The intent of the Multiclass Securities program is to increase... Securities Program Documents. OMB Approval Number: 2503-0030. Form Numbers: None. Description of the Need for...

  12. 12 CFR 748.0 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security program...

  13. 12 CFR 748.0 - Security program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security program...

  14. Information Security Assessment of SMEs as Coursework -- Learning Information Security Management by Doing

    ERIC Educational Resources Information Center

    Ilvonen, Ilona

    2013-01-01

    Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…

  15. 49 CFR 1546.103 - Form, content, and availability of security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Form, content, and availability of security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a...

  16. 49 CFR 1546.103 - Form, content, and availability of security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Form, content, and availability of security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a...

  17. Small Nations in Multinational Operations and Armenian Perspectives

    DTIC Science & Technology

    2014-12-12

    National Security Powers: Are the Checks in Balance?” In U.S. Army War College Guide to National Security Issues, Volume II: National Security Policy and...SMALL NATIONS IN MULTINATIONAL OPERATIONS AND ARMENIAN PERSPECTIVES A thesis presented to the Faculty of the U.S. Army

  18. Managing personal health information in distributed research network environments.

    PubMed

    Bredfeldt, Christine E; Butani, Amy L; Pardee, Roy; Hitz, Paul; Padmanabhan, Sandy; Saylor, Gwyn

    2013-10-08

    Studying rare outcomes, new interventions and diverse populations often requires collaborations across multiple health research partners. However, transferring healthcare research data from one institution to another can increase the risk of data privacy and security breaches. A working group of multi-site research programmers evaluated the need for tools to support data security and data privacy. The group determined that data privacy support tools should: 1) allow for a range of allowable Protected Health Information (PHI); 2) clearly identify what type of data should be protected under the Health Insurance Portability and Accountability Act (HIPAA); and 3) help analysts identify which protected health information data elements are allowable in a given project and how they should be protected during data transfer. Based on these requirements we developed two performance support tools to support data programmers and site analysts in exchanging research data. The first tool, a workplan template, guides the lead programmer through effectively communicating the details of multi-site programming, including how to run the program, what output the program will create, and whether the output is expected to contain protected health information. The second performance support tool is a checklist that site analysts can use to ensure that multi-site program output conforms to expectations and does not contain protected health information beyond what is allowed under the multi-site research agreements. Together the two tools create a formal multi-site programming workflow designed to reduce the chance of accidental PHI disclosure.

  19. 20 CFR 416.975 - Evaluation guides if you are self-employed.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... 416.975 Section 416.975 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... capital investment and profit-sharing agreements. We will generally consider work that you were forced to... given social security earnings credits because you materially participated in the activities of the farm...

  20. Information Security: A Scientometric Study of the Profile, Structure, and Dynamics of an Emerging Scholarly Specialty

    ERIC Educational Resources Information Center

    Olijnyk, Nicholas Victor

    2014-01-01

    The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…

  1. Author-Editor Guide to Technical Publications Preparation. Revision

    DTIC Science & Technology

    1990-01-01

    meteorology, climatology, military technical publications. ( ") <- 15: Number of Pages: 68 17. Security Classification of Report: Unclassified 1... Security Classification of this Page: Unclassified 19. Security Classification of Abstract: Unclassified 20. Limitation of Abstract: UL Standard Form 298...34 There are, however, February 1983. numerous exceptions. Although some technical material may not be classified in accordance with security AFR 83-2, Air

  2. 49 CFR 1548.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...

  3. 49 CFR 1548.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...

  4. 49 CFR 1548.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...

  5. 49 CFR 1548.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... carrier having a security program must: (1) Maintain an original of the security program at its corporate... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR...

  6. Building Security. Honeywell Planning Guide.

    ERIC Educational Resources Information Center

    Honeywell, Inc., Minneapolis, Minn.

    A general discussion of building detection and alarm systems to provide security against burglary and vandalism is provided by a manufacturer of automated monitoring and control systems. Security systems are identified as--(1) local alarm system, (2) central station alarm system, (3) proprietary alarm system, and (4) direct connect alarm system..…

  7. Regulatory Guide on Conducting a Security Vulnerability Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ek, David R.

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  8. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  9. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1987-12-31

    This report also provides data on the initiatives being implemented as a result of the review of domestic airport security by the Secretary’s Safety...enforcement support for airline and airport security measures. Finally, the passengers-the ultimate beneficiaries of the security program--pay for...of these airports is required to implement a security program which provides a secure operating environment for these air carriers. Airport security programs

  10. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1979-12-05

    The airline and airport security measures currently in effect continue to provide increased safety for airline passengers and crews as well as...107 governing airport security . other ongoing programs which contributed significantly to airport security included the training of law enforce- ment...officers supporting airport security programs and the explosives detection K(9 team program. Highlights of these actions and programs are summarized

  11. Swimming Pools. Managing School Facilities, Guide 2.

    ERIC Educational Resources Information Center

    Department for Education and Employment, London (England). Architects and Building Branch.

    This guide for schools with swimming pools offers advice concerning appropriate training for pool managers, the importance of water quality and testing, safety in the handling of chemicals, maintenance and cleaning requirements, pool security, and health concerns. The guide covers both indoor and outdoor pools, explains some technical terms,…

  12. 49 CFR 1542.111 - Exclusive area agreements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...

  13. 49 CFR 1542.111 - Exclusive area agreements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...

  14. 49 CFR 1542.111 - Exclusive area agreements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...

  15. 49 CFR 1542.111 - Exclusive area agreements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...

  16. 49 CFR 1542.111 - Exclusive area agreements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.111 Exclusive area agreements. (a) TSA may approve an amendment to an airport security program... aircraft operator or foreign air carrier, and maintained in the airport security program. This agreement...

  17. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the Security...

  18. Strategies to Minimize the Effects of Information Security Threats on Business Performance

    ERIC Educational Resources Information Center

    Okoye, Stella Ifeyinwa

    2017-01-01

    Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…

  19. A First Step Towards Network Security Virtualization: From Concept to Prototype

    DTIC Science & Technology

    2015-10-01

    ec2 security groups. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network- security.html. [3] Jeffrey R. Ballard, Ian Rae, and Aditya...20] Matthew L. Meola Michael J. Freedman Jennifer Rexford Nate Foster, Rob Harrison and David Walker. Frenetic: A High-Level Langauge for OpenFlow

  20. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  1. The Continuing Umbrella of Research Experiences (CURE): a model for training underserved scientists in cancer research.

    PubMed

    Franco, Idalid; Bailey, LeeAnn O; Bakos, Alexis D; Springfield, Sanya A

    2011-03-01

    Mentoring is a critical aspect of research and training; and the adoption of a successful mentoring model for guiding researchers through the educational pipeline is lacking. The Continuing Umbrella of Research Experiences (CURE) program was established in the Comprehensive Minority Biomedical Branch; which is part of the National Cancer Institute. This program offers unique training and career development opportunities to enhance diversity in cancer research. The CURE initiative focuses on broadening the cadre of underserved investigators engaging in cancer research. CURE begins with high school students and fosters scientific, academic and research excellence throughout the trainee's educational progression. The program supports students throughout the entirety of their training career. During this period, the trainee matures into a competitive early stage investigator; capable of securing advanced research project funding in academic and industry workforces. Thus, the CURE program provides a comprehensive vehicle for training and reinforces the critical mass of underserved investigators conducting cancer research.

  2. 5 CFR 1312.12 - Security Program Review Committee.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Security Program Review Committee. 1312...

  3. 5 CFR 1312.12 - Security Program Review Committee.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security Program Review Committee. 1312...

  4. Internet-based treatment for Romanian adults with panic disorder: protocol of a randomized controlled trial comparing a Skype-guided with an unguided self-help intervention (the PAXPD study).

    PubMed

    Ciuca, Amalia Maria; Berger, Thomas; Crişan, Liviu George; Miclea, Mircea

    2016-01-14

    Efficacy of self-help internet-based cognitive behavior therapy (ICBT) for anxiety disorders has been confirmed in several randomized controlled trials. However, the amount and type of therapist guidance needed in ICBT are still under debate. Previous studies have shown divergent results regarding the role of therapist guidance and its impact on treatment outcome. This issue is central to the development of ICBT programs and needs to be addressed directly. The present study aims to compare the benefits of regular therapist guidance via online real-time audio-video communication (i.e. Skype) to no therapist guidance during a 12-week Romanian self-help ICBT program for Panic Disorder. Both treatments are compared to a waiting-list control group. A parallel group randomized controlled trial is proposed. The participants, 192 Romanian adults fulfilling diagnostic criteria for panic disorder according to a diagnostic interview, conducted via secured Skype or telephone, are randomly assigned to one of the three conditions: independent use of the internet-based self-help program PAXonline, the same self-help treatment with regular therapist support via secured Skype, and waiting-list control group. The primary outcomes are severity of self-report panic symptoms (PDSS-SR) and diagnostic status (assessors are blind to group assignment), at the end of the intervention (12 weeks) and at follow-up (months 3 and 6). The secondary measures address symptoms of comorbid anxiety disorders, depression, quality of life, adherence and satisfaction with ICBT. Additional measures of socio-demographic characteristics, personality traits, treatment expectancies, catastrophic cognitions, body vigilance and working alliance are considered as potential moderators and/ or mediators of treatment outcome. To the best of our knowledge, the present study is the first effort to investigate the efficacy of a self-help internet-based intervention with therapist guidance via real-time video communication. A direct comparison between therapist guided versus unguided self-directed intervention for panic disorder will also be addressed for the first time. Findings from this study will inform researchers and practitioners about the added value of online video-therapy guidance sessions and the type of patients who may benefit the most from guided and unguided ICBT for Panic disorder. ACTRN12614000547640 (Australian New Zealand Clinical Trials Registry). Registered 22/05/2014.

  5. Health for all: a public health vision.

    PubMed

    McBeath, W H

    1991-12-01

    The approach of a millennial passage invites public health to a review of past performance and a preview of future prospects toward assuring a healthy public. Since the 1974 Canadian Lalonde report, the best national plans for health progress have emphasized disease prevention and health promotion. WHO's multinational Health for All by the Year 2000 promotes basic health services essential to leading a socially and economically productive life. Healthy People 2000, the latest US guide, establishes three goals: increase healthy life span, reduce health disparities, and achieve universal access to preventive services. Its objectives can be used to excite public understanding, equip program development, evaluate progress, and encourage public accountability for health initiatives. Needed is federal leadership in defining requisite action and securing necessary resources. Elsewhere a "new public health" emphasizes community life-style and multisectoral "healthy public policy." In the United States, a national health program is needed to achieve equity in access to personal health care. Even more essential is equitable sharing in basic health determinants in society--nutritious food, basic education, safe water, decent housing, secure employment, adequate income, and peace. Vital to such a future is able and active leadership now from governments and public health professionals.

  6. Health for all: a public health vision.

    PubMed Central

    McBeath, W H

    1991-01-01

    The approach of a millennial passage invites public health to a review of past performance and a preview of future prospects toward assuring a healthy public. Since the 1974 Canadian Lalonde report, the best national plans for health progress have emphasized disease prevention and health promotion. WHO's multinational Health for All by the Year 2000 promotes basic health services essential to leading a socially and economically productive life. Healthy People 2000, the latest US guide, establishes three goals: increase healthy life span, reduce health disparities, and achieve universal access to preventive services. Its objectives can be used to excite public understanding, equip program development, evaluate progress, and encourage public accountability for health initiatives. Needed is federal leadership in defining requisite action and securing necessary resources. Elsewhere a "new public health" emphasizes community life-style and multisectoral "healthy public policy." In the United States, a national health program is needed to achieve equity in access to personal health care. Even more essential is equitable sharing in basic health determinants in society--nutritious food, basic education, safe water, decent housing, secure employment, adequate income, and peace. Vital to such a future is able and active leadership now from governments and public health professionals. PMID:1746649

  7. 46 CFR 154.1435 - Medical first aid guide.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Medical first aid guide. 154.1435 Section 154.1435 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY... Equipment § 154.1435 Medical first aid guide. Each vessel must have a copy of the IMO Medical First Aid...

  8. Software Assurance in Acquisition: Mitigating Risks to the Enterprise. A Reference Guide for Security-Enhanced Software Acquisition and Outsourcing

    DTIC Science & Technology

    2009-02-01

    management, available at <http://www.iso.org/ iso /en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=39612&ICS1=35&ICS2=40 &ICS3=>. ISO /IEC 27001 . Information...Management of the Systems Engineering Process. [ ISO /IEC 27001 ] ISO /IEC 27001 :2005. Information technology -- Security techniques -- Information security...software life cycles [ ISO /IEC 15026]. Software assurance is a key element of national security and homeland security. It is critical because dramatic

  9. 7 CFR 772.6 - Subordination of security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.6 Subordination of security. (a) Eligibility. The Agency shall grant a subordination of Minor Program loan security when the transaction will... still be adequately secured after the subordination, or the value of the loan security will be increased...

