5 CFR 1312.31 - Security violations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified Information § 1312.31 Security violations. (a) A security violation notice is issued by the United...
6 CFR 7.12 - Violations of classified information requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Violations of classified information requirements. 7.12 Section 7.12 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLASSIFIED NATIONAL SECURITY INFORMATION Administration § 7.12 Violations of classified information...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
14 CFR 1203a.104 - Violation of security areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Violation of security areas. 1203a.104 Section 1203a.104 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.104 Violation of security areas. (a) Removal of unauthorized persons. The directors of NASA field...
14 CFR 1203a.104 - Violation of security areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Violation of security areas. 1203a.104 Section 1203a.104 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.104 Violation of security areas. (a) Removal of unauthorized persons. The directors of NASA field...
10 CFR 824.7 - Final notice of violation.
Code of Federal Regulations, 2011 CFR
2011-01-01
... whether the person violated or is continuing to violate a classified information security requirement. (b... classified information security requirement, the Director may issue to the person a final notice of violation... DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION...
10 CFR 824.7 - Final notice of violation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... whether the person violated or is continuing to violate a classified information security requirement. (b... classified information security requirement, the Director may issue to the person a final notice of violation... DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION...
49 CFR 1503.421 - Streamlined civil penalty procedures for certain security violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES Assessment of Civil Penalties by TSA § 1503.421 Streamlined civil penalty procedures for certain security violations. (a) Notice of violation. TSA, at the... violations described in the section and as otherwise provided by the Administrator. TSA may serve a Notice of...
5 CFR 1312.31 - Security violations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...
Kraemer, Sara; Carayon, Pascale
2007-03-01
This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.
48 CFR 3003.204 - Treatment of violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Treatment of violations. 3003.204 Section 3003.204 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS...
49 CFR 1503.201 - Reports of violations.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Reports of violations. 1503.201 Section 1503.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES INVESTIGATIVE AND ENFORCEMENT PROCEDURES Investigative Procedures §...
48 CFR 3003.203 - Reporting suspected violations of the Gratuities clause.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Reporting suspected violations of the Gratuities clause. 3003.203 Section 3003.203 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL IMPROPER BUSINESS...
17 CFR 14.4 - Violation of Commodity Exchange Act.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Violation of Commodity Exchange Act. 14.4 Section 14.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... Exchange Act. The Commission may deny, temporarily or permanently, the privilege of appearing or practicing...
15 CFR 701.6 - Violations, penalties, and remedies.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Violations, penalties, and remedies. 701.6 Section 701.6 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE...
15 CFR 700.74 - Violations, penalties, and remedies.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Violations, penalties, and remedies. 700.74 Section 700.74 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE...
10 CFR 824.6 - Preliminary notice of violation.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Preliminary notice of violation. 824.6 Section 824.6 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.6 Preliminary notice of violation. (a) In order to begin a proceeding to...
10 CFR 824.6 - Preliminary notice of violation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Preliminary notice of violation. 824.6 Section 824.6 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.6 Preliminary notice of violation. (a) In order to begin a proceeding to...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Violations of rules regarding decorum, submission of records or other similar activities. 8.27 Section 8.27 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION EXCHANGE PROCEDURES FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP...
77 FR 19153 - Nonpayment of Benefits to Fugitive Felons and Probation or Parole Violators
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-30
... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA 2006-0173] RIN 0960-AG12 Nonpayment of Benefits to Fugitive Felons and Probation or Parole Violators AGENCY: Social Security Administration. ACTION: Proposed rules; withdrawal. SUMMARY: We are withdrawing the proposed rules we published...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... users in the field in preventing the illegal entry of people and goods, or identifying other violations....g., Employer Identification Number (EIN) or Social Security Number (SSN), where available). f... entry of people and goods, or identifying other violations of law; (2) Allow analysts to conduct...
19 CFR 162.79 - Determination as to violation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Determination as to violation. 162.79 Section 162.79 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) INSPECTION, SEARCH, AND SEIZURE Special Procedures for Certain Violations...
