12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2011 CFR
2011-01-01
... Establishing Information Security Standards Table of Contents I. Introduction A. Scope B. Preservation of... Security Program B. Objectives III. Development and Implementation of Customer Information Security Program.... Introduction The Interagency Guidelines Establishing Information Security Standards (Guidelines) set forth...
12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2014 CFR
2014-01-01
... Security Standards B Appendix B to Part 170 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF... Part 170—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of...
12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2013 CFR
2013-01-01
... Security Standards B Appendix B to Part 170 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF... Part 170—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of...
12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2011 CFR
2011-01-01
... Part 364—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...
Information risk and security modeling
NASA Astrophysics Data System (ADS)
Zivic, Predrag
2005-03-01
This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.
Applying your corporate compliance skills to the HIPAA security standard.
Carter, P I
2000-01-01
Compliance programs are an increasingly hot topic among healthcare providers. These programs establish policies and procedures covering billing, referrals, gifts, confidentiality of patient records, and many other areas. The purpose is to help providers prevent and detect violations of the law. These programs are voluntary, but are also simply good business practice. Any compliance program should now incorporate the Health Insurance Portability and Accountability Act (HIPAA) security standard. Several sets of guidelines for development of compliance programs have been issued by the federal government, and each is directed toward a different type of healthcare provider. These guidelines share certain key features with the HIPAA security standard. This article examines the common areas between compliance programs and the HIPAA security standard to help you to do two very important things: (1) Leverage your resources by combining compliance with the security standard with other legal and regulatory compliance efforts, and (2) apply the lessons learned in developing your corporate compliance program to developing strategies for compliance with the HIPAA security standard.
ERIC Educational Resources Information Center
National Bureau of Standards (DOC), Washington, DC.
These guidelines provide a handbook for use by federal organizations in structuring physical security and risk management programs for their automatic data processing facilities. This publication discusses security analysis, natural disasters, supporting utilities, system reliability, procedural measures and controls, off-site facilities,…
12 CFR Appendix D-2 to Part 208 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2010 CFR
2010-01-01
... Relationships Risk Management Principles,” Nov. 1, 2001; FDIC FIL 68-99, Risk Assessment Tools and Practices for.... Definitions II. Standards for Safeguarding Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of...
12 CFR Appendix F to Part 225 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2010 CFR
2010-01-01
... Relationships Risk Management Principles,” Nov. 1, 2001; FDIC FIL 68-99, Risk Assessment Tools and Practices for.... Standards for Safeguarding Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B...
Code of Federal Regulations, 2010 CFR
2010-04-01
..., we will not find that the State agency has substantially failed to meet our standards. We will... regulations, or other written guidelines. 416.1071 Section 416.1071 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Determinations of Disability...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-25
... Grid Cyber Security AGENCY: National Institute of Standards and Technology (NIST), Department of... and Technology (NIST) seeks comments on draft NISTIR 7628 Rev. 1, Guidelines for Smart Grid Cyber... (formerly the Cyber Security Working Group) of the Smart Grid Interoperability Panel. The document has been...
Job security and fear: Do these drive our radiation guidelines
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, R.G.
1994-01-01
This commentary asks why scientists want radiation standard setting at a level well below that at which any health related problem has been observed in a human being. The idea that job security and fear actually may drive radiation standards is presented as a possibility. 3 refs.
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2011-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2013-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2012-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
22 CFR 1101.5 - Security, confidentiality and protection of records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...
Overview of Computer Security Certification and Accreditation. Final Report.
ERIC Educational Resources Information Center
Ruthberg, Zella G.; Neugent, William
Primarily intended to familiarize ADP (automatic data processing) policy and information resource managers with the approach to computer security certification and accreditation found in "Guideline to Computer Security Certification and Accreditation," Federal Information Processing Standards Publications (FIPS-PUB) 102, this overview…
43 CFR 2.51 - Assuring integrity of records.
Code of Federal Regulations, 2011 CFR
2011-10-01
... on those recommended in the National Bureau of Standard's booklet “Computer Security Guidelines for..., technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in...
43 CFR 2.51 - Assuring integrity of records.
Code of Federal Regulations, 2010 CFR
2010-10-01
... on those recommended in the National Bureau of Standard's booklet “Computer Security Guidelines for..., technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in...
43 CFR 2.51 - Assuring integrity of records.
Code of Federal Regulations, 2012 CFR
2012-10-01
... on those recommended in the National Bureau of Standard's booklet “Computer Security Guidelines for..., technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in...
43 CFR 2.226 - Assuring integrity of records.
Code of Federal Regulations, 2014 CFR
2014-10-01
... on those recommended in the National Bureau of Standard's booklet “Computer Security Guidelines for..., technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in...
43 CFR 2.226 - Assuring integrity of records.
Code of Federal Regulations, 2013 CFR
2013-10-01
... on those recommended in the National Bureau of Standard's booklet “Computer Security Guidelines for..., technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in...
12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2010 CFR
2010-01-01
... Relationships Risk Management Principles,” Nov. 1, 2001; FDIC FIL 68-99, Risk Assessment Tools and Practices for... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...
Information security for compliance with select agent regulations.
Lewis, Nick; Campbell, Mark J; Baskin, Carole R
2015-01-01
The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as "select agents." While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts--still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment.
Information Security for Compliance with Select Agent Regulations
Lewis, Nick; Campbell, Mark J.
2015-01-01
The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as “select agents.” While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts—still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment. PMID:26042864
Risk Assessment Methodology Based on the NISTIR 7628 Guidelines
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R
2013-01-01
Earlier work describes computational models of critical infrastructure that allow an analyst to estimate the security of a system in terms of the impact of loss per stakeholder resulting from security breakdowns. Here, we consider how to identify, monitor and estimate risk impact and probability for different smart grid stakeholders. Our constructive method leverages currently available standards and defined failure scenarios. We utilize the National Institute of Standards and Technology (NIST) Interagency or Internal Reports (NISTIR) 7628 as a basis to apply Cyberspace Security Econometrics system (CSES) for comparing design principles and courses of action in making security-related decisions.
Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities.
Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min; Yoo, Sooyoung
2012-06-01
The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another.
12 CFR Appendix B to Part 570 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2010 CFR
2010-01-01
... reports; or (B) Blind data, such as payment history on accounts that are not personally identifiable, that... technology, the sensitivity of your customer information, internal or external threats to information, and... Information Technology Examination Handbook, Information Security Booklet, Dec. 2002 available at http://www...
Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities
Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min
2012-01-01
Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648
12 CFR Appendix D-2 to Part 208 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2014 CFR
2014-01-01
.... Design its information security program to control the identified risks, commensurate with the... Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the... score, derived from a group of consumer reports; or (B) Blind data, such as payment history on accounts...
12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2012 CFR
2012-01-01
.... You shall: 1. Design your information security program to control the identified risks, commensurate... Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board G... information does not include: (A) Aggregate information, such as the mean credit score, derived from a group...
12 CFR Appendix D-2 to Part 208 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2011 CFR
2011-01-01
.... Design its information security program to control the identified risks, commensurate with the... Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the... score, derived from a group of consumer reports; or (B) Blind data, such as payment history on accounts...
12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2012 CFR
2012-01-01
... risks. C. Manage and Control Risk. Each bank shall: 1. Design its information security program to... A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service...) Aggregate information, such as the mean credit score, derived from a group of consumer reports; or (B) Blind...
12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2010 CFR
2010-01-01
... risks. C. Manage and Control Risk. Each bank shall: 1. Design its information security program to... A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service...) Aggregate information, such as the mean credit score, derived from a group of consumer reports; or (B) Blind...
Wireless local area network security.
Bergeron, Bryan P
2004-01-01
Wireless local area networks (WLANs) are increasingly popular in clinical settings because they facilitate the use of wireless PDAs, laptops, and other pervasive computing devices at the point of care. However, because of the relative immaturity of wireless network technology and evolving standards, WLANs, if improperly configured, can present significant security risks. Understanding the security limitations of the technology and available fixes can help minimize the risks of clinical data loss and maintain compliance with HIPAA guidelines.
Hospital security and patient elopement: protecting patients and your healthcare facility.
Smith, Thomas A
2012-01-01
Regulatory and financial consequences of adverse events associated with patient elopements are bringing new challenges to healthcare security to develop policies and procedures to prevent and respond to such incidents. This article provides an overview of the problem of elopement in healthcare and what it means to the security function; gives a working knowledge of healthcare related standards and guidelines aimed at reducing patient elopement; and reviews the elements of an elopement prevention and response plan for your organization.
ERIC Educational Resources Information Center
Yallapragada, RamMohan R.; Toma, Alfred G.; Roe, C. William
2011-01-01
According to the time line presently specified by the Securities and Exchange Commission (SEC), business firms in the United States (US) should switch from the existing US accounting reporting guidelines of the Generally Accepted Accounting Principles (GAAP) to International Financial Reporting Standards (IFRS) by the year 2014. The US business…
A Strategy for Improved System Assurance
2007-06-20
Quality (Measurements Life Cycle Safety, Security & Others) ISO /IEC 12207 * Software Life Cycle Processes ISO 9001 Quality Management System...14598 Software Product Evaluation Related ISO /IEC 90003 Guidelines for the Application of ISO 9001:2000 to Computer Software IEEE 12207 Industry...Implementation of International Standard ISO /IEC 12207 IEEE 1220 Standard for Application and Management of the System Engineering Process Use in
Implementation of Medical Information Exchange System Based on EHR Standard
Han, Soon Hwa; Kim, Sang Guk; Jeong, Jun Yong; Lee, Bi Na; Choi, Myeong Seon; Kim, Il Kon; Park, Woo Sung; Ha, Kyooseob; Cho, Eunyoung; Kim, Yoon; Bae, Jae Bong
2010-01-01
Objectives To develop effective ways of sharing patients' medical information, we developed a new medical information exchange system (MIES) based on a registry server, which enabled us to exchange different types of data generated by various systems. Methods To assure that patient's medical information can be effectively exchanged under different system environments, we adopted the standardized data transfer methods and terminologies suggested by the Center for Interoperable Electronic Healthcare Record (CIEHR) of Korea in order to guarantee interoperability. Regarding information security, MIES followed the security guidelines suggested by the CIEHR of Korea. This study aimed to develop essential security systems for the implementation of online services, such as encryption of communication, server security, database security, protection against hacking, contents, and network security. Results The registry server managed information exchange as well as the registration information of the clinical document architecture (CDA) documents, and the CDA Transfer Server was used to locate and transmit the proper CDA document from the relevant repository. The CDA viewer showed the CDA documents via connection with the information systems of related hospitals. Conclusions This research chooses transfer items and defines document standards that follow CDA standards, such that exchange of CDA documents between different systems became possible through ebXML. The proposed MIES was designed as an independent central registry server model in order to guarantee the essential security of patients' medical information. PMID:21818447
Implementation of Medical Information Exchange System Based on EHR Standard.
Han, Soon Hwa; Lee, Min Ho; Kim, Sang Guk; Jeong, Jun Yong; Lee, Bi Na; Choi, Myeong Seon; Kim, Il Kon; Park, Woo Sung; Ha, Kyooseob; Cho, Eunyoung; Kim, Yoon; Bae, Jae Bong
2010-12-01
To develop effective ways of sharing patients' medical information, we developed a new medical information exchange system (MIES) based on a registry server, which enabled us to exchange different types of data generated by various systems. To assure that patient's medical information can be effectively exchanged under different system environments, we adopted the standardized data transfer methods and terminologies suggested by the Center for Interoperable Electronic Healthcare Record (CIEHR) of Korea in order to guarantee interoperability. Regarding information security, MIES followed the security guidelines suggested by the CIEHR of Korea. This study aimed to develop essential security systems for the implementation of online services, such as encryption of communication, server security, database security, protection against hacking, contents, and network security. The registry server managed information exchange as well as the registration information of the clinical document architecture (CDA) documents, and the CDA Transfer Server was used to locate and transmit the proper CDA document from the relevant repository. The CDA viewer showed the CDA documents via connection with the information systems of related hospitals. This research chooses transfer items and defines document standards that follow CDA standards, such that exchange of CDA documents between different systems became possible through ebXML. The proposed MIES was designed as an independent central registry server model in order to guarantee the essential security of patients' medical information.
Analysis of information security management systems at 5 domestic hospitals with more than 500 beds.
Park, Woo-Sung; Seo, Sun-Won; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam
2010-06-01
The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS.
Mense, Alexander; Hoheiser-Pförtner, Franz; Schmid, Martin; Wahl, Harald
2013-01-01
Working with health related data necessitates appropriate levels of security and privacy. Information security, meaning ensuring confidentiality, integrity, and availability, is more organizational, than technical in nature. It includes many organizational and management measures, is based on well-defined security roles, processes, and documents, and needs permanent adaption of security policies, continuously monitoring, and measures assessment. This big challenge for any organization leads to implementation of an information security management system (ISMS). In the context of establishing a regional or national electronic health record for integrated care (ICEHR), the situation is worse. Changing the medical information exchange from on-demand peer-to-peer connections to health information networks requires all organizations participating in the EHR system to have consistent security levels and to follow the same security guidelines and rules. Also, the implementation must be monitored and audited, establishing cross-organizational information security management systems (ISMS) based on international standards. This paper evaluates requirements and defines basic concepts for an ISO 27000 series-based cross-organizational ISMS in the healthcare domain and especially for the implementation of the nationwide electronic health record in Austria (ELGA).
Congenital rubella syndrome surveillance in Honduras.
Molina, Ida Berenice; Mendoza, Lourdes Otilia; Palma, María Aparicia
2011-09-01
Congenital rubella syndrome (CRS) surveillance was established in Honduras to determine the scope of the problem and assess the impact of vaccination. Implementation of the surveillance system required the drafting of national CRS epidemiological surveillance guidelines, the development of a laboratory diagnostic method, and training of physicians, nurses, and microbiologists in the Honduran hospital network and social security system on CRS surveillance guidelines. Honduras' experience with the surveillance of other vaccine-preventable diseases facilitated the implementation of hospital-based CRS surveillance. The surveillance system operates in 23 of the 25 public hospitals that offer services to children and at 2 social security hospitals; the private sector has not been integrated into this system. Clinical and technical staff, including representatives from various disciplines such as pediatrics, neonatology, general medicine, epidemiology, nursing, and microbiology, participate in the hospital network, as well as follow up on cases in accordance with the standardized guidelines, depending on their areas of expertise. Implementation of the CRS surveillance system requires technical guidelines, laboratory diagnostic capacity, and trained multidisciplinary human resources for its systematization and operation.
Hospital Suicides: Lawsuits and Standards.
ERIC Educational Resources Information Center
Litman, Robert E.
1982-01-01
Suggested that every hospital should have a suicide prevention committee which establishes written guidelines after surveying security areas and talking with staff and patients. Reasonable treatment requires that each patient be evaluated for suicide risk and that staff follow a treatment plan according to the hospital's own policies. (JAC)
12 CFR Appendix F to Part 225 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2012 CFR
2012-01-01
... only to authorized individuals and controls to prevent employees from providing customer information to unauthorized individuals who may seek to obtain this information through fraudulent means. b. Access... records storage facilities to permit access only to authorized individuals; c. Encryption of electronic...
12 CFR Appendix F to Part 225 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2014 CFR
2014-01-01
... only to authorized individuals and controls to prevent employees from providing customer information to unauthorized individuals who may seek to obtain this information through fraudulent means. b. Access... records storage facilities to permit access only to authorized individuals; c. Encryption of electronic...
Bridging the Gap in Port Security; Network Centric Theory Applied to Public/Private Collaboration
2007-03-01
commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007] 16 The four core elements of CSI include:36 • Identify high...www.cbp.gov/xp/cgov/import/commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007]. 17 Connecting them
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
Implementing healthcare information security: standards can help.
Orel, Andrej; Bernik, Igor
2013-01-01
Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.
Code of Federal Regulations, 2010 CFR
2010-01-01
... guidelines for banks that engage in financial contract activities. Since the Financial Accounting Standards... (REGULATION Y) Regulations Financial Holding Companies Interpretations § 225.142 Statement of policy... agency securities and money market instruments. (a) Purpose of financial contract positions. In...
Document is intended to provide general guidelines for use byEPA and EPA-contracted laboratories when disposing of samples and associated analytical waste following use of the analytical methods listed in SAM.
SPAN security policies and guidelines
NASA Technical Reports Server (NTRS)
Sisson, Patricia L.; Green, James L.
1989-01-01
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure. Therefore, each system manager, must strictly adhere to the requirements and must consider implementing the guidelines discussed. There are areas of vulnerability within the operating system that may not be addressed. However, when a requirement or guideline is discussed, implementation techniques are included. Information related to computer and data security is discussed to provide information on implementation options. The information is presented as it relates to a VAX computer environment.
Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds
Park, Woo-Sung; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam
2010-01-01
Objectives The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. Methods The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. Results With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. Conclusions The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS. PMID:21818429
A Standardization Framework for Electronic Government Service Portals
NASA Astrophysics Data System (ADS)
Sarantis, Demetrios; Tsiakaliaris, Christos; Lampathaki, Fenareti; Charalabidis, Yannis
Although most eGovernment interoperability frameworks (eGIFs) cover adequately the technical aspects of developing and supporting the provision of electronic services to citizens and businesses, they do not exclusively address several important areas regarding the organization, presentation, accessibility and security of the content and the electronic services offered through government portals. This chapter extends the scope of existing eGIFs presenting the overall architecture and the basic concepts of the Greek standardization framework for electronic government service portals which, for the first time in Europe, is part of a country's eGovernment framework. The proposed standardization framework includes standards, guidelines and recommendations regarding the design, development and operation of government portals that support the provision of administrative information and services to citizens and businesses. By applying the guidelines of the framework, the design, development and operation of portals in central, regional and municipal government can be systematically addressed resulting in an applicable, sustainable and ever-expanding framework.
Institute for Computer Sciences and Technology. Annual Report FY 1986.
ERIC Educational Resources Information Center
National Bureau of Standards (DOC), Washington, DC. Inst. for Computer Sciences and Technology.
Activities of the Institute for Computer Sciences and Technology (ICST) within the U.S. Department of Commerce during fiscal year 1986 are described in this annual report, which summarizes research and publications by ICST in the following areas: (1) standards and guidelines for computer security, including encryption and message authentication…
Study on Control of Security and Storage of Holdings: A RAMP Study with Guidelines.
ERIC Educational Resources Information Center
Thomas, D. L.
Intended to assist developing countries in the essential task of preserving historical records and, therefore, deliberately oriented towards economy and a low level of technology, this study provides an outline of currently accepted standards that archivists in developing countries, especially those in tropical areas, can apply to their own…
12 CFR Appendix B to Part 570 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2011 CFR
2011-01-01
... arrangements in place to control risks. C. Manage and Control Risk. You shall: 1. Design your information... Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board G... include: (A) Aggregate information, such as the mean credit score, derived from a group of consumer...
12 CFR Appendix B to Part 570 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2013 CFR
2013-01-01
... arrangements in place to control risks. C. Manage and Control Risk. You shall: 1. Design your information... Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board G... include: (A) Aggregate information, such as the mean credit score, derived from a group of consumer...
12 CFR Appendix B to Part 570 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2014 CFR
2014-01-01
... arrangements in place to control risks. C. Manage and Control Risk. You shall: 1. Design your information... Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board G... include: (A) Aggregate information, such as the mean credit score, derived from a group of consumer...
12 CFR Appendix F to Part 225 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2013 CFR
2013-01-01
... arrangements in place to control risks. C. Manage and Control Risk. Each bank holding company shall: 1. Design... GOVERNORS OF THE FEDERAL RESERVE SYSTEM (CONTINUED) BANK HOLDING COMPANIES AND CHANGE IN BANK CONTROL.... Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F...
12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2012 CFR
2012-01-01
... charge of the branch or agency. b. Consumer information means any record about an individual, whether in... personally identify an individual. i. Examples: (1) Consumer information includes: (A) A consumer report that...) information from a consumer report that the bank obtains about an individual who applies for but does not...
12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2014 CFR
2014-01-01
... charge of the branch or agency. b. Consumer information means any record about an individual, whether in... personally identify an individual. i. Examples: (1) Consumer information includes: (A) A consumer report that...) information from a consumer report that the bank obtains about an individual who applies for but does not...
12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2013 CFR
2013-01-01
... charge of the branch or agency. b. Consumer information means any record about an individual, whether in... personally identify an individual. i. Examples: (1) Consumer information includes: (A) A consumer report that...) information from a consumer report that the bank obtains about an individual who applies for but does not...
12 CFR Appendix D-2 to Part 208 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2013 CFR
2013-01-01
... branch or agency. b. Consumer information means any record about an individual, whether in paper... an individual. i. Examples. (1) Consumer information includes: (A) A consumer report that a bank... consumer report that the bank obtains about an individual who applies for but does not receive a loan...
12 CFR Appendix D-2 to Part 208 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2012 CFR
2012-01-01
... branch or agency. b. Consumer information means any record about an individual, whether in paper... an individual. i. Examples. (1) Consumer information includes: (A) A consumer report that a bank... consumer report that the bank obtains about an individual who applies for but does not receive a loan...
Draft secure medical database standard.
Pangalos, George
2002-01-01
Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.
5 CFR 1312.10 - Systematic review guidelines.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.10 Systematic review guidelines. The EOP Security Officer...
Regulatory Guide on Conducting a Security Vulnerability Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ek, David R.
This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.
76 FR 8753 - Final Information Quality Guidelines Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-15
... DEPARTMENT OF HOMELAND SECURITY Final Information Quality Guidelines Policy AGENCY: Department of Homeland Security. ACTION: Notice and request for public comment on Final Information Quality Guidelines. SUMMARY: These guidelines should be used to ensure and maximize the quality of disseminated information...
12 CFR Appendix F to Part 225 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2011 CFR
2011-01-01
... arrangements in place to control risks. C. Manage and Control Risk. Each bank holding company shall: 1. Design... GOVERNORS OF THE FEDERAL RESERVE SYSTEM BANK HOLDING COMPANIES AND CHANGE IN BANK CONTROL (REGULATION Y) Pt.... Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F...
12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2014 CFR
2014-01-01
... any record about an individual, whether in paper, electronic, or other form, that is a consumer report... term does not include any record that does not identify an individual. i. Examples. (1) Consumer... individual who applies for but does not receive a loan, including any loan sought by an individual for a...
Code of Federal Regulations, 2014 CFR
2014-01-01
... apply: a. Consumer information means any record about an individual, whether in paper, electronic, or... compilation of such records. The term does not include any record that does not identify an individual. i... report that you obtain about an individual who applies for but does not receive a loan, including any...
Code of Federal Regulations, 2013 CFR
2013-01-01
... apply: a. Consumer information means any record about an individual, whether in paper, electronic, or... compilation of such records. The term does not include any record that does not identify an individual. i... report that you obtain about an individual who applies for but does not receive a loan, including any...
12 CFR Appendix B to Part 570 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2012 CFR
2012-01-01
... apply: a. Consumer information means any record about an individual, whether in paper, electronic, or... compilation of such records. The term does not include any record that does not identify an individual. i... obtain about an individual who applies for but does not receive a loan, including any loan sought by an...
12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2013 CFR
2013-01-01
... any record about an individual, whether in paper, electronic, or other form, that is a consumer report... term does not include any record that does not identify an individual. i. Examples. (1) Consumer... individual who applies for but does not receive a loan, including any loan sought by an individual for a...
Communications Processors: Categories, Applications, and Trends
1976-03-01
allow switching from BSC to SDLC .(12) Standard protocols would ease the requirement that communications processor software convert from one...COMMANDER c^/g^_ (^-»M-^ V »*-^ FRANK J. EMMA, Colonel, USAF Director, information Systems Technology Applications Office Deputy for Command...guidelines in selecting a device for a specific application are included, with manufacturer models presented as illustrations. UNCLASSIFIED SECURITY
5 CFR 1312.10 - Systematic review guidelines.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Systematic review guidelines. 1312.10... Declassification of National Security Information § 1312.10 Systematic review guidelines. The EOP Security Officer will prepare and keep current such guidelines as are required by Executive Order 12958 for the...
Frohde, Kenny; Brooks, David J
Emergency management (EM) and business continuity management (BCM) frameworks incorporate various strategic and operational measures. Defined within a number of national and international standards and guidelines, such concepts may be integrated within one another to provide increased resilience to disruptive events. Nevertheless, there is a degree of dispute regarding concept integration among security and EM professionals and bodies of knowledge. In line with cognitive psychology exemplar-based concepts, such disputes may be associated with a lack of precision in communality in the approach to EM and BCM. This paper presents a two-stage study, where stage 1 critiqued national and international literature and stage 2 applied semi-structured interviews with security managers in Western Australia. Findings indicate the existence of contradictory views on EM and its integration within BCM. As such, this study concludes that EM is considered a vital component of BCM by the majority of security managers. However, there is broader dispute regarding its degree of integration. Understanding the underpinnings of such disputes will aid in raising the standards and application of professionalism within security, EM and BCM domains, supporting clarification and definition of professional boundaries.
Protecting HIV information in countries scaling up HIV services: a baseline study.
Beck, Eduard J; Mandalia, Sundhiya; Harling, Guy; Santas, Xenophon M; Mosure, Debra; Delay, Paul R
2011-02-06
Individual-level data are needed to optimize clinical care and monitor and evaluate HIV services. Confidentiality and security of such data must be safeguarded to avoid stigmatization and discrimination of people living with HIV. We set out to assess the extent that countries scaling up HIV services have developed and implemented guidelines to protect the confidentiality and security of HIV information. Questionnaires were sent to UNAIDS field staff in 98 middle- and lower-income countries, some reportedly with guidelines (G-countries) and others intending to develop them (NG-countries). Responses were scored, aggregated and weighted to produce standard scores for six categories: information governance, country policies, data collection, data storage, data transfer and data access. Responses were analyzed using regression analyses for associations with national HIV prevalence, gross national income per capita, OECD income, receiving US PEPFAR funding, and being a G- or NG-country. Differences between G- and NG-countries were investigated using non-parametric methods. Higher information governance scores were observed for G-countries compared with NG-countries; no differences were observed between country policies or data collection categories. However, for data storage, data transfer and data access, G-countries had lower scores compared with NG-countries. No significant associations were observed between country score and HIV prevalence, per capita gross national income, OECD economic category, and whether countries had received PEPFAR funding. Few countries, including G-countries, had developed comprehensive guidelines on protecting the confidentiality and security of HIV information. Countries must develop their own guidelines, using established frameworks to guide their efforts, and may require assistance in adapting, adopting and implementing them.
Guidelines for computer security in general practice.
Schattner, Peter; Pleteshner, Catherine; Bhend, Heinz; Brouns, Johan
2007-01-01
As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice. To develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews. While the guideline was produced in the context of Australian general practice, we have developed a template that is also relevant for other countries. Current data on computer security measures was sought from Australian divisions of general practice. Semi-structured interviews were conducted with general practitioners (GPs), the medical software industry, senior managers within government responsible for health IT (information technology) initiatives, technical IT experts, divisions of general practice and a member of a health information consumer group. The respondents were asked to assess both the likelihood and the consequences of potential risks in computer security being breached. The study suggested that the most important computer security issues in general practice were: the need for a nominated IT security coordinator; having written IT policies, including a practice disaster recovery plan; controlling access to different levels of electronic data; doing and testing backups; protecting against viruses and other malicious codes; installing firewalls; undertaking routine maintenance of hardware and software; and securing electronic communication, for example via encryption. This information led to the production of computer security guidelines, including a one-page summary checklist, which were subsequently distributed to all GPs in Australia. This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making these guidelines relevant to local contexts should help maximise their uptake.
Assessing staff attitudes towards information security in a European healthcare establishment.