  10. Florida public transportation anti-terrorism resource guide

    DOT National Transportation Integrated Search

    2001-10-01

    The Center for Urban Transportation (CUTR) at the University of South Florida (USF) assembled this guide to provide public transit agencies in Florida with information on current resources available to assist them with improving system security and g...

  11. Tailoring ISO/IEC 27001 for SMEs: A Guide to Implement an Information Security Management System in Small Settings

    NASA Astrophysics Data System (ADS)

    Valdevit, Thierry; Mayer, Nicolas; Barafort, Béatrix

    While Information Security Management Systems (ISMS) are being adopted by the biggest IT companies, it remains quite difficult for smaller entities to implement and maintain all the requirements of ISO/IEC 27001. In order to increase information security in Luxembourg, the Public Research Centre Henri Tudor has been charged by the Luxembourg Ministry of Economy and Foreign Trade to find solutions to facilitate ISMS deployment for SMEs. After an initial experiment aiming at assisting a SME in getting the first national ISO/IEC 27001 certification for a private company, an implementation guide for deploying an ISMS, validated by local experts and experimented in SMEs, has been released and is presented in this paper.

  12. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures for...

  13. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-04-21

    6 Intercity Passenger Rail Program (Amtrak) .....................................................................6... Intercity Bus Security Grant Program..............................................................................7 Trucking Security Program...continue security enhancements for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency

  14. 76 FR 9041 - Intent To Request Approval From OMB of One New Public Collection of Information: Security Program...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-16

    ... measure their effectiveness. Through its voluntary Corporate Security Review (CSR) Program, TSA's Highway... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Approval From OMB of One New Public Collection of Information: Security Program for Hazardous Materials Motor...

  15. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada.

    PubMed

    Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man

    2014-01-01

    Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. A qualitative study using group discussions during a workshop. A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. The results of the planning workshop provide a blueprint for future research and intervention projects.

  16. Guiding resource allocations based on terrorism risk.

    PubMed

    Willis, Henry H

    2007-06-01

    Establishing tolerable levels of risk is one of the most contentious and important risk management decisions. With every regulatory or funding decision for a risk management program, society decides whether or not risk is tolerable. The Urban Area Security Initiative (UASI) is a Department of Homeland Security (DHS) grant program designed to enhance security and overall preparedness to prevent, respond to, and recover from acts of terrorism by providing financial assistance for planning, equipment, training, and exercise needs of large urban areas. After briefly reviewing definitions of terrorism risk and rationales for risk-based resource allocation, this article compares estimates of terrorism risk in urban areas that received UASI funding in 2004 to other federal risk management decisions. This comparison suggests that UASI allocations are generally consistent with other federal risk management decisions. However, terrorism risk in several cities that received funding is below levels that are often tolerated in other risk management contexts. There are several reasons why the conclusions about terrorism risk being de minimis in specific cities should be challenged. Some of these surround the means used to estimate terrorism risk for this study. Others involve the comparison that is made to other risk management decisions. However, many of the observations reported are valid even if reported terrorism risk estimates are several orders of magnitude too low. Discussion of resource allocation should be extended to address risk tolerance and include explicit comparisons, like those presented here, to other risk management decisions.

  17. [Development of a Tool for Training and Evaluation of the Competencies in Occupational Mental Health Necessary for Labor and Social Security Attorneys].

    PubMed

    Morimoto, Hideki; Shibata, Yoshiyuki; Kayashima, Kotaro; Motoyama, Kyoko; Wakabayashi, Tadashi; Horasawa, Ken; Maruta, Wakako; Ogasawara, Takayuki; Nishikido, Noriko; Oyama, Yuji; Toyoda, Hiroyuki; Mori, Ayaka; Mori, Koji

    2016-06-01

    Labor and Social Security Attorneys (LSSAs) advise their clients about occupational mental health, but the competencies necessary in this field are not clear to them. We standardized the necessary competencies as a counseling guide for LSSAs, and we also designed a related discussion training program. These competencies were summarized in a brainstorming session at a research conference comprised of physicians, an occupational health nurse, LSSAs, an instructional design expert, and a management consultant, and then a training program (lasting 9 hours 30 minutes) was developed. Nineteen trainees who were introduced by members of the research conference collectively completed a seven-question written test, both before and after the training, in order to assess its effectiveness. Sixteen trainees who completed the training were surveyed, with a recovery rate of 100%. The necessary competencies that they identified were: information about circular notices from the Ministry of Health, Labor and Welfare; behavior such as the gathering of information; and dealing with the reinstatement of employees. The scores were subjected to the Wilcoxon signed-rank test in order to evaluate the training, and the answers from the pre-training were compared with those from the post-training. A significant difference (P < 0.05) was seen for each question. These results show the effectiveness of the developed training program for the learning of the competencies necessary for LSSAs.

  18. Using the theoretical domains framework to guide the development of a self-management program for individuals with spinal cord injury: Results from a national stakeholder advisory group.

    PubMed

    Munce, Sarah E P; Allin, Sonya; Wolfe, Dalton L; Anzai, Karen; Linassi, Gary; Noonan, Vanessa K; Jaglal, Susan B

    2017-11-01

    To determine the implementation considerations for a targeted self-management program for individuals with spinal cord injury (SCI) from the perspective of a national stakeholder advisory group using the Theoretical Domains Framework (TDF) as a guide. Qualitative descriptive approach. Two focus groups held at the 6 th National Spinal Cord Injury Conference (October 2-4 th , 2014) in Toronto, Ontario, Canada. A total of 25 stakeholders from across Canada participated in focus groups or "brainstorming sessions". The stakeholders included 5 clinicians, 14 researchers, 3 policy makers, and 3 individuals with SCI. Not applicable. Not applicable. All 14 theoretical domains were identified in the brainstorming sessions. No new themes or domains were identified. The need to consider the theoretical domains of Knowledge, Skills, Reinforcement, Intentions, Goals (e.g. the readiness of the individual with SCI), Environmental Context and Resources (e.g. considerations for governance and ownership of the program and a business model for sustainability), as well as Social Influences (e.g. issues of privacy and security in the context of on-line delivery) was identified. The current study provides complementary results to our previous series of studies on the implementation considerations for the development of a targeted self-management program for individuals with SCI by emphasizing the health care professional/health policy perspective. It is anticipated that such a program could not only reduce secondary complications and subsequent inappropriate health care use but it may also improve the quality of life for individuals with SCI and their caregivers.

  19. A Citizen's Guide to U.S. Foreign Policy: Election '88. Nonpartisan Briefs on 18 Key Issues.

    ERIC Educational Resources Information Center

    Hoepli, Nancy, Ed.; And Others

    In order to make informed voting decisions citizens need background information on complex foreign policy issues facing the United States. This guide presents current issues and provides information to help citizens cast a thoughtful vote. The guide is divided into six main headings: Leadership; Security; Economic and Social Issues; Critical…

  20. Secrets of Successful Grantsmanship: A Guerrilla Guide to Raising Money. The Jossey-Bass Nonprofit Sector Series.

    ERIC Educational Resources Information Center

    Golden, Susan L.

    Based on the "simple truth" that people, not proposals, secure grants, this guide argues that grantseekers need to go well beyond strong ideas and "beautifully written" proposals. The guide provides fundraisers with the grantsmanship skills they need to navigate the grantmaking process: from avoiding common pitfalls such as…

  1. Reviewing a Reading Program: Professional Development Module. Facilitator's Guide

    ERIC Educational Resources Information Center

    Kosanovich, Marcia; Jordan, Georgia; Arndt, Elissa; VanSciver, Mary; Wahl, Michelle; Rissman, Lila

    2008-01-01

    This "Facilitator's Guide" has been prepared for presenters of the Reviewing a Reading Program professional development training. It is one of three pieces comprising a suite of materials on reviewing reading programs: this "Guide", the "Reviewing a Reading Program Participant's Guide" and the "Reviewing a Reading Program" Professional Development…

  2. 75 FR 65365 - Disaster Temporary Housing Operational Guide

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-22

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2010-0062] Disaster Temporary Housing Operational Guide AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice of availability; request for comments. SUMMARY: The Federal Emergency Management Agency (FEMA) is...

  3. Environmental sampling plan for Kwajalein Atoll Lagoon: 2017 Kwajalein sampling event

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamilton, T. F.

    2017-07-01

    Since the early 1980s, the U.S DOE Marshall Islands Program at LLNL has provided radiological monitoring of the marine and terrestrial environment at nuclear affected atolls in the northern Marshall Islands. The fundamental aim of these studies was to identify the level and distribution of key residual fallout radionuclide in the environment, improve understanding of prevalent radiation exposure pathways, and develop predictive dose assessments for resettled and resettling atoll population groups. These data and information were essential in terms of guiding the development of effective and environmentally protective remedial measures, and promoting potential actions to improve on food safety andmore » security.« less

  4. The role of optics in secure credentials

    NASA Astrophysics Data System (ADS)

    Lichtenstein, Terri L.

    2006-02-01

    The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.

  5. Metal Fabrication. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This guide identifies considerations in the organization, operation, and evaluation of secondary and postsecondary vocational education programs. It contains both a vocational program guide and Career Merit Achievement Plan (Career MAP) for metal fabrication. The guide contains the following sections: occupational description; program content…

  6. Reclaiming food security in the Mohawk community of Kahnawà:ke through Haudenosaunee responsibilities.

    PubMed

    Delormier, Treena; Horn-Miller, Kahente; McComber, Alex M; Marquis, Kaylia

    2017-11-01

    Indigenous Peoples are reclaiming their food security, nutrition, and well-being by revitalizing food systems, livelihoods, knowledge-systems, and governance. Our food security research is guided by sustainable self-determination that focuses on restoring Indigenous cultural responsibilities and relationships to land, each other, and the natural world (Corntassel, 2008). Our Kanien'kehá:ka (Mohawk) research team from Kahnawà:ke, in Quebec, Canada, examines food insecurity experiences in our community to explore ways of upholding our Haudenosaunee responsibilities and enhancing local food security. We collaboratively designed the study and interviewed Kahnawakehró:non (people from the Kahnawake community) with traditional knowledge, extensive community experience, and interests in food and culture. Interviews were audio-recorded, transcribed, and analysed by the team. Analysis characterized food insecurity experiences and conditions that challenge and enable food security with attention to traditional food systems, relationships to land, and gender-related responsibilities. Findings show that communal responsibilities generate resilient strategies that provide for all in times of crisis, and long-term food insecurity is managed through social programs, organized charities, and family support. Enhancing food security involves healing and protecting a limited land-base for food production, integrating food production with community priorities for education, training, health, economic development, and scientific innovation. Nurturing spiritual connections with tionhnhéhkwen (life sustaining foods), the natural world, and each other calls for accelerated teaching and practicing our original instructions. Challenges in developing food security leadership, balancing capitalism and subsistence economies, and strengthening social relationships are rooted in the historical colonial and current settler-colonial context that disrupts all aspects of Kanien'kehá:ka society. © 2018 John Wiley & Sons Ltd.

  7. TCP/IP Implementations and Vendors Guide,

    DTIC Science & Technology

    1986-02-01

    DOCUMENTATION PAGE la. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/ AVAILABILIT OF...UNIX System V (5.2) IMPLEMENTATION-LANGUAGE: C DISTRIBUTOR: UNIQ Digital Technologies 28 S. Water St. Batavia, fI1 60510 (312) 879-1008 CONTACT

  8. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  9. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  10. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1984-04-13

    AD-fl143 023 SEMIANNUAL REPORT TO CONGRESS ON THEUEFFECTIVENESS OF i/i THE CIVIL AVIATION SECURITY PROGRAM(U) FEDERAL AVIATION ADMINISTRATION...Semiannual Report to O Congress on the US Deportmnent of TrasEffectiveness ofi of TransportationFedewl Avkffim Avao The Civil Aviation - Security Program... Aviation Security Program 8. Performing OrgniaetioNi RePwt Us. Aviation Security Division 9. Performing Organistion Name and Address 10. Work Unit No

  11. Implantation of active fixation leads in coronary veins for left ventricular stimulation: report of five cases.

    PubMed

    Hansky, Bert; Vogt, Juergen; Gueldner, Holger; Schulte-Eistrup, Sebastian; Lamp, Barbara; Heintze, Johannes; Horstkotte, Dieter; Koerfer, Reiner

    2007-01-01

    Securing transvenous left ventricular (LV) pacing leads without an active fixation mechanism in proximal coronary vein (CV) segments is usually challenging and frequently impossible. We investigated how active fixation leads can be safely implanted in this location, how to avoid perforating the free wall of the CV, and how to recognize and respond to perforations. In five patients with no alternative to LV pacing from proximal CV segments, 4 Fr SelectSecure (Medtronic, Minneapolis, MN, USA) leads, which have a fixed helix, were implanted through a modified 6 Fr guide catheter with a pre-shaped tip (Launcher, Medtronic). Active fixation leads were successfully implanted in proximal CVs in five patients. There were no complications. Acute and chronic pacing thresholds were comparable to those of conventional CV leads. The pre-shaped guide catheter tip remains in close proximity to the myocardial aspect of the CV, directing the lead helix toward a safe implantation site. If only proximal CV pacing sites are available, 4 Fr SelectSecure leads can be safely implanted through a modified Launcher guide catheter, avoiding more invasive implantation techniques. Other than venous stenting or implantation of leads with retractable tines, SelectSecure leads are expected to remain extractable.