10 CFR Appendix A to Part 824 - General Statement of Enforcement Policy
Code of Federal Regulations, 2011 CFR
2011-01-01
... may be evaluated in the aggregate and a single severity level assigned for a group of violations. c... mechanisms for candid pre-decisional discussions regarding potential or alleged violations and will not... conclusion that one or more violations of classified information security requirements have occurred. Such a...
10 CFR Appendix A to Part 824 - General Statement of Enforcement Policy
Code of Federal Regulations, 2012 CFR
2012-01-01
... may be evaluated in the aggregate and a single severity level assigned for a group of violations. c... mechanisms for candid pre-decisional discussions regarding potential or alleged violations and will not... conclusion that one or more violations of classified information security requirements have occurred. Such a...
A Mature Maritime Strategy for Africa to Meet National Security Goals
2011-06-17
by corrupt governments, poverty, piracy, poaching in territorial waters, terrorist cells, militant youth activities, environmental violations, illegal...regions with maritime distress that are, or have the potential to impact vital U.S. national interests. Good national strategy that informs combatant and...environmental violations and many other debilitating maritime activities get conveyed ashore and directly impact the security and well-being of the
Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework
NASA Astrophysics Data System (ADS)
Tsigkritis, Theocharis; Spanoudakis, George; Kloukinas, Christos; Lorenzoli, Davide
The SERENITY monitoring framework offers mechanisms for diagnosing the causes of violations of security and dependability (S&D) properties and detecting potential violations of such properties, called "Cthreats". Diagnostic information and threat detection are often necessary for deciding what an appropriate reaction to a violation is and taking pre-emptive actions against predicted violations, respectively. In this chapter, we describe the mechanisms of the SERENITY monitoring framework which generate diagnostic information for violations of S&D properties and detecting threats.
Towards Device-Independent Information Processing on General Quantum Networks
NASA Astrophysics Data System (ADS)
Lee, Ciarán M.; Hoban, Matty J.
2018-01-01
The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.
Towards Device-Independent Information Processing on General Quantum Networks.
Lee, Ciarán M; Hoban, Matty J
2018-01-12
The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.
12 CFR 574.7 - Determination by the OTS.
Code of Federal Regulations, 2014 CFR
2014-01-01
... crime or racketeering; (B) Violation of securities or commodities laws or regulations; (C) Violation of... projecting activities which are inconsistent with economical home financing. [54 FR 49690, Nov. 30, 1989, as...
12 CFR 574.7 - Determination by the OTS.
Code of Federal Regulations, 2013 CFR
2013-01-01
... crime or racketeering; (B) Violation of securities or commodities laws or regulations; (C) Violation of... projecting activities which are inconsistent with economical home financing. [54 FR 49690, Nov. 30, 1989, as...
12 CFR 574.7 - Determination by the OTS.
Code of Federal Regulations, 2011 CFR
2011-01-01
... crime or racketeering; (B) Violation of securities or commodities laws or regulations; (C) Violation of... projecting activities which are inconsistent with economical home financing. [54 FR 49690, Nov. 30, 1989, as...
12 CFR 574.7 - Determination by the OTS.
Code of Federal Regulations, 2012 CFR
2012-01-01
... crime or racketeering; (B) Violation of securities or commodities laws or regulations; (C) Violation of... projecting activities which are inconsistent with economical home financing. [54 FR 49690, Nov. 30, 1989, as...
6 CFR 7.11 - Components' responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... INFORMATION Administration § 7.11 Components' responsibilities. Each DHS component shall appoint a security... security information; (b) Report violations of the provisions of this regulation to the Chief Security... component acquire adequate security education and training, as required by the DHS classified information...
19 CFR 12.28 - Importation of wild mammals and birds in violation of foreign law.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 19 Customs Duties 1 2014-04-01 2014-04-01 false Importation of wild mammals and birds in violation... HOMELAND SECURITY; DEPARTMENT OF THE TREASURY SPECIAL CLASSES OF MERCHANDISE Wild Animals, Birds, and Insects § 12.28 Importation of wild mammals and birds in violation of foreign law. No imported wild mammal...