Furnell, S M; Gaunt, P N; Holben, R F; Sanders, P W; Stockel, C T; Warren, M J
1996-01-01
Information security is now recognized as an important consideration in modern healthcare establishments (HCEs), with a variety of guidelines and standards currently available to enable the environments to be properly protected. However, financial and operational constraints often exist which influence the practicality of these recommendations. This paper establishes that the staff culture of the organization is of particular importance in determining the level and types of security that will be accepted. This culture will be based upon staff awareness of and attitudes towards security and it is, therefore, important to have a clear idea of what these attitudes are. To this end, two surveys have been conducted within a reference environment to establish the attitudes of general users and technical staff, allowing the results to be fed back to HCE management to enable security policy to be appropriately defined. These results indicated that, although the establishment had participated in a European healthcare security initiative, staff attitudes and awareness were still weak in some areas.
Homeland Security Lessons for the United States
2004-06-01
international standard for AML / CFT practices is set by the forty Recommendations of the Financial Action Task Force, or FATF, an inter-governmental...to foster sound AML / CFT practices. Singapore has a strong tradition for rigorous supervision of financial institutions. The two aspects of this...supervisory process with regards to AML / CFT are: issuing detailed guidelines to financial institutions, setting out their obligations with respect to
ERIC Educational Resources Information Center
California State Dept. of Education, Sacramento.
This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…
32 CFR 147.14 - Guideline L-Outside activities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Adjudication § 147.14 Guideline L—Outside activities. (a) The concern. Involvement in certain types of outside employment or activities is of security concern if it poses a conflict with an individual's security... outside employment or activity indicates that it does not pose a conflict with an individual's security...
Security basics for long-term care facilities.
Green, Martin
2015-01-01
The need for Long-Term Care (LTC) facilities is growing, the author reports, and along with it the need for programs to address the major security concerns of such facilities. In this article he explains how to apply the IAHSS Healthcare Security Industry Guidelines and the Design Guidelines to achieve a safer LTC facility.
Access and privacy rights using web security standards to increase patient empowerment.
Falcão-Reis, Filipa; Costa-Pereira, Altamiro; Correia, Manuel E
2008-01-01
Electronic Health Record (EHR) systems are becoming more and more sophisticated and include nowadays numerous applications, which are not only accessed by medical professionals, but also by accounting and administrative personnel. This could represent a problem concerning basic rights such as privacy and confidentiality. The principles, guidelines and recommendations compiled by the OECD protection of privacy and trans-border flow of personal data are described and considered within health information system development. Granting access to an EHR should be dependent upon the owner of the record; the patient: he must be entitled to define who is allowed to access his EHRs, besides the access control scheme each health organization may have implemented. In this way, it's not only up to health professionals to decide who have access to what, but the patient himself. Implementing such a policy is walking towards patient empowerment which society should encourage and governments should promote. The paper then introduces a technical solution based on web security standards. This would give patients the ability to monitor and control which entities have access to their personal EHRs, thus empowering them with the knowledge of how much of his medical history is known and by whom. It is necessary to create standard data access protocols, mechanisms and policies to protect the privacy rights and furthermore, to enable patients, to automatically track the movement (flow) of their personal data and information in the context of health information systems. This solution must be functional and, above all, user-friendly and the interface should take in consideration some heuristics of usability in order to provide the user with the best tools. The current official standards on confidentiality and privacy in health care, currently being developed within the EU, are explained, in order to achieve a consensual idea of the guidelines that all member states should follow to transfer such principles into national laws. A perspective is given on the state of the art concerning web security standards, which can be used to easily engineer health information systems complying with the patient empowering goals. In conclusion health systems with the characteristics thus described are technically feasible and should be generally implemented and deployed.
Medical image security in a HIPAA mandated PACS environment.
Cao, F; Huang, H K; Zhou, X Q
2003-01-01
Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Behavioral Interview Guidelines by Job Roles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Individual and Team Performance Guidelines. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
75 FR 5865 - Proposed Collection; Comment Request for Publication 1075
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-04
... Publication 1075, Tax Information Security Guidelines for Federal, State, and Local Agencies. [[Page 5866... internet at [email protected] . SUPPLEMENTARY INFORMATION: Title: Tax Information Security Guidelines... on proposed and/or continuing information collections, as required by the Paperwork Reduction Act of...
78 FR 23980 - Proposed Collection; Comment Request for Publication 1075
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-23
... Publication 1075, Tax Information Security Guidelines for Federal, State, and Local Agencies. DATES: Written... [email protected] . SUPPLEMENTARY INFORMATION: Title: Tax Information Security Guidelines for... on proposed and/or continuing information collections, as required by the Paperwork Reduction Act of...
Limitations and challenges towards an effective business continuity management in Nuklear Malaysia
NASA Astrophysics Data System (ADS)
Hamid, A. H. A.
2018-01-01
One of Nuklear Malaysia’s top concerns is radiological and nuclear safety as well as security preparedness of its operational facility management, which was bonded by Act 304, Directive 20 and International Atomic Energy Agency (IAEA) guidelines. In 2012, the Malaysian government initialised the Business Continuity Management System under the supervision of Malaysian Administrative Modernization and Management Planning Unit (MAMPU), referring to MAMPU.BPICT.700-4/2/11 (3), ISO 22301:2012 and Business Continuity Good Practice Guidelines 2013 documentation. These standards are integral to the implementation of a resilient management program that indicates an organisation’s capability to prevent any accident from occurring and spreading its impact, which includes sufficient recovery action to post-accident situation towards a normal operational and managerial state. Unfortunately, there is a lack of certified Business Continuity Management standard among the public sector agencies compared to local private sectors. Subsequently, Nuklear Malaysia has been selected by MAMPU and CyberSecurity Malaysia as one of the pioneering agencies to be certified accordingly. This paper significantly recognized Nuklear Malaysia’s effort to plan, analyse, design, implement, review and validate the establishment of this standard currently. The project was implemented using a case study approach to complete the required certification activities. As a result, this paper proposed benchmarking the selected literature reviews against the Nuklear Malaysia experience to determine best practices in implementing and managing Business Continuity effectively. It concluded that a resilient Business Continuity Management program needs to be incorporated into Nuclear Malaysia’s capabilities in ensuring its mitigation capacities to survive any unexpected event and subsequently overcome future challenges.
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database.
Choi, Jeongseok; Kim, Jaekwon; Lee, Dong Kyun; Jang, Kwang Soo; Kim, Dai-Jin; Choi, In Young
2016-03-01
Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.
75 FR 37819 - Proposed Information Quality Guidelines Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-30
... DEPARTMENT OF HOMELAND SECURITY Proposed Information Quality Guidelines Policy ACTION: Notice and request for public comment on Proposed Information Quality Guidelines. SUMMARY: These guidelines should be used to ensure and maximize the quality of disseminated information. The Department's guidelines are...
Bailey, Sarah F; Scheible, Melissa K; Williams, Christopher; Silva, Deborah S B S; Hoggan, Marina; Eichman, Christopher; Faith, Seth A
2017-11-01
Next-generation Sequencing (NGS) is a rapidly evolving technology with demonstrated benefits for forensic genetic applications, and the strategies to analyze and manage the massive NGS datasets are currently in development. Here, the computing, data storage, connectivity, and security resources of the Cloud were evaluated as a model for forensic laboratory systems that produce NGS data. A complete front-to-end Cloud system was developed to upload, process, and interpret raw NGS data using a web browser dashboard. The system was extensible, demonstrating analysis capabilities of autosomal and Y-STRs from a variety of NGS instrumentation (Illumina MiniSeq and MiSeq, and Oxford Nanopore MinION). NGS data for STRs were concordant with standard reference materials previously characterized with capillary electrophoresis and Sanger sequencing. The computing power of the Cloud was implemented with on-demand auto-scaling to allow multiple file analysis in tandem. The system was designed to store resulting data in a relational database, amenable to downstream sample interpretations and databasing applications following the most recent guidelines in nomenclature for sequenced alleles. Lastly, a multi-layered Cloud security architecture was tested and showed that industry standards for securing data and computing resources were readily applied to the NGS system without disadvantageous effects for bioinformatic analysis, connectivity or data storage/retrieval. The results of this study demonstrate the feasibility of using Cloud-based systems for secured NGS data analysis, storage, databasing, and multi-user distributed connectivity. Copyright © 2017 Elsevier B.V. All rights reserved.
[Animal welfare standards in ecological animal husbandry and the possibilities of their regulation].
Sundrum, A
1993-02-01
There is an ethic claim to an increasing consideration of animal welfare in agricultural husbandry. To put this in practise requires the consumer's willingness to pay higher prices for food, produced according to animal's needs. A growing number of consumers is willing to do that. For the higher price the consumer expects a product-security, which guarantees processing standards by transparent criteria and inspection. Guidelines in organic agriculture regulate standards of animal welfare and environmental friendly production. Standards of animal welfare are far beyond those in protection of animals legislation. Nevertheless, they don't allow a general judgement about animal welfare in husbandry systems on organic ruled farms. A practicable and conclusive valuation-concept is necessary. It is referred to the animal needs index as a concept for valuation, which is already tested in practice.
14 CFR 1203b.104 - Exercise of arrest authority-general guidelines.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Exercise of arrest authority-general guidelines. 1203b.104 Section 1203b.104 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION SECURITY PROGRAMS; ARREST AUTHORITY AND USE OF FORCE BY NASA SECURITY FORCE PERSONNEL § 1203b.104 Exercise...
14 CFR 1203b.104 - Exercise of arrest authority-general guidelines.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Exercise of arrest authority-general guidelines. 1203b.104 Section 1203b.104 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION SECURITY PROGRAMS; ARREST AUTHORITY AND USE OF FORCE BY NASA SECURITY FORCE PERSONNEL § 1203b.104 Exercise...
14 CFR 1203b.104 - Exercise of arrest authority-general guidelines.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Exercise of arrest authority-general guidelines. 1203b.104 Section 1203b.104 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION SECURITY PROGRAMS; ARREST AUTHORITY AND USE OF FORCE BY NASA SECURITY FORCE PERSONNEL § 1203b.104 Exercise...
14 CFR 1203b.104 - Exercise of arrest authority-general guidelines.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Exercise of arrest authority-general guidelines. 1203b.104 Section 1203b.104 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION SECURITY PROGRAMS; ARREST AUTHORITY AND USE OF FORCE BY NASA SECURITY FORCE PERSONNEL § 1203b.104 Exercise...
Guidelines for Network Security in the Learning Environment.
ERIC Educational Resources Information Center
Littman, Marlyn Kemper
1996-01-01
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
14 CFR § 1203b.104 - Exercise of arrest authority-general guidelines.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Exercise of arrest authority-general guidelines. § 1203b.104 Section § 1203b.104 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION SECURITY PROGRAMS; ARREST AUTHORITY AND USE OF FORCE BY NASA SECURITY FORCE PERSONNEL § 1203b.104...
Code of Federal Regulations, 2014 CFR
2014-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Code of Federal Regulations, 2011 CFR
2011-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Code of Federal Regulations, 2012 CFR
2012-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Code of Federal Regulations, 2013 CFR
2013-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
School Security and Crisis Preparedness: Make It Your Business.
ERIC Educational Resources Information Center
Trump, Kenneth S.
1999-01-01
The top five security risks in today's schools include aggressive behavior, weapons possession or use, drug trafficking, gangs, and "stranger danger." Home-made bomb threats are common. This article also discusses security system costs, risk-reduction frameworks, security assessments, crisis-preparedness guidelines, and security-related…
[Compliance with guidelines by state plans for food and nutritional security in Brazil].
Machado, Mick Lennon; Gabriel, Cristine Garcia; Soar, Claudia; Mamed, Gisele Rockenbach; Machado, Patrícia Maria de Oliveira; Lacerda, Josimari Telino de; Martins, Milena Corrêa; Marcon, Maria Cristina
2018-02-05
A descriptive and documental study was performed from August to October 2016 to analyze compliance by state plans for food and nutritional security (PlanSAN) with the guidelines set by the Brazilian National Policy for Food and Nutritional Security (PNSAN). The state plans were accessed via the websites of the Inter-Ministerial Chamber for Food and Nutritional Security (CAISAN) or the state governments, plus complementary data collection at the state level. All the states of Brazil joined the National System for Food and Nutritional Security (SISAN), while fewer than half (13 states, 48%) had drafted their plans. Of these, 5 (38%) of the PlanSAN had schedules that coincided with the same state's pluriannual plan, 5 (38%) of the PlanSAN specified the budget requirements for meeting the proposed targets, 7 (54%) specified mechanisms for monitoring the plan, and only 2 (15%) defined methodologies for monitoring food and nutritional security. The recent existence of (and adherence to) the CAISAN appear to be related to the lack of state plans in half the states. Although most of the states that did have plans met some of the guidelines laid out by the PNSAN, these mechanisms become weak and impractical when they lack earmarked budget funds to meet their targets. Since the PNSAN is structurally inter-sectorial, the development of plans requires collective work by various government departments. Importantly, the items analyzed here are all guidelines, which implies the need for mechanisms to monitor their actual implementation.
32 CFR 147.4 - Guideline B-Foreign influence.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Guideline B-Foreign influence. 147.4 Section 147... CIVILIAN ADJUDICATIVE GUIDELINES FOR DETERMINING ELIGIBILITY FOR ACCESS TO CLASSIFIED INFORMATION Adjudication § 147.4 Guideline B—Foreign influence. (a) The concern. A security risk may exist when an...
48 CFR 1804.470-3 - IT security requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true IT security requirements... security requirements. These IT security requirements cover all NASA contracts in which IT plays a role in...-63, Electronic Authentication Guideline) access to NASA's computer systems, networks, or IT...
A New Security Paradigm for Anti-Counterfeiting: Guidelines and an Implementation Roadmap
NASA Astrophysics Data System (ADS)
Lehtonen, Mikko
Product counterfeitingand piracy continue to plague brand and trademark owners across industry sectors. This chapter analyses the reasons for ineffectiveness of past technical anti-counterfeitingstrategies and formulates managerial guidelines for effective use of RFID in anti-counterfeiting. An implementation roadmap toward secure authentication of products tagged with EPC Gen-2 tags is proposed and possible supply chain locations for product checks are discussed.
Neurosecurity: security and privacy for neural devices.
Denning, Tamara; Matsuoka, Yoky; Kohno, Tadayoshi
2009-07-01
An increasing number of neural implantable devices will become available in the near future due to advances in neural engineering. This discipline holds the potential to improve many patients' lives dramatically by offering improved-and in some cases entirely new-forms of rehabilitation for conditions ranging from missing limbs to degenerative cognitive diseases. The use of standard engineering practices, medical trials, and neuroethical evaluations during the design process can create systems that are safe and that follow ethical guidelines; unfortunately, none of these disciplines currently ensure that neural devices are robust against adversarial entities trying to exploit these devices to alter, block, or eavesdrop on neural signals. The authors define "neurosecurity"-a version of computer science security principles and methods applied to neural engineering-and discuss why neurosecurity should be a critical consideration in the design of future neural devices.
Perceived Security Determinants in E-Commerce among Turkish University Students
ERIC Educational Resources Information Center
Yenisey, M.M.; Ozok, A.A.; Salvendy, G.
2005-01-01
Perceived security is defined as the level of security that users feel while they are shopping on e-commerce sites. The aims of this study were to determine items that positively influence this feeling of security by users during shopping, and to develop guidelines for perceived security in e-commerce. An experiment allowed users with different…
Chiropractic quality assurance: standards and guidelines
Gatterman, Meridel I; Dobson, Thomas P; LeFevbre, Ron
2001-01-01
Chiropractic quality assurance involves development of both clinical guidelines and standards. Confusion generated by poor differentiation of guidelines from standards contributes to mistrust of the guideline development process. Guidelines are considered to be recommendations that allow for flexibility and individual patient differences. Standards are more binding and require a high level of supporting evidence. While guidelines serve as educational tools to improve the quality of practice, standards that outline minimum competency are used more as administrative tools on which to base policy. Barriers to development of clinical guidelines and standards include fear that they will create prescriptive “cookbook” practice, and the distrust that guidelines are developed primarily for cost containment. Clinicians also criticize guidelines developed by academics that don't relate to practice, and those based on evidence that lacks clinical relevance. Conflicting guidelines perceived to be based on strong bias or conflict of interest are also suspect. To reduce barriers to acceptance and implementation, guidelines should be inclusive, patient-centered, and based on a variety of evidence and clinical experience.
14 CFR 1203.603 - Systematic review for declassification.
Code of Federal Regulations, 2011 CFR
2011-01-01
... National Security Agency. (3) Systematic review for declassification of classified information pertaining... coordinated through the Central Intelligence Agency. (4) The Chairperson, NASA Information Security Program... guidelines. The Chairperson, NASA Information Security Program Committee, shall develop, in coordination with...
14 CFR 1203.603 - Systematic review for declassification.
Code of Federal Regulations, 2010 CFR
2010-01-01
... INFORMATION SECURITY PROGRAM Declassification and Downgrading § 1203.603 Systematic review for... review guidelines. The Chairperson, NASA Information Security Program Committee, shall develop, in... custodian and referred to the Chairperson, NASA Information Security Program Committee. This listing shall...
NASA Technical Reports Server (NTRS)
Zelkin, Natalie; Henriksen, Stephen
2011-01-01
This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.
Shinosaki, Kazuhiro
2015-01-01
The domestic introduction of rTMS is expected as a new treatment option for treatment-resistant depression. I discussed some problems with the introduction from three viewpoints : scientific evidence, specialty, and social responsibility. I surveyed scientific evidence for rTMS regarding the action mechanism, effectiveness, side effects, and its positioning in the treatment guidelines. To secure the quality of rTMS treatment, I proposed rTMS guidelines, nurturing of the specialists, and a center hospital plan, and pointed out some medium-term problems after its introduction and the consistency of rTMS treatment and standard depression treatment. From the viewpoint of social responsibility, rTMS treatment should be a medical service covered by health insurance to avoid its misuse. We should prepare to overcome the public suspicion of brain stimulation treatment for mental disease.
Complying with the Campus Security Act--1990. Title II--Crime Awareness and Campus Security.
ERIC Educational Resources Information Center
National Association of Student Personnel Administrators, Inc.
This paper offers guidelines to colleges and universities which must comply with requirements of the Student Right-to-Know and Campus Security Act of 1990, specifically Title II, Crime Awareness and Campus Security. An introduction outlines some measures that campuses are urged to adopt such as campus-wide committees to review security policies,…
Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks
ERIC Educational Resources Information Center
Bashar, Muhammad Shafi Al
2011-01-01
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…
Guidelines for Working with Law Enforcement Agencies
ERIC Educational Resources Information Center
Corn, Michael
2007-01-01
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Gruber, T
1996-01-01
The author presents guidelines to help a security department select a computer system to track security activities--whether it's a commercial software product, an in-house developed program, or a do-it-yourself designed system. Computerized security activity reporting, he believes, is effective and beneficial.
EEOC: benefits application doesn't preclude ADA complaint. Equal Employment Opportunity Commission.
1997-03-07
The Equal Employment Opportunity Commission (EEOC) issued new enforcement guidelines that give employees, including those with AIDS, greater opportunities to press employment discrimination claims in court. An individual may simultaneously be eligible for disability benefits and for legal rights under the Americans with Disabilities Act (ADA). The guidance was developed and issued following a series of court decisions that blocked plaintiffs in ADA cases from proceeding with litigation because they had received disability benefits. ADA standards differ fundamentally from those of disability programs, such as social security, worker's compensation, and disability insurance.
32 CFR 147.15 - Guideline M-Misuse of Information technology systems.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Guideline M-Misuse of Information technology... CLASSIFIED INFORMATION Adjudication § 147.15 Guideline M—Misuse of Information technology systems. (a) The... technology systems may raise security concerns about an individual's trustworthiness, willingness, and...
New security and privacy laws require basic changes in professional practice
NASA Astrophysics Data System (ADS)
Sykes, David M.
2005-09-01
Everybody knows about HIPAA-but what about GLBA? FIPA? The Patriot Act? Homeland Security? NCLB? FCRA? CASB1? PIPEDA? All of these are recent laws that impact acoustical design. Throw in the American Hospital Association/ASHE and AIA's about-to-be-released ``Guidelines for the Design of Healthcare Facilities'' as well as the redrafting of DCID 6/9 and it looks like time for careful examination of some professional practices relating to security and privacy. Should INCE members join with and endorse the ASA's recently formed Joint TCAA/TCN Subcommittee which aims to fill a policy vacuum in Washington and Ottawa relating to the fundamental protection of citizens' rights to privacy? This group will formulate consistent guidelines to enable federal and state agencies in the US and Canada to enforce and monitor their laws-will their guidelines affect INCE members? Those who advise or give expert testimony to government agencies, defense/security organizations, courts, and large institutions in financial services, healthcare or education likely find themselves in a rapidly shifting landscape and recognize the need to respond with new research and professional practices.
Conflict of Interest in Seminal Hepatitis C Virus and Cholesterol Management Guidelines.
Jefferson, Akilah A; Pearson, Steven D
2017-03-01
Little is known regarding whether Institute of Medicine (IOM) standards for managing conflicts of interest (COI) have been met in the development of recent important clinical guidelines. To evaluate adherence to the IOM standards for limits on commercial COI, guideline development, and evaluation of evidence by the 2013 American College of Cardiology and American Heart Association cholesterol management guideline and the 2014 American Association for the Study of Liver Diseases and Infectious Diseases Society of America hepatitis C virus management guideline. This study was a retrospective document review of the June 2014 print version of the cholesterol guideline and the final September 2015 print version of the hepatitis C virus guideline. Each guideline was assessed for adherence to the IOM standards for commercial COI published in the 2011 special report Clinical Practice Guidelines We Can Trust. The IOM standards call for no commercial COI among guideline committee chairs and cochairs and for less than 50% of committee members to have commercial COI. Guideline and contemporaneous article disclosure statements were used to evaluate adherence to these standards. Each guideline was also reviewed for adherence to other IOM standards for guideline development and evidence review. Among the 16 cholesterol guideline committee members, 7 (44%) disclosed commercial COI, all 7 reported industry-sponsored research, and 6 (38%) also reported consultancy. Of 3 guideline chairs and cochairs, 1 (33%) disclosed commercial COI. Review of contemporaneous articles identified additional commercial COI. Among the 29 hepatitis C virus guideline committee members, 21 (72%) reported commercial COI. Eighteen (62%) disclosed industry-sponsored research, 10 (34%) served on advisory boards, 5 (17%) served on data safety monitoring boards, 3 (10%) were consultants, and 3 (10%) reported other honoraria. Of 6 guideline cochairs, 4 (67%) disclosed commercial COI. All 4 disclosed additional COI in other publications that were not listed in their guideline disclosures. Contemporaneous literature review revealed an additional cochair with commercial COI. Of the 9 IOM guideline development and evidence standards, the cholesterol guideline met 5 (56%), and the hepatitis C virus guideline met them all. Neither the cholesterol guideline nor the hepatitis C virus guideline fully met the IOM standards for commercial COI management, and discordance between committee leader guideline disclosures and those in contemporaneous articles was common. Adherence to additional IOM standards for guideline development and evidence review was mixed. Adoption of consistent COI frameworks across specialty societies may help ensure that clinical guidelines are developed in a transparent and trustworthy manner.
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1983-01-01
This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.
Analyzing Cases of Resilience Success and Failure - A Research Study
2012-12-01
controls [NIST 2012, NIST 2008] ISO 27002 and ISO 27004 Guidelines for initiating, implementing, maintaining, and improving information security...Commission ( ISO /IEC). Information technology—Security techniques—Code of practice for information security management ( ISO /IEC 27002 :2005). ISO /IEC, 2005...security management system and controls or groups of controls [ ISO /IEC 2005, ISO /IEC 2009] CIS Security Metrics Outcome and practice metrics measuring
Design Principles and Guidelines for Security
2007-11-21
Padula , Secure Computer Systems: Unified Exposition and Multics Interpretation. Electronic Systems Division, USAF. ESD-TR-75-306, MTR-2997 Rev.1...Hanscom AFB, MA. March 1976 [7] David Elliott Bell. “Looking Back at the Bell-La Padula Model,” Proc. Annual Computer Security Applications Conference
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
..., entitled ``Numerical Guidelines Applicable to Volatile Market Opens'' with a new paragraph, entitled...) of Rule 2128 to eliminate the ability of the Exchange to deviate from the Numerical Guidelines... Numerical Guidelines or Reference Prices in various ``Unusual Circumstances.'' The Exchange proposes to...
32 CFR 2004.11 - Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)].
Code of Federal Regulations, 2014 CFR
2014-07-01
..., or Guidelines [102(b)(3)]. 2004.11 Section 2004.11 National Defense Other Regulations Relating to... NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.11 Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)]. (a) Reviews and Updates. All implementing...
32 CFR 2004.11 - Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)].
Code of Federal Regulations, 2012 CFR
2012-07-01
..., or Guidelines [102(b)(3)]. 2004.11 Section 2004.11 National Defense Other Regulations Relating to... NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.11 Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)]. (a) Reviews and Updates. All implementing...
32 CFR 2004.11 - Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)].
Code of Federal Regulations, 2013 CFR
2013-07-01
..., or Guidelines [102(b)(3)]. 2004.11 Section 2004.11 National Defense Other Regulations Relating to... NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.11 Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)]. (a) Reviews and Updates. All implementing...
32 CFR 2004.11 - Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)].
Code of Federal Regulations, 2011 CFR
2011-07-01
..., or Guidelines [102(b)(3)]. 2004.11 Section 2004.11 National Defense Other Regulations Relating to... NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.11 Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)]. (a) Reviews and Updates. All implementing...
Analysis of health professional security behaviors in a real clinical setting: an empirical study.
Fernández-Alemán, José Luis; Sánchez-Henarejos, Ana; Toval, Ambrosio; Sánchez-García, Ana Belén; Hernández-Hernández, Isabel; Fernandez-Luque, Luis
2015-06-01
The objective of this paper is to evaluate the security behavior of healthcare professionals in a real clinical setting. Standards, guidelines and recommendations on security and privacy best practices for staff personnel were identified using a systematic literature review. After a revision process, a questionnaire consisting of 27 questions was created and responded to by 180 health professionals from a public hospital. Weak passwords were reported by 62.2% of the respondents, 31.7% were unaware of the organization's procedures for discarding confidential information, and 19.4% did not carry out these procedures. Half of the respondents (51.7%) did not take measures to ensure that the personal health information on the computer monitor could not be seen by unauthorized individuals, and 57.8% were unaware of the procedure established to report a security violation. The correlation between the number of years in the position and good security practices was not significant (Pearson's r=0.085, P=0.254). Age was weakly correlated with good security practices (Pearson's r=-0.169, P=0.028). A Mann-Whitney test showed no significant difference between the respondents' security behavior as regards gender (U=2536, P=0.792, n=178). The results of the study suggest that more efforts are required to improve security education for health personnel. It was found that both preventive and corrective actions are needed to prevent health staff from causing security incidents. Healthcare organizations should: identify the types of information that require protection, clearly communicate the penalties that will be imposed, promote security training courses, and define what the organization considers improper behavior to be and communicate this to all personnel. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Code of Federal Regulations, 2010 CFR
2010-01-01
... CURRENCY, DEPARTMENT OF THE TREASURY INVESTMENT SECURITIES Interpretations § 1.130 Type II securities... financing the construction or improvement of facilities at or used by a university or a degree-granting... construction or improvement of facilities used by a hospital may be eligible as a Type II security, if the...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2013 CFR
2013-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2012 CFR
2012-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...
Usable SPACE: Security, Privacy, and Context for the Mobile User
NASA Astrophysics Data System (ADS)
Jutla, Dawn
Users breach the security of data within many financial applications daily as human and/or business expediency to access and use information wins over corporate security policy guidelines. Recognizing that changing user context often requires different security mechanisms, we discuss end-to-end solutions combining several security and context mechanisms for relevant security control and information presentation in various mobile user situations. We illustrate key concepts using Dimitri Kanevskys (IBM Research) early 2000s patented inventions for voice security and classification.