  12. Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)

    DTIC Science & Technology

    2012-05-01

    protect, and secure the United States and its interests. • AOF is the United States, Alaska, Canada, Mexico, Bahamas, Puerto Rico , and the U.S. Virgin...Criteria (UFC) for Smart Microgrid Cyber design guides for Industrial Control Systems (ICS) Residual systems Operations and Maintenance Operator...Training Sustainment Commercial Transition Cooperation with NIST for microgrid security standards Working with industry associations and

  13. 49 CFR 1542.105 - Approval and amendments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...

  14. 49 CFR 1542.105 - Approval and amendments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...

  15. 49 CFR 1542.105 - Approval and amendments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...

  16. 49 CFR 1542.105 - Approval and amendments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...

  17. 49 CFR 1542.105 - Approval and amendments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...

  18. Program Resource Guide.

    ERIC Educational Resources Information Center

    National School Resource Network, Washington, DC.

    This program resource guide is a compilation of all programs and projects on preventing school violence and vandalism referenced in National School Resource Network (NSRN) materials. The programs cited are described in NSRN trainers' guides, participant guides, technical assistance bulletins, an "Aha" listing, and a compendium. The index is…

  19. Annual Income Tax Guide.

    ERIC Educational Resources Information Center

    Keener, Sandra C.

    1992-01-01

    This annual guide to income tax for parents of children with disabilities covers organizing records; avoiding audits; deducting medical expenses; and considering the impact of recent changes in medical expenses, Social Security numbers for children, child care, earned income credit, and deduction for dependents. (DB)

  20. 32 CFR 322.1 - Purpose and applicability.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...

  1. 32 CFR 322.1 - Purpose and applicability.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...

  2. 32 CFR 322.1 - Purpose and applicability.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...

  3. 32 CFR 322.1 - Purpose and applicability.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...

  4. 32 CFR 322.1 - Purpose and applicability.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.1 Purpose and... of Defense Privacy Program (32 CFR part 310) within the National Security Agency/Central Security...

  5. Case study: adapting the IAHSS curriculum in Thailand.

    PubMed

    Goss, Richard J

    2009-01-01

    In late 2007 Corporate Protective Solutions (CPS), headquartered in Langley, B.C. Canada, an independent security consulting company that specialises in healthcare security, approached the IAHSS concerning the adaptation of the Basic Training Manual and Study Guide for Healthcare Security Officers for one of their clients. In this article, its managing director for Asia Pacific outlines the challenges of this project from which other international healthcare security managers can learn to replicate the process for their own facilities.

  6. Hospitality Management. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    Florida State Univ., Tallahassee. Center for Instructional Development and Services.

    This program guide is intended for the implementation of a hospitality management program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, describes jobs under the program, and includes a curriculum framework and student performance standards for…

  7. Developing Renewable Energy Projects Larger Than 10 MWs at Federal Facilities (Book)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2013-03-01

    To accomplish Federal goals for renewable energy, sustainability, and energy security, large-scale renewable energy projects must be developed and constructed on Federal sites at a significant scale with significant private investment. The U.S. Department of Energy's Federal Energy Management Program (FEMP) helps Federal agencies meet these goals and assists agency personnel navigate the complexities of developing such projects and attract the necessary private capital to complete them. This guide is intended to provide a general resource that will begin to develop the Federal employee's awareness and understanding of the project developer's operating environment and the private sector's awareness and understandingmore » of the Federal environment. Because the vast majority of the investment that is required to meet the goals for large-scale renewable energy projects will come from the private sector, this guide has been organized to match Federal processes with typical phases of commercial project development. The main purpose of this guide is to provide a project development framework to allow the Federal Government, private developers, and investors to work in a coordinated fashion on large-scale renewable energy projects. The framework includes key elements that describe a successful, financially attractive large-scale renewable energy project.« less

  8. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2010-04-30

    5 Intercity Bus Security Grant Program...eligibility.22 This grant program includes funding for the Freight Rail Security Grant Program (FRSGP), and the Intercity Passenger Rail Program (IPR...eligible to receive funding to continue security enhancements for its intercity rail services between high-risk urban areas. 21 U.S. Department of

  9. Security Assistance Dependence - Wielding American Power

    DTIC Science & Technology

    2002-12-09

    national security objectives. One vehicle of this power brokering is the well-developed international security assistance program – oftentimes...incorrectly referred to exclusively as foreign military sales. There is nothing simple about the security assistance program as it has developed today...For the USG, there are many agencies influencing today’s security assistance program to execute complex, integrated tasks directly impacting U.S

  10. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  11. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  12. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  13. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  14. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  15. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  16. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  17. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  18. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  19. 12 CFR 21.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...

  20. 12 CFR 21.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...

  1. 7 CFR 772.5 - Security maintenance.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security maintenance. 772.5 Section 772.5 Agriculture... SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.5 Security maintenance. (a) General. Borrowers are responsible for maintaining the collateral that is serving as security for their Minor Program loan in...

  2. 12 CFR 21.3 - Security program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...

  3. 7 CFR 772.5 - Security maintenance.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Security maintenance. 772.5 Section 772.5 Agriculture... SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.5 Security maintenance. (a) General. Borrowers are responsible for maintaining the collateral that is serving as security for their Minor Program loan in...

  4. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1980-05-22

    SECURITY. - CONTINUED TRAINING OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. - SECURITY PROGRAMS IMPLEMENTED BY AIR FREIGHT...cooperation by all concerned. (See Exhibit 14) Airport Security - Ongoing activities which contributed significantly to airport security included full...implementation of the revised Federal Aviation Regulations (FAR) Part 107 governing airport security , training of law enforcement officers supporting

  5. Basic Gasoline Engine Mechanics. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This packet contains a program guide and Career Merit Achievement Plan (Career MAP) for the implementation of a basic gasoline engine mechanics program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, lists job titles under the program, and includes a…

  6. Consumer Electronic Product Servicing. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This packet contains a program guide and Career Merit Achievement Plan (Career MAP) for the implementation of a consumer electronic product servicing program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, lists job titles under the program, and includes…

  7. Computer Integrated Manufacturing. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This packet contains a program guide and Career Merit Achievement Plan (Career MAP) for the implementation of a computer-integrated manufacturing program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, lists job titles under the program, and includes a…

  8. Computer Engineering Technology. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This packet contains a program guide and Career Merit Achievement Plan (Career MAP) for the implementation of a computer engineering technology program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, lists job titles under the program, and includes a…

  9. Communication Electronics. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This packet contains a program guide and Career Merit Achievement Plan (Career MAP) for the implementation of a communication electronics (communications technician) program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, lists job titles under the…

  10. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...

  11. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...

  12. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...

  13. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...

  14. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2012-10-01 2012-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...

  15. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...

  16. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-06-08

    Security Grant Program ...............................................................................6 Intercity Passenger Rail Program (Amtrak...6 Intercity Bus Security Grant Program...fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services between high-risk

  17. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-08-05

    Freight Rail Security Grant Program ...............................................................................6 Intercity Passenger Rail Program...Amtrak) .....................................................................6 Intercity Bus Security Grant Program...overview- fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services

  18. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...

  19. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...

  20. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...

  1. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...

  2. 78 FR 45452 - Mailing of Tickets Under the Ticket To Work Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-29

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 411 [Docket No. SSA-2011-0034] RIN 0960-AH34 Mailing of Tickets Under the Ticket To Work Program AGENCY: Social Security Administration. ACTION: Final rule..., Office of Employment Support Programs, Social Security Administration, 6401 Security Boulevard, Baltimore...

  3. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  4. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  5. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  6. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  7. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  8. Conflict in Context: Understanding Local to Global Security.

    ERIC Educational Resources Information Center

    Mertz, Gayle; Lieber, Carol Miller

    This multidisciplinary guide provides middle and high school teachers and students with inquiry-based tools to support their exploration of emerging local, national, international, and transboundary security issues. Students are introduced to critical thinking, problem solving, and peacemaking strategies that will help them better understand…

  9. What is Security? A perspective on achieving security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Atencio, Julian J.

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  10. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    ERIC Educational Resources Information Center

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  11. Federal Funding for Health Security in FY2018.

    PubMed

    Watson, Crystal; Watson, Matthew; Kirk Sell, Tara

    This article is the latest in an annual series analyzing federal funding for health security programs. It examines proposed funding in the President's Budget Request for FY2018 and provides updated amounts for FY2017 and actual funding for FY2010 through FY2016. The proposed FY2018 budget for health security-related programs represents a significant decrease in funding from prior years and previous administrations. In total, the President's proposed FY2018 budget includes $12.45 billion for health security-related programs, an estimated decrease in funding of $1.25 billion, or 9%, from the estimated $13.71 billion in FY2017 and an 11% decrease from the FY2016 actual funding level of $13.99 billion. Most FY2018 health security funding ($6.67 billion, 54%) would go to programs with multiple-hazard and preparedness goals and missions, representing a 14% decrease in this funding compared to FY2017. Radiological and nuclear security programs would receive 20% ($2.48 billion) of all health security funding, a slight decrease of 2% from the prior year. Biosecurity programs would be funded at $1.53 billion (12% of health security funding) in FY2018, a decrease of 6% compared to FY2017. Chemical security programs would represent 3% ($389.7 million) of all health security funding in FY2018, a 9% decrease from the prior year. Finally, 11% of health security funding ($1.39 billion) would be dedicated to pandemic influenza and emerging infectious diseases programs, the only category of funding to see an increase (3%) above FY2017.

  12. Computer Electronics. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This packet contains a program guide and Career Merit Achievement Plan (Career MAP) for the implementation of a computer electronics technology (computer service technician) program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, lists job titles under…

  13. Basic Commercial Art. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This document includes a vocational program guide and Career Merit Achievement Plan (Career MAP) for secondary and postsecondary basic commercial art programs. The guide contains the following sections: occupational description; program content (curriculum framework and student performance standards); program implementation (student admission…

  14. Gyrotropic Guiding-Center Fluid Theory for Turbulent Inhomogeneous Magnetized Plasma

    DTIC Science & Technology

    2006-01-01

    this paper, a new fluid theory is given in the guiding-center and gyrotropic approximation which is derivable from the Vlasov-Maxwell equations . The... equations can be solved (1) by using measurements of the low-order velocity moments to specify the initial and boundary conditions. 15. SUBJECT TERMS...Vlasov-Maxwell equations Fokker-Planck operator guiding-center Inhomogeneous, gyrotropic, magnetized plasma 16. SECURITY CLASSIFICATION OF: 17

  15. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  16. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  17. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National... Information Security Oversight Office no later than Friday, March 16, 2012. The Information Security Oversight... FURTHER INFORMATION CONTACT: David O. Best, Senior Program Analyst, The Information Security Oversight...

  18. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 11...

  19. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...

  20. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-09

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...

  1. Innovative Quality-Assurance Strategies for Tuberculosis Surveillance in the United States

    PubMed Central

    Manangan, Lilia Ponce; Tryon, Cheryl; Magee, Elvin; Miramontes, Roque

    2012-01-01

    Introduction. The Centers for Disease Control and Prevention (CDC)'s National Tuberculosis Surveillance System (NTSS) is the national repository of tuberculosis (TB) data in the United States. Jurisdictions report to NTSS through the Report of Verified Case of Tuberculosis (RVCT) form that transitioned to a web-based system in 2009. Materials and Methods. To improve RVCT data quality, CDC conducted a quality assurance (QA) needs assessment to develop QA strategies. These include QA components (case detection, data accuracy, completeness, timeliness, data security, and confidentiality); sample tools such as National TB Indicators Project (NTIP) to identify TB case reporting discrepancies; comprehensive training course; resource guide and toolkit. Results and Discussion. During July–September 2011, 73 staff from 34 (57%) of 60 reporting jurisdictions participated in QA training. Participants stated usefulness of sharing jurisdictions' QA methods; 66 (93%) wrote that the QA tools will be effective for their activities. Several jurisdictions reported implementation of QA tools pertinent to their programs. Data showed >8% increase in NTSS and NTIP enrollment through Secure Access Management Services, which monitors system usage, from August 2011–February 2012. Conclusions. Despite challenges imposed by web-based surveillance systems, QA strategies can be developed with innovation and collaboration. These strategies can also be used by other disease programs to ensure high data quality. PMID:22685648

  2. Commercial Foods. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This guide identifies considerations in the organization, operation, and evaluation of secondary and postsecondary vocational education programs. It contains both a vocational program guide and Career Merit Achievement Plan (Career MAP) for commercial foods. The guide contains the following sections: occupational description; program…

  3. Lawrence Livermore National Laboratory`s Computer Security Short Subjects Videos: Hidden Password, The Incident, Dangerous Games and The Mess; Computer Security Awareness Guide

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.