19 CFR 12.28 - Importation of wild mammals and birds in violation of foreign law.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 19 Customs Duties 1 2013-04-01 2013-04-01 false Importation of wild mammals and birds in violation... HOMELAND SECURITY; DEPARTMENT OF THE TREASURY SPECIAL CLASSES OF MERCHANDISE Wild Animals, Birds, and Insects § 12.28 Importation of wild mammals and birds in violation of foreign law. No imported wild mammal...
19 CFR 12.28 - Importation of wild mammals and birds in violation of foreign law.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 1 2012-04-01 2012-04-01 false Importation of wild mammals and birds in violation... HOMELAND SECURITY; DEPARTMENT OF THE TREASURY SPECIAL CLASSES OF MERCHANDISE Wild Animals, Birds, and Insects § 12.28 Importation of wild mammals and birds in violation of foreign law. No imported wild mammal...
19 CFR 12.28 - Importation of wild mammals and birds in violation of foreign law.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Importation of wild mammals and birds in violation... HOMELAND SECURITY; DEPARTMENT OF THE TREASURY SPECIAL CLASSES OF MERCHANDISE Wild Animals, Birds, and Insects § 12.28 Importation of wild mammals and birds in violation of foreign law. No imported wild mammal...
19 CFR 12.28 - Importation of wild mammals and birds in violation of foreign law.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Importation of wild mammals and birds in violation... HOMELAND SECURITY; DEPARTMENT OF THE TREASURY SPECIAL CLASSES OF MERCHANDISE Wild Animals, Birds, and Insects § 12.28 Importation of wild mammals and birds in violation of foreign law. No imported wild mammal...
NASA Astrophysics Data System (ADS)
Zhang, Hong
2017-06-01
In recent years, with the continuous development and application of network technology, network security has gradually entered people's field of vision. The host computer network external network of violations is an important reason for the threat of network security. At present, most of the work units have a certain degree of attention to network security, has taken a lot of means and methods to prevent network security problems such as the physical isolation of the internal network, install the firewall at the exit. However, these measures and methods to improve network security are often not comply with the safety rules of human behavior damage. For example, the host to wireless Internet access and dual-network card to access the Internet, inadvertently formed a two-way network of external networks and computer connections [1]. As a result, it is possible to cause some important documents and confidentiality leak even in the the circumstances of user unaware completely. Secrecy Computer Violation Out-of-band monitoring technology can largely prevent the violation by monitoring the behavior of the offending connection. In this paper, we mainly research and discuss the technology of secret computer monitoring.
33 CFR 127.305 - Operations Manual.
Code of Federal Regulations, 2010 CFR
2010-07-01
... security personnel; (e) A description of the security systems for the marine transfer area for LNG; (f) The...) Transfer operations start-up and shutdown; (3) Security violations; and (4) The communications systems; and... Section 127.305 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED...
Jogenfors, Jonathan; Elhassan, Ashraf Mohamed; Ahrens, Johan; Bourennane, Mohamed; Larsson, Jan-Åke
2015-12-01
Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson's configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.
31 CFR 103.36 - Additional records to be made and retained by casinos.
Code of Federal Regulations, 2010 CFR
2010-07-01
... and maintain a record of the name, permanent address, and social security number of the person... secure the name, permanent address, and social security number of each person having a financial interest... to secure the required social security number, it shall not be deemed to be in violation of this...
Access control violation prevention by low-cost infrared detection
NASA Astrophysics Data System (ADS)
Rimmer, Andrew N.
2004-09-01
A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this type of security breach.
22 CFR 127.5 - Authority of the Defense Security Service.
Code of Federal Regulations, 2010 CFR
2010-04-01
... ensure compliance with the Department of Defense National Industrial Security Program Operating Manual... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authority of the Defense Security Service. 127... VIOLATIONS AND PENALTIES § 127.5 Authority of the Defense Security Service. In the case of exports involving...
17 CFR 245.103 - Issuer right of recovery; right of action by equity security owner.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., conversion or termination of a derivative security) in violation of section 306(a)(1) of that Act of an... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Issuer right of recovery; right of action by equity security owner. 245.103 Section 245.103 Commodity and Securities Exchanges...