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1983-01-01
The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-03
... 1250-ZA00 Interpretive Standards for Systemic Compensation Discrimination and Voluntary Guidelines for... Order 11246 with respect to Systemic Compensation Discrimination (Standards) and Voluntary Guidelines... to Systemic Compensation Discrimination (Voluntary Guidelines). OFCCP is proposing to rescind the...
Sadeghi-Demneh, Ebrahim; Forghany, Saeed; Onmanee, Pornsuree; Trinler, Ursula; Dillon, Michael P; Baker, Richard
2017-06-20
Standards and guidelines are an integral part of prosthetic and orthotic service delivery in the developed world underpinned by an assumption that they lead to improved services. Implementing them has a cost, however, and that cost needs to be justified, particularly in resource-limited environments. This scoping review thus asks the question, "What is the evidence of the impact of standards and guidelines on service delivery outcomes in prosthetics and orthotics?" A structured search of three electronic databases (Medline, Scopus and Web of Science) followed by manual searching of title, abstract and full text, yielded 29 articles. Four categories of papers were identified: Descriptions and Commentaries (17 papers), Guideline Development (7), Guideline Testing (2) and Standards implementation (3). No articles were explicitly designed to assess the impact of standards and guidelines on service delivery outcomes in prosthetics and orthotics. Studies tended to be commentaries on or descriptions of guideline development, testing or implementation of standards. The literature is not sufficiently well developed to warrant the cost and effort of a systematic review. Future primary research should seek to demonstrate whether and how guidelines and standards improve the outcomes for people that require prostheses, orthoses and other assistive devices. Implications for Rehabilitation International Standards and Clinical Guidelines are now an integral part of clinical service provision in prosthetics and orthotics in the developed world. Complying with standards and guidelines has a cost and, particularly in resource-limited environments, it should be possible to justify this in terms of the resulting benefits. This scoping review concludes that there have been no previous studies designed to directly quantify the effects of implementing standards and guidelines on service delivery.
44 CFR 12.18 - Uniform pay guidelines.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Uniform pay guidelines. 12.18... HOMELAND SECURITY GENERAL ADVISORY COMMITTEES § 12.18 Uniform pay guidelines. (a) Members. Subject to the provisions of this section, the pay of any member of an advisory committee shall be fixed at the daily...
29 CFR 1606.3 - The national security exception.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 4 2010-07-01 2010-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...
29 CFR 1606.3 - The national security exception.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 4 2011-07-01 2011-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...
29 CFR 1606.3 - The national security exception.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 29 Labor 4 2012-07-01 2012-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...
29 CFR 1606.3 - The national security exception.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 29 Labor 4 2014-07-01 2014-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...
29 CFR 1606.3 - The national security exception.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 29 Labor 4 2013-07-01 2013-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...
20 CFR 638.805 - Security and law enforcement.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 3 2012-04-01 2012-04-01 false Security and law enforcement. 638.805 Section... and law enforcement. (a) The Job Corps Director shall provide guidelines to protect the security of... jurisdiction with the appropriate State and locality with respect to criminal law enforcement as long as a...
The Importance of Trust in Electronic Commerce.
ERIC Educational Resources Information Center
Ratnasingham, Pauline
1998-01-01
Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)
20 CFR 638.805 - Security and law enforcement.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Security and law enforcement. 638.805 Section... and law enforcement. (a) The Job Corps Director shall provide guidelines to protect the security of... jurisdiction with the appropriate State and locality with respect to criminal law enforcement as long as a...
Standards and guidelines for observational studies: quality is in the eye of the beholder.
Morton, Sally C; Costlow, Monica R; Graff, Jennifer S; Dubois, Robert W
2016-03-01
Patient care decisions demand high-quality research. To assist those decisions, numerous observational studies are being performed. Are the standards and guidelines to assess observational studies consistent and actionable? What policy considerations should be considered to ensure decision makers can determine if an observational study is of high-quality and valid to inform treatment decisions? Based on a literature review and input from six experts, we compared and contrasted nine standards/guidelines using 23 methodological elements involved in observational studies (e.g., study protocol, data analysis, and so forth). Fourteen elements (61%) were addressed by at least seven standards/guidelines; 12 of these elements disagreed in the approach. Nine elements (39%) were addressed by six or fewer standards/guidelines. Ten elements (43%) were not actionable in at least one standard/guideline that addressed the element. The lack of observational study standard/guideline agreement may contribute to variation in study conduct; disparities in what is considered credible research; and ultimately, what evidence is adopted. A common set of agreed on standards/guidelines for conducting observational studies will benefit funders, researchers, journal editors, and decision makers. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.
32 CFR 2004.11 - Agency Implementing Regulations, Internal Rules, or Guidelines [102(b)(3)].
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.11 Agency...
45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection... of the security standards. (a) Health plan. (1) A health plan that is not a small health plan must...
36 CFR 292.42 - Management standards and guidelines.
Code of Federal Regulations, 2010 CFR
2010-07-01
... guidelines. 292.42 Section 292.42 Parks, Forests, and Public Property FOREST SERVICE, DEPARTMENT OF... standards and guidelines. (a) In addition to existing statutory and regulatory authority governing administration of National Forest System lands and resources, the standards and guidelines in §§ 292.43 to 292.48...
NASA Technical Reports Server (NTRS)
Branch, Drew A.
2014-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to the communication among the military branches legionnaires. With advanced persistent threats (APT's) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning, and configuration of network devices i.e. routers and IDS's/IPS's. In addition, I will be completing security assessments on software and hardware, vulnerability assessments and reporting, and conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.
NASA Technical Reports Server (NTRS)
Branch, Drew
2013-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere was heightened from Airports to the communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning and configuration of network devices i.e. routers and IDSsIPSs. In addition I will be completing security assessments on software and hardware, vulnerability assessments and reporting, conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, policies and procedures.
Woo, E H C; White, P; Lai, C W K
2016-03-01
This paper presents an overview of global ergonomics standards and guidelines for design of computer workstations, with particular focus on their inconsistency and associated health risk impact. Overall, considerable disagreements were found in the design specifications of computer workstations globally, particularly in relation to the results from previous ergonomics research and the outcomes from current ergonomics standards and guidelines. To cope with the rapid advancement in computer technology, this article provides justifications and suggestions for modifications in the current ergonomics standards and guidelines for the design of computer workstations. Practitioner Summary: A research gap exists in ergonomics standards and guidelines for computer workstations. We explore the validity and generalisability of ergonomics recommendations by comparing previous ergonomics research through to recommendations and outcomes from current ergonomics standards and guidelines.
Standard development at the Human Variome Project.
Smith, Timothy D; Vihinen, Mauno
2015-01-01
The Human Variome Project (HVP) is a world organization working towards facilitating the collection, curation, interpretation and free and open sharing of genetic variation information. A key component of HVP activities is the development of standards and guidelines. HVP Standards are systems, procedures and technologies that the HVP Consortium has determined must be used by HVP-affiliated data sharing infrastructure and should be used by the broader community. HVP guidelines are considered to be beneficial for HVP affiliated data sharing infrastructure and the broader community to adopt. The HVP also maintains a process for assessing systems, processes and tools that implement HVP Standards and Guidelines. Recommended System Status is an accreditation process designed to encourage the adoption of HVP Standards and Guidelines. Here, we describe the HVP standards development process and discuss the accepted standards, guidelines and recommended systems as well as those under acceptance. Certain HVP Standards and Guidelines are already widely adopted by the community and there are committed users for the others. © The Author(s) 2015. Published by Oxford University Press.
Standard development at the Human Variome Project
Smith, Timothy D.; Vihinen, Mauno
2015-01-01
The Human Variome Project (HVP) is a world organization working towards facilitating the collection, curation, interpretation and free and open sharing of genetic variation information. A key component of HVP activities is the development of standards and guidelines. HVP Standards are systems, procedures and technologies that the HVP Consortium has determined must be used by HVP-affiliated data sharing infrastructure and should be used by the broader community. HVP guidelines are considered to be beneficial for HVP affiliated data sharing infrastructure and the broader community to adopt. The HVP also maintains a process for assessing systems, processes and tools that implement HVP Standards and Guidelines. Recommended System Status is an accreditation process designed to encourage the adoption of HVP Standards and Guidelines. Here, we describe the HVP standards development process and discuss the accepted standards, guidelines and recommended systems as well as those under acceptance. Certain HVP Standards and Guidelines are already widely adopted by the community and there are committed users for the others. PMID:25818894
History and Organizations for Radiological Protection.
Kang, Keon Wook
2016-02-01
International Commission on Radiological Protection (ICRP), an independent international organization established in 1925, develops, maintains, and elaborates radiological protection standards, legislation, and guidelines. United Nations Scientific Committee on the Effects of Atomic Radiation (UNSCEAR) provides scientific evidence. World Health Organization (WHO) and International Atomic Energy Agency (IAEA) utilise the ICRP recommendations to implement radiation protection in practice. Finally, radiation protection agencies in each country adopt the policies, and adapt them to each situation. In Korea, Nuclear Safety and Security Commission is the governmental body for nuclear safety regulation and Korea Institute of Nuclear Safety is a public organization for technical support and R&D in nuclear safety and radiation protection.
76 FR 30308 - National Standard 10 Guidelines; Public Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... Standard 10 Guidelines; Public Meetings AGENCY: National Marine Fisheries Service (NMFS), National Oceanic... to the National Standard 10 (NS10) Guidelines and announced a public meeting to be held on May 19... practicable, promote the safety of human life at sea.'' NMFS published final guidelines for NS10 in 1998 (63...
Practical School Security: Basic Guidelines for Safe and Secure Schools.
ERIC Educational Resources Information Center
Trump, Kenneth S.
This book is written primarily for elementary and secondary school administrators and teachers, but college faculty involved in providing teacher or administrator education would also benefit from the practical approach to issues of school security. Chapters 1 through 3 establish a framework for dealing with the myths and realities of school…
Weyhe, D; Uslar, V N; Mählmeyer, C; Oehlers, H
2018-06-21
Guidelines aim to standardize treatment concepts based on evidence from the literature and may thus be viewed as collegial support; however, there is a lack of clarity about the legal relevance and legal validity of international guidelines compared to the Association of the Scientific Medical Societies in Germany (AWMF) recommendations. A literature search was conducted on German AWMF guidelines and on international guidelines for inguinal hernia in adults. Differences in the structure of the guidelines were analyzed and legal terms, such as the medical standard, the Patients' Rights Act and the current legal literature are defined and commented on with respect to guideline-compliant treatment. Since 2003 a total of 15 guidelines and recommendations for the treatment of inguinal hernia have been published. There are no AWMF guidelines on one of the procedures most frequently performed in Germany. Among the relevant judgments and laws passed from 1994 onwards, § 630 of the German Civil Code (BGB) passed in 2013 seems to be particularly significant, since it standardizes the term "medical standard" and explicitly allows values falling short of the standard after clarification. From a legal point of view, the basic prerequisites for medical treatment are patient consent and intervention education. In principle, a non-guideline-compliant treatment procedure can be agreed. The patient must be informed about the treatment options that are relevant to the medical standard, the procedure must be indicated according to the medical standard and the operation must be performed in accordance with the national medical specialist standard. Thus, international guidelines cannot a priori claim to be followed unobserved and are therefore not legally comparable to the German S3 guidelines of the AWMF. It is strongly advised to expressly point out and explicitly explain anything falling short of the standard, individual healing attempts and so-called outsider methods.
Implementation Guidelines for State Safety Oversight of Rail Fixed Guideway Systems
DOT National Transportation Integrated Search
1996-06-01
These guidelines will assist states, oversight agencies, and rail transit agencies in developing safety and security programs to satisfy the requirements of the Federal Transit Administration (FTA). These requirements were published in the Federal Re...
Application of the API/NPRA SVA methodology to transportation security issues.
Moore, David A
2006-03-17
Security vulnerability analysis (SVA) is becoming more prevalent as the issue of chemical process security is of greater concern. The American Petroleum Institute (API) and the National Petrochemical and Refiner's Association (NPRA) have developed a guideline for conducting SVAs of petroleum and petrochemical facilities in May 2003. In 2004, the same organizations enhanced the guidelines by adding the ability to evaluate transportation security risks (pipeline, truck, and rail). The importance of including transportation and value chain security in addition to fixed facility security in a SVA is that these issues may be critically important to understanding the total risk of the operation. Most of the SVAs done using the API/NPRA SVA and other SVA methods were centered on the fixed facility and the operations within the plant fence. Transportation interfaces alone are normally studied as a part of the facility SVA, and the entire transportation route impacts and value chain disruption are not commonly considered. Particularly from a national, regional, or local infrastructure analysis standpoint, understanding the interdependencies is critical to the risk assessment. Transportation risks may include weaponization of the asset by direct attack en route, sabotage, or a Trojan Horse style attack into a facility. The risks differ in the level of access control and the degree of public exposures, as well as the dynamic nature of the assets. The public exposures along the transportation route need to be carefully considered. Risks may be mitigated by one of many strategies including internment, staging, prioritization, conscription, or prohibition, as well as by administrative security measures and technology for monitoring and isolating the assets. This paper illustrates how these risks can be analyzed by the API/NPRA SVA methodology. Examples are given of a pipeline operation, and other examples are found in the guidelines.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY INFORMATION POLICY AND GUIDELINES, IMPLEMENTING REGULATIONS § 806.2 Applicability. This rule supplements Executive Order 12065 within the Board with regard to national security information. It establishes general policies and certain procedures for the classification and declassification of information...
45 CFR 164.306 - Security standards: General rules.
Code of Federal Regulations, 2012 CFR
2012-10-01
... RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164.306 Security standards: General rules. (a) General requirements. Covered... covered entity to reasonably and appropriately implement the standards and implementation specifications...
45 CFR 164.306 - Security standards: General rules.
Code of Federal Regulations, 2013 CFR
2013-10-01
... RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164.306 Security standards: General rules. (a) General requirements. Covered... and appropriately implement the standards and implementation specifications as specified in this...
A case of standardization? Implementing health promotion guidelines in Denmark.
Rod, Morten Hulvej; Høybye, Mette Terp
2016-09-01
Guidelines are increasingly used in an effort to standardize and systematize health practices at the local level and to promote evidence-based practice. The implementation of guidelines frequently faces problems, however, and standardization processes may in general have other outcomes than the ones envisioned by the makers of standards. In 2012, the Danish National Health Authorities introduced a set of health promotion guidelines that were meant to guide the decision making and priority setting of Denmark's 98 local governments. The guidelines provided recommendations for health promotion policies and interventions and were structured according to risk factors such as alcohol, smoking and physical activity. This article examines the process of implementation of the new Danish health promotion guidelines. The article is based on qualitative interviews and participant observation, focusing on the professional practices of health promotion officers in four local governments as well as the field of Danish health promotion more generally. The analysis highlights practices and episodes related to the implementation of the guidelines and takes inspiration from Timmermans and Epstein's sociology of standards and standardization. It remains an open question whether or not the guidelines lead to more standardized policies and interventions, but we suggest that the guidelines promote a risk factor-oriented approach as the dominant frame for knowledge, reasoning, decision making and priority setting in health promotion. We describe this process as a case of epistemic standardization. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Cloud Computing for Mission Design and Operations
NASA Technical Reports Server (NTRS)
Arrieta, Juan; Attiyah, Amy; Beswick, Robert; Gerasimantos, Dimitrios
2012-01-01
The space mission design and operations community already recognizes the value of cloud computing and virtualization. However, natural and valid concerns, like security, privacy, up-time, and vendor lock-in, have prevented a more widespread and expedited adoption into official workflows. In the interest of alleviating these concerns, we propose a series of guidelines for internally deploying a resource-oriented hub of data and algorithms. These guidelines provide a roadmap for implementing an architecture inspired in the cloud computing model: associative, elastic, semantical, interconnected, and adaptive. The architecture can be summarized as exposing data and algorithms as resource-oriented Web services, coordinated via messaging, and running on virtual machines; it is simple, and based on widely adopted standards, protocols, and tools. The architecture may help reduce common sources of complexity intrinsic to data-driven, collaborative interactions and, most importantly, it may provide the means for teams and agencies to evaluate the cloud computing model in their specific context, with minimal infrastructure changes, and before committing to a specific cloud services provider.
NASA Astrophysics Data System (ADS)
Montuori, Antonio; Anderlini, Letizia; Palano, Mimmo; Albano, Matteo; Pezzo, Giuseppe; Antoncecchi, Ilaria; Chiarabba, Claudio; Serpelloni, Enrico; Stramondo, Salvatore
2018-07-01
In this study, we tested the "land-subsidence monitoring guidelines" proposed by the Italian Ministry of Economic Development (MISE), to study ground deformations along on-shore hydrocarbon reservoirs. We propose protocols that include the joint use of Global Positioning System (GPS) and multi-temporal Differential Interferometric Synthetic Aperture Radar (DInSAR) techniques, for a twofold purpose: a) monitoring land subsidence phenomena along selected areas after defining the background of ground deformations; b) analyzing possible relationships between hydrocarbon exploitation and anomalous deformation patterns. Experimental results, gathered along the Ravenna coastline (northern Italy) and in the southeastern Sicily (southern Italy), show wide areas of subsidence mainly related to natural and anthropogenic processes. Moreover, ground deformations retrieved through multi-temporal DInSAR time series exhibit low sensitivity as well as poor spatial and temporal correlation with hydrocarbon exploitation activities. Results allow evaluating the advantages and limitations of proposed protocols, to improve the techniques and security standards established by MISE guidelines for monitoring on-shore hydrocarbon reservoirs.
Toward improved guideline quality: using the COGS statement with GEM.
Shiffman, Richard N; Michel, Georges
2004-01-01
The Conference on Guideline Standardization (COGS) was convened to create a standardized documentation checklist for clinical practice guidelines in an effort to promote guideline quality and facilitate implementation. The statement was created by a multidisciplinary panel using a rigorous consensus development methodology. The Guideline Elements Model (GEM) provides a standardized approach to representing guideline documents using XML. In this work, we demonstrate the sufficiency of GEM for describing COGS components. Using the mapping between COGS and GEM elements we built an XSLT application to examine a guideline's adherence (or non-adherence) to the COGS checklist. Once a guideline has been marked up according to the GEM hierarchy, its knowledge content can be reused in multiple ways.
Utilization of the American Telemedicine Association's Clinical Practice Guidelines
Antoniotti, Nina; Bernard, Jordana
2013-01-01
Abstract Background: The American Telemedicine Association (ATA) Standards and Guidelines Committee develops practice standards and guidelines. Key to the Committee's mission is dissemination so the standards can be used in the practice of telemedicine. Over a 2-year period, when a standards document was accessed from the ATA Web site, a short survey was completed, but it did not assess how the documents were used once downloaded. A more formal survey was conducted to determine the impact ATA standards and guidelines are having on healthcare delivery via telemedicine. Materials and Methods: A survey was developed and distributed via SurveyMonkey to 13,177 ATA members and nonmembers in November 2011. Results were compiled and analyzed after a 90-day open period for responses to be submitted. Results: The majority of respondents (96%) believe the practice of telemedicine/telehealth should have standards and guidelines and that the ATA and other professional societies/associations should be responsible for developing them. The top uses of guidelines include guidance for clinical practice, training, gaining reimbursement, and research. Respondents indicating a need for standards and guidelines said the ATA (78.7%) and other professional societies/associations (74.5%) should be responsible for development. When asked to list specific practice guidelines or standards they are using for telehealth, the majority (21.5%) are using in-house (e.g., hospital, company)-developed guidelines, followed by those from professional associations/societies (20.4%) and those developed by the ATA (18.2%). Conclusions: Overall, the survey results indicate guidelines documents developed by the ATA and other professional societies and those developed in-house are being regularly accessed and used in both public and private sectors. Practitioners of telemedicine believe that standards and guidelines are needed for guidance for clinical practice, training, gaining reimbursement, and research, and they are to use those developed by professional organization such as the ATA as well as those developed by their own institutions. PMID:24050615
20 CFR 416.1033 - Policies and operating instructions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 416.1033 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Determinations of Disability Administrative Responsibilities and Requirements... guidelines necessary for it to carry out its responsibilities in performing the disability determination...
Interpreting international governance standards for health IT use within general medical practice.
Mahncke, Rachel J; Williams, Patricia A H
2014-01-01
General practices in Australia recognise the importance of comprehensive protective security measures. Some elements of information security governance are incorporated into recommended standards, however the governance component of information security is still insufficiently addressed in practice. The International Organistion for Standardisation (ISO) released a new global standard in May 2013 entitled, ISO/IEC 27014:2013 Information technology - Security techniques - Governance of information security. This standard, applicable to organisations of all sizes, offers a framework against which to assess and implement the governance components of information security. The standard demonstrates the relationship between governance and the management of information security, provides strategic principles and processes, and forms the basis for establishing a positive information security culture. An analysis interpretation of this standard for use in Australian general practice was performed. This work is unique as such interpretation for the Australian healthcare environment has not been undertaken before. It demonstrates an application of the standard at a strategic level to inform existing development of an information security governance framework.
45 CFR 164.306 - Security standards: General rules.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...
45 CFR 164.306 - Security standards: General rules.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 1 2011-10-01 2011-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...
45 CFR 164.306 - Security standards: General rules.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 1 2014-10-01 2014-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...
Crops and food security--experiences and perspectives from Taiwan.
Huang, Chen-Te; Fu, Tzu-Yu Richard; Chang, Su-San
2009-01-01
Food security is an important issue that is of concern for all countries around the world. There are many factors which may cause food insecurity including increasing demand, shortage of supply, trade condition, another countries' food policy, lack of money, high food and oil prices, decelerating productivity, speculation, etc. The food self-sufficiency ratio of Taiwan is only 30.6% weighted by energy in 2007. Total agriculture imports and cereals have increased significantly due to the expansion of livestock and fishery industries and improve living standard. The agriculture sector of Taiwan is facing many challenges, such as: low level of food self-sufficiency, aging farmers, large acreage of set-aside farmlands, small scale farming, soaring price of fertilizers, natural disasters accelerated by climate change, and rapid changes in the world food economy. To cope with these challenges, the present agricultural policy is based on three guidelines: "Healthfulness, Efficiency, and Sustainability." A program entitled "Turning Small Landlords into Large Tenants" was launched to make effective use of idle lands. Facing globalization and the food crisis, Taiwan will secure stable food supply through revitalization of its set-aside farmlands and international markets, and provide technical assistance to developing countries, in particular for staple food crops.
Privacy enhanced group communication in clinical environment
NASA Astrophysics Data System (ADS)
Li, Mingyan; Narayanan, Sreeram; Poovendran, Radha
2005-04-01
Privacy protection of medical records has always been an important issue and is mandated by the recent Health Insurance Portability and Accountability Act (HIPAA) standards. In this paper, we propose security architectures for a tele-referring system that allows electronic group communication among professionals for better quality treatments, while protecting patient privacy against unauthorized access. Although DICOM defines the much-needed guidelines for confidentiality of medical data during transmission, there is no provision in the existing medical security systems to guarantee patient privacy once the data has been received. In our design, we address this issue by enabling tracing back to the recipient whose received data is disclosed to outsiders, using watermarking technique. We present security architecture design of a tele-referring system using a distributed approach and a centralized web-based approach. The resulting tele-referring system (i) provides confidentiality during the transmission and ensures integrity and authenticity of the received data, (ii) allows tracing of the recipient who has either distributed the data to outsiders or whose system has been compromised, (iii) provides proof of receipt or origin, and (iv) can be easy to use and low-cost to employ in clinical environment.
Development and Application of Skill Standards for Security Practitioners
2006-07-01
Development and Application of Skill Standards for Security Practitioners Henry K. Simpson Northrop Grumman Technical Services Lynn F. Fischer...and Application of Skill Standards for Security Practitioners Henry K. Simpson, Northrop Grumman Technical Services Lynn F. Fischer, Defense...described in the present report was driven by a JSTC tasking to develop skill standards for security practitioners in seven different security
Completion of risk assessment and monitoring within forensic psychiatry.
Galappathie, Nuwan; Heeramun, Ragini; Jethwa, Krishma
2009-04-01
There is a clear need for high standards of risk assessment and monitoring within forensic psychiatry. This has been highlighted by a number of high profile homicide enquires which have called for better standards of multidisciplinary risk assessment and monitoring. There are no national standards for risk assessment. We conducted a study to audit electronically the completion rate of a service-designed risk assessment document within Fromside, a medium secure unit in the UK. The completion rates for key sections of 64 risk assessment documents were assessed. Only 48 of the 64 (75%) documents were electronically available. The completion rates ranged from 59/64 (92%) for the retrospective risk review to 46/64 (72%) for relapse indicators. Only 35/64 (55%) risk documents were updated within the last three months. We found that the use of risk profile documents has helped achieve good standards of risk assessment, however greater priority needs to be given to ongoing monitoring. We recommend that consideration is given to the development of national guidelines for multidisciplinary risk assessment and monitoring.
7 CFR 611.10 - Standards, guidelines, and plans.
Code of Federal Regulations, 2012 CFR
2012-01-01
... CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE CONSERVATION OPERATIONS SOIL SURVEYS Soil Survey Operations § 611.10 Standards, guidelines, and plans. (a) NRCS conducts soil surveys under national standards and guidelines for naming, classifying, and interpreting soils and for disseminating soil survey information. (b...
7 CFR 611.10 - Standards, guidelines, and plans.
Code of Federal Regulations, 2014 CFR
2014-01-01
... CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE CONSERVATION OPERATIONS SOIL SURVEYS Soil Survey Operations § 611.10 Standards, guidelines, and plans. (a) NRCS conducts soil surveys under national standards and guidelines for naming, classifying, and interpreting soils and for disseminating soil survey information. (b...
7 CFR 611.10 - Standards, guidelines, and plans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE CONSERVATION OPERATIONS SOIL SURVEYS Soil Survey Operations § 611.10 Standards, guidelines, and plans. (a) NRCS conducts soil surveys under national standards and guidelines for naming, classifying, and interpreting soils and for disseminating soil survey information. (b...
7 CFR 611.10 - Standards, guidelines, and plans.
Code of Federal Regulations, 2011 CFR
2011-01-01
... CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE CONSERVATION OPERATIONS SOIL SURVEYS Soil Survey Operations § 611.10 Standards, guidelines, and plans. (a) NRCS conducts soil surveys under national standards and guidelines for naming, classifying, and interpreting soils and for disseminating soil survey information. (b...
7 CFR 611.10 - Standards, guidelines, and plans.
Code of Federal Regulations, 2013 CFR
2013-01-01
... CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE CONSERVATION OPERATIONS SOIL SURVEYS Soil Survey Operations § 611.10 Standards, guidelines, and plans. (a) NRCS conducts soil surveys under national standards and guidelines for naming, classifying, and interpreting soils and for disseminating soil survey information. (b...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-22
...] Draft Guidelines on Pharmacovigilance of Veterinary Medicinal Products: Electronic Standards for... Requirements for the Registration of Veterinary Medicinal Products (VICH) has developed a draft guideline titled ``Pharmacovigilance of Veterinary Medicinal Products: Electronic Standards for Transfer of Data...
PIAAC Technical Standards and Guidelines
ERIC Educational Resources Information Center
OECD Publishing, 2014
2014-01-01
The Programme for International Assessment of Adult Competencies (PIAAC) will establish technical standards and guidelines to ensure that the survey design and implementation processes of PIAAC yield high-quality and internationally comparable data. This document provides a revised version of the technical standards and guidelines originally…
Asperger Syndrome: Treatment and Intervention. Some Guidelines for Parents.
ERIC Educational Resources Information Center
Klin, Ami; Volkmar, Fred R.
This guide provides assessment, education, and treatment strategies for children with Asperger syndrome. It discusses assessment, and provides guidelines for securing and implementing services and determines appropriate placement. The following recommendations are also provided for general intervention strategies: (1) skills, concept, appropriate…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-29
...] Guidance for Industry on Standards for Securing the Drug Supply Chain--Standardized Numerical... industry entitled ``Standards for Securing the Drug Supply Chain-Standardized Numerical Identification for... the Drug Supply Chain-Standardized Numerical Identification for Prescription Drug Packages.'' In the...