  4. SPAN security policies and guidelines

    NASA Technical Reports Server (NTRS)

    Sisson, Patricia L.; Green, James L.

    1989-01-01

    A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure. Therefore, each system manager, must strictly adhere to the requirements and must consider implementing the guidelines discussed. There are areas of vulnerability within the operating system that may not be addressed. However, when a requirement or guideline is discussed, implementation techniques are included. Information related to computer and data security is discussed to provide information on implementation options. The information is presented as it relates to a VAX computer environment.

  5. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  6. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  7. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0089] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that...

  8. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1975-10-06

    Results of the passenger screening procedures continue to reflect the success and effec- tiveness of airline and airport security programs. During the...airline and airport security programs. While it is impossible to estimate accurately just how many hijackings and related crimes were prevented, the...attempts might have occurred during 1974 and as many as 25 during the first 6 months of 1975, if current airline and airport security programs had not

  9. Effective Strategies for School Security.

    ERIC Educational Resources Information Center

    Blauvelt, Peter D.

    This handbook offers administrators specific advice on developing the skills, knowledge, and techniques needed for coping with problems of school crime and violence. The guide begins by advising administrators that having security information available at all times helps determine the climate of the school. Instructions are given for preparing…

  10. 20 CFR 404.1575 - Evaluation guides if you are self-employed.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... 404.1575 Section 404.1575 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... the work you do after you have become entitled to disability benefits. If you are entitled to social... this section, social security disability benefits means disability insurance benefits for a disabled...

  11. Department of Defense Intelligence Information System (DoDIIS). Instructions 2000

    DTIC Science & Technology

    2000-02-01

    DIA, November 1993, DoDIIS Site Certifier’s Guide, SC-2610-143-93. e) DIA, June 1995, DoDIIS Security Architecture Guidance and Directions ( SAGD ), Draft...Plan S&T Scientific & Technical SAGD Security Architecture Guidance and Directions SBU Sensitive But Unclassified SCI Sensitive Compartmented

  12. 20 CFR 404.1575 - Evaluation guides if you are self-employed.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    .... 404.1575 Section 404.1575 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... the work you do after you have become entitled to disability benefits. If you are entitled to social... this section, social security disability benefits means disability insurance benefits for a disabled...

  13. 12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Establishing Information Security Standards Table of Contents I. Introduction A. Scope B. Preservation of... Security Program B. Objectives III. Development and Implementation of Customer Information Security Program.... Introduction The Interagency Guidelines Establishing Information Security Standards (Guidelines) set forth...

  14. 14 CFR 1203.201 - Information security objectives.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  15. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  16. 14 CFR 1203.201 - Information security objectives.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  17. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-21

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR... Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the following Information...

  18. Commercial Vehicle Driving. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This guide identifies considerations in the organization, operation, and evaluation of secondary and postsecondary vocational education programs. It contains both a vocational program guide and Career Merit Achievement Plan (Career MAP) for commercial vehicle driving. The guide contains the following sections: occupational description; program…

  19. Precision Metal Fabrication. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This guide identifies considerations in the organization, operation, and evaluation of secondary and postsecondary vocational education programs. It contains both a vocational program guide and Career Merit Achievement Plan (Career MAP) for precision metal fabrication. The guide contains the following sections: occupational description; program…

  20. 32 CFR Appendix A to Part 806 - References

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...

  1. 32 CFR Appendix A to Part 806 - References

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...

  2. 32 CFR Appendix A to Part 806 - References

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...

  3. Standardized development of computer software. Part 1: Methods

    NASA Technical Reports Server (NTRS)

    Tausworthe, R. C.

    1976-01-01

    This work is a two-volume set on standards for modern software engineering methodology. This volume presents a tutorial and practical guide to the efficient development of reliable computer software, a unified and coordinated discipline for design, coding, testing, documentation, and project organization and management. The aim of the monograph is to provide formal disciplines for increasing the probability of securing software that is characterized by high degrees of initial correctness, readability, and maintainability, and to promote practices which aid in the consistent and orderly development of a total software system within schedule and budgetary constraints. These disciplines are set forth as a set of rules to be applied during software development to drastically reduce the time traditionally spent in debugging, to increase documentation quality, to foster understandability among those who must come in contact with it, and to facilitate operations and alterations of the program as requirements on the program environment change.

  4. Y-12 Site Sustainability Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Spencer, Charles G

    2012-12-01

    The accomplishments to date and the long-range planning of the Y-12 Energy Management and Sustainability and Stewardship programs support the U.S. Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) vision for a commitment to energy effi ciency and sustainability and to achievement of the Guiding Principles. Specifi cally, the Y-12 vision is to support the Environment, Safety and Health Policy and the DOE Strategic Sustainability Performance Plan, while promoting overall sustainability and reduction of greenhouse gas emissions. The mission of the Y-12 Energy Management program is to incorporate energy-effi cient technologies site-wide and to position Y-12 tomore » meet NNSA energy requirement needs through 2025 and beyond. The plan addresses greenhouse gases, buildings, fleet management, water use, pollution prevention, waste reduction, sustainable acquisition, electronic stewardship and data centers, site innovation and government-wide support.« less

  5. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada

    PubMed Central

    Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man

    2014-01-01

    Background Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. Objectives To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. Design A qualitative study using group discussions during a workshop. Methods A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. Results The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. Conclusions The results of the planning workshop provide a blueprint for future research and intervention projects. PMID:25147772

  6. 14 CFR 1203.409 - Exceptional cases.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....409 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM... Information Security Program Committee, Security Division, Washington, DC 20546 for a classification..., to the Director, Information Security Oversight Office, GSA, for a determination. ...

  7. Management Guide to the Protection of Information Resources.

    ERIC Educational Resources Information Center

    Helsing, Cheryl; And Others

    This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…

  8. 49 CFR 1542.103 - Content.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...

  9. 49 CFR 1542.103 - Content.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...

  10. 49 CFR 1542.103 - Content.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...

  11. 49 CFR 1542.103 - Content.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Content. 1542.103 Section 1542.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.103 Content. (a) Complete program. Except as...

  12. 78 FR 31966 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: [FEMA-2013-0019... Security Initiative (UASI) Nonprofit Security Grant Program (NSGP). DATES: Comments must be submitted on or... Urban Areas Security Initiative (UASI) Nonprofit Security Grant Program (NSGP) provides funding support...

  13. 14 CFR 153.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...

  14. 14 CFR 153.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...

  15. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  16. 14 CFR 153.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... the airport security program, in which certain security measures specified in Title 49 of the Code of... procedures. Security Identification Display Area (SIDA) means a portion of an airport, specified in the airport security program, in which security measures specified in Title 49 of the Code of Federal...

  17. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  18. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  19. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  20. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  1. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  2. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  3. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program

    DTIC Science & Technology

    1991-02-01

    enforcement support for airline and airport security measures. Airline passengers, as the ultimate beneficiaries of the security program. pay for the...environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 4(02 airports. 18...essential to many passengers. " FAA is currently reviewing Parts 107 and 108 of the Federal Aviation Regulations, covering airport security and airplane

  4. Peterson's Summer Study Abroad: A Guide to Summer Academic and Language Programs. First Edition.

    ERIC Educational Resources Information Center

    Peterson's Guides, Inc., Princeton, NJ.

    This guide provides descriptions of over 900 summer academic and language study-abroad programs in 80 countries that range from 1-week language study courses to full-summer university programs. An introductory section provides general information on study abroad programs and the use of the guide. The bulk of the guide consists of individual…

  5. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less

  6. 77 FR 73669 - Response to Comments Received for the “The Menlo Report: Ethical Principles Guiding Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-11

    ... Technology Research'' (``The Menlo Report'') for the Department of Homeland Security (DHS), Science and Technology, Cyber Security Division (CSD), Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT) Project AGENCY: Science and Technology Directorate, DHS. ACTION: Response...

  7. Security of Personal Computer Systems: A Management Guide.

    ERIC Educational Resources Information Center

    Steinauer, Dennis D.

    This report describes management and technical security considerations associated with the use of personal computer systems as well as other microprocessor-based systems designed for use in a general office environment. Its primary objective is to identify and discuss several areas of potential vulnerability and associated protective measures. The…

  8. 42 CFR 56.603 - Project elements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., including the provision for an audit conducted in accordance with the DHHS Audit Agency Guide for Audits of... of the Social Security Act, obtain or make every reasonable effort to obtain a written agreement with... entitled to insurance benefits under title XVIII of the Social Security Act, to medical assistance under a...

  9. Commercial Foods and Culinary Arts. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This guide identifies considerations in the organization, operation, and evaluation of secondary and postsecondary vocational education programs. It contains both a vocational program guide and Career Merit Achievement Plan (Career MAP) for commercial foods and culinary arts. The guide contains the following sections: occupational description;…

  10. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    ERIC Educational Resources Information Center

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  11. Applying your corporate compliance skills to the HIPAA security standard.

    PubMed

    Carter, P I

    2000-01-01

    Compliance programs are an increasingly hot topic among healthcare providers. These programs establish policies and procedures covering billing, referrals, gifts, confidentiality of patient records, and many other areas. The purpose is to help providers prevent and detect violations of the law. These programs are voluntary, but are also simply good business practice. Any compliance program should now incorporate the Health Insurance Portability and Accountability Act (HIPAA) security standard. Several sets of guidelines for development of compliance programs have been issued by the federal government, and each is directed toward a different type of healthcare provider. These guidelines share certain key features with the HIPAA security standard. This article examines the common areas between compliance programs and the HIPAA security standard to help you to do two very important things: (1) Leverage your resources by combining compliance with the security standard with other legal and regulatory compliance efforts, and (2) apply the lessons learned in developing your corporate compliance program to developing strategies for compliance with the HIPAA security standard.

  12. Commercial Art. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This document contains a vocational program guide and Career Merit Achievement Plan (Career MAP) for secondary and postsecondary commercial art. The guide contains the following sections: occupational description; program content (curriculum framework and student performance standards); program implementation (student admission criteria,…

  13. 19 CFR 201.43 - Program.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... who is responsible for implementation and oversight of information security programs and procedures... complaints regarding all elements of the information security program shall be directed to the Director of... UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION National Security...

  14. 14 CFR 1203.901 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...

  15. 14 CFR 1203.603 - Systematic review for declassification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION SECURITY PROGRAM Declassification and Downgrading § 1203.603 Systematic review for... review guidelines. The Chairperson, NASA Information Security Program Committee, shall develop, in... custodian and referred to the Chairperson, NASA Information Security Program Committee. This listing shall...

  16. 14 CFR 1203.901 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...

  17. Business Services and Technology. Advanced Finance Instructional Guide.

    ERIC Educational Resources Information Center

    Eastern Michigan Univ., Ypsilanti.

    This guide contains 15 lesson plans on financial topics for high school students. The lessons cover the following: (1) securities in the U.S. economy; (2) careers in finance; (3) commercial banking interest rates; (4) understanding financial statements; (5) newspaper stock tables; (6) financial institution operations; (7) foundation…

  18. Championing Intellectual Freedom: A School Administrator's Guide

    ERIC Educational Resources Information Center

    Gibson, Jeffrey

    2007-01-01

    School administrators want to believe that they are champions for the rights of the students they serve. They strive to provide students with a secure, enriching environment to aid in their intellectual and social development. Through their leadership, administrators have the responsibility to guide and redirect students to help them achieve at…

  19. SAFETY GUIDES FOR YOU--IN THE PRIMARY GRADES.

    ERIC Educational Resources Information Center

    WALKER, LUVERNE CRABTREE

    THIS SAFETY INSTRUCTIONAL GUIDE FOR PRIMARY-GRADE TEACHERS PRESENTS NINE DIFFERENT SAFETY UNITS, INCLUDING TRAFFIC SAFETY, PLAYTIME SAFETY, SAFE EATING AND DRINKING HABITS, SAFE CLOTHING, HOME SAFETY, ANIMAL SAFETY, CIVIL DEFENSE SECURITY, AND TESTING SAFETY PRACTICES. EACH UNIT STRESSES THE REASONS FOR ACCENTING SAFETY, WHAT TO KNOW AND DO, AND…

  20. 75 FR 22424 - Avalotis Corp.; Grant of a Permanent Variance

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-28

    ... International, LLC, and Matrix Service Industrial Contractors, Inc.), and 71 FR 10557 (Commonwealth Dynamics... of damage or defects at all times. (b) Guide rope fastening and alignment tension. The employer must fasten one end of each guide rope securely to the overhead support, with appropriate tension applied at...

  1. Choosing an Optical Disc System: A Guide for Users and Resellers.

    ERIC Educational Resources Information Center

    Vane-Tempest, Stewart

    1995-01-01

    Presents a guide for selecting an optional disc system. Highlights include storage hierarchy; standards; data life cycles; security; implementing an optical jukebox system; optimizing the system; performance; quality and reliability; software; cost of online versus near-line; and growing opportunities. Sidebars provide additional information on…

  2. Individualized Education Program (IEP) Planning Guide for Special Education Students Entering High School Vocational Education Programs.