12 CFR 263.402 - Removal, suspension, or debarment.
Code of Federal Regulations, 2011 CFR
2011-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...
12 CFR 19.243 - Removal, suspension, or debarment.
Code of Federal Regulations, 2014 CFR
2014-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...
12 CFR 263.402 - Removal, suspension, or debarment.
Code of Federal Regulations, 2014 CFR
2014-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...
12 CFR 19.243 - Removal, suspension, or debarment.
Code of Federal Regulations, 2013 CFR
2013-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...
12 CFR 263.402 - Removal, suspension, or debarment.
Code of Federal Regulations, 2012 CFR
2012-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...
12 CFR 19.243 - Removal, suspension, or debarment.
Code of Federal Regulations, 2011 CFR
2011-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...
12 CFR 19.243 - Removal, suspension, or debarment.
Code of Federal Regulations, 2012 CFR
2012-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...
12 CFR 263.402 - Removal, suspension, or debarment.
Code of Federal Regulations, 2013 CFR
2013-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...
48 CFR 3003.405 - Misrepresentations or violations of the Covenant Against Contingent Fees.
Code of Federal Regulations, 2010 CFR
2010-10-01
... System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Contingent Fees 3003.405 Misrepresentations or...
Interactive Programming Support for Secure Software Development
ERIC Educational Resources Information Center
Xie, Jing
2012-01-01
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... Request; Voluntary Self- Disclosure of Antiboycott Violations AGENCY: Bureau of Industry and Security... Administration Regulations (EAR) by providing a method for industry to voluntarily self-disclose antiboycott violations. Companies wishing to voluntarily self-disclose antiboycott may submit pertinent information, as...
44 CFR 17.620 - Effect of violation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Effect of violation. 17.620 Section 17.620 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (GRANTS) § 17.620 Effect of...
15 CFR 719.22 - Reporting a violation.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Reporting a violation. 719.22 Section 719.22 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS...
15 CFR 719.22 - Reporting a violation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Reporting a violation. 719.22 Section 719.22 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS...
15 CFR 764.4 - Reporting of violations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Reporting of violations. 764.4 Section 764.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS ENFORCEMENT AND...
Best Practices and Lessons Learned In LANL Approaches to Transportation Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Drypolcher, Katherine Carr
Presentation includes slides on Physical Protection of Material in Transit; Graded Approach for Implementation Controls; Security Requirements; LANL Lessons Learned; Shipping Violation; Unmonitored Shipment; Foreign shipment; and the Conclusion.
31 CFR 1021.410 - Additional records to be made and retained by casinos.
Code of Federal Regulations, 2012 CFR
2012-07-01
... name, permanent address, and social security number of the person involved. Where the deposit, account..., and social security number of each person having a financial interest in the deposit, account or line... been unable to secure the required social security number, it shall not be deemed to be in violation of...
31 CFR 1021.410 - Additional records to be made and retained by casinos.
Code of Federal Regulations, 2013 CFR
2013-07-01
... name, permanent address, and social security number of the person involved. Where the deposit, account..., and social security number of each person having a financial interest in the deposit, account or line... been unable to secure the required social security number, it shall not be deemed to be in violation of...
31 CFR 1021.410 - Additional records to be made and retained by casinos.
Code of Federal Regulations, 2011 CFR
2011-07-01
... name, permanent address, and social security number of the person involved. Where the deposit, account..., and social security number of each person having a financial interest in the deposit, account or line... been unable to secure the required social security number, it shall not be deemed to be in violation of...
31 CFR 1021.410 - Additional records to be made and retained by casinos.
Code of Federal Regulations, 2014 CFR
2014-07-01
... name, permanent address, and social security number of the person involved. Where the deposit, account..., and social security number of each person having a financial interest in the deposit, account or line... been unable to secure the required social security number, it shall not be deemed to be in violation of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-04
... securities options or the clearing of such futures as security futures constitutes a violation of the CEA. \\3... same as the options and security futures on SPDR Gold Shares, iShares COMEX Gold Shares, and iShares... to help clarify that options and security futures on ETFS Physical Swiss Gold Shares and ETFS...