A proposed approach for the assessment of chemicals in indirect potable reuse schemes.
Rodriguez, Clemencia; Weinstein, Philip; Cook, Angus; Devine, Brian; Van Buynder, Paul
2007-10-01
The city of Perth in Western Australia is facing a future of compromised water supplies. In recent years, this urban region has been experiencing rapid population growth, coupled with drying climate, which has exacerbated water shortages. As part of the government strategy to secure water sustainability and to address an agenda focused on all elements of the water cycle, a target of 20% reuse of treated wastewater by 2012 was established. This includes a feasibility review of managed aquifer recharge for indirect potable reuse. A characterization of contaminants in wastewater after treatment and an assessment of the health implications are necessary to reassure both regulators and the public. To date, the commonly used approach involves a comparison of measured contaminant concentrations with the established drinking-water standards or other toxicological guidelines for the protection of human health. However, guidelines and standards have not been established for many contaminants in recycled water (unregulated chemicals). This article presents a three-tiered approach for the preliminary health risk assessment of chemicals in order to determine key contaminants that need to be monitored and managed. The proposed benchmark values for the calculation of risk quotients are health based, systematically defined, scientifically defensible, easy to apply, and clear to interpret. The proposed methodology is based on the derivation of health-based levels for unregulated contaminants with toxicity information and a "threshold of toxicological concern" for unregulated contaminants without toxicity data. The application of this approach will help policymakers set guidelines regarding unregulated chemicals in recycled water.
A Proactive Approach to Building Security.
ERIC Educational Resources Information Center
Winters, Sharon
1994-01-01
Describes building security procedures developed at the Hampton Public Library (Virginia) to deal with problem patrons. Highlights include need for the library monitor program; staffing patterns; monitor selection criteria; training procedures; library behavior guidelines; library policy statements; theft detection systems; and sample job…
Richmond, Jonathan Y; Nesby-O'Dell, Shanna L
2002-12-06
In recent years, concern has increased regarding use of biologic materials as agents of terrorism, but these same agents are often necessary tools in clinical and research microbiology laboratories. Traditional biosafety guidelines for laboratories have emphasized use of optimal work practices, appropriate containment equipment, well-designed facilities, and administrative controls to minimize risk of worker injury and to ensure safeguards against laboratory contamination. The guidelines discussed in this report were first published in 1999 (U.S. Department of Health and Human Services/CDC and National Institutes of Health. Biosafety in microbiological and biomedical laboratories [BMBL]. Richmond JY, McKinney RW, eds. 4th ed. Washington, DC: US Department of Health and Human Services, 1999 [Appendix F]). In that report, physical security concerns were addressed, and efforts were focused on preventing unauthorized entry to laboratory areas and preventing unauthorized removal of dangerous biologic agents from the laboratory. Appendix F of BMBL is now being revised to include additional information regarding personnel risk assessments, and inventory controls. The guidelines contained in this report are intended for laboratories working with select agents under biosafety-level 2, 3, or 4 conditions as described in Sections II and III of BMBL. These recommendations include conducting facility risk assessments and developing comprehensive security plans to minimize the probability of misuse of select agents. Risk assessments should include systematic, site-specific reviews of 1) physical security; 2) security of data and electronic technology systems; 3) employee security; 4) access controls to laboratory and animal areas; 5) procedures for agent inventory and accountability; 6) shipping/transfer and receiving of select agents; 7) unintentional incident and injury policies; 8) emergency response plans; and 9) policies that address breaches in security. The security plan should be an integral part of daily operations. All employees should be well-trained and equipped, and the plan should be reviewed annually, at least.
The History of Preconception Care: Evolving Guidelines and Standards
Moos, Merry-K.; Curtis, Michele
2006-01-01
This article explores the history of the preconception movement in the United States and the current status of professional practice guidelines and standards. Professionals with varying backgrounds (nurses, nurse practitioners, family practice physicians, pediatricians, nurse midwives, obstetricians/gynecologists) are in a position to provide preconception health services; standards and guidelines for numerous professional organizations, therefore, are explored. The professional nursing organization with the most highly developed preconception health standards is the American Academy of Nurse Midwives (ACNM); for physicians, it is the American College of Obstetricians and Gynecologists (ACOG). These guidelines and standards are discussed in detail. PMID:16710764
[Standards and guidelines of radiation protection and safety in dental X-ray examinations].
Guo, X L; Li, G; Cheng, Y; Yu, Q; Wang, H; Zhang, Z Y
2017-12-09
With the rapid development of imaging technology, the application of dental imaging in diagnosis, treatment planning, intraoperative surgical navigation, monitoring of treatment or lesion development and assessment of treatment outcomes is playing an essential role in oral healthcare. The increased total number of dental X-ray examinations is accompanied by a relatively significant increase in collective dose to patients as well as to dental healthcare workers, which is harmful to human bodies to a certain degree. Some radiation protection standards and guidelines in dental radiology have been published in European countries, US, Canada and Australia, etc. Adherence to these standards and guidelines helps to achieve images with diagnostic quality and avoid unnecessary and repeated exposures. However, no radiation protection standard or guideline with regard to dental X-ray examinations has been put in force so far in mainland China. Therefore, a literature review on available radiation protection standards and guidelines was conducted to provide reference to the development of radiation protection standards or guidelines in mainland China.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-11
... before May 12, 2011. ADDRESSES: Written comments may be sent to: Chief, Computer Security Division... FURTHER INFORMATION CONTACT: Elaine Barker, Computer Security Division, National Institute of Standards... Quynh Dang, Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD...
Spectrum for UAS Control and Non-Payload Communications
NASA Technical Reports Server (NTRS)
Kerczewski, Robert J.
2013-01-01
There is an increasing need to fly UAS in the NAS to perform missions of vital importance to National Security and Defense, Emergency Management, and Science as well as commercial applications (e.g. cargo transport). To enable integration of UAS into the National Airspace System, several critical technical barriers must be eliminated, including: Separation Assurance/Sense and Avoid - the uncertainty surrounding the ability to interoperate in ATC environments and maintain safe separation from other aircraft in the absence of an on-board pilot. Human Systems Integration - lack of standards and guidelines with respect to UAS display information as well as lack of Ground Control Station (GCS) design requirements to operate in the NAS. Certification - lack of airworthiness requirements and safety-related data specific to the full range of UAS, or for their avionics systems or other components. Communications - lack of standard, certifiable data links and aviation safety spectrum to operate such links for civil UAS control communications.
Telemedicine in neurosurgical emergency: Indian perspective
Sinha, Virendra Deo; Tiwari, Rahul Nath; Kataria, Rashim
2012-01-01
Telemedicine is rapidly developing telecommunication technology to provide medical information and services. The importance of telemedicine for neurosurgical emergencies was established with the fact that majority of the neurosurgical specialists are practicing in urban settings and in most of the rural areas, neurosurgical care is far off or non-existing. Countries with inadequate health care must incorporate telemedicine in their health care system. Telemedicine offers real benefits in a country as vast as India, where the majority of the population lives in remote areas with no access to even the most basic healthcare. Issues pertaining security, privacy, maintaining standards, and legal aspects are relevant. A recommended set of standards and guidelines for telemedicine needs to be set in place and constantly refined to promote the integrated growth of telemedicine in the country. The paper discusses various issues, shortcomings, and utility of telemedicine in India. PMID:22870155
Research and develop locking design for NJDOT junction boxes : final report, April 2009.
DOT National Transportation Integrated Search
2009-04-01
The report outlines the guidelines for securing electrical junction box covers to the junction box to prevent vandalism. The report provides details drawings that show various methods for securing the junction box cover to the junction box.
45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 1 2011-10-01 2011-10-01 false Compliance dates for the initial implementation of the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection...
45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 1 2014-10-01 2014-10-01 false Compliance dates for the initial implementation of the security standards. 164.318 Section 164.318 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection...
Grant, Sean P.; Mayo-Wilson, Evan; Melendez-Torres, G. J.; Montgomery, Paul
2013-01-01
Background Previous reviews show that reporting guidelines have improved the quality of trial reports in medicine, yet existing guidelines may not be fully suited for social and psychological intervention trials. Objective/Design We conducted a two-part study that reviewed (1) reporting guidelines for and (2) the reporting quality of social and psychological intervention trials. Data Sources (1) To identify reporting guidelines, we systematically searched multiple electronic databases and reporting guideline registries. (2) To identify trials, we hand-searched 40 journals with the 10 highest impact factors in clinical psychology, criminology, education, and social work. Eligibility (1) Reporting guidelines consisted of articles introducing a checklist of reporting standards relevant to social and psychological intervention trials. (2) Trials reported randomised experiments of complex interventions with psychological, social, or health outcomes. Results (1) We identified 19 reporting guidelines that yielded 147 reporting standards relevant to social and psychological interventions. Social and behavioural science guidelines included 89 standards not found in CONSORT guidelines. However, CONSORT guidelines used more recommended techniques for development and dissemination compared to other guidelines. (2) Our review of trials (n = 239) revealed that many standards were poorly reported, such as identification as a randomised trial in titles (20% reported the information) and abstracts (55%); information about blinding (15%), sequence generation (23%), and allocation concealment (17%); and details about actual delivery of experimental (43%) and control interventions (34%), participant uptake (25%), and service environment (28%). Only 11 of 40 journals referenced reporting guidelines in “Instructions to Authors.” Conclusion Existing reporting guidelines have important limitations in content, development, and/or dissemination. Important details are routinely missing from trial publications; most leading journals in social and behavioural sciences do not ask authors to follow reporting standards. Findings demonstrate a need to develop a CONSORT extension with updated standards for social and psychological intervention trials. PMID:23734256
Issues in protection of human subjects in internet research.
Im, Eun-Ok; Chee, Wonshik
2002-01-01
Despite the increasing use of the Internet among nurses, the use of the Internet in nursing research has been rarely discussed and critiqued in terms of issues in protection of human subjects. In this article, issues in protection of human subjects in Internet research are explored by analyzing an Internet study to propose directions for human protection in Internet research. Issues raised through the study include those related to (a) anonymity and confidentiality, (b) security, (c) self-determination and authenticity, (d) full disclosure, and (e) fair treatment. Based on discussion of the five issues, development of standardized guidelines, investigator triangulation, and information sharing are proposed as directions for protection of human subjects in Internet research.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-18
... DEPARTMENT OF ENERGY Office of Energy Efficiency and Renewable Energy Guidelines for Home Energy... for Home Energy Professionals: Standard Work Specifications for Single Family Energy Upgrades was...: Comments on the Guidelines for Home Energy Professionals: Standard Work Specifications for Single Family...
40 CFR 420.07 - Effluent limitations guidelines and standards for pH.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 28 2010-07-01 2010-07-01 true Effluent limitations guidelines and standards for pH. 420.07 Section 420.07 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS IRON AND STEEL MANUFACTURING POINT SOURCE CATEGORY General Provisions...
Technical standards and guidelines: molecular genetic testing for ultra-rare disorders.
Maddalena, Anne; Bale, Sherri; Das, Soma; Grody, Wayne; Richards, Sue
2005-10-01
These standards and guidelines are designed primarily as an educational resource for clinical laboratory geneticists to help them provide quality clinical laboratory genetic services. Adherence to these standards and guidelines does not necessarily ensure a successful medical outcome. These standards and guidelines should not be considered inclusive of all proper procedures and tests or exclusive of other procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific procedure or test, the clinical molecular geneticist should apply his or her own professional judgment to the specific clinical circumstances presented by the individual patient or specimen. It may be prudent, however, to document in the laboratory record the rationale for any significant deviation from these standards and guidelines.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lowe, Daniel L.
2004-11-01
The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory andmore » knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security plans, etc. This standardized approach is applied to specific country and regional needs. Recent examples (FY 2003-2004) include foreign missions to Lithuania, Russian Federation Navy, Russia - PNPI, Greece (joint mission with IAEA), Tanzania, Iraq, Chile, Ecuador, and Egypt. Some of the ambitions and results of the RTR program may be characterized by the successes in Lithuania, Greece, and Russia.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schurman, D.L.; Datesman, G.H. Jr; Truitt, J.O.
The report presents a system for evaluating and correcting deficiencies in security-force effectiveness in licensed nuclear facilities. There are four checklists which security managers can copy directly, or can use as guidelines for developing their own checklists. The checklists are keyed to corrective-action guides found in the body of the report. In addition to the corrective-action guides, the report gives background information on the nature of security systems and discussions of various special problems of the licensed nuclear industry.
Security Standards and Best Practice Considerations for Quantum Key Distribution (QKD)
2012-03-01
SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) THESIS...protection in the United States. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD...FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-03
... Directive 104-6 (series), we have developed piracy-related Port Security Advisories (PSAs) to provide... compliance with this directive. The PSAs can be found at http://homeport.uscg.mil/piracy , including a non...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-25
... developed piracy-related Port Security Advisories (PSAs)to provide further guidance and direction to U.S. flagged vessels operating in high risk waters to help facilitate compliance with this directive. The PSAs...
Training Requirements in OSHA Standards and Training Guidelines. Revised.
ERIC Educational Resources Information Center
Occupational Safety and Health Administration, Washington, DC.
This guide provides an overview of Occupational Safety and Health Act (OSHA) standards and training guidelines for various industries. The first section introduces the concept of voluntary training guidelines, explaining that the guidelines are designed to help employers determine whether a worksite problem can be solved by training, what training…
7 CFR 160.75 - Loan of standards under security deposit.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 3 2010-01-01 2010-01-01 false Loan of standards under security deposit. 160.75... REGULATIONS AND STANDARDS FOR NAVAL STORES Loan and Care of United States Standards § 160.75 Loan of standards under security deposit. Duplicates of the United States Standards for rosin may be loaned to interested...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-05
... Standards of Performance for New Stationary Sources and Emission Guidelines for Existing Sources: Sewage... ``Standards of Performance for New Stationary Sources and Emission Guidelines for Existing Sources: Sewage... solid waste incineration units. In that action, EPA proposed NSPS and EG for sewage sludge incineration...
Treatise on water hammer in hydropower standards and guidelines
NASA Astrophysics Data System (ADS)
Bergant, A.; Karney, B.; Pejović, S.; Mazij, J.
2014-03-01
This paper reviews critical water hammer parameters as they are presented in official hydropower standards and guidelines. A particular emphasize is given to a number of IEC standards and guidelines that are used worldwide. The paper critically assesses water hammer control strategies including operational scenarios (closing and opening laws), surge control devices (surge tank, pressure regulating valve, flywheel, etc.), redesign of the water conveyance system components (tunnel, penstock), or limitation of operating conditions (limited operating range) that are variably covered in standards and guidelines. Little information is given on industrial water hammer models and solutions elsewhere. These are briefly introduced and discussed in the light of capability (simple versus complex systems), availability of expertise (in house and/or commercial) and uncertainty. The paper concludes with an interesting water hammer case study referencing the rules and recommendations from existing hydropower standards and guidelines in a view of effective water hammer control. Recommendations are given for further work on development of a special guideline on water hammer (hydraulic transients) in hydropower plants.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-30
... the Standard Review Plan (SRP), concerning the physical security reviews of design certification... NRC staff with the physical security review of applications for design certifications, incorporate... NUCLEAR REGULATORY COMMISSION [NRC-2013-0225] Proposed Revision to Physical Security--Standard...
NASA Astrophysics Data System (ADS)
Frühwirth, Christian
Industry managers have long recognized the vital importance of information security for their businesses, but at the same time they perceived security as a technology-driven rather then a business-driven field. Today, this notion is changing and security management is shifting from technology- to business-oriented approaches. Whereas there is evidence of this shift in the literature, this paper argues that security standards and academic work have not yet taken it fully into account. We examine whether this disconnect has lead to a misalignment of IT security requirements in businesses versus industry standards and academic research. We conducted 13 interviews with practitioners from 9 different firms to investigate this question. The results present evidence for a significant gap between security requirements in industry standards and actually reported security vulnerabilities. We further find mismatches between the prioritization of security factors in businesses, standards and real-world threats. We conclude that security in companies serves the business need of protecting information availability to keep the business running at all times.
32 CFR 147.8 - Guideline F-Financial considerations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Guideline F-Financial considerations. 147.8 Section 147.8 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL... raise a security concern and may be disqualifying include: (1) A history of not meeting financial...
32 CFR 147.8 - Guideline F-Financial considerations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Guideline F-Financial considerations. 147.8 Section 147.8 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL... raise a security concern and may be disqualifying include: (1) A history of not meeting financial...
32 CFR 147.8 - Guideline F-Financial considerations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Guideline F-Financial considerations. 147.8 Section 147.8 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL... raise a security concern and may be disqualifying include: (1) A history of not meeting financial...
32 CFR 147.8 - Guideline F-Financial considerations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Guideline F-Financial considerations. 147.8 Section 147.8 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL... raise a security concern and may be disqualifying include: (1) A history of not meeting financial...
32 CFR 147.8 - Guideline F-Financial considerations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Guideline F-Financial considerations. 147.8 Section 147.8 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL... raise a security concern and may be disqualifying include: (1) A history of not meeting financial...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-22
... and each Exchange Director's underlying business, ISE also stated that it believes that Exchange... Exchange to align its Board structure in accordance with corporate governance best practices guidelines... Services Proxy Voting Guidelines, the CalPERS Core Principles of Accountable Corporate Governance, the TIAA...
20 CFR 404.1569 - Listing of Medical-Vocational Guidelines in appendix 2.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Listing of Medical-Vocational Guidelines in appendix 2. 404.1569 Section 404.1569 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... includes information about jobs (classified by their exertional and skill requirements) that exist in the...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Physical security standards. 110.44 Section 110.44 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) EXPORT AND IMPORT OF NUCLEAR EQUIPMENT AND MATERIAL Review of License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient...
Email recruitment to use web decision support tools for pneumonia.
Flanagan, James R; Peterson, Michael; Dayton, Charles; Strommer Pace, Lori; Plank, Andrew; Walker, Kristy; Carlson, William S
2002-01-01
Application of guidelines to improve clinical decisions for Community Acquired Pneumonia (CAP) patients depends on accurate information about specific facts of each case and on presenting guideline support at the time decisions are being made. We report here on a system designed to solicit information from physicians about their CAP patients in order to classify CAP and present appropriate guidelines for type of care, length of stay, and use of antibiotics. We used elements of three existing information systems to create a achieve these goals: professionals coding diagnoses captured by the existing clinical information system (CIS), email, and web-based decision support tools including a pneumonia severity evaluation tool (SET). The non-secure IS components (email and web) were able to link to information in the CIS using tokens that do not reveal confidential patient-identifiable information. We examined their response to this strategy and the accuracy of pneumonia classification using this approach compared to chart review as a gold standard. On average physicians responded to email solicitations 50% of the time over the 14 month study. Also using this standard, we examined various information triggers for case finding. Professional coding of the primary reason for admission as pneumonia was fairly sensitive as an indicator of CAP. Physician use of the web SET was insensitive but fairly specific. Pneumonia classification using the SET was very reliable compared to experts' chart review using the same algorithm. We examined the distribution of severity of pneumonia for cases of pneumonia found by the various information triggers and for each severity the average length of stay. The distribution found by both chart review and by SET has demonstrated a shift toward more severe cases being admitted compared to only 3 years ago. The length of stay for level of severity is above expectations published by guidelines even for cases of true CAP by chart review. We suggest that the Fine classification system may not adequately describe patients in this setting. Physicians frequently responded that the guidelines presented did not fit their patients.
Baker, Robert A; Bronson, Shahna L; Dickinson, Timothy A; Fitzgerald, David C; Likosky, Donald S; Mellas, Nicholas B; Shann, Kenneth G
2013-09-01
One of the roles of a professional society is to develop standards and guidelines of practice as an instrument to guide safe and effective patient care. The American Society of Extracorporeal Technology (AmSECT) first published its Essentials for Perfusion Practice, Clinical Function: Conduct of Extracorporeal Circulation in 1993. The International Consortium for Evidence-Based Perfusion (ICEBP), a committee within AmSECT, was tasked with updating this document in 2010. The aim of this report is to describe the method of development and content of AmSECT's new professional standards and guidelines. The ICEBP committee independently evaluated and provided input regarding the current "Essentials and Guidelines." Structural changes were made to the entire document, and a draft document was developed, presented, and circulated to the AmSECT Board of Directors and broader membership for comment. Informed by these reviews, a revised document was then presented to the Society for a membership vote. The final document consists of 15 areas of practice covered by 50 Standards and 38 Guidelines (see Appendix 1) with the first standard focusing on the development of institutional protocols to support their implementation and use. A majority of the membership voted to accept the document (81.2% of the voting membership accepting, 18.8% rejecting). After an audit of the balloting process by AmSECT's Ethics Committee, the results were reported to the membership and the document was officially adopted on July 24, 2013. The Standards and Guidelines will serve as a useful guide for cardiac surgical teams that wish to develop institution-specific standards and guidelines to improve the reliability, safety, and effectiveness of adult cardiopulmonary bypass. The ICEBP recognizes that the development of a Standards and Guidelines statement alone will not change care. Safe, reliable, and effective care will be best served through the development and implementation of institutional protocols based on these standards. AmSECT's Standards and Guidelines for Perfusion Practice reflect the changing landscape of our profession as we work toward a safer and optimal provision of cardiopulmonary bypass for all our patients as well as a work environment that is supportive of delivering this care. standards, guidelines, cardiopulmonary bypass, perfusion, cardiac surgery.
Information Systems Security Management: A Review and a Classification of the ISO Standards
NASA Astrophysics Data System (ADS)
Tsohou, Aggeliki; Kokolakis, Spyros; Lambrinoudakis, Costas; Gritzalis, Stefanos
The need for common understanding and agreement of functional and non-functional requirements is well known and understood by information system designers. This is necessary for both: designing the "correct" system and achieving interoperability with other systems. Security is maybe the best example of this need. If the understanding of the security requirements is not the same for all involved parties and the security mechanisms that will be implemented do not comply with some globally accepted rules and practices, then the system that will be designed will not necessarily achieve the desired security level and it will be very difficult to securely interoperate with other systems. It is therefore clear that the role and contribution of international standards to the design and implementation of security mechanisms is dominant. In this paper we provide a state of the art review on information security management standards published by the International Organization for Standardization and the International Electrotechnical Commission. Such an analysis is meaningful to security practitioners for an efficient management of information security. Moreover, the classification of the standards in the clauses of ISO/IEC 27001:2005 that results from our analysis is expected to provide assistance in dealing with the plethora of security standards.
NASA Technical Reports Server (NTRS)
Ganzy, Ethan G.
2014-01-01
All devices attached to the NASA KSC network are subject to security vulnerability scanning and/or penetration testing. In today's changing environment, vulnerable and/or unprotected systems can easily be overlooked. Systems that are not properly managed can become a potential threat to the operational integrity of our systems and networks. This includes all NASA (internal and external) information systems within NASA KSC Internet Protocol (IP) address space, and NASA KSC facilities. The Office of the Chief Information Officer (OCIO) recommends that all NASA Centers and information systems be subject to penetration testing on a regular interval in accordance with the guidelines identified by the National Institute of Standards and Technology (NIST). (ITS-HBK-2810.04-02A) Protecting information and equipment at NASA is an area of increasing concern. In addition to the CPU's on the network; Supervisory, Control and Data Acquisition (SCADA) systems are especially vulnerable because these systems have lacked standards, use embedded controllers with little computational power and informal software, are connected to physical processes, have few operators, and are increasingly also being connected to corporate networks. The scope of work is comprised of several individual components which together build upon previous work by Drew Branch, NASA KSC Intern. The Pwn Plug is the selected COTS (Commercial-Off-The-Shelf) device chosen to test simplification of mandatory IT Security tasks. The device will be utilized to provide services to NASA KSC and enable an assessment of infrastructure soundness and regulatory compliance in an efficient, economical, and business responsive manner. The Pwn Plug is designed as a pen testing appliance which provides a hardware platform that can support commercial penetration testing efforts at significantly reduced costs. The expected outcomes are: 1) External Penetration Testing, 2) Social Engineering, 3) Procedural Documentation, 4) Recommended Remediation Action Plan, 5) System Retest & Remediation Attestation and 6) Final Reports, out briefing and Presentation. Due to physical and material constraints beyond intern and mentor control, the project was redefined as a working pen-test scenario. Limitations of lab availability and tools dictated an academic exercise. This report was developed within the scenario guidelines suggested by the project mentor. The guidelines were to be creative in developing a Pen Test program for a client.
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
Alagappan, Valliappan; Hefferan, Albert; Parivallal, Aarthi
2018-04-01
Right to access in the built environment creates equal and nondiscriminatory opportunities to a person with disabilities in order to move freely around and interact positively without hindrance and barriers. The objective of the study is to understand the existing accessibility related issues and implementation of guidelines and standards for public buildings. The technical verification using onsite and offsite access audit format for current provision of facilities in the internal and external environment has been carried out with the format prepared in reference to Central Public Works Department (CPWD) accessibility guidelines for mobility impaired and elderly and American Disability Act (ADA) guidelines. The access audit format included parameters like accessibility, safety, security, comfort and convenience and it addresses the barriers faced by wheel chair users, people with crutches, prosthetics and with non-assistive devices. The study addressed accessibility compliance in three zones of the building with initiation from parking area zone, inside the building, and area outside the building premises. The findings highlight the environmental barriers encountered by mobility impaired people and represented graphically in the layout plan and physical effort required to overcome the challenges in the built environment. The overall accessibility compliance is 42% in the interstate bus terminal. Implications for rehabilitation The study identifies the environmental limitations, human and technologically facilitators with the help of Central Public Works Department (CPWD) and American Disability Act (ADA) guidelines (1990). It highlights barriers for mobility-impaired users, by demonstrating in a spatial layout and the means to facilitate easy access with minimal frustration, stress and with less physical effort. It demonstrates the need for preparation of separate guidelines for making the existing types of buildings to be access and disabled-friendly. New accessibility guidelines shall be prepared by incorporating concepts like such as relative accessibility into new bus terminal buildings. Guidelines help the disabled in the process of rehabilitation and develop inclusiveness not rather than alienation.
20 CFR 416.401 - Scope of subpart.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Scope of subpart. 416.401 Section 416.401 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Amount of Benefits § 416.401 Scope of subpart. This subpart D sets forth basic guidelines for...
20 CFR 416.401 - Scope of subpart.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Scope of subpart. 416.401 Section 416.401 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Amount of Benefits § 416.401 Scope of subpart. This subpart D sets forth basic guidelines for...
20 CFR 416.401 - Scope of subpart.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Scope of subpart. 416.401 Section 416.401 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Amount of Benefits § 416.401 Scope of subpart. This subpart D sets forth basic guidelines for...
20 CFR 416.401 - Scope of subpart.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Scope of subpart. 416.401 Section 416.401 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Amount of Benefits § 416.401 Scope of subpart. This subpart D sets forth basic guidelines for...
Is Your Center Burglar/Vandal Proofed? Guidelines for Protecting Your Center.
ERIC Educational Resources Information Center
Adams, Shawn
1998-01-01
Identifies specific steps that child care centers can take to reduce the chances of burglary and vandalism. Differentiates loss prevention, loss control, and risk financing. Includes discussion of layering defenses, perimeter protection, security lighting, building surface security, locks, and alarm systems. Discusses the importance of reducing…
49 CFR 806.4 - Mandatory review for declassification.
Code of Federal Regulations, 2010 CFR
2010-10-01
... TRANSPORTATION SAFETY BOARD NATIONAL SECURITY INFORMATION POLICY AND GUIDELINES, IMPLEMENTING REGULATIONS § 806.4... 3-501 of E.O. 12065 must be in writing and should be addressed to: National Security Oversight... specified by section 3-501 of E.O. 12065. If the request does not reasonably describe the information sought...