    ERIC Educational Resources Information Center

    Burrell, Lewis P.

    This guide is designed to assist school program planners who are working with mainstreamed special education students in vocational education programs. The guide, covering grades 11 and 12, contains vocational program goals, objectives, and evaluation measures for 30 secondary vocational education programs in 15 curriculum areas, as well as for…

  3. 14 CFR 1203.202 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...

  4. 14 CFR 1203.202 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...

  5. 7 CFR 764.255 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.255 Section 764.255... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Operating Loan Program § 764.255 Security requirements. An OL... operating purposes, loans must be secured by a first lien on farm property or products having a security...

  6. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...

  7. 12 CFR 21.3 - Security program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... banking office; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES...

  8. 12 CFR 568.3 - Security program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...

  9. Afghan National Police Training Program Would Benefit from Better Compliance with the Economy Act and Reimbursable Agreements

    DTIC Science & Technology

    2011-08-25

    Security Cooperation Agency INL Bureau of International Narcotics and Law Enforcement Affairs JSSP Justice Sector Security Program PAE Pacific...regional training centers. The programs were the Justice Sector Security Program ( JSSP ), the Corrections System Support Program (CSSP), and the...Civilian Police International. JSSP and CSSP are considered rule of law programs. Rule of law is most commonly understood to be a foundational

  10. Nuclear Security Education Program at the Pennsylvania State University

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Uenlue, Kenan; The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304; Jovanovic, Igor

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basismore » of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory.« less

  11. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-12-01

    6 Intercity Passenger Rail Program (Amtrak) .....................................................................7 Intercity Bus Security Grant...20 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services between high-risk urban...Research Service 7 Intercity Passenger Rail Program (Amtrak) The Intercity Passenger Rail Program (IPR) is designed to enhance security of the

  12. Building Maintenance. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This program guide identifies primary concerns in the organization, operation, and evaluation of a building maintenance program. It is designed for local school district and community college administrators, instructors, program advisory committees, and regional coordinating councils. The guide begins with the Dictionary of Occupational Titles…

  13. Recommended Practice for Securing Control System Modems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    James R. Davidson; Jason L. Wright

    2008-01-01

    This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  14. 14 CFR 1203.604 - Mandatory review for declassification.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... requestor may submit the request to: (i) The Chairperson, NASA Information Security Program Committee; or... determination to the Chairperson, NASA Information Security Program Committee, National Aeronautics and Space... Chairperson, NASA Information Security Program Committee, for final resolution and appropriate response. (f...

  15. 14 CFR 1203.604 - Mandatory review for declassification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... requestor may submit the request to: (i) The Chairperson, NASA Information Security Program Committee; or... determination to the Chairperson, NASA Information Security Program Committee, National Aeronautics and Space... Chairperson, NASA Information Security Program Committee, for final resolution and appropriate response. (f...

  16. 48 CFR 3019.705-1 - General support for the program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS SMALL BUSINESS PROGRAMS The Small Business Subcontracting Program 3019.705-1 General support for the program. In any...

  17. Understanding Title V of the Social Security Act: A Guide to the Provisions of the Federal Maternal and Child Health Block Grant.

    ERIC Educational Resources Information Center

    Health Resources and Services Administration (DHHS/PHS), Washington, DC. Maternal and Child Health Bureau.

    The Maternal and Child Health (MCH) Services Block Grant (Title V of the Social Security Act) has operated as a federal-state partnership since the Social Security Act was passed in 1935. Through Title V, the federal government pledged its support of state efforts to extend health and welfare services for mothers and children. Title V has been…

  18. Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists

    PubMed Central

    Kramer, Daniel B.; Foo Kune, Denis; Auto de Medeiros, Julio; Yan, Chen; Xu, Wenyuan; Crawford, Thomas; Fu, Kevin

    2017-01-01

    Abstract Medical devices increasingly depend on software. While this expands the ability of devices to perform key therapeutic and diagnostic functions, reliance on software inevitably causes exposure to hazards of security vulnerabilities. This article uses a recent high‐profile case example to outline a proactive approach to security awareness that incorporates a scientific, risk‐based analysis of security concerns that supports ongoing discussions with patients about their medical devices. PMID:28512774

  19. The need for a General Comment for Article 19 of the UN Convention on the Rights of the Child: Toward enlightenment and progress for child protection.

    PubMed

    Bennett, Susan; Hart, Stuart N; Ann Svevo-Cianci, Kimberly

    2009-11-01

    To present the need and plan for development of a General Comment for the UN Convention on the Rights of the Child Article 19 which has the potential to transform and advance child protection through the infusion of a child rights approach. The Committee on the Rights of the Child (Committee) authorized ISPCAN and IICRD to draft a General Comment for CRC Article 19 (GC19) and to introduce implementation supports. An international working group (GC19WG), Expert Advisory Panel (EAP), and GC19 Focal Group of Committee members (GC19 CRC FG) have been organized to help guide and carry out the program of development. Analyses of relevant histories and knowledge, including effective and promising child protection strategies, are being applied to guide formulation of the GC and high priority implementation components. Consultations on the draft and supportive products will be conducted in cooperation with UNICEF, WHO, the NGO Group for the CRC, and other NGOs. Advice is to be solicited from interested parties and organizations in person and through distance communication throughout the world. In addition to the GC19, numerous implementation supports will be planned and some will be produced and piloted during the program of development. Under consideration are an implementation guide and resources; commentary; accountability models, indicators, measures and evaluation systems; a clearing house and resource website; a child-appropriate version of GC19; and education/training curricula and programs. GC19 has the potential to transform child protection by fostering a paradigm shift in its conceptualization, theory, research, and practice. Article 19 encourages an interpretation and application beyond narrow child protection conceptualizations and practices which have been found seriously inadequate. The General Comment can advance effective prevention of maltreatment and protection of personal security by promoting the child's rights, well-being, health, and development in all aspects of child protection. GC19 will provide support to the Committee on the Rights of the Child in its monitoring and guiding functions, and to States Parties, professionals, and civil society agents concerned with the protection and well-being of children.

  20. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  1. 77 FR 49048 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-15

    ... to certain issues of securities in DTC's Fast Automated Securities Transfer program (``FAST''). For securities that are part of the FAST program, the transfer agents hold the securities registered in the name...

  2. A guide to federal-aid programs and projects

    DOT National Transportation Integrated Search

    1999-05-01

    This guide provides basic information about Federal-aid programs, projects, and other program characteristics. The information sheets contained in the guide provide fiscal information, statutory and regulatory references, general eligibility and back...

  3. 14 CFR 1203.412 - Classification guides.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Classification guides. 1203.412 Section... PROGRAM Guides for Original Classification § 1203.412 Classification guides. (a) General. A classification guide, based upon classification determinations made by appropriate program and classification...

  4. 14 CFR 1203.412 - Classification guides.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Classification guides. 1203.412 Section... PROGRAM Guides for Original Classification § 1203.412 Classification guides. (a) General. A classification guide, based upon classification determinations made by appropriate program and classification...

  5. Basic Automotive Mechanics. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This program guide identifies primary concerns in the organization, operation, and evaluation of a basic automotive mechanics program. It is designed for local school district and community college administrators, instructors, program advisory committees, and regional coordinating councils. The guide begins with the Dictionary of Occupational…

  6. Lawrence Livermore National Laboratory safeguards and security quarterly progress report to the US Department of Energy quarter ending September 30, 1994

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davis, G.; Mansur, D.L.; Ruhter, W.D.

    1994-10-01

    This report presents the details of the Lawrence Livermore National Laboratory safeguards and securities program. This program is focused on developing new technology, such as x- and gamma-ray spectrometry, for measurement of special nuclear materials. This program supports the Office of Safeguards and Securities in the following five areas; safeguards technology, safeguards and decision support, computer security, automated physical security, and automated visitor access control systems.

  7. Driving toward guiding principles: a goal for privacy, confidentiality, and security of health information.

    PubMed

    Buckovich, S A; Rippen, H E; Rozen, M J

    1999-01-01

    As health care moves from paper to electronic data collection, providing easier access and dissemination of health information, the development of guiding privacy, confidentiality, and security principles is necessary to help balance the protection of patients' privacy interests against appropriate information access. A comparative review and analysis was done, based on a compilation of privacy, confidentiality, and security principles from many sources. Principles derived from ten identified sources were compared with each of the compiled principles to assess support level, uniformity, and inconsistencies. Of 28 compiled principles, 23 were supported by at least 50 percent of the sources. Technology could address at least 12 of the principles. Notable consistencies among the principles could provide a basis for consensus for further legislative and organizational work. It is imperative that all participants in our health care system work actively toward a viable resolution of this information privacy debate.

  8. Report: EPA’s Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes

    EPA Pesticide Factsheets

    Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.

  9. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  10. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  11. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  12. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  13. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  14. 75 FR 52768 - National Protection and Programs Directorate; Agency Information Collection Activities: Office of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0071] National Protection and Programs Directorate; Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security.... SUMMARY: The Department of Homeland Security, National Protection and Programs Directorate, Office of...

  15. Accuracy of a cone beam computed tomography-guided surgical stent for orthodontic mini-implant placement.

    PubMed

    Yu, Jae-Jung; Kim, Gyu-Tae; Choi, Yong-Suk; Hwang, Eui-Hwan; Paek, Janghyun; Kim, Seong-Hun; Huang, John C

    2012-03-01

    To validate the accuracy of a cone-beam computed tomography (CBCT)-guided surgical stent for orthodontic mini-implant (OMI) placement by quantitatively evaluating the difference between CBCT-prescribed and actual position of mini-implants in preoperative and postoperative CBCT images. A surgical stent was fabricated using Teflon-Perfluoroalkoxy, which has appropriate biological x-ray attenuation properties. Polyvinylsiloxane impression material was used to secure the custom-made surgical stent onto swine mandibles. CBCT scanning was done with the stent in place to virtually plan mini-implants using a three-dimensional (3D) software program. An appropriate insertion point was determined using 3D reconstruction data, and the vertical and horizontal angulations were determined using four prescribed angles. A custom-designed surveyor was used to drill a guide hole within the surgical stent as prescribed on the CBCT images for insertion of 32 OMIs. The mandibles with a surgical stent in place were rescanned with CBCT to measure the deviations between the virtual planning data and surgical results. The difference between the prescribed and actual vertical angle was 1.01 ± 7.25, and the horizontal difference was 1.16 ± 6.08. The correlation coefficient confirms that there was no intrarater variability in either the horizontal (R  =  .97) or vertical (R  =  .74) vectors. The surgical stent in this study guides mini-implants to the prescribed position as planned in CBCT. Since the statistical difference was not significant, the surgical stent can be considered to be an accurate guide tool for mini-implant placement in clinical use.

  16. 49 CFR 1548.7 - Approval, amendment, annual renewal, and withdrawal of approval of the security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... requested by TSA concerning Security Threat Assessments. (ix) A statement acknowledging and ensuring that each employee and agent will successfully complete a Security Threat Assessment under § 1548.15 before... training and Security Threat Assessments by relevant personnel. (4) Duration of security program. The...

  17. How Should Municipal Police Agencies Participate in America’s Homeland Security Strategy?

    DTIC Science & Technology

    2008-12-01

    NonProfit Organizations: A Guide to Strengthening and Sustaining Organizational Achievement, 3rd ed. (San Francisco, CA: Jossey- Bass , 2004). 43 Ibid 36...Planning for Public and NonProfit Organizations: A Guide to Strengthening and Sustaining Organizational Achievement, 3rd ed. (San Francisco, CA: Jossey- Bass ...Public and NonProfit Organizations: A Guide to Strengthening and Sustaining Organizational Achievement, 3rd ed. (San Francisco, CA: Jossey- Bass , 2004

  18. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  19. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  20. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  1. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  2. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  3. State Education Department: Security over Pupil Evaluation Program and Program Evaluation Test Materials Needs Improvement. Report 91-S-2.

    ERIC Educational Resources Information Center

    New York State Office of the Comptroller, Albany.

    Findings of an audit of the New York State Education Department's procedures to maintain security over Pupil Evaluation Program (PEP) and Program Evaluation Test (PET) examination materials are presented in this report. The audit sought to determine whether the department's security procedures adequately prevented unauthorized access to exam…

  4. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 2 2011-10-01 2011-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...

  5. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 2 2014-10-01 2012-10-01 true What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...

  6. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 2 2013-10-01 2012-10-01 true What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...

  7. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 2 2012-10-01 2012-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...

  8. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...

  9. Surgical Technology Program Guide.

    ERIC Educational Resources Information Center

    Georgia Univ., Athens. Dept. of Vocational Education.