Big Data and Heath Impacts of Drinking Water Quality Violation
NASA Astrophysics Data System (ADS)
Allaire, M.; Zheng, S.; Lall, U.
2017-12-01
Health impacts of drinking water quality violations are only understood at a coarse level in the United States. This limits identification of threats to water security in communities across the country. Substantial under-reporting is suspected due to requirements at U.S. public health institutes that water borne illnesses be confirmed by health providers. In the era of `big data', emerging information sources could offer insight into waterborne disease trends. In this study, we explore the use of fine-resolution sales data for over-the-counter medicine to estimate the health impacts of drinking water quality violations. We also demonstrate how unreported water quality issues can be detected by observing market behavior. We match a panel of supermarket sales data for the U.S. at the weekly level with geocoded violations data from 2006-2015. We estimate the change in anti-diarrheal medicine sale due to drinking water violations using a fixed effects model. We find that water quality violations have considerable effects on medicine sales. Sales nearly double due to Tier 1 violations, which pose an immediate health risk, and sales increase 15.1 percent due to violations related to microorganisms. Furthermore, our estimate of diarrheal illness cases associated with water quality violations indicates that the Centers for Disease Control and Prevention (CDC) reporting system may only capture about one percent of diarrheal cases due to impaired water. Incorporating medicine sales data could offer national public health institutes a game-changing way to improve monitoring of disease outbreaks. Since many disease cases are not formally diagnosed by health providers, consumption information could provide additional information to remedy under-reporting issues and improve water security in communities across the United States.
77 FR 27418 - Order Denying Export Privileges
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-10
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Order Denying Export Privileges In the... violating Section 38 of the Arms Export Control Act (22 U.S.C. 2778 (2000)) (``AECA''). Specifically, Baniameri was convicted of conspiring to export goods and technology to Iran, in violation of IEEPA...
17 CFR 240.21F-6 - Criteria for determining amount of award.
Code of Federal Regulations, 2014 CFR
2014-04-01
... remediate the harm caused by the violations, including assisting the authorities in the recovery of the... entity self-reported a securities violation following the whistleblower's related internal disclosure... the enforcement action, including the amount of harm or potential harm caused by the underlying...
17 CFR 240.21F-6 - Criteria for determining amount of award.
Code of Federal Regulations, 2013 CFR
2013-04-01
... remediate the harm caused by the violations, including assisting the authorities in the recovery of the... entity self-reported a securities violation following the whistleblower's related internal disclosure... the enforcement action, including the amount of harm or potential harm caused by the underlying...
17 CFR 240.21F-6 - Criteria for determining amount of award.
Code of Federal Regulations, 2012 CFR
2012-04-01
... remediate the harm caused by the violations, including assisting the authorities in the recovery of the... entity self-reported a securities violation following the whistleblower's related internal disclosure... the enforcement action, including the amount of harm or potential harm caused by the underlying...
15 CFR 719.3 - Violations of the IEEPA subject to judicial enforcement proceedings.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ENFORCEMENT § 719.3 Violations of the IEEPA subject to judicial enforcement proceedings. (a) Violations—(1) Import restrictions involving Schedule 1 chemicals. Except as otherwise...
15 CFR 719.3 - Violations of the IEEPA subject to judicial enforcement proceedings.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ENFORCEMENT § 719.3 Violations of the IEEPA subject to judicial enforcement proceedings. (a) Violations—(1) Import restrictions involving Schedule 1 chemicals. Except as otherwise...
10 CFR 824.4 - Civil penalties.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Civil penalties. 824.4 Section 824.4 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.4 Civil penalties. (a) Any person who violates a classified information protection...
10 CFR 824.4 - Civil penalties.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Civil penalties. 824.4 Section 824.4 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.4 Civil penalties. (a) Any person who violates a classified information protection...
10 CFR 824.4 - Civil penalties.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Civil penalties. 824.4 Section 824.4 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.4 Civil penalties. (a) Any person who violates a classified information protection...