20 CFR 416.401 - Scope of subpart.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Scope of subpart. 416.401 Section 416.401 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Amount of Benefits § 416.401 Scope of subpart. This subpart D sets forth basic guidelines for...
20 CFR 404.1614 - Responsibilities for obtaining evidence to make disability determinations.
Code of Federal Regulations, 2010 CFR
2010-04-01
... make disability determinations. 404.1614 Section 404.1614 Employees' Benefits SOCIAL SECURITY... determinations in those classes of cases described in the written guidelines for which the State agency does not make the determination; or (2) Under international agreements with respect to social security benefits...
Central Libraries in Uncertain Times.
ERIC Educational Resources Information Center
Kenney, Brian J.
2001-01-01
Discusses security and safety issues for public libraries, especially high-profile central facilities, in light of the September 11 terrorist attacks. Highlights include inspecting bags as patrons enter as well as exit; the need for security guidelines for any type of disaster or emergency; building design; and the importance of communication.…
31 CFR 315.39 - Surrender for payment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... establish his or her identity in accordance with Treasury instructions and identification guidelines. The... presenter must record his or her social security number on the face of the security, provided it does not... appear before an officer authorized to certify requests for payment, establish his or her identity, sign...
Pearson, Elizabeth J M; Morris, Meg E; McKinstry, Carol E
2016-09-01
There is inconsistent management of cancer-related fatigue (CRF) by health professionals worldwide. This research aims to identify the most appropriate guidelines for the management of cancer-related fatigue. A systematic search of international literature identified evidence-based clinical practice guidelines for CRF. Four reviewers independently appraised the highest quality guidelines using the AGREE-II instrument and National Heath and Medical Research Council (NHMRC) guideline standards. Five guidelines met the inclusion criteria. Of these, the 2015 Canadian Association of Psychosocial Oncology (CAPO) CRF guidelines and the 2014 American Society of Clinical Oncology (ASCO) fatigue guidelines for cancer survivors were selected for in-depth appraisal. The CAPO guideline scored higher than the ASCO for five domains of the AGREE-II. For one domain, the differences were statistically significant (p ≤ 0.05). The CAPO guideline met 37 of 47 NHMRC mandatory guideline standards and the ASCO guideline met 20. The difference in the proportion of standards met was statistically significant for one domain (p ≤ 0.05). Both guidelines had low scores for applicability and implementation. Currently, the CAPO guideline for cancer-related fatigue has the strongest evidence for use. To enhance implementation, further strategies for guideline dissemination and application are needed.
[The comparative evaluation of level of security culture in medical organizations].
Roitberg, G E; Kondratova, N V; Galanina, E V
2016-01-01
The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.
Medical Malpractice Implications of Clinical Practice Guidelines.
Ruhl, Douglas S; Siegal, Gil
2017-08-01
Clinical practice guidelines aim to improve medical care by clarifying and making useful recommendations to providers. Although providers should account for patients' unique characteristics when determining a treatment plan, it is generally perceived as good practice to follow guidelines when applicable. This is of interest in malpractice litigation, where it is essential to establish a standard of care to evaluate the performances of providers. Although the opinions of expert witnesses are used to determine standards of care, guidelines are expected to play a leading role. Guidelines alone should not establish a legal standard but may help inform this discussion in the courtroom. Therefore, it is incumbent that excellent, practical, and timely guidelines are continually created and updated in a transparent way. These guidelines must be very clear and underscore the various strengths of recommendation based on the quality of available evidence.
NASA Technical Reports Server (NTRS)
Zelkin, Natalie; Henriksen, Stephen
2011-01-01
This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed C-band (5091- to 5150-MHz) airport surface communication system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents an initial high-level safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the C-band communication system after the profile is finalized and system rollout timing is determined. A security risk assessment has been performed by NASA as a parallel activity. While safety analysis is concerned with a prevention of accidental errors and failures, the security threat analysis focuses on deliberate attacks. Both processes identify the events that affect operation of the system; and from a safety perspective the security threats may present safety risks.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 9 2011-07-01 2011-07-01 false Interpretive bulletin relating to the ERISA Guidelines and the Special Reliance Procedure. 2509.75-10 Section 2509.75-10 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GENERAL INTERPRETIVE BULLETINS...
12 CFR Appendix A to Part 748 - Guidelines for Safeguarding Member Information
Code of Federal Regulations, 2010 CFR
2010-01-01
... written or oral communications from a consumer reporting agency to a third party of information used or... adjust, as appropriate, the information security program in light of any relevant changes in technology... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Guidelines for Safeguarding Member Information...
The U.S.-Japan Alliance: Review of the Guidelines for Defense Cooperation
2015-03-01
Cooperation: Process and Historical Impact, Michael J. Green and Koji Murata concluded that the guidelines failed to establish a clear understanding...Japan-U.S. Security Consultative Committee, November 27, 1978, available at <http://fas.org/news/japan/sisin1e.htm>. 4 Michael J. Green and Koji Murata
15 CFR Supplement No. 2 to Part 734 - Guidelines for De Minimis Rules
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Guidelines for De Minimis Rules No. Supplement No. 2 to Part 734 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS SCOPE...
MANUAL: GUIDELINES FOR WATER REUSE
Water reclamation for nonpotable reuse has been adopted in the United States and elsewhere without the benefit of national or international guidelines or standards. However, in recent years, many states in the U.S. have adopted standards or guidelines, and the World Health Organi...
Chang, Susan; Vogelbaum, Michael; Lang, Frederick F; Haines, Stephen; Kunwar, Sandeep; Chiocca, E Antonio; Olivi, Alessandro; Quinones-Hinojosa, Alfredo; Parsa, Andrew; Warnick, Ronald
2007-04-01
We present guidelines to standardize the reporting of surgically based neuro-oncology trials. The guidelines are summarized in a checklist format that can be used as a framework from which to construct a surgically based trial. This manuscript follows and is taken in part from GNOSIS: Guidelines for neuro-oncology: Standards for investigational studies-reporting of phase 1 and phase 2 clinical trials [Chang SM, Reynolds SL, Butowski N, Lamborn KR, Buckner JC, Kaplan RS, Bigner DD (2005) Neuro-oncology 7:425-434].
Protecting proprietary rights - A potential Shuttle user's view
NASA Technical Reports Server (NTRS)
Day, J. B.
1977-01-01
Maintaining a high degree of industrial security in the multiple-payload Shuttle environment poses a number of problems for NASA. As a part of Battelle-Columbus' support of NASA's User Development Program, this paper presents a potential user's perspective on this situation. The need for security, the nature of the problem, and precedents for NASA security measures are discussed. Eleven policy guidelines representing desirable features from a potential user's viewpoint are presented for NASA consideration.
ERIC Educational Resources Information Center
Sitati, Emmily M.; Ndirangu, Mwangi; Kennedy, Bota; Rapongo, George S.
2016-01-01
In 2006, the Kenyan Ministry of Education (MoE) developed an early childhood development education (ECDE) service standard guidelines to guide the ECDE stakeholders in provision of early childhood education (ECE) programmes. The study sought to investigate the implementation of the ECDE service standard guidelines on provision of physical…
12 CFR Appendix A to Part 748 - Guidelines for Safeguarding Member Information
Code of Federal Regulations, 2014 CFR
2014-01-01
... Implementation of Member Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board.... Development and Implementation of Member Information Security Program A. Involve the Board of Directors. The...
12 CFR Appendix A to Part 748 - Guidelines for Safeguarding Member Information
Code of Federal Regulations, 2013 CFR
2013-01-01
... Implementation of Member Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board.... Development and Implementation of Member Information Security Program A. Involve the Board of Directors. The...
12 CFR Appendix A to Part 748 - Guidelines for Safeguarding Member Information
Code of Federal Regulations, 2011 CFR
2011-01-01
... Implementation of Member Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board.... Development and Implementation of Member Information Security Program A. Involve the Board of Directors. The...
12 CFR Appendix A to Part 748 - Guidelines for Safeguarding Member Information
Code of Federal Regulations, 2012 CFR
2012-01-01
... Implementation of Member Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board.... Development and Implementation of Member Information Security Program A. Involve the Board of Directors. The...
Code of Federal Regulations, 2010 CFR
2010-07-01
... independence of accountant retained by Employee Benefit Plan. 2509.75-9 Section 2509.75-9 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GENERAL INTERPRETIVE BULLETINS RELATING TO THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974 § 2509.75-9 Interpretive...
Code of Federal Regulations, 2011 CFR
2011-07-01
... independence of accountant retained by Employee Benefit Plan. 2509.75-9 Section 2509.75-9 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GENERAL INTERPRETIVE BULLETINS RELATING TO THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974 § 2509.75-9 Interpretive...
Safeguarding Your Technology: Practical Guidelines for Electronic Education Information Security.
ERIC Educational Resources Information Center
Szuba, Tom
This guide was developed specifically for educational administrators at the building, campus, district, system, and state levels, and is meant to serve as a framework to help them better understand why and how to effectively secure their organization's information, software, and computer and networking equipment. This document is organized into 10…
76 FR 1559 - Guidelines for the Use of Electronic Voting Systems in Union Officer Elections
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-11
... voting. Id. However, there are still concerns regarding on-line computer security, viruses and attacks... casting votes at polling sites; electronic voting from remote site personal computers via the Internet..., Washington, DC 20210. Because of security precautions, the Department continues to experience delays in U.S...
21 CFR 1311.08 - Incorporation by reference.
Code of Federal Regulations, 2010 CFR
2010-04-01
... of Standards and Technology, Computer Security Division, Information Technology Laboratory, National... standards are available from the National Institute of Standards and Technology, Computer Security Division... 140-2, Security Requirements for Cryptographic Modules, May 25, 2001, as amended by Change Notices 2...
Chan, Leighton; Heinemann, Allen W; Roberts, Jason
2014-01-01
Note from the AJOT Editor-in-Chief: Since 2010, the American Journal of Occupational Therapy (AJOT) has adopted reporting standards based on the Consolidated Standards of Reporting Trials (CONSORT) Statement and American Psychological Association (APA) guidelines in an effort to publish transparent clinical research that can be easily evaluated for methodological and analytical rigor (APA Publications and Communications Board Working Group on Journal Article Reporting Standards, 2008; Moher, Schulz, & Altman, 2001). AJOT has now joined 28 other major rehabilitation and disability journals in a collaborative initiative to enhance clinical research reporting standards through adoption of the EQUATOR Network reporting guidelines, described below. Authors will now be required to use these guidelines in the preparation of manuscripts that will be submitted to AJOT. Reviewers will also use these guidelines to evaluate the quality and rigor of all AJOT submissions. By adopting these standards we hope to further enhance the quality and clinical applicability of articles to our readers. Copyright © 2014 by the American Occupational Therapy Association, Inc.
Pangalos, George
2001-01-01
Background The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. Objective To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. Methods We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. Results We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. Conclusions The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a specific implementation environment. When implemented in specific environments, these principles and guidelines must also be complemented by measures, which are more specific. Even when a High Level Security Policy already exists in an institution, it is advisable that the management of the Health Care Establishment periodically revisits it to see whether it should be modified or augmented. PMID:11720956
Ilioudis, C; Pangalos, G
2001-01-01
The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a specific implementation environment. When implemented in specific environments, these principles and guidelines must also be complemented by measures, which are more specific. Even when a High Level Security Policy already exists in an institution, it is advisable that the management of the Health Care Establishment periodically revisits it to see whether it should be modified or augmented.
Software OT&E Guidelines. Volume 3. Software Maintainability Evaluator’s Handbook
1980-04-01
SOFTWARE OT&E " 1 GUIDELINES . VOLUME III SOFTWARE MAINTAINABILITY EVALUATOR’S HANDBOOK APRIL 1980 AIR FORCE TEST AND EVALUATION CENTER KIRTLAND AIR...FORCE BASE NEW MEXICO 87117 C-, -j AfTECP 800-3 AF’r...........3 ...... UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When D.. Entered) RE:PORT...c -. 5 TY!aJ0. PERIOD COVERED SOFTWARE OT& . GUIDELINES, Volume III .of five). -1 softare-R.aintainability Evaluator’s P-IEFnook’ 4ina. i 1980
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
... Securities.'' Second, the Exchange is replacing existing paragraph (C)(4) of Rule 11890, entitled ``Numerical... the ability of the Exchange to deviate from the Numerical Guidelines contained in paragraph (C)(1... flexibility to the Exchange to use different Numerical Guidelines or Reference Prices in various ``Unusual...
78 FR 57445 - Charging Standard Administrative Fees for Nonprogram-Related Information
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-18
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0026] Charging Standard Administrative Fees for Nonprogram-Related Information AGENCY: Social Security Administration. ACTION: Notice of standard... administration of a program under the Social Security Act (Act). SUPPLEMENTARY INFORMATION: Section 1106 of the...
Brown, Amanda; Anderson, Delia; Szerlip, Harold M
2003-01-01
Physician adherence to practice guidelines has been poor. Exposure to such guidelines is not a routine part of medical school curricula. This study was designed to determine whether standardized patients could be used to teach preclinical students the skills to manage a patient with newly diagnosed diabetes mellitus. Students were assigned a standardized patient with hyperglycemia. The students were given guidelines on the management of diabetes and told to manage the patient appropriately. Patients' charts were reviewed to determine if all cardiovascular risks were managed appropriately. Students successfully managed all cardiovascular risks according to published guidelines. Participants overwhelmingly believed this methodology was a valuable way to teach disease management. Second-year students can use practice guidelines to successfully manage patients with diabetes. The students' performance exceeded the standards of care found in the published literature. This problem-based approach may be an ideal way to teach disease management.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Iveson, Steven W.
Global chemical security has been enhanced through the determined use and integration of both voluntary and legislated standards. Many popular standards contain components that specifically detail requirements for the security of materials, facilities and other vital assets. In this document we examine the roll of quality management standards and how they affect the security culture within the institutions that adopt these standards in order to conduct business within the international market place. Good manufacturing practices and good laboratory practices are two of a number of quality management systems that have been adopted as law in many nations. These standards aremore » designed to protect the quality of drugs, medicines, foods and analytical test results in order to provide the world-wide consumer with safe and affective products for consumption. These standards provide no established security protocols and yet manage to increase the security of chemicals, materials, facilities and the supply chain via the effective and complete control over the manufacturing, the global supply chains and testing processes. We discuss the means through which these systems enhance security and how nations can further improve these systems with additional regulations that deal specifically with security in the realm of these management systems. We conclude with a discussion of new technologies that may cause disruption within the industries covered by these standards and how these issues might be addressed in order to maintain or increase the level of security within the industries and nations that have adopted these standards.« less
Guidelines for Implementing State Skill Standards Certificate Program in Construction.
ERIC Educational Resources Information Center
Wisconsin State Dept. of Workforce Development, Madison.
This packet contains guidelines, a student competency checklist, and student evaluation sheet for use in a Wisconsin school-to-work state skill standards certificate program in construction. The guidelines provide a planning resource for implementing the program, which was created in partnership with unions, employers, the state Department of…
ERIC Educational Resources Information Center
Branstad, Dennis K., Ed.
The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…
An overview of revised NASA safety standard 1740.14
NASA Technical Reports Server (NTRS)
Reynolds, Robert; Eichler, Peter; Johnson, Nicholas
1997-01-01
Following a broad review of the debris control guidelines outside of NASA and according to additional feedback on the guidelines from within NASA, revisions were made to the NASA safety standard 1740.14. The NASA policy to limit the generation of orbital debris on NASA missions, stated in the NASA management instruction 1700.8 and implemented in the form of the NASA safety standard (NSS) 1740.14 is described together with the revisions implemented. The overall direction of the guidelines is the same, but the details of many of the guidelines were changed, including: changes for tether programs and for the control of operational debris. The NASA will continue to review the guidelines as new measurements and improved models of the environment are obtained.
Guidelines for producing training films and videos.
Harper, P B
1991-01-01
Drawing from experience in producing a film on the surgical procedure of female sterilization, 4 guidelines to technical film production for training purposes are presented and discussed in this paper. In order of presentation in the text, the paper 1st encourages identifying and securing a technical expert, then clearly identifying steps of the technical procedure, involving trainees and trainers in the production process, and working with experienced producers, scriptwriters, and crew members. Returning to the 1st guideline, the technical advisor will have a central presence during all photography and editing, and ideally should not have any personal investment in the procedure being shown. Prior to script finalization and sorting, research is urged to ensure concrete procedural steps. Printed materials, slides, interviews of experienced clinicians, procedure observation, and test videotape shooting may be called upon and employed as parts of the research phase. Trainees should participate during preliminary research, script development, and pretesting of early film versions, their suggestions for change incorporated where appropriate in the final version. On the final point of securing experienced workers, country nationals sensitive to relevant cultural and background dynamics should be included in the team. The special concerns of airport security regulation and customs requirements knowledge are essential, as well as their attention to assuring adequate on-site electricity for camera equipment.
Biological Terrorism: US Policies to Reduce Global Biothreats
2008-09-01
program for pro- jects that advance BEP objectives. Global Cooperation to develop bio- safety and pathogen security stan- dards that are consistent with...security. The Organization for Economic Cooperation and Development ( OECD ) has recently developed voluntary biosecurity guidelines for implementation...Abbreviations AG Australia Group BEP Biosecurity Engagement Program BSL Biosafety level BWC Biological Weapons Convention BWC-ISU Biological Weapons
ERIC Educational Resources Information Center
International Journal of Testing, 2016
2016-01-01
The amount and severity of security threats have increased considerably over the past two decades, calling into question the validity of assessments administered around the world. These threats have increased for a number of reasons, including the popular use of computerized and online technologies for test administration and the use of almost…
A systematic scoping review of adherence to reporting guidelines in health care literature
Samaan, Zainab; Mbuagbaw, Lawrence; Kosa, Daisy; Debono, Victoria Borg; Dillenburg, Rejane; Zhang, Shiyuan; Fruci, Vincent; Dennis, Brittany; Bawor, Monica; Thabane, Lehana
2013-01-01
Background Reporting guidelines have been available for the past 17 years since the inception of the Consolidated Standards of Reporting Trials statement in 1996. These guidelines were developed to improve the quality of reporting of studies in medical literature. Despite the widespread availability of these guidelines, the quality of reporting of medical literature remained suboptimal. In this study, we assess the current adherence practice to reporting guidelines; determine key factors associated with better adherence to these guidelines; and provide recommendations to enhance adherence to reporting guidelines for future studies. Methods We undertook a systematic scoping review of systematic reviews of adherence to reporting guidelines across different clinical areas and study designs. We searched four electronic databases (Cumulative Index to Nursing and Allied Health Literature, Web of Science, Embase, and Medline) from January 1996 to September 2012. Studies were included if they addressed adherence to one of the following guidelines: Consolidated Standards of Reporting Trials (CONSORT), Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA), Quality of Reporting of Meta-analysis (QUOROM), Transparent Reporting of Evaluations with Nonrandomized Designs (TREND), Meta-analysis Of Observational Studies in Epidemiology (MOOSE) and Strengthening the Reporting of Observational Studies in Epidemiology (STROBE). A protocol for this study was devised. A literature search, data extraction, and quality assessment were performed independently by two authors in duplicate. This study reporting follows the PRISMA guidelines. Results Our search retrieved 5159 titles, of which 50 were eligible. Overall, 86.0% of studies reported suboptimal levels of adherence to reporting guidelines. Factors associated with better adherence included journal impact factor and endorsement of guidelines, publication date, funding source, multisite studies, pharmacological interventions and larger studies. Conclusion Reporting guidelines in the clinical literature are important to improve the standards of reporting of clinical studies; however, adherence to these guidelines remains suboptimal. Action is therefore needed to enhance the adherence to these standards. Strategies to enhance adherence include journal editorial policies endorsing these guidelines. PMID:23671390
Deurenberg, Rikie; Vlayen, Joan; Guillo, Sylvie; Oliver, Thomas K; Fervers, Beatrice; Burgers, Jako
2008-03-01
Effective literature searching is particularly important for clinical practice guideline development. Sophisticated searching and filtering mechanisms are needed to help ensure that all relevant research is reviewed. To assess the methods used for the selection of evidence for guideline development by evidence-based guideline development organizations. A semistructured questionnaire assessing the databases, search filters and evaluation methods used for literature retrieval was distributed to eight major organizations involved in evidence-based guideline development. All of the organizations used search filters as part of guideline development. The medline database was the primary source accessed for literature retrieval. The OVID or SilverPlatter interfaces were used in preference to the freely accessed PubMed interface. The Cochrane Library, embase, cinahl and psycinfo databases were also frequently used by the organizations. All organizations reported the intention to improve and validate their filters for finding literature specifically relevant for guidelines. In the first international survey of its kind, eight major guideline development organizations indicated a strong interest in identifying, improving and standardizing search filters to improve guideline development. It is to be hoped that this will result in the standardization of, and open access to, search filters, an improvement in literature searching outcomes and greater collaboration among guideline development organizations.
An automated tool for an analysis of compliance to evidence-based clinical guidelines.
Metfessel, B A
2001-01-01
Evidence-based clinical guidelines have been developed in an attempt to decrease practice variation and improve patient outcomes. Although a number of studies and a few commercial products have attempted to measure guideline compliance, there still exists a strong need for an automated product that can take as input large amounts of data and create systematic and detailed profiles of compliance to evidence-based guidelines. The Guideline Compliance Assessment Tool is a product presently under development in our group that will accept as input medical and pharmacy claims data and create a guideline compliance profile that assesses provider practice patterns as compared to evidence-based standards. The system components include an episode of care grouper to standardize classifications of illnesses, an evidence-based guideline knowledge base that potentially contains information on several hundred distinct conditions, a guideline compliance scoring system that emphasizes systematic guideline variance rather than random variances, and an advanced data warehouse that would allow drilling into specific areas of interest. As provider profiling begins to shift away from a primary emphasis on cost to an emphasis on quality, automated methods for measuring guideline compliance will become important in measuring provider performance and increasing guideline usage, consequently improving the standard of care and the potential for better patient outcomes.
Standards and Guidelines in Telemedicine and Telehealth
Krupinski, Elizabeth A.; Bernard, Jordana
2014-01-01
The development of guidelines and standards for telemedicine is an important and valuable process to help insure effective and safe delivery of quality healthcare. Some organizations, such as the American Telemedicine Association (ATA), have made the development of standards and guidelines a priority. The practice guidelines developed so far have been well received by the telemedicine community and are being adopted in numerous practices, as well as being used in research to support the practice and growth of telemedicine. Studies that utilize published guidelines not only help bring them into greater public awareness, but they also provide evidence needed to validate existing guidelines and guide the revision of future versions. Telemedicine will continue to grow and be adopted by more healthcare practitioners and patients in a wide variety of forms not just in the traditional clinical environments, and practice guidelines will be a key factor in fostering this growth. Creation of guidelines is important to payers and regulators as well as increasingly they are adopting and integrating them into regulations and policies. This paper will review some of the recent ATA efforts in developing telemedicine practice guidelines, review the role of research in guidelines development, review data regarding their use, and discuss some of areas where guidelines are still needed. PMID:27429261
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 39 Postal Service 1 2013-07-01 2013-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 39 Postal Service 1 2012-07-01 2012-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 39 Postal Service 1 2014-07-01 2014-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 39 Postal Service 1 2011-07-01 2011-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
39 CFR 267.4 - Information security standards.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 39 Postal Service 1 2010-07-01 2010-07-01 false Information security standards. 267.4 Section 267.4 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.4 Information security standards. (a) The Postal Service will operate under a uniform set of...
WHO Expert Committee on Specifications for Pharmaceutical Preparations.
2011-01-01
The Expert Committee on Specifications for Pharmaceutical Preparations works towards clear, independent and practical standards and guidelines for the quality assurance of medicines. Standards are developed by the Committee through worldwide consultation and an international consensus-building process. The following new guidelines were adopted and recommended for use: procedure for adoption of International Chemical Reference Substances; WHO good practices for pharmaceutical microbiology laboratories; good manufacturing practices: main principles for pharmaceutical products; good manufacturing practices for blood establishments (jointly with the Expert Committee on Biological Standardization); guidelines on good manufacturing practices for heating, ventilation and air-conditioning systems for non-sterile pharmaceutical dosage forms; good manufacturing practices for sterile pharmaceutical products; guidelines on transfer of technology in pharmaceutical manufacturing; good pharmacy practice: standards for quality of pharmacy services (joint FIP/WHO); model guidance for the storage and transport of time- and temperature-sensitive pharmaceutical products (jointly with the Expert Committee on Biological Standardization); procedure for prequalification of pharmaceutical products; guide on submission of documentation for prequalification of innovator finished pharmaceutical products approved by stringent regulatory authorities; prequalification of quality control laboratories: procedure for assessing the acceptability, in principle, of quality control laboratories for use by United Nations agencies; guidelines for preparing a laboratory information file; guidelines for drafting a site master file; guidelines on submission of documentation for a multisource (generic) finished product: general format: preparation of product dossiers in common technical document format.
Coomber, Kerri; Jones, Sandra C; Martino, Florentine; Miller, Peter G
2017-03-01
This study examined rates of awareness of standard drink labelling and drinking guidelines among Australian adult drinkers. Demographic predictors of these two outcomes were also explored. Online survey panel participants aged 18-45 years(n = 1061; mean age = 33.2 years) completed an online survey assessing demographics, alcohol consumption patterns, awareness of standard drink labels and the National Health and Medical Research Council (NHMRC) guidelines, and support for more detailed labels. The majority (80%) of participants had seen standard drink labels on alcohol products; with younger drinkers, those from a regional/rural location and high-risk drinkers significantly more likely to have seen such labelling. Most respondents estimated at or below the maximum number of drinks stipulated in the NHMRC guidelines. However, their estimates of the levels for male drinkers were significantly higher than for female drinkers. High-risk drinkers were significantly less likely to provide accurate estimates, while those who had seen the standard drink logo were significantly more likely to provide accurate estimates of drinking levels to reduce the risk of long-term harms only. Just under three-quarters of respondents supported the inclusion of more information on labels regarding guidelines to reduce negative health effects. The current standard drink labelling approach fails to address high-risk drinkers. The inclusion of information about NHMRC guidelines on alcohol labels, and placing standard drink labelling on the front of products could improve awareness of what constitutes a standard drink and safe levels of consumption among Australian drinkers.[Kerri Coomber, Sandra C. Jones, Florentine Martino, Peter G. Miller. Predictors of awareness of standard drink labelling and drinking guidelines to reduce negative health effects among Australian drinkers. Drug Alcohol Rev 2017;36:200-209]. © 2016 Australasian Professional Society on Alcohol and other Drugs.
Children Who Lose Their Parents to HIV/AIDS: Agency Guidelines for Adoptive and Kinship Placement.
ERIC Educational Resources Information Center
Merkel-Holguin, Lisa
Across the United States and world, children who lose their parents to HIV/AIDS are one of the fasted emerging groups affected by this epidemic. Increasingly, child welfare and family service agencies are helping infected parents to secure legal and permanent care arrangements for their children. These guidelines address the issues of placing…
Nevada National Security Site Environmental Report 2011
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy Wills, ed
2012-09-12
This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment,more » Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-03
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-64766; File No. S7-25-11] RIN 3235-AL10 Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap Participants Correction In proposed rule document number 2011-16758, appearing on pages 42396-42455 in the...
Do You Take Credit Cards? Security and Compliance for the Credit Card Payment Industry
ERIC Educational Resources Information Center
Willey, Lorrie; White, Barbara Jo
2013-01-01
Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…
ERIC Educational Resources Information Center
Center for Educational Leadership and Technology, Inc., Marlborough, MA.