    This surgical technology program guide presents the standard curriculum for technical institutes in Georgia. The curriculum addresses the minimum competencies for a surgical technology program. The program guide is designed to relate primarily to the development of those skills needed by individuals in the field to provide services in the…

  10. Building Maintenance and Utilities Management. Florida Vocational Program Guide.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This program guide identifies primary concerns in the organization, operation, and evaluation of a building maintenance and utilities management program. It is designed for local school district and community college administrators, instructors, program advisory committees, and regional coordinating councils. The guide begins with the Dictionary…

  11. Weaving a Secure Web around Education: A Guide to Technology Standards and Security.

    ERIC Educational Resources Information Center

    National Forum on Education Statistics (ED/OERI), Washington, DC.

    The purpose of this guidebook is to assist education agencies and organizations--which include state education agencies or state departments of education, school districts, and schools--in the development, maintenance, and standardization of effective Web sites. Also included is a detailed examination of the procedures necessary to provide…

  12. Safeguarding Your Technology: Practical Guidelines for Electronic Education Information Security.

    ERIC Educational Resources Information Center

    Szuba, Tom

    This guide was developed specifically for educational administrators at the building, campus, district, system, and state levels, and is meant to serve as a framework to help them better understand why and how to effectively secure their organization's information, software, and computer and networking equipment. This document is organized into 10…

  13. Guiding Principles for Providing High-Quality Education in Juvenile Justice Secure Care Settings

    ERIC Educational Resources Information Center

    US Department of Education, 2014

    2014-01-01

    Providing high-quality education in juvenile justice secure care settings presents unique challenges for the administrators, teachers, and staff who are responsible for the education, rehabilitation, and welfare of youths committed to their care. The United States departments of Education (ED) and Justice (DOJ) recognize that while these…

  14. 75 FR 82581 - Federal Acquisition Regulation; Federal Acquisition Circular 2005-48; Small Entity Compliance Guide

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-30

    ..., Payrolls and Basic Records to delete the requirement for submission of full social security numbers and... requires contractors and subcontractors to maintain the full social security number and current address of... Wage and Hour Division of the Department of Labor for purposes of an investigation or audit of...

  15. Interactive Programming Support for Secure Software Development

    ERIC Educational Resources Information Center

    Xie, Jing

    2012-01-01

    Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…

  16. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  17. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  18. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  19. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  20. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  1. 78 FR 15734 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-12

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0010] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...

  2. 78 FR 15733 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-12

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0008] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...

  3. Summer-Jobs-for-Youth Program Guide. How to Develop and Manage a Summer Youth Jobs Program. A Technical Assistance Guide.

    ERIC Educational Resources Information Center

    National Alliance of Business, Inc., Washington, DC.

    This guide offers a practical approach for operating summer youth employment programs that involves cooperation among private businesses and local organizations. A timetable provides a month-by-month schedule. Seven sections discuss management responsibilities. Program Planning covers scope, goals, and coordination. Program Management addresses…

  4. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 8, 2013. ISOO...

  5. 75 FR 68370 - Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-05

    ... DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate [Docket No. DHS-2010-0071] Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office...

  6. 14 CFR § 1203.412 - Classification guides.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Classification guides. § 1203.412 Section... PROGRAM Guides for Original Classification § 1203.412 Classification guides. (a) General. A classification guide, based upon classification determinations made by appropriate program and classification...

  7. Guide to Population Issues for Students and Teachers [and] Curriculum Guide.

    ERIC Educational Resources Information Center

    Facing the Future, Lopez Island, WA.

    As the world grapples with increasing environmental, social, and security problems, population is rarely considered a cause or contributing factor. The relationship of population to the human condition, and to the condition of the Earth, is often subtle and complex. But population growth affects almost every aspect of life from education to…

  8. Moving to a New Town. A Relocation Guide.

    ERIC Educational Resources Information Center

    Rackliffe, Gary, Ed.; Pearson, Nancy, Ed.

    Designed to help those who must consider relocating to secure employment, this relocation guide provides answers to a number of questions pertaining to moving, money management, and adjusting to a new community. Various aspects of deciding to move are covered, including reasons for moving, thinking of a move as permanent, feelings of homesickness,…

  9. U.S. Army War College Guide to National Security Issues. Volume 2. National Security Policy and Strategy

    DTIC Science & Technology

    2012-06-01

    1998 National War College paper entitled “U.S. National Se- curity Structure: A New Model for the 21st Century” defines the national security community ...fueled by revolu- tions in communications and information management, the emergence of a truly global market and world economy, the primacy of economic...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions , searching existing data sources

  10. 78 FR 38724 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-27

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0006] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... Agreement that establishes a computer matching program between the Department of Homeland Security/U.S...

  11. 7 CFR 610.24 - Responsibilities of State Technical Committees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...

  12. 7 CFR 610.24 - Responsibilities of State Technical Committees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...

  13. 7 CFR 610.24 - Responsibilities of State Technical Committees.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...

  14. 7 CFR 610.24 - Responsibilities of State Technical Committees.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...

  15. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1976-09-20

    commerce--a pr per balance appears to exist. Moreover, airline and airport security programs appear to be capable of responding to changes in the nature...Moreover, airline and airport security programs appear to be capable of responding to changes in the nature and level of current and future threats. The...delays and diversions were experienced. Airline and airport security measures continued to afford the necessary level of protection to U.S. air

  16. Implementing the global health security agenda: lessons from global health and security programs.

    PubMed

    Paranjape, Suman M; Franz, David R

    2015-01-01

    The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.

  17. Administrator, National Security Education Program

    DTIC Science & Technology

    1993-01-19

    1. Administer, direct, and manage the resources for the lit program. 2. Establish and direct an international education center, as approved by the...approve the hiring of, and evaluate the performance of personnel who staff the international education center. 4. Ensure appropriate internal management...Administrator, National Security Education Program * References: (a) DoD Directive 1025.2 , "National Security * Education Program," January 13, 1993

  18. Case Study: Creation of a Degree Program in Computer Security. White Paper.

    ERIC Educational Resources Information Center

    Belon, Barbara; Wright, Marie

    This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…

  19. 48 CFR 3019.705 - Responsibilities for the contracting officer under the subcontracting program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS SMALL BUSINESS PROGRAMS The Small Business Subcontracting Program 3019.705...

  20. 49 CFR 1549.101 - Acceptance, screening, and transfer of cargo.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO SCREENING PROGRAM Operations § 1549.101 Acceptance, screening, and transfer of cargo. (a) Preventing or... facilities, equipment, and procedures described in its security program to prevent or deter the carriage...

  1. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, July 12, 2013. ISOO will...

  2. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  3. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  4. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  5. 7 CFR 772.8 - Sale or exchange of security property.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...

  6. 7 CFR 772.8 - Sale or exchange of security property.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...

  7. 7 CFR 772.8 - Sale or exchange of security property.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...

  8. 7 CFR 772.8 - Sale or exchange of security property.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...

  9. An Innovative Community College Program and Partnership in Information Security.

    ERIC Educational Resources Information Center

    Howard, Barbara C; Morneau, Keith A.

    This report describes an innovative network security program initiated by Northern Virginia Community College and funded with a grant from the Northern Virginia Regional Partnership. The program educates and trains students in the instillation, configuration, and troubleshooting of the hardware and software infrastructure of information security.…

  10. 78 FR 43230 - Agency Information Collection Activities: Submission to OMB for Reinstatement, Without Change, of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-19

    ... Insured Credit Unions to maintain an information security program and an incident response plan that... Federally Insured Credit Unions to maintain an information security program and an incident response plan... credit unions to develop a written security program to safeguard sensitive member information. This...

  11. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...

  12. Seasonal Difference in National School Lunch Program Participation and Its Impacts on Household Food Security.

    PubMed

    Huang, Jin; Kim, Youngmi; Barnidge, Ellen

    2016-11-20

    The National School Lunch Program (NSLP) is one of the most important food assistance programs in the United States to ensure children's food security and healthy development. Previous studies have offered mixed results and challenges in estimating the effects of program participation. This study assesses NSLP's effect on household food security using data from the Survey of Income and Program Participation (SIPP). SIPP collects information on food security that covers four reference months, including both summer (June, July, August) and nonsummer months. The number of summer months in these four reference months varies by SIPP rotation group. These unique features allow this study to address the potential selection bias in the research of NSLP and food security by examining a seasonal difference in program participation. The analysis found that one more summer month in the reference period increases the difference in low food security rates by about 1.5 percentage points between recipients and nonrecipients eligible for free or reduced-price lunch. Findings have important social work and health policy implications for increasing food security among low-income households with children. © 2016 National Association of Social Workers.

  13. Cohort Default Rate Guide.

    ERIC Educational Resources Information Center

    Department of Education, Washington, DC. Default Management Div.

    This guide is designed to assist schools with their Federal Family Education Loan Program (FFEL) and the William D. Ford Federal Direct Loan (Direct Loan) Program cohort default rate. The guide is a reference tool in understanding cohort default rates and processes. This guide incorporates two former guides, the "Draft Cohort Default Rate…

  14. Vocational Agriculture/Agribusiness. Wisconsin Association of Vocational Agriculture Instructors Curriculum Guide for Wisconsin High Schools. Revised.

    ERIC Educational Resources Information Center

    Wisconsin Association of Vocational Agriculture Instructors, Madison.

    This guide is designed to aid the development of vocational education programs in agriculture in local school districts. Major program objectives, conditions conducive to learning, program evaluation, suggestions for using the guide, curriculum models, and Wisconsin's philosophy and procedures in developing occupational experience programs in…

  15. Career/Vocational Preparation for Students with Disabilities: A Program Improvement Guide.

    ERIC Educational Resources Information Center

    Stodden, Robert A.

    This program improvement guide is designed to assist district and school level interdisciplinary planning teams to improve career/vocational programs for students with disabilities. Its focus is on the integration of best practices within the educational program continuum to achieve positive student outcomes. The guide includes three sections.…

  16. 47 CFR 79.108 - Video programming guides and menus provided by navigation devices.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 4 2014-10-01 2014-10-01 false Video programming guides and menus provided by...) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Apparatus § 79.108 Video programming guides and... § 76.1200 of this chapter, into the chain of commerce for purchase by consumers, and multichannel video...

  17. 12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Part 364—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...

  18. 76 FR 65107 - Recovery of Delinquent Debts-Treasury Offset Program Enhancements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-20

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404, 408, 416, and 422 [Docket No. SSA-2010-0010] RIN 0960-AH19 Recovery of Delinquent Debts--Treasury Offset Program Enhancements AGENCY: Social Security... Recovery Policy, Social Security Administration, 6401 Security Boulevard, Baltimore, MD 21235-6401, (410...

  19. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration (SSA). ACTION: Notice of renewal of an existing...

  20. 10 CFR 37.43 - General security program requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... overall security strategy to ensure the integrated and effective functioning of the security program required by this subpart. The security plan must, at a minimum: (i) Describe the measures and strategies... lessons learned; (iii) Relevant results of NRC inspections; and (iv) Relevant results of the licensee's...

  1. Associate Degree Nursing Program Guide. Final Report from February 19, 1985 to August 31, 1985.

    ERIC Educational Resources Information Center

    Seminole Community Coll., Sanford, FL.

    This program guide is intended to help Associate Degree Nursing (ADN) instructors in Florida develop and/or update ADN programs. The first part is the final report of the project that developed the guide. Section I of the guide provides a description of the occupation, student admission criteria, retention and withdrawal standards, and program…

  2. Federal funding for health security in FY2015.

    PubMed

    Boddie, Crystal; Sell, Tara Kirk; Watson, Matthew

    2014-01-01

    Previous articles in this series have provided funding information for federal civilian biodefense programs and programs focused on radiological and nuclear preparedness and consequence management. This year the authors have expanded the focus of the analysis to US federal funding for health security. This article provides proposed funding amounts for FY2015, estimated amounts for FY2014, and actual amounts for FY2010 through FY2013 in 5 domains critical to health security: biodefense programs, radiological and nuclear programs, chemical programs, pandemic influenza and emerging infectious disease programs, and multiple-hazard and preparedness programs.

  3. Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.

    Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less

  4. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1980-10-14

    CEASE FUNDING OF TRAINING"OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. F. FEDERAL AIR MARSHALS PROVIDE LAW ENFORCEMENT SUPPORT...enforcement officer authority through special deputations by the U.S. Marshals Service on an annual basis. Airport Security - Continuing activities...which contributed signifi- cantly to airport security include the training of local law enforcement officers supporting airport security programs, the

  5. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1977-04-05

    diversions. Perhaps the best evidence of the effectiveness of airline and airport security measures is the number of hijackings and related crimes prevented...airports. Consideration is being given to include a provision in the airport security regulation which would prohibit the introduction of...Security Program. A complete revision of the regulation that established basic airport security requirements is currently underway. One of the more

  6. Global Security Contingency Fund: Summary and Issue Overview

    DTIC Science & Technology

    2014-04-04

    Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance

  7. Nuclear Forensics: A Capability at Risk (Abbreviated Version)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    National Research Council of the National Academies

    Nuclear forensics is important to our national security. Actions, including provision of appropriate funding, are needed now to sustain and improve the nation's nuclear forensics capabilities. The Department of Homeland Security (DHS), working with cooperating agencies and national laboratories, should plan and implement a sustainable, effective nuclear forensics program. Nuclear forensics is the examination and evaluation of discovered or seized nuclear materials and devices or, in cases of nuclear explosions or radiological dispersals, of detonation signals and post-detonation debris. Nuclear forensic evidence helps law enforcement and intelligence agencies work toward preventing, mitigating, and attributing a nuclear or radiological incident. Thismore » report, requested by DHS, the National Nuclear Security Administration, and the Department of Defense, makes recommendations on how to sustain and improve U.S. nuclear forensics capabilities. The United States has developed a nuclear forensics capability that has been demonstrated in real-world incidents of interdicted materials and in exercises of actions required after a nuclear detonation. The committee, however, has concerns about the program and finds that without strong leadership, careful planning, and additional funds, these capabilities will decline. Major areas of concern include: Organization. The responsibility for nuclear forensics is shared by several agencies without central authority and with no consensus on strategic requirements to guide the program. This organizational complexity hampers the program and could prove to be a major hindrance operationally. Sustainability. The nation's current nuclear forensics capabilities are available primarily because the system of laboratories, equipment, and personnel upon which they depend was developed and funded by the nuclear weapons program. However, the weapons program's funds are declining. Workforce and Infrastructure. Personnel skilled in nuclear forensics are too few and are spread too thinly. Some key facilities are in need of replacement because they are old, outdated, and not built to modern environmental, health, and safety standards. Procedures and Tools. Most nuclear forensics techniques were developed to carry out Cold War missions and to satisfy a different, less restrictive set of environmental, health, and safety standards. Some of the equipment also does not reflect today's technical capabilities. The Executive Office of the President established the National Technical Nuclear Forensics Center under the direction of the Secretary of Homeland Security, to coordinate nuclear forensics in the United States. DHS's responsibility can only be carried out with the cooperation and support of the other agencies involved. The committee recommends that DHS and the other cooperating agencies should: 1. Streamline the organizational structure, aligning authority and responsibility; and develop and issue appropriate requirements documents. 2. Issue a coordinated and integrated implementation plan for fulfilling the requirements and sustaining and improving the program's capabilities. This plan would form the basis for the agencies' multi-year program budget requests. 3. Implement a plan to build and maintain an appropriately sized and composed nuclear forensics workforce, ensuring sufficient staffing at the national laboratories and support for university research, training programs, and collaborative relationships among the national laboratories and other organizations. 4. Adapt nuclear forensics to the challenges of real emergency situations, including, for example, conducting more realistic exercises that are unannounced and that challenge regulations and procedures followed in the normal work environment, and implementing lessons learned. The national laboratories should: 5. Optimize procedures and equipment through R&D to meet program requirements. Modeling and simulation should play an increased role in research, development, and planning. The nuclear forensics community should: 6. Develop standards and procedures for nuclear forensics that are rooted in the same underlying principles that have been recommended to guide modern forensic science. DHS and the other cooperating agencies should: 7. Devise and implement a plan that enables access to relevant information in databases including classified and proprietary databases for nuclear forensics missions. The Executive Office of the President and the Department of State, working with the community of nuclear forensics experts, should: 8. Determine the classes of data and methods that are to be shared internationally and explore mechanisms to accomplish that sharing.« less

  8. The FELICIA bulletin board system and the IRBIS anonymous FTP server: Computer security information sources for the DOE community. CIAC-2302

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orvis, W.J.

    1993-11-03

    The Computer Incident Advisory Capability (CIAC) operates two information servers for the DOE community, FELICIA (formerly FELIX) and IRBIS. FELICIA is a computer Bulletin Board System (BBS) that can be accessed by telephone with a modem. IRBIS is an anonymous ftp server that can be accessed on the Internet. Both of these servers contain all of the publicly available CIAC, CERT, NIST, and DDN bulletins, virus descriptions, the VIRUS-L moderated virus bulletin board, copies of public domain and shareware virus- detection/protection software, and copies of useful public domain and shareware utility programs. This guide describes how to connect these systemsmore » and obtain files from them.« less

  9. The U.S. Constitution. A Teacher's Guide. Six 30-Minute Video Programs for Junior High and High School Students.

    ERIC Educational Resources Information Center

    Patrick, John J.

    This teacher's guide was designed to accompany six 30-minute video programs on the fundamental constitutional principles that form this nation's foundation. Each lesson in the guide contains an introduction to the main ideas of the program, a program summary, and suggested activities to carry out before and after the program. The topics emphasized…

  10. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official... Senior FEMA official responsible for the information security program. The Director of the Security Division, has been designated as the senior official to direct and administer the FEMA information security...

  11. 41 CFR 101-26.507 - Security equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true Security equipment. 101... PROGRAM 26.5-GSA Procurement Programs § 101-26.507 Security equipment. Federal agencies and other activities authorized to purchase security equipment through GSA sources shall do so in accordance with the...

  12. 7 CFR 764.235 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.235 Section 764.235... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Conservation Loan Program § 764.235 Security requirements. (a... estate may be taken as additional security if needed. (c) Loans of $25,000 of less for real estate...

  13. 24 CFR 880.608 - Security deposits.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Security deposits. 880.608 Section... PROGRAM) SECTION 8 HOUSING ASSISTANCE PAYMENTS PROGRAM FOR NEW CONSTRUCTION Management § 880.608 Security... a security deposit in an amount equal to one month's Total Tenant Payment or $50, whichever is...

  14. 41 CFR 101-26.507 - Security equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true Security equipment. 101... PROGRAM 26.5-GSA Procurement Programs § 101-26.507 Security equipment. Federal agencies and other activities authorized to purchase security equipment through GSA sources shall do so in accordance with the...

  15. 7 CFR 764.355 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.355 Section 764.355... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Emergency Loan Program § 764.355 Security requirements. (a) EM loans made under § 764.351(a)(1) must comply with the general security requirements established at...

  16. 41 CFR 101-26.507 - Security equipment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true Security equipment. 101... PROGRAM 26.5-GSA Procurement Programs § 101-26.507 Security equipment. Federal agencies and other activities authorized to purchase security equipment through GSA sources shall do so in accordance with the...

  17. 41 CFR 101-26.507 - Security equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Security equipment. 101... PROGRAM 26.5-GSA Procurement Programs § 101-26.507 Security equipment. Federal agencies and other activities authorized to purchase security equipment through GSA sources shall do so in accordance with the...

  18. 7 CFR 764.355 - Security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 764.355 Section 764.355... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Emergency Loan Program § 764.355 Security requirements. Link... comply with the general security requirements established at §§ 764.103, 764.104 and 764.155(b). (b) EM...

  19. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-18

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0055] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration. ACTION: Notice of a renewal of an existing...

  20. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Prevention Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of... to establish a new system of records titled, ``Department of Homeland Security/Transportation Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  1. Why Phishing Works: Project for an Information Security Capstone Course

    ERIC Educational Resources Information Center

    Pollacia, Lissa; Ding, Yan Zong; Yang, Seung

    2015-01-01

    This paper presents a project which was conducted in a capstone course in Information Security. The project focused on conducting research concerning the various aspects of phishing, such as why phishing works and who is more likely to be deceived by phishing. Students were guided through the process of conducting research: finding background and…

  2. Getting Acquainted: Actor and Partner Effects of Attachment and Temperament on Young Children's Peer Behavior

    ERIC Educational Resources Information Center

    McElwain, Nancy L.; Holland, Ashley S.; Engle, Jennifer M.; Ogolsky, Brian G.

    2014-01-01

    Guided by a dyadic view of children's peer behavior, this study assessed actor and partner effects of attachment security and temperament on young children's behavior with an unfamiliar peer. At 33 months of age, child-mother attachment security was assessed via a modified Strange Situation procedure, and parents reported on child temperament…

  3. Unified Facilities Criteria (UFC) Design Guide. Army Reserve Facilities

    DTIC Science & Technology

    2010-02-01

    Laser ...Including Change 3, 1 February 2010 42 use. 3-2.3.1.8 Provide painted striping in POV and MEP areas, and elsewhere as needed. 3-2.3.2 Curb and Gutter...have to meet physical security requirements for security fencing. Most Tenants prefer that fences are located in a strip of rock mulch or

  4. 76 FR 81517 - Submission for Review and Comment: “The Menlo Report: Ethical Principles Guiding Information and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ...'' (``Menlo Report'') for the Department of Homeland Security (DHS), Science and Technology, Cyber Security Division (CSD), Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT... be found at: http://www.cyber.st.dhs.gov/wp-content/uploads/2011/12/MenloPrinciplesCORE-20110915-r560...

  5. From Belligerence to Peace: The Role of Civic Education.

    ERIC Educational Resources Information Center

    Benporath, Sigal R.

    When a security threat and sense of instability befell the United States after the events of September 11, 2001, the familiar order of political priorities was upset. In a matter of days the American public discourse organized itself around the same principles that have guided the state of Israel for many years: security IN, education OUT.…

  6. 76 FR 28315 - Security Zone; Vessels Carrying Hazardous Cargo, Sector Columbia River Captain of the Port Zone

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-17

    ..., but are not limited to, liquefied petroleum gas, ammonium nitrate and associated mixtures, anhydrous... Department of Homeland Security Management Directive 023-01 and Commandant Instruction M16475.lD, which guide... accordance with the general regulations in 33 CFR part 165, Subpart D, no person or vessel may enter or...

  7. Drafting Lab Management Guide.

    ERIC Educational Resources Information Center

    Ohio State Univ., Columbus. Instructional Materials Lab.

    This manual was developed to guide drafting instructors and vocational supervisors in sequencing laboratory instruction and controlling the flow of work for a 2-year machine trades training program. The first part of the guide provides information on program management (program description, safety concerns, academic issues, implementation…

  8. Federal Communications Commission (FCC) Transponder Loading Data Conversion Software. User's guide and software maintenance manual, version 1.2

    NASA Technical Reports Server (NTRS)

    Mallasch, Paul G.

    1993-01-01

    This volume contains the complete software system documentation for the Federal Communications Commission (FCC) Transponder Loading Data Conversion Software (FIX-FCC). This software was written to facilitate the formatting and conversion of FCC Transponder Occupancy (Loading) Data before it is loaded into the NASA Geosynchronous Satellite Orbital Statistics Database System (GSOSTATS). The information that FCC supplies NASA is in report form and must be converted into a form readable by the database management software used in the GSOSTATS application. Both the User's Guide and Software Maintenance Manual are contained in this document. This volume of documentation passed an independent quality assurance review and certification by the Product Assurance and Security Office of the Planning Research Corporation (PRC). The manuals were reviewed for format, content, and readability. The Software Management and Assurance Program (SMAP) life cycle and documentation standards were used in the development of this document. Accordingly, these standards were used in the review. Refer to the System/Software Test/Product Assurance Report for the Geosynchronous Satellite Orbital Statistics Database System (GSOSTATS) for additional information.

  9. Density-to-Potential Inversions to Guide Development of Exchange-Correlation Approximations at Finite Temperature

    NASA Astrophysics Data System (ADS)

    Jensen, Daniel; Wasserman, Adam; Baczewski, Andrew

    The construction of approximations to the exchange-correlation potential for warm dense matter (WDM) is a topic of significant recent interest. In this work, we study the inverse problem of Kohn-Sham (KS) DFT as a means of guiding functional design at zero temperature and in WDM. Whereas the forward problem solves the KS equations to produce a density from a specified exchange-correlation potential, the inverse problem seeks to construct the exchange-correlation potential from specified densities. These two problems require different computational methods and convergence criteria despite sharing the same mathematical equations. We present two new inversion methods based on constrained variational and PDE-constrained optimization methods. We adapt these methods to finite temperature calculations to reveal the exchange-correlation potential's temperature dependence in WDM-relevant conditions. The different inversion methods presented are applied to both non-interacting and interacting model systems for comparison. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Security Administration under contract DE-AC04-94.

  10. 77 FR 47419 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-08

    ... 1974; Department of Homeland Security U.S. Citizenship and Immigration Services -011 E-Verify Program... ``Department of Homeland Security/United States Citizenship and Immigration Services--011 E- Verify Program System of Records.'' The United States Citizenship and Immigration Services E-Verify Program allows...

  11. 49 CFR 1546.103 - Form, content, and availability of security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... security program is acceptable only if TSA finds that the security program provides a level of protection similar to the level of protection provided by U.S. aircraft operators serving the same airports. Foreign... the same airport, if TSA determines that such procedures are necessary to provide a similar level of...

  12. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    ERIC Educational Resources Information Center

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  13. 31 CFR 1023.210 - Anti-money laundering program requirements for brokers or dealers in securities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... requirements for brokers or dealers in securities. 1023.210 Section 1023.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.210 Anti-money laundering program...