10 CFR 824.4 - Civil penalties.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Civil penalties. 824.4 Section 824.4 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.4 Civil penalties. (a) Any person who violates a classified information protection...
43 CFR 17.330 - Compliance reviews.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., Conciliation, and Enforcement Procedures § 17.330 Compliance reviews. (a) DOI may conduct compliance reviews... and correct violations of the Act and these regulations. DOI may conduct these reviews even in the... review indicates a violation of the Act or these regulations, DOI will attempt to secure voluntary...
US statutes of general interest to safeguards and security officers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cadwell, J.J.
1988-09-01
This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)
32 CFR 1290.9 - Forms and reports.
Code of Federal Regulations, 2014 CFR
2014-07-01
.... Magistrate system is based on use of a four-ply ticket designed to provide legal notice to violators and... departments. The DD Form 1805 is printed on chemically carbonized paper and prenumbered in series for... 635, Security/Criminal Incident Report, denoting the date, time, place, and type of violation, and the...
32 CFR 1290.9 - Forms and reports.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... Magistrate system is based on use of a four-ply ticket designed to provide legal notice to violators and... departments. The DD Form 1805 is printed on chemically carbonized paper and prenumbered in series for... 635, Security/Criminal Incident Report, denoting the date, time, place, and type of violation, and the...
32 CFR 1290.9 - Forms and reports.
Code of Federal Regulations, 2012 CFR
2012-07-01
.... Magistrate system is based on use of a four-ply ticket designed to provide legal notice to violators and... departments. The DD Form 1805 is printed on chemically carbonized paper and prenumbered in series for... 635, Security/Criminal Incident Report, denoting the date, time, place, and type of violation, and the...
Code of Federal Regulations, 2010 CFR
2010-04-01
..., in the case of a violation involving a business organization, by notifying members of management not... enforcement actions can contribute significantly to the success of the agency's mission. Cooperation can enhance the Commission's ability to detect violations of the federal securities laws, increase the...
Code of Federal Regulations, 2011 CFR
2011-04-01
..., in the case of a violation involving a business organization, by notifying members of management not... enforcement actions can contribute significantly to the success of the agency's mission. Cooperation can enhance the Commission's ability to detect violations of the federal securities laws, increase the...
10 CFR 824.14 - Special procedures.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Special procedures. 824.14 Section 824.14 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.14 Special procedures. A person receiving a final notice of violation under § 824...
19 CFR 10.786 - Violations relating to the MFTA.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Violations relating to the MFTA. 10.786 Section 10.786 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Morocco Free...
17 CFR 38.711 - Warning letters.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Warning letters. 38.711... MARKETS Disciplinary Procedures § 38.711 Warning letters. Where a rule violation is found to have occurred, no more than one warning letter may be issued per rolling 12-month period for the same violation. ...
17 CFR 38.711 - Warning letters.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Warning letters. 38.711... MARKETS Disciplinary Procedures § 38.711 Warning letters. Where a rule violation is found to have occurred, no more than one warning letter may be issued per rolling 12-month period for the same violation. ...
19 CFR 10.889 - Violations relating to the OFTA.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 19 Customs Duties 1 2014-04-01 2014-04-01 false Violations relating to the OFTA. 10.889 Section 10.889 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Oman Free...
19 CFR 10.889 - Violations relating to the OFTA.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 19 Customs Duties 1 2013-04-01 2013-04-01 false Violations relating to the OFTA. 10.889 Section 10.889 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Oman Free...
19 CFR 10.889 - Violations relating to the OFTA.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 1 2012-04-01 2012-04-01 false Violations relating to the OFTA. 10.889 Section 10.889 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Oman Free...
19 CFR 10.889 - Violations relating to the OFTA.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Violations relating to the OFTA. 10.889 Section 10.889 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Oman Free...
17 CFR 232.106 - Prohibition against electronic submissions containing executable code.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...
17 CFR 232.106 - Prohibition against electronic submissions containing executable code.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...