This document presents guidelines and recommendations for development of a technology infrastructure in Connecticut public schools that conforms to national industry standards for voice, video, and data communications. The guidelines present information on the state statutes regarding facilities implementation and describe industry standards.…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-03
... Current List of Laboratories Which Meet Minimum Standards To Engage in Urine Drug Testing for Federal... Guidelines for Federal Workplace Drug Testing Programs (Mandatory Guidelines). The Mandatory Guidelines were... Laboratories and Instrumented Initial Testing Facilities (IITF) must meet in order to conduct drug and specimen...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-13
... Current List of Laboratories Which Meet Minimum Standards To Engage in Urine Drug Testing for Federal... Guidelines for Federal Workplace Drug Testing Programs (Mandatory Guidelines). The Mandatory Guidelines were... and Instrumented Initial Testing Facilities (IITF) must meet in order to conduct drug and specimen...
Guidelines and Minimum Standards for Operation of Texas Proprietary Schools. (Revised.)
ERIC Educational Resources Information Center
Texas Education Agency, Austin. Div. of Proprietary Schools and Veterans Education.
This guide, prepared to assist owners and managers of proprietary schools in Texas in applying for and obtaining approval by the Texas Education Agency, provides guidelines and minimum standards of practice for proprietary school operation. First, the guidelines are discussed in terms of definitions, exemptions, general provisions, certificates of…
Standards Guidelines. Safety in Oregon Schools. OAR 581-22-706.
ERIC Educational Resources Information Center
Oregon State Dept. of Education, Salem.
This document contains guidelines that help Oregon schools meet the components of Oregon Administrative Rule 581-22-706, Emergency Plans and Safety Programs. The standard mandates that Oregon schools shall maintain a comprehensive safety program for all employees and students. School districts may alter the guidelines provided in this guidebook to…
Guidelines for Technology Equipment Selection and Use: An SREB Model for Schools and Campuses.
ERIC Educational Resources Information Center
Parker, Louis T.; Thomas, William R.
In the winter of 1999, the Southern Regional Education Board's (SREB's) Educational Technology Cooperative analyzed technology equipment standards and guidelines from state departments of education and higher education agencies in the SREB states. This report, which is based on a summary of these guidelines and standards, reflects the Educational…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-05
... accepted for purposes of the securities laws, any accounting principles established by a standard setting... Financial Accounting Standards Board (``FASB'') and its parent organization, the Financial Accounting... recognizing the FASB's financial accounting and reporting standards as ``generally accepted'' under Section...
Privacy and security issues in teleradiology.
White, Peter
2004-10-01
Teleradiology is now well established within healthcare in the USA, but ethico-legal concepts surrounding this innovation remain unclear. New legislation, the Health Insurance Portability and Accountability Act, as well as ethical guidelines and common law demonstrate the importance being placed on security of electronic data and the protection of patients' personal data. Radiologists need to be aware of the security, privacy, and confidentiality issues which relate to teleradiology, so that they can safeguard not only their own interests but also the best interests of their patients.
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1984-01-01
Guidance is presented to NASA Computer Security Officials for determining the acceptability or unacceptability of ADP security risks based on the technical, operational and economic feasibility of potential safeguards. The risk management process is reviewed as a specialized application of the systems approach to problem solving and information systems analysis and design. Reporting the results of the risk reduction analysis to management is considered. Report formats for the risk reduction study are provided.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-24
... standards. The collection also requires airport operators to comply with a security directive by maintaining... airport operators maintain records of criminal history records checks and security threat assessments in... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency...
Gambito, Ephraim D V; Gonzalez-Suarez, Consuelo B; Grimmer, Karen A; Valdecañas, Carolina M; Dizon, Janine Margarita R; Beredo, Ma Eulalia J; Zamora, Marcelle Theresa G
2015-11-04
Clinical practice guidelines need to be regularly updated with current literature in order to remain relevant. This paper reports on the approach taken by the Philippine Academy of Rehabilitation Medicine (PARM). This dovetails with its writing guide, which underpinned its foundational work in contextualizing guidelines for stroke and low back pain (LBP) in 2011. Working groups of Filipino rehabilitation physicians and allied health practitioners met to reconsider and modify, where indicated, the 'typical' Filipino patient care pathways established in the foundation guidelines. New clinical guidelines on stroke and low back pain which had been published internationally in the last 3 years were identified using a search of electronic databases. The methodological quality of each guideline was assessed using the iCAHE Guideline Quality Checklist, and only those guidelines which provided full text references, evidence hierarchy and quality appraisal of the included literature, were included in the PARM update. Each of the PARM-endorsed recommendations was then reviewed, in light of new literature presented in the included clinical guidelines. A novel standard updating approach was developed based on the criteria reported by Johnston et al. (Int J Technol Assess Health Care 19(4):646-655, 2003) and then modified to incorporate wording from the foundational PARM writing guide. The new updating tool was debated, pilot-tested and agreed upon by the PARM working groups, before being applied to the guideline updating process. Ten new guidelines on stroke and eleven for low back pain were identified. Guideline quality scores were moderate to good, however not all guidelines comprehensively linked the evidence body underpinning recommendations with the literature. Consequently only five stroke and four low back pain guidelines were included. The modified PARM updating guide was applied by all working groups to ensure standardization of the wording of updated recommendations and the underpinning evidence bases. The updating tool provides a simple, standard and novel approach that incorporates evidence hierarchy and quality, and wordings of recommendations. It could be used efficiently by other guideline updaters particularly in developing countries, where resources for guideline development and updates are limited. When many people are involved in guideline writing, there is always the possibility of 'slippage' in use of wording and interpretation of evidence. The PARM updating tool provides a mechanism for maintaining a standard process for guideline updating processes that can be followed by clinicians with basic training in evidence-based practice principles.
ERIC Educational Resources Information Center
Virginia State General Assembly, Richmond. House.
This study of existing guidelines and standards for international travel by students in local school divisions is the result of a Virginia Department of Education team effort over four months. The interdisciplinary team reviewed guidelines and standards for international travel and student exchange programs from major organizations and developed…
Current and potential cyber attacks on medical journals; guidelines for improving security.
Dadkhah, Mehdi; Seno, Seyed Amin Hosseini; Borchardt, Glenn
2017-03-01
At the moment, scholarly publishing is faced with much academic misconduct and threats such as predatory journals, hijacked journals, phishing, and other scams. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats. It seems that information security is missing in some parts of scholarly publishing that particularly involves medical journals. In this paper, we explain different types of cyber-attacks that especially threaten editors and academic journals. We then explain the details involved in each type of attack. Finally, we present general guidelines for detection and prevention of the attacks. In some cases, we use small experiments to show that our claim is true. Finally, we conclude the paper with a prioritization of these attacks. Copyright © 2016 European Federation of Internal Medicine. Published by Elsevier B.V. All rights reserved.
Berkowitz, Seth A; Aragon, Katherine; Hines, Jonas; Seligman, Hilary; Lee, Sei; Sarkar, Urmimala
2013-01-01
Objective To determine whether diabetes clinical standards consider increased hypoglycemia risk in vulnerable patients. Data Sources MEDLINE, the National Guidelines Clearinghouse, the National Quality Measures Clearinghouse, and supplemental sources. Study Design Systematic review of clinical standards (guidelines, quality metrics, or pay-for-performance programs) for glycemic control in adult diabetes patients. The primary outcome was discussion of increased risk for hypoglycemia in vulnerable populations. Data Collection/Extraction Methods Manuscripts identified were abstracted by two independent reviewers using prespecified inclusion/exclusion criteria and a standardized abstraction form. Principal Findings We screened 1,166 titles, and reviewed 220 manuscripts in full text. Forty-four guidelines, 17 quality metrics, and 8 pay-for-performance programs were included. Five (11 percent) guidelines and no quality metrics or pay-for-performance programs met the primary outcome. Conclusions Clinical standards do not substantively incorporate evidence about increased risk for hypoglycemia in vulnerable populations. PMID:23445498
Berkowitz, Seth A; Aragon, Katherine; Hines, Jonas; Seligman, Hilary; Lee, Sei; Sarkar, Urmimala
2013-08-01
To determine whether diabetes clinical standards consider increased hypoglycemia risk in vulnerable patients. MEDLINE, the National Guidelines Clearinghouse, the National Quality Measures Clearinghouse, and supplemental sources. Systematic review of clinical standards (guidelines, quality metrics, or pay-for-performance programs) for glycemic control in adult diabetes patients. The primary outcome was discussion of increased risk for hypoglycemia in vulnerable populations. Manuscripts identified were abstracted by two independent reviewers using prespecified inclusion/exclusion criteria and a standardized abstraction form. We screened 1,166 titles, and reviewed 220 manuscripts in full text. Forty-four guidelines, 17 quality metrics, and 8 pay-for-performance programs were included. Five (11 percent) guidelines and no quality metrics or pay-for-performance programs met the primary outcome. Clinical standards do not substantively incorporate evidence about increased risk for hypoglycemia in vulnerable populations. © Health Research and Educational Trust.
Developing an interdisciplinary community-based sports concussion management program.
LoGalbo, Anthony; Salinas, Christine M; Dougherty, Michael; Field, Mel
2014-01-01
The increasing incidence and associated consequences of sport-related concussion have been at the forefront of public health concerns in recent years, prompting the need for safe and effective management guidelines and availability of appropriately trained healthcare providers. In this report we provide practical and user-friendly information regarding several important factors to consider when developing a sports concussion program, including how to select relevant team members, assess community needs and available resources, provide concussion education, secure and nurture partnerships with athletic programs, implement management strategies that align with current practice standards, and cater to athletes' unique needs in terms of program accessibility. It is hoped that the knowledge shared and proposed recommendations will be beneficial for guiding both newly developing and established concussion programs alike. © 2014 S. Karger AG, Basel.
NASA Astrophysics Data System (ADS)
Kalyankar-Narwade, Supriya; Kumar, C. Ramesh; Patil, Sanjay A.
2017-11-01
Engine Management ECU plays a vital role in controlling different important features related to the engine performance. ECU is an embedded system which includes hardware and firmware platform for control logics. However, it is necessary to verify its smooth performance by its functionality testing in the Electromagnetic environment for approval. If these requirements are not known at earlier stages, then ECU may not fulfil functional requirements during required automotive electronic test standards. Hence, focusing on EMS ECU, this paper highlights hardware, layout and software guidelines for solving problems related with Electromagnetic Interference (EMI) to comply ISO 7637, CISPR 25 standard, Electromagnetic Compatibility (EMC) to comply ISO 11452-4,5 standard, Electrostatic Discharge (ESD) to comply ISO 10605 standard and Environmental Testing to comply standards as per IEC standards. This paper specifies initially the importance, need and guidelines for reducing the EMI effect on PCB i.e. making ECU more electromagnetically compatible as per automotive standards. The guidelines are useful for the designers to avoid pitfalls at the later stage. After mentioned modifications in the paper, ECU successfully passed the requirements for all standard tests.
45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.
Code of Federal Regulations, 2013 CFR
2013-10-01
... of Electronic Protected Health Information § 164.318 Compliance dates for the initial implementation of the security standards. (a) Health plan. (1) A health plan that is not a small health plan must... the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES...
45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.
Code of Federal Regulations, 2012 CFR
2012-10-01
... of Electronic Protected Health Information § 164.318 Compliance dates for the initial implementation of the security standards. (a) Health plan. (1) A health plan that is not a small health plan must... the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES...
ERIC Educational Resources Information Center
Kiriakou, Charles M.
2012-01-01
Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-12
... these guidelines, DTC must, among other things, maintain a Total Risk-Based Capital Ratio of at least 10... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63254; File No. SR-DTC-2010-14] Self-Regulatory... Preferred Stock November 5, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act...
Suborbital Safety Technical Committee- Summary of Proposed Standards & Guidelines
NASA Astrophysics Data System (ADS)
Quinn, Andy; Atencia Yepez, Amaya; Klicker, Michael; Howard, Diane; Verstraeten, Joram; Other Suborbital Safety TC Members
2013-09-01
There are currently no international safety standards and guidelines to assist designers, operators and authorities in the suborbital domain. There is a launch licensing regime in the United States (US) to assist the forerunners of the suborbital domain however this does not provide a safety approval for the vehicle against set standards or does not have an acceptable level of safety to achieve in terms of design or operation. In Europe a certification framework may be implemented however this (or any regulatory framework) is not in place as yet. This paper summarises the 5 tasks thus far completed by the International Association for the Advancement of Space Safety (IAASS) Suborbital Safety Technical Committee (SS TC) in terms of deriving standards and guidelines for the suborbital domain. The SS TC comprises members from the suborbital industry (US and European vehicle designers), safety experts, legal experts, medical/training experts, prospective spaceport operators and members from the US and European authorities (though these members cannot directly steer the standards and guidelines - they can merely review them for interest and comment on non-policy aspects). The SS TC has been divided into three working groups (WG): Regulatory WG, Technical WG and Operations WG. The 5 tasks that are summarised in this paper include: Regulatory WG - (Task 1) Clarify and promote regulatory framework for suborbital flights (including discussions on Space Law 'v' Air Law for suborbital domain); Technical WG - (Task 1) Defining & Alignment (globally) of Safety Criteria for Suborbital domain using industry best practices, (Task 2) Software/complex hardware certification for suborbital flights; Operations WG - (Task 1) Flight Crew and Spaceflight Participant Medical and Training Standards & Guidelines for suborbital flight, (Task 2) Spaceport Safety Management System. This paper also details the next set of standards and guidelines that will be derived by the SS TC. The paper concludes that these and future IAASS suborbital safety standards and guidelines are needed now and should beconsidered by the industry players before the first commercial flights expected late 2013/early 2014.
JANNAF "Test and Evaluation Guidelines for Liquid Rocket Engines": Status and Application
NASA Technical Reports Server (NTRS)
Parkinson, Douglas; VanLerberghe, Wayne M.; Rahman, Shamim A.
2017-01-01
For many decades, the U.S. rocket propulsion industrial base has performed remarkably in developing complex liquid rocket engines that can propel critical payloads into service for the nation, as well as transport people and hardware for missions that open the frontiers of space exploration for humanity. This has been possible only at considerable expense given the lack of detailed guidance that captures the essence of successful practices and knowledge accumulated over five decades of liquid rocket engine development. In an effort to provide benchmarks and guidance for the next generation of rocket engineers, the Joint Army Navy NASA Air Force (JANNAF) Interagency Propulsion Committee published a liquid rocket engine (LRE) test and evaluation (T&E) guideline document in 2012 focusing on the development challenges and test verification considerations for liquid rocket engine systems. This document has been well received and applied by many current LRE developers as a benchmark and guidance tool, both for government-driven applications as well as for fully commercial ventures. The USAF Space and Missile Systems Center (SMC) has taken an additional near-term step and is directing activity to adapt and augment the content from the JANNAF LRE T&E guideline into a standard for potential application to future USAF requests for proposals for LRE development initiatives and launch vehicles for national security missions. A draft of this standard was already sent out for review and comment, and is intended to be formally approved and released towards the end of 2017. The acceptance and use of the LRE T&E guideline is possible through broad government and industry participation in the JANNAF liquid propulsion committee and associated panels. The sponsoring JANNAF community is expanding upon this initial baseline version and delving into further critical development aspects of liquid rocket propulsion testing at the integrated stage level as well as engine component level, in order to advance the state of the practice. The full participation of the entire U.S. rocket propulsion industrial base is invited and expected at this opportune moment in the continuing advancement of spaceflight technology.
WHO Expert Committee on specifications for pharmaceutical preparations.
2010-01-01
The Expert Committee on Specifications for Pharmaceutical Preparations works towards clear, independent and practical standards and guidelines for the quality assurance of medicines. Standards are developed by the Committee through worldwide consultation and an international consensus-building process. The following new guidelines were adopted and recommended for use: good practices for pharmaceutical quality control laboratories; supplementary guidelines for active pharmaceutical ingredients; good manufacturing practices for pharmaceutical products containing hazardous substances; good manufacturing practices for sterile pharmaceutical products; good distribution practices for pharmaceutical products; guidelines on the requalification of prequalified dossiers: and guidelines for the preparation of a contract research organization master file.
ERIC Educational Resources Information Center
Zydney, Janet Mannheimer; Hooper, Simon
2015-01-01
Educators can use video to gain invaluable information about their students. A concern is that collecting videos online can create an increased security risk for children. The purpose of this article is to provide ethical and legal guidelines for designing video-based apps for mobile devices and the web. By reviewing the literature, law, and code…
Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert
2013-06-01
To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.
Digital image envelope: method and evaluation
NASA Astrophysics Data System (ADS)
Huang, H. K.; Cao, Fei; Zhou, Michael Z.; Mogel, Greg T.; Liu, Brent J.; Zhou, Xiaoqiang
2003-05-01
Health data security, characterized in terms of data privacy, authenticity, and integrity, is a vital issue when digital images and other patient information are transmitted through public networks in telehealth applications such as teleradiology. Mandates for ensuring health data security have been extensively discussed (for example The Health Insurance Portability and Accountability Act, HIPAA) and health informatics guidelines (such as the DICOM standard) are beginning to focus on issues of data continue to be published by organizing bodies in healthcare; however, there has not been a systematic method developed to ensure data security in medical imaging Because data privacy and authenticity are often managed primarily with firewall and password protection, we have focused our research and development on data integrity. We have developed a systematic method of ensuring medical image data integrity across public networks using the concept of the digital envelope. When a medical image is generated regardless of the modality, three processes are performed: the image signature is obtained, the DICOM image header is encrypted, and a digital envelope is formed by combining the signature and the encrypted header. The envelope is encrypted and embedded in the original image. This assures the security of both the image and the patient ID. The embedded image is encrypted again and transmitted across the network. The reverse process is performed at the receiving site. The result is two digital signatures, one from the original image before transmission, and second from the image after transmission. If the signatures are identical, there has been no alteration of the image. This paper concentrates in the method and evaluation of the digital image envelope.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 29 2011-07-01 2009-07-01 true Law authorizing establishment of effluent limitations guidelines for existing sources, standards of performance for new sources and pretreatment standards of new and existing sources. 401.12 Section 401.12 Protection of Environment...
Chang, Susan M.; Reynolds, Sharon L.; Butowski, Nicholas; Lamborn, Kathleen R.; Buckner, Jan C.; Kaplan, Richard S.; Bigner, Darell D.
2005-01-01
We present guidelines to standardize the reporting of phase 1 and phase 2 neuro-oncology trials. The guidelines are also intended to assist with accurate interpretation of results from these trials, to facilitate the peer-review process, and to expedite the publication of important and accurate manuscripts. Our guidelines are summarized in a checklist format that can be used as a framework from which to construct a phase 1 or 2 clinical trial. PMID:16212807
Chang, Susan M; Reynolds, Sharon L; Butowski, Nicholas; Lamborn, Kathleen R; Buckner, Jan C; Kaplan, Richard S; Bigner, Darell D
2005-10-01
We present guidelines to standardize the reporting of phase 1 and phase 2 neuro-oncology trials. The guidelines are also intended to assist with accurate interpretation of results from these trials, to facilitate the peer-review process, and to expedite the publication of important and accurate manuscripts. Our guidelines are summarized in a checklist format that can be used as a framework from which to construct a phase 1 or 2 clinical trial.
Assessment of the NASA Flight Assurance Review Program
NASA Technical Reports Server (NTRS)
Holmes, J.; Pruitt, G.
1983-01-01
The NASA flight assurance review program to develop minimum standard guidelines for flight assurance reviews was assessed. Documents from NASA centers and NASA headquarters to determine current design review practices and procedures were evaluated. Six reviews were identified for the recommended minimum. The practices and procedures used at the different centers to incorporate the most effective ones into the minimum standard review guidelines were analyzed and guidelines for procedures, personnel and responsibilies, review items/data checklist, and feedback and closeout were defined. The six recommended reviews and the minimum standards guidelines developed for flight assurance reviews are presented. Observations and conclusions for further improving the NASA review and quality assurance process are outlined.
6 CFR 5.34 - Standards of conduct for administration of the Privacy Act.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Standards of conduct for administration of the Privacy Act. 5.34 Section 5.34 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.34 Standards of conduct for administration of the...
Health IT for Patient Safety and Improving the Safety of Health IT.
Magrabi, Farah; Ong, Mei-Sing; Coiera, Enrico
2016-01-01
Alongside their benefits health IT applications can pose new risks to patient safety. Problems with IT have been linked to many different types of clinical errors including prescribing and administration of medications; as well as wrong-patient, wrong-site errors, and delays in procedures. There is also growing concern about the risks of data breach and cyber-security. IT-related clinical errors have their origins in processes undertaken to design, build, implement and use software systems in a broader sociotechnical context. Safety can be improved with greater standardization of clinical software and by improving the quality of processes at different points in the technology life cycle, spanning design, build, implementation and use in clinical settings. Oversight processes can be set up at a regional or national level to ensure that clinical software systems meet specific standards. Certification and regulation are two mechanisms to improve oversight. In the absence of clear standards, guidelines are useful to promote safe design and implementation practices. Processes to identify and mitigate hazards can be formalised via a safety management system. Minimizing new patient safety risks is critical to realizing the benefits of IT.
Access and authorisation in a Glocal e-Health Policy context.
Scott, Richard E; Jennett, Penny; Yeo, Maryann
2004-03-31
Challenges to the development of appropriate yet adaptable policy and tools for security of the individual patient electronic health record (EHR) are proving to be significant. Compounding this is the unique capability of e-health to transgress all existing geo-political and other barriers. Initiatives to develop and advance policy, standards, and tools in relation to EHR access control and authorisation management must address this capability. Currently policy development initiatives take place largely in an isolated manner. This jeopardises the potential of e-health because decisions made in one jurisdiction might hamper, even prevent, an e-health opportunity in another. This paper places access and authorisation issues in an overall policy context through describing current Canadian initiatives. The National Initiative for Telehealth (NIFTE) Guidelines project is developing a framework of national guidelines for telehealth. The Policy and Peer Permission (PPP) project is developing a unique tool that provides persistent protection of data. The new corporate body 'Infoway' is developing a pan-Canadian electronic health record solution. Finally, the Glocal e-Health Policy initiative is developing a tool with which to identify and describe the inter-relationships of e-health issues amongst policy levels, themes, and actors.
Possible overexposure of pregnant women to emissions from a walk through metal detector.
Wu, Dagang; Qiang, Rui; Chen, Ji; Seidman, Seth; Witters, Donald; Kainz, Wolfgang
2007-10-07
This paper presents a systematic procedure to evaluate the induced current densities and electric fields due to walk-through metal detector (WTMD) exposure. This procedure is then used to assess the exposure of nine pregnant women models exposed to one WTMD model. First, we measured the magnetic field generated by the WTMD, then we extracted the equivalent current source to represent the WTMD emissions and finally we calculated the induced current densities and electric fields using the impedance method. The WTMD emissions and the induced fields in the pregnant women and fetus models are then compared to the ICNIRP Guidelines and the IEEE C95.6 exposure safety standard. The results prove the consistency between maximum permissible exposure (MPE) levels and basic restrictions for the ICNIRP Guidelines and IEEE C95.6. We also found that this particular WTMD complies with the ICNIRP basic restrictions for month 1-5 models, but leads to both fetus and pregnant women overexposure for month 6-9 models. The IEEE C95.6 restrictions (MPEs and basic restrictions) are not exceeded. The fetus overexposure of this particular WTMD calls for carefully conducted safety evaluations of security systems before they are deployed.
Possible overexposure of pregnant women to emissions from a walk through metal detector
NASA Astrophysics Data System (ADS)
Wu, Dagang; Qiang, Rui; Chen, Ji; Seidman, Seth; Witters, Donald; Kainz, Wolfgang
2007-09-01
This paper presents a systematic procedure to evaluate the induced current densities and electric fields due to walk-through metal detector (WTMD) exposure. This procedure is then used to assess the exposure of nine pregnant women models exposed to one WTMD model. First, we measured the magnetic field generated by the WTMD, then we extracted the equivalent current source to represent the WTMD emissions and finally we calculated the induced current densities and electric fields using the impedance method. The WTMD emissions and the induced fields in the pregnant women and fetus models are then compared to the ICNIRP Guidelines and the IEEE C95.6 exposure safety standard. The results prove the consistency between maximum permissible exposure (MPE) levels and basic restrictions for the ICNIRP Guidelines and IEEE C95.6. We also found that this particular WTMD complies with the ICNIRP basic restrictions for month 1-5 models, but leads to both fetus and pregnant women overexposure for month 6-9 models. The IEEE C95.6 restrictions (MPEs and basic restrictions) are not exceeded. The fetus overexposure of this particular WTMD calls for carefully conducted safety evaluations of security systems before they are deployed.
Enhancing security and improving interoperability in healthcare information systems.
Gritzalis, D A
1998-01-01
Security is a key issue in healthcare information systems, since most aspects of security become of considerable or even critical importance when handling healthcare information. In addition, the intense need for information exchange has revealed interoperability of systems and applications as another key issue. Standardization can play an important role towards both these issues. In this paper, relevant standardization activities are briefly presented, and existing and emerging healthcare information security standards are identified and critically analysed. The analysis is based on a framework which has been developed for this reason. Therefore, the identification of gaps and inconsistencies in current standardization, the description of the conflicts of standards with legislation, and the analysis of implications of these standards to user organizations, are the main results of this paper.
Bardutzky, Jürgen; Witsch, Jens; Jüttler, Eric; Schwab, Stefan; Vajkoczy, Peter; Wolf, Stefan
2011-09-14
Aneurysmal subarachnoid hemorrhage (SAH) may be complicated by delayed cerebral ischemia, which is a major cause of unfavorable clinical outcome and death in SAH-patients. Delayed cerebral ischemia is presumably related to the development of vasospasm triggered by the presence of blood in the basal cisterns. To date, oral application of the calcium antagonist nimodipine is the only prophylactic treatment for vasospasm recognized under international guidelines.In retrospective trials lumbar drainage of cerebrospinal fluid has been shown to be a safe and feasible measure to remove the blood from the basal cisterns and decrease the incidence of delayed cerebral ischemia and vasospasm in the respective study populations. However, the efficacy of lumbar drainage has not been evaluated prospectively in a randomized controlled trial yet. This is a protocol for a 2-arm randomized controlled trial to compare an intervention group receiving early continuous lumbar CSF-drainage and standard neurointensive care to a control group receiving standard neurointensive care only. Adults suffering from a first aneurysmal subarachnoid hemorrhage whose aneurysm has been secured by means of coiling or clipping are eligible for trial participation. The effect of early CSF drainage (starting < 72 h after securing the aneurysm) will be measured in the following ways: the primary endpoint will be disability after 6 months, assessed by a blinded investigator during a personal visit or standardized telephone interview using the modified Rankin Scale. Secondary endpoints include mortality after 6 months, angiographic vasospasm, transcranial Doppler sonography (TCD) mean flow velocity in both middle cerebral arteries and rate of shunt insertion at 6 months after hospital discharge. Here, we present the study design of a multicenter prospective randomized controlled trial to investigate whether early application of a lumbar drainage improves clinical outcome after aneurysmal subarachnoid hemorrhage.
5 CFR 1312.8 - Standard identification and markings.
Code of Federal Regulations, 2011 CFR
2011-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.8 Standard identification and markings... or event for declassification that corresponds to the lapse of the information's national security...
5 CFR 1312.8 - Standard identification and markings.
Code of Federal Regulations, 2010 CFR
2010-01-01
... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.8 Standard identification and markings... or event for declassification that corresponds to the lapse of the information's national security...