  14. 31 CFR 1023.210 - Anti-money laundering program requirements for brokers or dealers in securities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... requirements for brokers or dealers in securities. 1023.210 Section 1023.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.210 Anti-money laundering program...

  15. 31 CFR 1023.210 - Anti-money laundering program requirements for brokers or dealers in securities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... requirements for brokers or dealers in securities. 1023.210 Section 1023.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.210 Anti-money laundering program...

  16. 31 CFR 1023.210 - Anti-money laundering program requirements for brokers or dealers in securities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... requirements for brokers or dealers in securities. 1023.210 Section 1023.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.210 Anti-money laundering program...

  17. English Language and Skills Training for Entry-Level Health Care Jobs. Program Guide.

    ERIC Educational Resources Information Center

    Vaidya, Elma

    The guide describes a vocational English-as-a-Second-Language program for pre-employment training of Southeast Asians seeking work in entry-level health care jobs. The program was conducted in cooperation with a hospital in Massachusetts. The guide describes the program and its four instructional units in detail, and includes lesson plans,…

  18. A Guide to Business Course Competencies. The Business Program in Virginia.

    ERIC Educational Resources Information Center

    Henrico County Public Schools, Glen Allen, VA. Virginia Vocational Curriculum and Resource Center.

    This curriculum guide was developed as a model for schools in Virginia to prepare local programs of studies in business education. The Business Program contains 21 courses plus a 4-year sequence of courses for office specialist and a local option for students with disabilities. This guide contains an overview of the Business Program, information…

  19. Import Auto Technician; Curriculum Guide for the Development of an Import Automobile Technology Program.

    ERIC Educational Resources Information Center

    East Los Angeles Coll., CA.

    In this curriculum guide, courses in a three-phase community college program for training import automobile technicians are provided. Following an introducation to the guide, the background of the development of the program, the program, the instruction, support for instruction, and the import automobile industry are discussed. Sample options for…

  20. Understanding U.S. Geography and Weather. Scholastic Teaching Guide and Poster

    ERIC Educational Resources Information Center

    US Department of Homeland Security, 2006

    2006-01-01

    The U.S. Department of Homeland Security is working together with state and local government and private sector partners to prepare the nation and the nation's schools for emergencies of all kinds. This teaching guide includes lessons, reproducible worksheets, and a classroom poster that can be used to reinforce key curriculum concepts while…

  1. Forum Guide to Facilities Information Management: A Resource for State and Local Education Agencies. NFES 2012-808

    ERIC Educational Resources Information Center

    National Forum on Education Statistics, 2012

    2012-01-01

    Safe and secure facilities that foster learning are crucial to providing quality education services, and developing and maintaining these facilities requires considerable resources and organization. Facility information systems allow education organizations to collect and manage data that can be used to inform and guide decisionmaking about the…

  2. Excellence in Educational Fund Raising at America's Community Colleges and a Key Resources Guide for Educational Fund Raising.

    ERIC Educational Resources Information Center

    Ryan, G. Jeremiah

    Designed to encourage and inform community college efforts to secure private financial support, this literature review and resource guide examine the current status of fund raising at community colleges and list pertinent information sources. After introductory comments advocate increased community college involvement in fund raising, the paper…

  3. The Appropriate and Effective Use of Security Technologies in U.S. Schools. A Guide for Schools and Law Enforcement Agencies.

    ERIC Educational Resources Information Center

    Green, Mary W.

    This guide provides basic guidelines to help schools, in collaboration with law enforcement agencies, analyze their vulnerability to violence, theft, and vandalism, and suggest possible technologies to effectively address these problems. It describes existing commercially available technologies and urges thoughtful consideration of not only the…

  4. 21st Century Skills, Education & Competitiveness: A Resource and Policy Guide

    ERIC Educational Resources Information Center

    Partnership for 21st Century Skills, 2008

    2008-01-01

    Americans are deeply concerned about their present and future prospects in a time of economic uncertainty. Policymakers have a make-or-break opening--and an obligation--to chart a new path for public education that will secure the nation's economic competitiveness. This guide summarizes the challenges and opportunities that, if left unaddressed,…

  5. Landscape Analysis of Nutrition-sensitive Agriculture Policy Development in Senegal.

    PubMed

    Lachat, Carl; Nago, Eunice; Ka, Abdoulaye; Vermeylen, Harm; Fanzo, Jessica; Mahy, Lina; Wüstefeld, Marzella; Kolsteren, Patrick

    2015-06-01

    Unlocking the agricultural potential of Africa offers a genuine opportunity to address malnutrition and drive development of the continent. Using Senegal as a case study, to identify gaps and opportunities to strengthen agricultural policies with nutrition-sensitive approaches. We carried out a systematic analysis of 13 policy documents that related to food production, agriculture, food security, or nutrition. Next, we collected data during a participatory analysis with 32 national stakeholders and in-depth interviews with 15 national experts of technical directorates of the different ministries that deal with agriculture and food production. The current agricultural context has various elements that are considered to enhance its nutrition sensitivity. On average, 8.3 of the 17 Food and Agriculture Organization guiding principles for agriculture programming for nutrition were included in the policies reviewed. Ensuring food security and increasing dietary diversity were considered to be the principal objectives of agricultural policies. Although there was considerable agreement that agriculture can contribute to nutrition, current agricultural programs generally do not target communities on the basis of their nutritional vulnerability. Agricultural programs were reported to have specific components to target female beneficiaries but were generally not used as delivery platforms for nutritional interventions. The findings of this study indicate the need for a coherent policy environment across the food system that aligns recommendations at the national level with local action on the ground. In addition, specific activities are needed to develop a shared understanding of nutrition and public health nutrition within the agricultural community in Senegal. © The Author(s) 2015.

  6. 17 CFR 240.3a12-9 - Exemption of certain direct participation program securities from the arranging provisions of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of certain direct participation program securities from the arranging provisions of sections 7(c) and 11(d)(1). 240.3a12-9 Section 240.3a12-9 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL...

  7. Machine Trades Lab Management Guide.

    ERIC Educational Resources Information Center

    Ohio State Univ., Columbus. Instructional Materials Lab.

    This manual was developed to guide machine trades instructors and vocational supervisors in sequencing laboratory instruction and controlling the flow of work for a 2-year machine trades training program. The first part of the guide provides information on program management (program description, safety concerns, academic issues, implementation…

  8. Stephen Hawking's Universe. Teacher's Guide.

    ERIC Educational Resources Information Center

    Thompson, Malcolm H.; Rameau, Jonathan D.

    This program guide is meant to help teachers assist their students in viewing the six-part public television series, "Stephen Hawking's Universe." The guide features program summaries that give background information and brief synopses of the programs; previewing activities that familiarize students with the subject; vocabulary that…

  9. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1983-10-21

    Aviation Security Program -s fro January 1 -June 30, 1983 c> CD C_3 LU DTIC ELECTE NOV 1 8 1983 D <sS^ B Washington, O.C. 20691 October...Effectiveness of the Civil Aviation Security Program 7. A-.W.) Aviation Security Division V. P»tf»m..»» 0>|fi •« Nam» «n4 Aa^rai» DOT/Federal...Aviation Administration Office of Civil Aviation Security 800 Independence Avenue, SW. Washington, P.C. 20591 1. ••€•*.»•<•’• Caiala*. Na. S.

  10. 46 CFR 503.53 - Oversight Committee.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security... provisions of Executive Order 13526 and directives of the Information Security Oversight Office. The program... and complaints concerning the Commission's information security program; (d) Recommend appropriate...

  11. 46 CFR 503.53 - Oversight Committee.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security... provisions of Executive Order 12958 and directives of the Information Security Oversight Office. The program... and complaints concerning the Commission's information security program; (d) Recommend appropriate...

  12. FAA computer security : recommendations to address continuing weaknesses

    DOT National Transportation Integrated Search

    2000-12-01

    In September, testimony before the Committee on Science, House of Representatives, focused on the Federal Aviation Administration's (FAA) computer security program. In brief, we reported that FAA's agency-wide computer security program has serious, p...

  13. TealLock 5.20 security software program for handheld devices.

    PubMed

    Tahil, Fatimah A

    2004-07-01

    The TealLock has a simple graphic interface, and the program is user-friendly with well thought out options to customize security settings. The program is inexpensive and works seamlessly with the Palm OS platform's built-in basic Security application. The developer offers a 30-day free trial version and there is no downside to trying it to see if it meets your needs. It seems to be an effective security software program for psychiatrists who keep confidential and sensitive patient information on their PDAs. In keeping with HIPAA regulations, the TealLock bolsters security for protected health information stored on PDAs or other handheld devices by providing safeguards that address authentication, access control, encryption, and selected aspects of transmission.

  14. Workshop: Western hemisphere network of bird banding programs

    USGS Publications Warehouse

    Celis-Murillo, A.

    2007-01-01

    Purpose: To promote collaboration among banding programs in the Americas. Introduction: Bird banding and marking provide indispensable tools for ornithological research, management, and conservation of migratory birds on migratory routes, breeding and non-breeding grounds. Many countries and organizations in Latin America and the Caribbean are in the process of developing or have expressed interest in developing national banding schemes and databases to support their research and management programs. Coordination of developing and existing banding programs is essential for effective data management, reporting, archiving and security, and most importantly, for gaining a fuller understanding of migratory bird conservation issues and how the banding data can help. Currently, there is a well established bird-banding program in the U.S.A. and Canada, and programs in other countries are being developed as well. Ornithologists in many Latin American countries and the Caribbean are interested in using banding and marking in their research programs. Many in the ornithological community are interested in establishing banding schemes and some countries have recently initiated independent banding programs. With the number of long term collaborative and international initiatives increasing, the time is ripe to discuss and explore opportunities for international collaboration, coordination, and administration of bird banding programs in the Western Hemisphere. We propose the second ?Western Hemisphere Network of Bird Banding Programs? workshop, in association with the SCSCB, to be an essential step in the progress to strengthen international partnerships and support migratory bird conservation in the Americas and beyond. This will be the second multi-national meeting to promote collaboration among banding programs in the Americas (the first meeting was held in October 8-9, 2006 in La Mancha, Veracruz, Mexico). The Second ?Western Hemisphere Network of Bird Banding Programs? workshop will continue addressing issues surrounding the coordination of an Americas? approach to bird banding and will review in detail the advances made on the first workshop such as, coordination of bands and markers, coordination in recovery reporting, permit issues, data management and data sharing and archiving, data security, training, etc. Workshop Goals: Build on accomplishments of the network?s first workshop (Oct 8-9, 2006). Identify and explore new opportunities for data sharing, data archiving, data access, training, etc. Initiate strategies to support international collaboration and coordination amongst bird banding programs in the Western Hemisphere. Workshop structure: One day workshop of guided discussions. Participants: Representatives of government agencies, program managers and NGOs.

  15. [Cortical potentials evoked to response to a signal to make a memory-guided saccade].

    PubMed

    Slavutskaia, M V; Moiseeva, V V; Shul'govskiĭ, V V

    2010-01-01

    The difference in parameters of visually guided and memory-guided saccades was shown. Increase in the memory-guided saccade latency as compared to that of the visually guided saccades may indicate the deceleration of saccadic programming on the basis of information extraction from the memory. The comparison of parameters and topography of evoked components N1 and P1 of the evoked potential on the signal to make a memory- or visually guided saccade suggests that the early stage of the saccade programming associated with the space information processing is performed predominantly with top-down attention mechanism before the memory-guided saccade and bottom-up mechanism before the visually guided saccade. The findings show that the increase in the latency of the memory-guided saccades is connected with decision making at the central stage of the saccade programming. We proposed that wave N2, which develops in the middle of the latent period of the memory-guided saccades, is correlated with this process. Topography and spatial dynamics of components N1, P1 and N2 testify that the memory-guided saccade programming is controlled by the frontal mediothalamic system of selective attention and left-hemispheric brain mechanisms of motor attention.

  16. Measuring relational security in forensic mental health services

    PubMed Central

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  17. Measuring relational security in forensic mental health services.

    PubMed

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  18. 76 FR 72433 - Revision of Agency Information Collection Activity Under OMB Review: Secure Flight Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ...] Revision of Agency Information Collection Activity Under OMB Review: Secure Flight Program AGENCY... operators and foreign air carriers submit to Secure Flight for the purposes of watch list matching... screening checkpoint which airport operators will submit to Secure Flight, and a survey of certain general...

  19. Evaluation of Participant Needs in a Regional Center for Security Studies

    ERIC Educational Resources Information Center

    Schmoker, Oliver E., III.

    2009-01-01

    This research study was implemented within the subject headquarters of a regional center, an organization responsible for security cooperation in Europe and Eurasia. The focus of the study was the center's program of security education. This program was designed to support evolving security objectives of foreign countries in order to increase the…

  20. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1985-11-07

    hijackings since 1973 during any comparable 6-month period. (See Exhibits 1, 2, and 3) Air carrier and airport security measures required by the FAA have...enforcement support for airline passenger boarding and airport security measures. The passengers, who are the principal beneficiaries of the security program

Top