17 CFR 232.106 - Prohibition against electronic submissions containing executable code.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Hearing. 824.8 Section 824.8 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.8 Hearing. (a) Any person who receives a final notice of violation under § 824.7 may request a hearing...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Hearing. 824.8 Section 824.8 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.8 Hearing. (a) Any person who receives a final notice of violation under § 824.7 may request a hearing...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
... becomes ``systemic as well as intentional or willful.'' In response, FINRA noted that inclusion of a rule... the rules of a Registered Securities Association enforce compliance with, and provide appropriate... FINRA should only consider a member's activity a rule violation if the violation becomes systemic as...
10 CFR 1017.29 - Civil penalty.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Civil penalty. 1017.29 Section 1017.29 Energy DEPARTMENT... INFORMATION Violations § 1017.29 Civil penalty. (a) Regulations. Any person who violates a UCNI security requirement of any of the following is subject to a civil penalty under this part: (1) 10 CFR Part 1017...
10 CFR 1017.29 - Civil penalty.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Civil penalty. 1017.29 Section 1017.29 Energy DEPARTMENT... INFORMATION Violations § 1017.29 Civil penalty. (a) Regulations. Any person who violates a UCNI security requirement of any of the following is subject to a civil penalty under this part: (1) 10 CFR Part 1017...
10 CFR 1017.29 - Civil penalty.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Civil penalty. 1017.29 Section 1017.29 Energy DEPARTMENT... INFORMATION Violations § 1017.29 Civil penalty. (a) Regulations. Any person who violates a UCNI security requirement of any of the following is subject to a civil penalty under this part: (1) 10 CFR Part 1017...
10 CFR 1017.29 - Civil penalty.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Civil penalty. 1017.29 Section 1017.29 Energy DEPARTMENT... INFORMATION Violations § 1017.29 Civil penalty. (a) Regulations. Any person who violates a UCNI security requirement of any of the following is subject to a civil penalty under this part: (1) 10 CFR Part 1017...
ERIC Educational Resources Information Center
Archer, Chalmers, Jr.; Archer, A. J. Finch
1986-01-01
Examines the susceptibility of computerized institutional records to security violations by "hackers," wishing to change grades/records or merely demonstrate their ability to access the systems. Points to practices that encourage security abuses and risk confidentiality. Outlines procedures used by Northern Virginia Community College to…
ERIC Educational Resources Information Center
Sikolia, David Wafula
2013-01-01
User non-compliance with information security policies in organizations due to negligence or ignorance is reported as a key data security problem for organizations. The violation of the confidentiality, integrity and availability of organizational data has led to losses in millions of dollars for organizations in terms of money and time spent…
Pilot Alcohol Violations Reported in U.S. Newspapers, 1990–2006
Kraus, Chadd K.; Li, Guohua
2009-01-01
Introduction Alcohol violations by airline pilots are rare yet remain a public concern. Such incidents often generate widespread news coverage. This study examines the frequency and characteristics of alcohol violation incidents involving airline pilots reported in U.S. newspapers. Methods The database of Lexis-Nexis™, which contains full-text articles for over 350 newspapers, was searched to identify alcohol violation incidents involving airline pilots in the U.S. between January 1990 and June 2006. Information pertaining to the pilot, flight, blood alcohol concentration (BAC), and consequence was ascertained for each incident based on the newspaper coverage. Results During the study period, newspapers reported on a total of 13 incidents of alcohol violations involving 17 pilots. All but two of the incidents occurred during January 2002 through June 2006. The majority (85%) of the incidents were first identified by airport personnel, such as security screeners, based on suspicion of alcohol use by the pilot. Subsequent alcohol testing revealed a mean BAC of 90 mg/dL (ranging from 10 mg · dL−1 to 182 mg · dL−1). Of the 17 pilots, 6 were known to be prosecuted criminally, including 5 who were sentenced to jail terms. Discussion Incidents of alcohol violations by airline pilots reported in U.S. newspapers have increased in recent years. This increase is likely due in part to increased detection resulting from enhanced aviation security and enforcement following the September 2001 terrorist attacks. PMID:17183928
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-07
... INFORMATION: Background The Bureau of Industry and Security (BIS), Office of Export Enforcement (OEE... voluntary self-disclosures in connection with OEE's conduct of investigations. The other two changes address... committed a violation of the EAR can voluntarily disclose the facts of the potential violations to OEE. Such...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-12
... Commission adopted amendments to paragraph (c) of Rule 19d-1 to allow self-regulatory organizations (``SROs... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62036; File No. 4-594] Self-Regulatory Organizations; Order Approving Minor Rule Violation Plan for EDGX Exchange, Inc. May 5, 2010. On March 19, 2010...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-12
... Commission adopted amendments to paragraph (c) of Rule 19d-1 to allow self-regulatory organizations (``SROs... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62037; File No. 4-595] Self-Regulatory Organizations; Order Approving Minor Rule Violation Plan for EDGA Exchange, Inc. May 5, 2010. On March 19, 2010...