Sharer, J Daniel; Bodamer, Olaf; Longo, Nicola; Tortorelli, Silvia; Wamelink, Mirjam M C; Young, Sarah
2017-02-01
Disclaimer: These ACMG Standards and Guidelines are intended as an educational resource for clinical laboratory geneticists to help them provide quality clinical laboratory genetic services. Adherence to these standards and guidelines is voluntary and does not necessarily assure a successful medical outcome. These Standards and Guidelines should not be considered inclusive of all proper procedures and tests or exclusive of others that are reasonably directed to obtaining the same results. In determining the propriety of any specific procedure or test, clinical laboratory geneticists should apply their professional judgment to the specific circumstances presented by the patient or specimen. Clinical laboratory geneticists are encouraged to document in the patient's record the rationale for the use of a particular procedure or test, whether or not it is in conformance with these Standards and Guidelines. They also are advised to take notice of the date any particular guideline was adopted, and to consider other relevant medical and scientific information that becomes available after that date. It also would be prudent to consider whether intellectual property interests may restrict the performance of certain tests and other procedures.Cerebral creatine deficiency syndromes are neurometabolic conditions characterized by intellectual disability, seizures, speech delay, and behavioral abnormalities. Several laboratory methods are available for preliminary and confirmatory diagnosis of these conditions, including measurement of creatine and related metabolites in biofluids using liquid chromatography-tandem mass spectrometry or gas chromatography-mass spectrometry, enzyme activity assays in cultured cells, and DNA sequence analysis. These guidelines are intended to standardize these procedures to help optimize the diagnosis of creatine deficiency syndromes. While biochemical methods are emphasized, considerations for confirmatory molecular testing are also discussed, along with variables that influence test results and interpretation.Genet Med 19 2, 256-263.
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1984-01-01
The Office of Management and Budget (OMB) Circular A-71, transmittal Memorandum No. 1, requires that each agency establish a management control process to assure that appropriate administrative, physical and technical safeguards are incorporated into all new computer applications. In addition to security specifications, the management control process should assure that the safeguards are adequate for the application. The security activities that should be integral to the system development process are examined. The software quality assurance process to assure that adequate and appropriate controls are incorporated into sensitive applications is also examined. Security for software packages is also discussed.
Compliance with minimum information guidelines in public metabolomics repositories
Spicer, Rachel A.; Salek, Reza; Steinbeck, Christoph
2017-01-01
The Metabolomics Standards Initiative (MSI) guidelines were first published in 2007. These guidelines provided reporting standards for all stages of metabolomics analysis: experimental design, biological context, chemical analysis and data processing. Since 2012, a series of public metabolomics databases and repositories, which accept the deposition of metabolomic datasets, have arisen. In this study, the compliance of 399 public data sets, from four major metabolomics data repositories, to the biological context MSI reporting standards was evaluated. None of the reporting standards were complied with in every publicly available study, although adherence rates varied greatly, from 0 to 97%. The plant minimum reporting standards were the most complied with and the microbial and in vitro were the least. Our results indicate the need for reassessment and revision of the existing MSI reporting standards. PMID:28949328
Compliance with minimum information guidelines in public metabolomics repositories.
Spicer, Rachel A; Salek, Reza; Steinbeck, Christoph
2017-09-26
The Metabolomics Standards Initiative (MSI) guidelines were first published in 2007. These guidelines provided reporting standards for all stages of metabolomics analysis: experimental design, biological context, chemical analysis and data processing. Since 2012, a series of public metabolomics databases and repositories, which accept the deposition of metabolomic datasets, have arisen. In this study, the compliance of 399 public data sets, from four major metabolomics data repositories, to the biological context MSI reporting standards was evaluated. None of the reporting standards were complied with in every publicly available study, although adherence rates varied greatly, from 0 to 97%. The plant minimum reporting standards were the most complied with and the microbial and in vitro were the least. Our results indicate the need for reassessment and revision of the existing MSI reporting standards.
Allaert, Francois-André; Mazen, Noël-Jean; Legrand, Louis; Quantin, Catherine
2017-01-17
The market for Connected Health Devices (CHD) with healthcare applications is growing fast and should be worth several billion euros in turnover in the coming years. Their development will completely transform the organisation of our healthcare system, profoundly change the way patients are managed and revolutionizes disease prevention. The CHD with healthcare applications is a tidal wave that has societal impact calling into question the privacy of patients' personal and healthcare information and its protection in secure systems. Rather than trying to stop the use of CHD, we must channel the wave by clearly examining the advantages versus the risks and threats to the patients, and find counter-measures for implementation. The main difficulty is channeling the wave in a way that is acceptable to CHD developers who otherwise will bypass the rules, even if they can be sued for it. Therefore, it appears necessary to implement guidelines that can be used by all developers, defining the minimum requirement for assuring the security of patient privacy and healthcare management. In European Healthcare Systems, there is an imperative need for establishing security guidelines that CHD producers could use to ensure compliance, so that patient privacy and healthcare management is safeguarded. The aim would be to implement the guidelines a posteriori rather than a priori control so as not to hamper innovation.
The Development of Human Factor Guidelines for Unmanned Aircraft System Control Stations
NASA Technical Reports Server (NTRS)
Hobbs, Alan
2014-01-01
Despite being referred to as unmanned some of the major challenges confronting unmanned aircraft systems (UAS) relate to human factors. NASA is conducting research to address the human factors relevant to UAS access to non-segregated airspace. This work covers the issues of pilot performance, interaction with ATC, and control station design. A major outcome of this research will be recommendations for human factors design guidelines for UAS control stations to support routine beyond-line-of-sight operations in the US national airspace system (NAS). To be effective, guidelines must be relevant to a wide range of systems, must not be overly prescriptive, and must not impose premature standardization on evolving technologies. In developing guidelines, we recognize that existing regulatory and guidance material may already provide adequate coverage of certain issues. In other cases suitable guidelines may be found in existing military or industry human factors standards. In cases where appropriate existing standards cannot be identified, original guidelines will be proposed.
Human Factors Guidelines for UAS in the National Airspace System
NASA Technical Reports Server (NTRS)
Hobbs, Alan; Shively, R. Jay
2013-01-01
The ground control stations (GCS) of some UAS have been characterized by less-than-adequate human-system interfaces. In some cases this may reflect a failure to apply an existing regulation or human factors standard. In other cases, the problem may indicate a lack of suitable guidance material. NASA is leading a community effort to develop recommendations for human factors guidelines for GCS to support routine beyond-line-of-sight UAS operations in the national airspace system (NAS). In contrast to regulations, guidelines are not mandatory requirements. However, by encapsulating solutions to identified problems or areas of risk, guidelines can provide assistance to system developers, users and regulatory agencies. To be effective, guidelines must be relevant to a wide range of systems, must not be overly prescriptive, and must not impose premature standardization on evolving technologies. By assuming that a pilot will be responsible for each UAS operating in the NAS, and that the aircraft will be required to operate in a manner comparable to conventionally piloted aircraft, it is possible to identify a generic set of pilot tasks and the information, control and communication requirements needed to support these tasks. Areas where guidelines will be useful can then be identified, utilizing information from simulations, operational experience and the human factors literature. In developing guidelines, we recognize that existing regulatory and guidance material will, at times, provide adequate coverage of an area. In other cases suitable guidelines may be found in existing military or industry human factors standards. In cases where appropriate existing standards cannot be identified, original guidelines will be proposed.
76 FR 23969 - Virginia Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-29
... Roanoke, Virginia. The committee is authorized under the Secure Rural Schools and Community Self..., operating guidelines, the next meeting date and location, and other administrative business. DATES: The...
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-06-15
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.
45 CFR 164.308 - Administrative safeguards.
Code of Federal Regulations, 2013 CFR
2013-10-01
... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... accordance with § 164.306: (1)(i) Standard: Security management process. Implement policies and procedures to... to the confidentiality, integrity, and availability of electronic protected health information held...
45 CFR 164.308 - Administrative safeguards.
Code of Federal Regulations, 2014 CFR
2014-10-01
... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... accordance with § 164.306: (1)(i) Standard: Security management process. Implement policies and procedures to... to the confidentiality, integrity, and availability of electronic protected health information held...
32 CFR 2001.80 - Prescribed standard forms.
Code of Federal Regulations, 2011 CFR
2011-07-01
... when their use will enhance the protection of national security information and/or will reduce the....80 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Standard...
2007-09-01
Identified in DTSA Guidelines for Military Service Certification and ITAR Exemption Description 8 Table 2: GAO Analysis of DOD Exemption... DTSA Defense Technology Security Administration ITAR International Traffic in Arms Regulations NATO North Atlantic Treaty Organization This is...and friendly nations. To clarify exemption use, DOD’s Defense Technology Security Administration ( DTSA )—which is responsible for developing and
2010-09-01
genetic relationships between kin.33 Regardless of the underlying mechanism, individual symbiotic relationships can confer multiple benefits to the...allocation guidelines for homeland security and emergency management policymakers. The framework provides an operationally relevant rubric for...S. Wells, The Journey of Man: A Genetic Odyssey (Princeton, NJ: Princeton University Press, 2002). 4 A. Jakubowicz, “Anglo-multiculturalism
An updated look at document security: from initiation to storage or shredder.
McConnell, Charles R
2014-01-01
In these days of close attention to security of information handled electronically, there is often a tendency to overlook the security of hard-copy documents. Document security can involve many areas of business, but the health care department manager's concerns are primarily for patient records and employee documentation. Document security is closely related to growing concerns for individual privacy; guidelines are furnished for protecting employee privacy by separating retention practices for business information from personal information. Sensitive documentation requires rules and procedures for processing, retaining, accessing, storing, and eventually destroying. Also, documents that are missing or incomplete at times present unique problems for the organization. The department manager is provided with some simple rules for safeguarding employee and patient documentation.
Standardization by ISO to Ensure the Sustainability of Space Activities
NASA Astrophysics Data System (ADS)
Kato, A.; Lazare, B.; Oltrogge, D.; Stokes, H.
2013-08-01
The ISO / Technical Committee 20 / Sub-committee 14 develops debris-related standards and technical reports to mitigate debris and help ensure mission and space sustainability. While UN Guidelines and the IADC Guidelines encourage national governments and agencies to promote debris mitigation design and operation, the ISO standards will help the global space industry promote and sustain its space-related business. In this paper the scope and status of each ISO standard is discussed within an overall framework. A comparison with international guidelines is also provided to demonstrate the level of consistency. Finally, as a case study, the ISO standards are applied to a CubeSat mission, thus demonstrating their usability on a relatively recent and popular class of satellite.
mHealth data security: the need for HIPAA-compliant standardization.
Luxton, David D; Kayl, Robert A; Mishkind, Matthew C
2012-05-01
The rise in the use of mobile devices, such as smartphones, tablet personal computers, and wireless medical devices, as well as the wireless networks that enable their use, has raised new concerns for data security and integrity. Standardized Health Insurance Portability and Accountability Act of 1996 (HIPAA)-compliant electronic data security that will allow ubiquitous use of mobile health technologies is needed. The lack of standardized data security to assure privacy, to allow interoperability, and to maximize the full capabilities of mobile devices presents a significant barrier to care. The purpose of this article is to provide an overview of the issue and to encourage discussion of this important topic. Current security needs, standards, limitations, and recommendations for how to address this barrier to care are discussed.
Virginia Erosion and Sediment Control Handbook. Standards, Criteria and Guidelines.
ERIC Educational Resources Information Center
Virginia State Soil and Water Conservation Commission, Richmond, VA.
Guidelines and technical standards for development of local erosion and sediment control programs and conservation standards to meet the goals established by the Virginia Erosion and Sediment Control law are presented in this handbook. Part I defines natural and manmade erosion, sedimentation, and the hazards of uncontrolled wear and damage to the…
Texas School Libraries: Standards, Resources, Services, and Students' Performance.
ERIC Educational Resources Information Center
Smith, Ester G.
This study of Texas school libraries had three objectives: examine school library resources, services, and use, on the basis of the School Library Programs: Standards and Guidelines for Texas and determine the need for updating these standards and guidelines so that they better serve communities across the state; determine the impact that school…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-07
... Current List of Laboratories Which Meet Minimum Standards To Engage in Urine Drug Testing for Federal... Drug Testing Programs (Mandatory Guidelines). The Mandatory Guidelines were first published in the... of Laboratories Engaged in Urine Drug Testing for Federal Agencies,'' sets strict standards that...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-14
... Current List of Laboratories Which Meet Minimum Standards To Engage in Urine Drug Testing for Federal... Drug Testing Programs (Mandatory Guidelines). The Mandatory Guidelines were first published in the... of Laboratories Engaged in Urine Drug Testing for Federal Agencies,'' sets strict standards that...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-01
... Current List of Laboratories Which Meet Minimum Standards To Engage in Urine Drug Testing for Federal... Drug Testing Programs (Mandatory Guidelines). The Mandatory Guidelines were first published in the... of Laboratories Engaged in Urine Drug Testing for Federal Agencies,'' sets strict standards that...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-01
... Current List of Laboratories Which Meet Minimum Standards To Engage in Urine Drug Testing for Federal... Drug Testing Programs (Mandatory Guidelines). The Mandatory Guidelines were first published in the... of Laboratories Engaged in Urine Drug Testing for Federal Agencies,'' sets strict standards that...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-04
... Current List of Laboratories Which Meet Minimum Standards To Engage in Urine Drug Testing for Federal... Drug Testing Programs (Mandatory Guidelines). The Mandatory Guidelines were first published in the... of Laboratories Engaged in Urine Drug Testing for Federal Agencies,'' sets strict standards that...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-02
... Current List of Laboratories Which Meet Minimum Standards To Engage in Urine Drug Testing for Federal... Drug Testing Programs (Mandatory Guidelines). The Mandatory Guidelines were first published in the..., ``Certification of Laboratories Engaged in Urine Drug Testing for Federal Agencies,'' sets strict standards that...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-10
... Current List of Laboratories Which Meet Minimum Standards To Engage in Urine Drug Testing for Federal... Drug Testing Programs (Mandatory Guidelines). The Mandatory Guidelines were first published in the... of Laboratories Engaged in Urine Drug Testing for Federal Agencies,'' sets strict standards that...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-14
... Current List of Laboratories Which Meet Minimum Standards To Engage in Urine Drug Testing for Federal... Drug Testing Programs (Mandatory Guidelines). The Mandatory Guidelines were first published in the... of Laboratories Engaged in Urine Drug Testing for Federal Agencies,'' sets strict standards that...
ERIC Educational Resources Information Center
Reading Recovery Council of North America, Columbus, OH.
This booklet outlines the Reading Recovery Council of North America's (RRCNA) standards and guidelines for those who are responsible for the establishment and maintenance of effective Reading Recovery and/or "Descubriendo La Lectura" sites. The standards are deemed essential for assuring quality services to children and effective…
Defending the Mentally Disabled.
ERIC Educational Resources Information Center
Cournos, Francine; And Others
1984-01-01
Discusses the role of mental health and social services personnel in helping patients apply for recertification for Supplementary Security Income (SSI) benefits. Describes the appeal process and provides guidelines for professionals. (JAC)
Gil Jiménez, Víctor P.; Armada, Ana García
2009-01-01
Frequently, Wireless Sensor Networks (WSN) are designed focusing on applications and omitting transmission problems in these wireless networks. In this paper, we present a measurement campaign that has been carried out using one of the most commonly used WSN platforms, the micaZ from Crossbow©. Based on these measurements, some guidelines to deploy a robust and reliable WSN are provided. The results are focused on security and environmental applications but can also be extrapolated to other scenarios. A main conclusion that can be extracted is that, from the transmission point of view, a dense WSN is one of the best choices to overcome many of the transmission problems such as the existence of a transitional region, redundance, forwarding, obstructions or interference with other systems. PMID:22303175
SEC sets guidelines for climate risk
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
2010-04-15
In a 3--2 vote in late January 2010, the U.S. Securities & Exchange Commission (SEC), the agency in charge of making sure investors are aware of risks associated with financial investments, approved new 'interpretive guidance' for 'disclosure of climate-related business risks.' The new guidelines call for disclosure of anticipated impact of climate change on assets and financial risks associated with compliance costs for existing and pending climate regulations.
Building Assured Systems Framework
2010-09-01
of standards such as ISO 27001 as frameworks [NASCIO 2009]. In this context, a framework is a standard intended to assist in auditing and compliance...Information Security ISO /IEC 27004 Information technology – Security techniques - Information security management measurement ISO /IEC 15939, System and
78 FR 67210 - Charging Standard Administrative Fees for Nonprogram-Related Information; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-08
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0026] Charging Standard Administrative Fees for Nonprogram-Related Information; Correction AGENCY: Social Security Administration. ACTION: Notice... Social Security Administration published a document in the Federal Register of September 18, 2013...
Code of Federal Regulations, 2011 CFR
2011-10-01
... implements NASA's acquisition requirements pertaining to Federal policies for the security of unclassified... (FISMA) of 2002, Homeland Security Presidential Directive (HSPD) 12, Clinger-Cohen Act of 1996 (40 U.S.C... Institute of Standards and Technology (NIST) security requirements and standards. These requirements...
Code of Federal Regulations, 2013 CFR
2013-10-01
... implements NASA's acquisition requirements pertaining to Federal policies for the security of unclassified... (FISMA) of 2002, Homeland Security Presidential Directive (HSPD) 12, Clinger-Cohen Act of 1996 (40 U.S.C... Institute of Standards and Technology (NIST) security requirements and standards. These requirements...
This November 2011 document summarizes the various requirements of the sewage sludge incinerators (SSI) new source performance standards (NSPS) and emission guidelines (EG), broken down into compliance categories.
NASA Technical Reports Server (NTRS)
1996-01-01
NASA's standard for oxygen system design, materials selection, operation, and transportation is presented. Minimum guidelines applicable to NASA Headquarters and all NASA Field Installations are contained.
Traffic Data Quality Measurement : Final Report
DOT National Transportation Integrated Search
2004-09-15
One of the foremost recommendations from the FHWA sponsored workshops on Traffic Data Quality (TDQ) in 2003 was a call for "guidelines and standards for calculating data quality measures." These guidelines and standards are expected to contain method...
Dedios, Maria Cecilia; Esperato, Alexo; De-Regil, Luz Maria; Peña-Rosas, Juan Pablo; Norris, Susan L
2017-03-21
Over the past decade, the World Health Organization (WHO) has implemented a standardized, evidence-informed guideline development process to assure technically sound and policy-relevant guidelines. This study is an independent evaluation of the adaptability of the guidelines produced by the Evidence and Programme Guidance unit, at the Department of Nutrition for Health and Development (NHD). The study systematizes the lessons learned by the NHD group at WHO. We used a mixed methods approach to determine the adaptability of the nutrition guidelines. Adaptability was defined as having two components; methodological quality and implementability of guidelines. Additionally, we gathered recommendations to improve future guideline development in nutrition actions for health and development. Data sources for this evaluation were official documentation and feedback (both qualitative and quantitative) from key stakeholders involved in the development of nutrition guidelines. The qualitative data was collected through a desk review and two waves of semi-structured interviews (n = 12) and was analyzed through axial coding. Guideline adaptability was assessed quantitatively using two standardized instruments completed by key stakeholders. The Appraisal Guideline for Research and Evaluation questionnaire, version II was used to assess guideline quality (n = 6), while implementability was assessed with the electronic version of the GuideLine Implementability Appraisal (n = 7). The nutrition evidence-informed guideline development process has several strengths, among them are the appropriate management of conflicts of interest of guideline developers and the systematic use of high-quality evidence to inform the recommendations. These features contribute to increase the methodological quality of the guidelines. The key areas for improvement are the limited implementability of the recommendations, the lack of explicit and precise implementation advice in the guidelines and challenges related to collaborative work within interdisciplinary groups. Overall, our study found that the nutrition evidence-informed guidelines are of good methodological quality but that the implementability requires improvement. The recommendations to improve guideline adaptability address the guideline content, the dynamics shaping interdisciplinary work, and actions for implementation feasibility. As WHO relies heavily on a standardized procedure to develop guidelines, the lessons learned may be applicable to guideline development across the organization and to other groups developing guidelines.
Measuring Information Security: Guidelines to Build Metrics
NASA Astrophysics Data System (ADS)
von Faber, Eberhard
Measuring information security is a genuine interest of security managers. With metrics they can develop their security organization's visibility and standing within the enterprise or public authority as a whole. Organizations using information technology need to use security metrics. Despite the clear demands and advantages, security metrics are often poorly developed or ineffective parameters are collected and analysed. This paper describes best practices for the development of security metrics. First attention is drawn to motivation showing both requirements and benefits. The main body of this paper lists things which need to be observed (characteristic of metrics), things which can be measured (how measurements can be conducted) and steps for the development and implementation of metrics (procedures and planning). Analysis and communication is also key when using security metrics. Examples are also given in order to develop a better understanding. The author wants to resume, continue and develop the discussion about a topic which is or increasingly will be a critical factor of success for any security managers in larger organizations.
Critical appraisal of clinical practice guidelines in pediatric infectious diseases.
Wilby, Kyle John; Black, Emily Kathleen; MacLeod, Claire; Wiens, Matthew; Lau, Tim T Y; Paiva, Maria A; Gorman, Sean
2015-10-01
There is a need to critically appraise clinical practice guidelines in order to ensure safe and effective practices are being implemented to optimize patient care. Appraising guidelines within one therapeutic area enable recommendations for improvement during guideline creation and dissemination. Study objectives were to systematically appraise selected published guidelines used in the treatment of pediatric infectious diseases and to make recommendations for improvement throughout the development and dissemination processes. The study occurred between collaborative academic and practice-based institutions located in Canada and Qatar. A literature search identified guidelines for management of pediatric infectious diseases from 1997 to 2013. Each guideline was appraised by four independent assessors, according to the appraisal of guidelines for research and evaluation II (AGREE II) instrument. Standardized domain scores were calculated for each guideline and pooled. Final endorsements for use in clinical practice were also determined. Inter-rater reliability was assessed using intraclass correlation coefficients. Standardized domain scores according to the AGREE II instrument. Twenty guidelines met inclusion criteria and were appraised. Pooled domain scores were: scope and purpose (69.9), stakeholder involvement (40.1), rigour of development (47.1), clarity of presentation (73.4), applicability (23.7), editorial independence (46.7), and overall assessment (55.8). Two (10%) guidelines were recommended for use without revision, 13 (65%) guidelines were recommended with modifications, and 5 (25%) guidelines were not recommended for implementation into practice. Inter-rater reliability was moderate to good with intra-class correlations of 0.65-0.93 per guideline. The majority of appraised guidelines were moderately rated, with a 25% of guidelines not recommended for use. Strategies for improvement require the involvement of all key stakeholders (caregivers, patients, and allied health professionals), and consideration of facilitators, barriers and resource implications during implementation. Additionally, critical appraisal of guidelines should become standard practice prior to adoption into clinical settings.
Scientific Reporting: Raising the Standards.
McLeroy, Kenneth R; Garney, Whitney; Mayo-Wilson, Evan; Grant, Sean
2016-10-01
This article is based on a presentation that was made at the 2014 annual meeting of the editorial board of Health Education & Behavior. The article addresses critical issues related to standards of scientific reporting in journals, including concerns about external and internal validity and reporting bias. It reviews current reporting guidelines, effects of adopting guidelines, and offers suggestions for improving reporting. The evidence about the effects of guideline adoption and implementation is briefly reviewed. Recommendations for adoption and implementation of appropriate guidelines, including considerations for journals, are provided. © 2016 Society for Public Health Education.
An Analysis of State Alternate Assessment Participation Guidelines
ERIC Educational Resources Information Center
Musson, Jane E.; Thomas, Megan K.; Towles-Reeves, Elizabeth; Kearns, Jacqueline F.
2010-01-01
The purpose of this study was to examine all states' participation guidelines for alternate assessments based on alternate achievement standards (AA-AAS) and to analyze these guidelines for common and contrasting themes. State alternate assessment participation guidelines were found for all 50 states. Participation guidelines were coded, and 12…
17 CFR 155.4 - Trading standards for introducing brokers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Trading standards for introducing brokers. 155.4 Section 155.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION (CONTINUED) TRADING STANDARDS § 155.4 Trading standards for introducing brokers. (a) Each...
Assessing the Security of Connected Diabetes Devices.
Out, Dirk-Jan; Tettero, Olaf
2017-03-01
This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices.
Code of Federal Regulations, 2013 CFR
2013-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.600 General. Brokers or dealers in securities are subject to the special standards of diligence; prohibitions...
Code of Federal Regulations, 2011 CFR
2011-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.600 General. Brokers or dealers in securities are subject to the special standards of diligence; prohibitions...
Code of Federal Regulations, 2012 CFR
2012-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.600 General. Brokers or dealers in securities are subject to the special standards of diligence; prohibitions...
Code of Federal Regulations, 2014 CFR
2014-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.600 General. Brokers or dealers in securities are subject to the special standards of diligence; prohibitions...
5 CFR 9701.520 - Standards of conduct for labor organizations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... organizations. 9701.520 Section 9701.520 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.520 Standards of...
The European Stroke Organisation Guidelines: a standard operating procedure.
Ntaios, George; Bornstein, Natan M; Caso, Valeria; Christensen, Hanne; De Keyser, Jacques; Diener, Hans-Christoph; Diez-Tejedor, Exuperio; Ferro, Jose M; Ford, Gary A; Grau, Armin; Keller, Emanuella; Leys, Didier; Russell, David; Toni, Danilo; Turc, Guillaume; Van der Worp, Bart; Wahlgren, Nils; Steiner, Thorsten
2015-10-01
In 2008, the recently founded European Stroke Organisation published its guidelines for the management of ischemic stroke and transient ischemic attack. This highly cited document was translated in several languages and was updated in 2009. Since then, the European Stroke Organisation has published guidelines for the management of intracranial aneurysms and subarachnoidal hemorrhage, for the establishment of stroke units and stroke centers, and recently for the management of intracerebral hemorrhage. In recent years, the methodology for the development of guidelines has evolved significantly. To keep pace with this progress and driven by the strong determination of the European Stroke Organisation to further promote stroke management, education, and research, the European Stroke Organisation decided to delineate a detailed standard operating procedure for its guidelines. There are two important cornerstones in this standard operating procedure: The first is the implementation of the Grading of Recommendations Assessment, Development, and Evaluation methodology for the development of its Guideline Documents. The second one is the decision of the European Stroke Organisation to move from the classical model of a single Guideline Document about a major topic (e.g. management of ischemic stroke) to focused modules (i.e. subdivisions of a major topic). This will enable the European Stroke Organisation to react faster when new developments in a specific stroke field occur and update its recommendations on the related module rather swiftly; with the previous approach of a single large Guideline Document, its entire revision had to be completed before an updated publication, delaying the production of up-to-date guidelines. After discussion within the European Stroke Organisation Guidelines Committee and significant input from European Stroke Organisation members as well as methodologists and analysts, this document presents the official standard operating procedure for the development of the Guideline Documents of the European Stroke Organisation. © 2015 World Stroke Organization.
Clinical guidelines: proliferation and medicolegal significance.
Hurwitz, B
1994-01-01
Guidelines seeking to influence and regulate clinical activity are currently gaining a new cultural ascendancy on both sides of the Atlantic. Statutory agencies may be charged with developing clinical guidelines, and civil courts, in deciding actions in negligence, could be influenced by standards of care expressed in guideline statements. Clinical guidelines are not accorded unchallengeable status: they have been subject to careful scrutiny by British and American courts to establish their authenticity and relevance. In the United States, compliance with clinical guidelines cannot be used as a defence against liability if a physician's conduct is held to have been negligent, and third party organisations can be held liable if their clinical guidelines are found to be a contributory cause of patient harm. Guidelines have not usurped the role of the expert witness in court. The importance the law attaches to customary practice means that atypical or bizarre guidelines are unlikely to be accepted as embodying a legally required standard of clinical care. PMID:10136259
76 FR 77546 - Merchant Mariner Medical Advisory Committee; Vacancy
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-13
... issuance of merchant mariner credentials; medical standards and guidelines for the physical qualifications of operators of commercial vessels; medical examiner education; and medical research. DATES... standards and guidelines for the physical qualifications of operators of commercial vessels; medical...
ERIC Educational Resources Information Center
Zancanella, Don; Alsup, Janet
2010-01-01
When someone uses the term "standards," one tends to assume the topic under discussion is K-12 education, but standards for teacher preparation have their own parallel history. In English teacher education, that history has two strands: the NCTE Guidelines for the Preparation of Teachers of English Language Arts, which predate the "standards…
Hansen, D T; Adams, A H; Meeker, W C; Phillips, R B
1992-09-01
With the advent of health care's "era of accountability", the chiropractic profession is now faced with generating implicit standards and guidelines for care or having it done for us by outside agencies. Already we see chiropractic groups in individual states and provinces being pressured into naive efforts of guideline development. Current knowledge and experience are available through recent health care literature that clearly defines the structure and process of guideline development and offers suggestions on how to measure outcomes of those processes. In addition, the United States Congress has directed a new federal agency to oversee this activity and monitor outcomes of quality improvement programs. The time has come for the chiropractic profession to define its exact role in health care delivery and develop implicit standards of care and practice guidelines. This sentinel effort should be managed by a commissioned body of empaneled experts that generally represent the academic and clinical chiropractic profession. A protocol for selection of these panelists and the panel chairperson needs to be developed and memorialized. Appropriate methodology (with definitions) needs to be developed for the process of standards/guideline development. Adherence to the accepted structure and process of guideline development will ensure the continuity of this dynamic process in the coming generations. This proposal offers a preliminary definition of the structure and process, including a "seed" policy statement and decision flow chart, specific to guideline development. Once the structure and process of guideline development for chiropractic are defined, the profession can then present this product to federal and state agencies, private sector health care purchasers, patient advocacy groups and other stakeholders of chiropractic care.(ABSTRACT TRUNCATED AT 250 WORDS)
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-01-01
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358
17 CFR 155.4 - Trading standards for introducing brokers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Trading standards for introducing brokers. 155.4 Section 155.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.4 Trading standards for introducing brokers. (a) Each introducing broker...
17 CFR 155.4 - Trading standards for introducing brokers.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Trading standards for introducing brokers. 155.4 Section 155.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.4 Trading standards for introducing brokers. (a) Each introducing broker...
17 CFR 155.4 - Trading standards for introducing brokers.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Trading standards for introducing brokers. 155.4 Section 155.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.4 Trading standards for introducing brokers. (a) Each introducing broker...
45 CFR Appendix A to Subpart C of... - Security Standards: Matrix
Code of Federal Regulations, 2011 CFR
2011-10-01
... C of Part 164 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS... Protected Health Information Pt. 164, Subpt. C, App. A Appendix A to Subpart C of Part 164—Security Standards: Matrix Standards Sections Implementation Specifications (R)=Required, (A)=Addressable...
45 CFR Appendix A to Subpart C of... - Security Standards: Matrix
Code of Federal Regulations, 2010 CFR
2010-10-01
... C of Part 164 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS... Protected Health Information Pt. 164, Subpt. C, App. A Appendix A to Subpart C of Part 164—Security Standards: Matrix Standards Sections Implementation Specifications (R)=Required, (A)=Addressable...
REVIEW OF CONCENTRATION STANDARDS AND GUIDELINES FOR FUNGI IN INDOOR AIR
The paper reviews and compares existing guidelines for indoor airborne fungi, discusses limitations of existing guidelines, and identifies research needs that should contribute to the development of realistic and useful guidelines for these important air pollutants. (NOTE: Exposu...
Assessing the Security of Connected Diabetes Devices
Out, Dirk-Jan; Tettero, Olaf
2017-01-01
This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices. PMID:28264190
45 CFR 164.308 - Administrative safeguards.
Code of Federal Regulations, 2012 CFR
2012-10-01
...)(i) Standard: Security management process. Implement policies and procedures to prevent, detect... this subpart for the entity. (3)(i) Standard: Workforce security. Implement policies and procedures to...) Standard: Information access management. Implement policies and procedures for authorizing access to...
45 CFR 164.308 - Administrative safeguards.
Code of Federal Regulations, 2011 CFR
2011-10-01
...)(i) Standard: Security management process. Implement policies and procedures to prevent, detect... this subpart for the entity. (3)(i) Standard: Workforce security. Implement policies and procedures to...) Standard: Information access management. Implement policies and procedures for authorizing access to...
78 FR 21134 - Merchant Mariner Medical Advisory Committee; Vacancy
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-09
... standards and guidelines for the physical qualifications of operators of commercial vessels; medical examiner education; and medical research. DATES: Applicants must send a cover letter describing their... merchant mariners' documents; medical standards and guidelines for the physical qualifications of operators...
Rules and Regulations: Minimum Schoolhouse Construction Standards.
ERIC Educational Resources Information Center
Arkansas State Dept. of Education, Little Rock.
Regulatory guidelines governing the minimum schoolhouse construction standards as well as rules for new construction applications, school site selection, and approval procedures are presented. Appendices (comprising 95 percent of the publication) document the following: educational space guidelines; planning for modern education; school…
WHO Expert Committee on Specifications for Pharmaceutical Preparations.
2009-01-01
The Expert Committee on Specifications for Pharmaceutical Preparations works towards clear, independent and practical standards and guidelines for the quality assurance of medicines. Standards are developed by the Committee through worldwide consultation and an international consensus-building process. The following new standards and guidelines were adopted and recommended for use: the current list of available International Chemical Reference Substances and International Infrared Reference Spectra; guidelines on stability testing of active pharmaceutical ingredients and finished pharmaceutical products; procedure for prequalification of pharmaceutical products; and the procedure for assessing the acceptability, in principle, of active pharmaceutical ingredients for use in pharmaceutical products.
Pediatric Psycho-oncology Care: Standards, Guidelines and Consensus Reports
Wiener, Lori; Viola, Adrienne; Koretski, Julia; Perper, Emily Diana; Patenaude, Andrea Farkas
2014-01-01
Objective To identify existing guidelines, standards, or consensus-based reports for psychosocial care of children with cancer and their families. Purpose Psychosocial standards of care for children with cancer can systematize the approach to care and create a replicable model that can be utilized in pediatric hospitals around the world. Determining gaps in existing standards in pediatric psycho-oncology can guide development of useful evidence- and consensus-based standards. Methods The MEDLINE and PubMed databases were searched by investigators at two major pediatric oncology centers for existing guidelines, consensus-based reports, or standards for psychosocial care of pediatric cancer patients and their families published in peer-reviewed journals in English between 1980 and 2013. Results We located 27 articles about psychosocial care that met inclusion criteria: 5 set forth standards, 19 guidelines and 3 were consensus-based reports. None were sufficiently up-to-date, significantly evidence-based, comprehensive and specific enough to serve as a current standard for psychosocial care for children with cancer and their families. Conclusion Despite calls by a number of international pediatric oncology and psycho-oncology professional organizations about the urgency of addressing the psychosocial needs of the child with cancer in order to reduce suffering, there remains a need for development of a widely acceptable, evidence- and consensus-based, comprehensive standard of care to guide provision of essential psychosocial services to all pediatric cancer patients. PMID:24906202
Banville, Dominique
2006-06-01
To be recognized as an accredited program, Physical Education Teacher Education (PETE) programs in the country must abide by guidelines put forward by the National Association for Sport and Physical Education (NASPE), in collaboration with the National Council for the Accreditation of Teacher Education (NCATE). The guidelines are divided into nine standards and identify a number of outcomes (NASPE, 1998). The purpose of this study was to determine the nature of the exchanges between novice teachers (NTs) and cooperating teachers (CTs), when using the NASPE Standards (1998) as a reference point, and determine if the focus of the exchanges differed over time and according to data source. Six pairs of CTs and their NT participated in the study. Data were collected through recorded conversations between NTs and their CT as well as NTs' logs. Data showed that the majority of conversations focused on planning and instruction (Standard 6) and management and motivation (Standard 4), while few related to diverse learners (Standard 3), growth and development (Standard 2), and communication (Standard 5). The small amount of information shared by CTs in some standards indicates a need for PETE programs to share the guidelines with CTs to make them aware of the importance of offering a variety of topics to interns, because CTs are the primary source of information during this crucial experience.
Choi, Jeeyae; Jansen, Kay; Coenen, Amy
In recent years, Decision Support Systems (DSSs) have been developed and used to achieve "meaningful use". One approach to developing DSSs is to translate clinical guidelines into a computer-interpretable format. However, there is no specific guideline modeling approach to translate nursing guidelines to computer-interpretable guidelines. This results in limited use of DSSs in nursing. Unified modeling language (UML) is a software writing language known to accurately represent the end-users' perspective, due to its expressive characteristics. Furthermore, standard terminology enabled DSSs have been shown to smoothly integrate into existing health information systems. In order to facilitate development of nursing DSSs, the UML was used to represent a guideline for medication management for older adults encode with the International Classification for Nursing Practice (ICNP®). The UML was found to be a useful and sufficient tool to model a nursing guideline for a DSS.
Choi, Jeeyae; Jansen, Kay; Coenen, Amy
2015-01-01
In recent years, Decision Support Systems (DSSs) have been developed and used to achieve “meaningful use”. One approach to developing DSSs is to translate clinical guidelines into a computer-interpretable format. However, there is no specific guideline modeling approach to translate nursing guidelines to computer-interpretable guidelines. This results in limited use of DSSs in nursing. Unified modeling language (UML) is a software writing language known to accurately represent the end-users’ perspective, due to its expressive characteristics. Furthermore, standard terminology enabled DSSs have been shown to smoothly integrate into existing health information systems. In order to facilitate development of nursing DSSs, the UML was used to represent a guideline for medication management for older adults encode with the International Classification for Nursing Practice (ICNP®). The UML was found to be a useful and sufficient tool to model a nursing guideline for a DSS. PMID:26958174
A Proposed Interpretation of the ISO 10015 and Implications for HRD Theory and Research
ERIC Educational Resources Information Center
Jacobs, Ronald L.; Wang, Bryan
2007-01-01
While recent discussions of ISO 10015- Guidelines for Training have done much to promote the need for the standard, no interpretation of the standard has been presented that would guide its actual implementation. This paper proposes an interpretation of the ISO 10015 based on the specifications of the guideline and two other standards related to…
Code of Federal Regulations, 2012 CFR
2012-01-01
... Residential Mortgage Lending Practices C Appendix C to Part 30 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SAFETY AND SOUNDNESS STANDARDS Pt. 30, App. C Appendix C to Part 30—OCC Guidelines.... Preservation of Existing Authority C. Relationship to Other Legal Requirements D. Definitions II. Standards for...
ERIC Educational Resources Information Center
Kohoutek, Jan
2014-01-01
This article analyses the student assessment procedures of 12 universities in the UK, the Netherlands and the Czech Republic with respect to their alignment with the European standards and guidelines on the quality of assessing higher education students (European Standards and Guidelines for Quality Assurance [ESG] 1.3). Based on qualitative…
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215... FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...-risk, the facility must complete a Security Vulnerability Assessment. A Security Vulnerability...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-02
... Current List of Laboratories Which Meet Minimum Standards To Engage in Urine Drug Testing for Federal... Drug Testing Programs (Mandatory Guidelines). The Mandatory Guidelines were first published in the... of [[Page 16814
Guidelines and Standards for Proprietary Schools.
ERIC Educational Resources Information Center
Georgia State Board of Education, Atlanta.
This guide contains information pertaining to Georgia law, rules, regulations, and standards of practice for regulating proprietary schools in Georgia. Section 1 of the guide presents operation guidelines, including definitions, exemptions, general provisions, certificates of approval of schools, and appeals procedures. Section 2 presents minimum…
Security Requirements Management in Software Product Line Engineering
NASA Astrophysics Data System (ADS)
Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario
Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.
Code of Federal Regulations, 2011 CFR
2011-07-01
... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS PESTICIDE CHEMICALS Metallo-Organic Pesticide Chemicals Manufacturing Subcategory § 455.34 Effluent limitations guidelines...
Code of Federal Regulations, 2013 CFR
2013-07-01
... PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) PESTICIDE CHEMICALS Metallo-Organic Pesticide Chemicals Manufacturing Subcategory § 455.33 Effluent limitations guidelines...
Code of Federal Regulations, 2012 CFR
2012-07-01
... PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) PESTICIDE CHEMICALS Metallo-Organic Pesticide Chemicals Manufacturing Subcategory § 455.33 Effluent limitations guidelines...
Code of Federal Regulations, 2014 CFR
2014-07-01
... PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) PESTICIDE CHEMICALS Metallo-Organic Pesticide Chemicals Manufacturing Subcategory § 455.33 Effluent limitations guidelines...
Railroad infrastructure trespass detection performance guidelines
DOT National Transportation Integrated Search
2011-01-01
The U.S. Department of Transportations John A. Volpe National Transportation Systems Center, under the direction of the Federal Railroad Administration, conducted a 3-year demonstration of an automated prototype railroad infrastructure security sy...
41 CFR 105-62.201 - Declassification and downgrading.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Office, and the systematic review guidelines issued by the Administrator of General Services. (6) It is... Security Oversight Office, or in accordance with the procedures for mandatory review described in § 105-62...
41 CFR 105-62.201 - Declassification and downgrading.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Office, and the systematic review guidelines issued by the Administrator of General Services. (6) It is... Security Oversight Office, or in accordance with the procedures for mandatory review described in § 105-62...
78 FR 19744 - Privacy Act of 1974; Privacy Act System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-02
...: NASA Guest Operations System. SECURITY CLASSIFICATION: None. SYSTEM LOCATION: Location 1, as set forth... in accordance with the guidelines defined in the NASA Records Retention Schedules (NRRS), Schedule 1...
WHO expert committee on specifications for pharmaceutical preparations.
2013-01-01
The Expert Committee on Specifications for Pharmaceutical Preparations works towards clear, independent and practical standards and guidelines for the quality assurance of medicines. Standards are developed by the Committee through worldwide consultation and an international consensus-building process. The following new guidelines were adopted and recommended for use: Release procedure for International Chemical Reference Substances; WHO guidelines on quality risk management; WHO guidelines on variations to a prequalified product; and the Collaborative procedure between the World Health Organization Prequalification of Medicines Programme and national medicines regulatory authorities in the assessment and accelerated national registration of WHO-prequalified pharmaceutical products.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-08
... Financial Accounting Standards Board (``FASB'') and its parent organization, the Financial Accounting... recognizing the FASB's financial accounting and reporting standards as ``generally accepted'' under Section...; Securities Exchange Act of 1934; Order Regarding Review of FASB Accounting Support Fee for 2010 Under Section...
42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 42 Public Health 2 2012-10-01 2012-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...
42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 42 Public Health 2 2014-10-01 2014-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...
42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...
42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 42 Public Health 2 2013-10-01 2013-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...
42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 2 2011-10-01 2011-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...
76 FR 80241 - Revisions to Rules of Conduct and Standards of Responsibility for Representatives
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-23
... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2011-0016] RIN 0960-AH32 Revisions to Rules of Conduct and Standards of Responsibility for Representatives AGENCY: Social Security.... FOR FURTHER INFORMATION CONTACT: Andrew Maunz, Office of the General Counsel, Social Security...
40 CFR 60.38e - Reporting and recordkeeping guidelines.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 6 2010-07-01 2010-07-01 false Reporting and recordkeeping guidelines... PROGRAMS (CONTINUED) STANDARDS OF PERFORMANCE FOR NEW STATIONARY SOURCES Emission Guidelines and Compliance Times for Hospital/Medical/Infectious Waste Incinerators § 60.38e Reporting and recordkeeping guidelines...
Code of Federal Regulations, 2013 CFR
2013-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Elastomeric Binder) Subcategory § 427.42 Effluent limitations guidelines...
Code of Federal Regulations, 2012 CFR
2012-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Elastomeric Binder) Subcategory § 427.42 Effluent limitations guidelines...
Code of Federal Regulations, 2014 CFR
2014-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Elastomeric Binder) Subcategory § 427.42 Effluent limitations guidelines...
Code of Federal Regulations, 2014 CFR
2014-07-01
... PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) PESTICIDE CHEMICALS Organic Pesticide Chemicals Manufacturing Subcategory § 455.24 Effluent limitations guidelines representing the...
Code of Federal Regulations, 2014 CFR
2014-07-01
... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) PESTICIDE CHEMICALS Metallo-Organic Pesticide Chemicals Manufacturing Subcategory § 455.34 Effluent limitations guidelines...
Code of Federal Regulations, 2012 CFR
2012-07-01
... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) PESTICIDE CHEMICALS Metallo-Organic Pesticide Chemicals Manufacturing Subcategory § 455.34 Effluent limitations guidelines...
Code of Federal Regulations, 2013 CFR
2013-07-01
... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) PESTICIDE CHEMICALS Metallo-Organic Pesticide Chemicals Manufacturing Subcategory § 455.34 Effluent limitations guidelines...
Code of Federal Regulations, 2012 CFR
2012-07-01
... PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) PESTICIDE CHEMICALS Organic Pesticide Chemicals Manufacturing Subcategory § 455.24 Effluent limitations guidelines representing the...
Code of Federal Regulations, 2013 CFR
2013-07-01
... PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) PESTICIDE CHEMICALS Organic Pesticide Chemicals Manufacturing Subcategory § 455.24 Effluent limitations guidelines representing the...
Morel, Kenneth R
2009-11-01
In the context of forensic neuropsychological assessments, the professional interaction of law and psychology is viewed primarily as one where the retaining attorney or court dictates its needs to psychologists when resolving legal disputes. While this perspective is conceptually accurate, the positive and practical collaboration of law and psychology also relies on attorneys adhering to basic protections of sensitive psychological assessment procedures and tests. Objective testing is undermined when a practitioner of law engages in actions prior to, during, or following a neuropsychological examination in a manner that threatens the test security. An appreciation among practitioners of law and psychology regarding the necessity of test security is essential. This article reviews attorney actions that can affect test security, proposes a distinction by psychology between appropriate and problematic client preparation for a neuropsychological examination, integrates the available legal precedent regarding test security, and suggests productive measures to protect test security in medicolegal settings.
How to implement security controls for an information security program at CBRN facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.
This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in anmore » easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.« less
17 CFR 450.3 - Exemption for holdings subject to fiduciary standards.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption for holdings subject to fiduciary standards. 450.3 Section 450.3 Commodity and Securities Exchanges DEPARTMENT OF THE... standards. (a) The Secretary has determined that the rules and standards of the Comptroller of the Currency...
17 CFR 450.3 - Exemption for holdings subject to fiduciary standards.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Exemption for holdings subject to fiduciary standards. 450.3 Section 450.3 Commodity and Securities Exchanges DEPARTMENT OF THE... standards. (a) The Secretary has determined that the rules and standards of the Comptroller of the Currency...
Gupta, Veer; Henriksen, Kim; Edwards, Melissa; Jeromin, Andreas; Lista, Simone; Bazenet, Chantal; Soares, Holly; Lovestone, Simon; Hampel, Harald; Montine, Thomas; Blennow, Kaj; Foroud, Tatiana; Carrillo, Maria; Graff-Radford, Neill; Laske, Christoph; Breteler, Monique; Shaw, Leslie; Trojanowski, John Q.; Schupf, Nicole; Rissman, Robert A.; Fagan, Anne M.; Oberoi, Pankaj; Umek, Robert; Weiner, Michael W.; Grammas, Paula; Posner, Holly; Martins, Ralph
2015-01-01
The lack of readily available biomarkers is a significant hindrance towards progressing to effective therapeutic and preventative strategies for Alzheimer’s disease (AD). Blood-based biomarkers have potential to overcome access and cost barriers and greatly facilitate advanced neuroimaging and cerebrospinal fluid biomarker approaches. Despite the fact that preanalytical processing is the largest source of variability in laboratory testing, there are no currently available standardized preanalytical guidelines. The current international working group provides the initial starting point for such guidelines for standardized operating procedures (SOPs). It is anticipated that these guidelines will be updated as additional research findings become available. The statement provides (1) a synopsis of selected preanalytical methods utilized in many international AD cohort studies, (2) initial draft guidelines/SOPs for preanalytical methods, and (3) a list of required methodological information and protocols to be made available for publications in the field in order to foster cross-validation across cohorts and laboratories. PMID:25282381
78 FR 52779 - Merchant Mariner Medical Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-26
..., medical standards and guidelines for physical qualifications of operators of commercial vessels, medical examiner education, and medical research. The meeting will be open to the public. DATES: MEDMAC will meet...' documents; (b) medical standards and guidelines for the physical qualifications of operators of commercial...
78 FR 38735 - Autopsy Performance Criteria: Standards, Guidelines and Best Practices
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-27
... DEPARTMENT OF JUSTICE Office of Justice Programs [OJP (NIJ) Docket No. 1626] Autopsy Performance... Working Group for Medicolegal Death Investigation will make available to the general public a document entitled, ``Autopsy Performance Criteria: Standards, Guidelines and Best Practices''. The opportunity to...
This November 1998 document of questions and answers are provided as a guide for those subject to the new source performance standards (NSPS) or emission guidelines (EG), as well as those implementing the NSPS or EG.
2014-12-01
Effectiveness of the A2/AD Capabilities against the U.S.-Japanese Intervention .........................................................59 3...terms of the effect of the NDG, some scholars ascribe the acceleration of a security dilemma in Sino-Japanese relations to a mutual mistrust of the...advocated political realism, has provided international politics students with an effective model on how the international system has evolved since the
NASA Technical Reports Server (NTRS)
Lauenstein, J M.
2015-01-01
An overview is presented of the space radiation environment and its effects on electrical, electronic, and electromechanical parts. Relevant test standards and guidelines are listed. Test standards and guidelines are necessary to ensure best practices, minimize and bound systematic and random errors, and to ensure comparable results from different testers and vendors. Test standards are by their nature static but exist in a dynamic environment of advancing technology and radiation effects research. New technologies, failure mechanisms, and advancement in our understanding of known failure mechanisms drive the revision or development of test standards. Changes to standards must be weighed against their impact on cost and existing part qualifications. There must be consensus on new best practices. The complexity of some new technologies exceeds the scope of existing test standards and may require development of a guideline specific to the technology. Examples are given to illuminate the value and limitations of key radiation test standards as well as the challenges in keeping these standards up to date.
Code of Federal Regulations, 2013 CFR
2013-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Starch Binder) Subcategory § 427.32 Effluent limitations guidelines representing...
Code of Federal Regulations, 2014 CFR
2014-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Roofing Subcategory § 427.62 Effluent limitations guidelines representing the degree of...
Code of Federal Regulations, 2013 CFR
2013-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Roofing Subcategory § 427.63 Effluent limitations guidelines representing the degree of effluent...
Code of Federal Regulations, 2013 CFR
2013-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Coating or Finishing of Asbestos Textiles Subcategory § 427.83 Effluent limitations guidelines...
Code of Federal Regulations, 2014 CFR
2014-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Floor Tile Subcategory § 427.72 Effluent limitations guidelines representing the degree...
Code of Federal Regulations, 2010 CFR
2010-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Elastomeric Binder) Subcategory § 427.42 Effluent limitations guidelines representing the...
Code of Federal Regulations, 2013 CFR
2013-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos-Cement Sheet Subcategory § 427.22 Effluent limitations guidelines representing the degree...
Code of Federal Regulations, 2010 CFR
2010-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Floor Tile Subcategory § 427.72 Effluent limitations guidelines representing the degree of...
Code of Federal Regulations, 2010 CFR
2010-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Starch Binder) Subcategory § 427.32 Effluent limitations guidelines representing the degree...
Code of Federal Regulations, 2012 CFR
2012-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Starch Binder) Subcategory § 427.33 Effluent limitations guidelines representing the degree...
Code of Federal Regulations, 2010 CFR
2010-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Roofing Subcategory § 427.62 Effluent limitations guidelines representing the degree of effluent...
Code of Federal Regulations, 2012 CFR
2012-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos-Cement Sheet Subcategory § 427.23 Effluent limitations guidelines representing the degree of...
Code of Federal Regulations, 2010 CFR
2010-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos-Cement Pipe Subcategory § 427.12 Effluent limitations guidelines representing the degree of...
Code of Federal Regulations, 2012 CFR
2012-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Coating or Finishing of Asbestos Textiles Subcategory § 427.82 Effluent limitations guidelines...
Code of Federal Regulations, 2014 CFR
2014-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Millboard Subcategory § 427.53 Effluent limitations guidelines representing the degree of effluent...
Code of Federal Regulations, 2013 CFR
2013-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos-Cement Pipe Subcategory § 427.12 Effluent limitations guidelines representing the degree...
Code of Federal Regulations, 2012 CFR
2012-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Roofing Subcategory § 427.62 Effluent limitations guidelines representing the degree of...
Code of Federal Regulations, 2010 CFR
2010-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos-Cement Sheet Subcategory § 427.22 Effluent limitations guidelines representing the degree of...
Code of Federal Regulations, 2014 CFR
2014-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Starch Binder) Subcategory § 427.33 Effluent limitations guidelines representing the degree...
Code of Federal Regulations, 2012 CFR
2012-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos-Cement Pipe Subcategory § 427.12 Effluent limitations guidelines representing the degree...
Code of Federal Regulations, 2010 CFR
2010-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Coating or Finishing of Asbestos Textiles Subcategory § 427.82 Effluent limitations guidelines representing...
Code of Federal Regulations, 2014 CFR
2014-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Coating or Finishing of Asbestos Textiles Subcategory § 427.83 Effluent limitations guidelines...
Code of Federal Regulations, 2013 CFR
2013-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Elastomeric Binder) Subcategory § 427.43 Effluent limitations guidelines representing the...
Code of Federal Regulations, 2011 CFR
2011-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Starch Binder) Subcategory § 427.32 Effluent limitations guidelines representing the degree...
Code of Federal Regulations, 2011 CFR
2011-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Floor Tile Subcategory § 427.72 Effluent limitations guidelines representing the degree of...
Code of Federal Regulations, 2013 CFR
2013-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Millboard Subcategory § 427.52 Effluent limitations guidelines representing the degree of...
Code of Federal Regulations, 2012 CFR
2012-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Millboard Subcategory § 427.52 Effluent limitations guidelines representing the degree of...
Code of Federal Regulations, 2011 CFR
2011-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Roofing Subcategory § 427.62 Effluent limitations guidelines representing the degree of effluent...
Code of Federal Regulations, 2010 CFR
2010-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Millboard Subcategory § 427.52 Effluent limitations guidelines representing the degree of effluent...
Code of Federal Regulations, 2014 CFR
2014-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Starch Binder) Subcategory § 427.32 Effluent limitations guidelines representing...
Code of Federal Regulations, 2014 CFR
2014-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos-Cement Pipe Subcategory § 427.12 Effluent limitations guidelines representing the degree...
Code of Federal Regulations, 2012 CFR
2012-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos-Cement Pipe Subcategory § 427.13 Effluent limitations guidelines representing the degree of...
Code of Federal Regulations, 2014 CFR
2014-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Roofing Subcategory § 427.63 Effluent limitations guidelines representing the degree of effluent...
Code of Federal Regulations, 2012 CFR
2012-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Elastomeric Binder) Subcategory § 427.43 Effluent limitations guidelines representing the...
Code of Federal Regulations, 2014 CFR
2014-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos-Cement Sheet Subcategory § 427.23 Effluent limitations guidelines representing the degree of...
Code of Federal Regulations, 2013 CFR
2013-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Millboard Subcategory § 427.53 Effluent limitations guidelines representing the degree of effluent...
Code of Federal Regulations, 2014 CFR
2014-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Millboard Subcategory § 427.52 Effluent limitations guidelines representing the degree of...
Code of Federal Regulations, 2014 CFR
2014-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Coating or Finishing of Asbestos Textiles Subcategory § 427.82 Effluent limitations guidelines...
Code of Federal Regulations, 2012 CFR
2012-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Coating or Finishing of Asbestos Textiles Subcategory § 427.83 Effluent limitations guidelines...
Code of Federal Regulations, 2013 CFR
2013-07-01
... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Roofing Subcategory § 427.62 Effluent limitations guidelines representing the degree of...
Code of Federal Regulations, 2012 CFR
2012-07-01
... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS (CONTINUED) ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Floor Tile Subcategory § 427.73 Effluent limitations guidelines representing the degree of...