The SERENITY Runtime Monitoring Framework
NASA Astrophysics Data System (ADS)
Spanoudakis, George; Kloukinas, Christos; Mahbub, Khaled
This chapter describes SERENITY’s approach to runtime monitoring and the framework that has been developed to support it. Runtime monitoring is required in SERENITY in order to check for violations of security and dependability properties which are necessary for the correct operation of the security and dependability solutions that are available from the SERENITY framework. This chapter discusses how such properties are specified and monitored. The chapter focuses on the activation and execution of monitoring activities using S&D Patterns and the actions that may be undertaken following the detection of property violations. The approach is demonstrated in reference to one of the industrial case studies of the SERENITY project.
32 CFR 2700.12 - Criteria for and level of original classification.
Code of Federal Regulations, 2011 CFR
2011-07-01
... FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Original Classification § 2700.12... be classified only when protecting the national security requires that the information they contain be withheld from public disclosure. Information may not be classified to conceal violations of law...
Effect of source tampering in the security of quantum cryptography
NASA Astrophysics Data System (ADS)
Sun, Shi-Hai; Xu, Feihu; Jiang, Mu-Sheng; Ma, Xiang-Chun; Lo, Hoi-Kwong; Liang, Lin-Mei
2015-08-01
The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum key distribution (MDI-QKD), the source becomes the only region exploitable by a potential eavesdropper (Eve). Phase randomization is a cornerstone assumption in most discrete-variable (DV) quantum communication protocols (e.g., QKD, quantum coin tossing, weak-coherent-state blind quantum computing, and so on), and the violation of such an assumption is thus fatal to the security of those protocols. In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. Furthermore, our attack may also be valid for continuous-variable (CV) QKD, which is another main class of QKD protocol, since, excepting the phase random assumption, other parameters (e.g., intensity) could also be changed, which directly determine the security of CV-QKD.
Cybercrimes vs. Cyberliberties
NASA Astrophysics Data System (ADS)
Strossen, Nadine
This new Introduction explains how all of the themes and conclusions of the original chapter remain valid despite intervening developments, including the 2001 terrorist attacks. It shows that the major points that the 1999 chapter made about one particular medium, at one particular historical point, concerning particular safety and security issues that were then at the forefront of public concern, apply more universally to other media, during other historical periods, and regarding other safety and security concerns. The Introduction supports this generalization by analyzing two sets of subsequent developments. First, it shows that post-911 surveillance measures that target communications, including Internet communications, violate freedom of speech and privacy without sufficient countervailing security benefits. Second, it shows that the government’s continuing efforts to suppress online sexual expression, in order to protect children from seeing it, continue appropriately to be struck down by the courts as violating free speech rights without sufficient countervailing benefits.
12 CFR 1511.1 - Definitions of terms.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Bank to effect a transfer of a Book-entry Funding Corporation Security, as set forth in Federal Reserve... Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING CORPORATION BOOK-ENTRY PROCEDURE § 1511... a property interest in a Book-entry Funding Corporation Security and that it is a violation of the...
12 CFR 1511.1 - Definitions of terms.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Bank to effect a transfer of a Book-entry Funding Corporation Security, as set forth in Federal Reserve... Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING CORPORATION BOOK-ENTRY PROCEDURE § 1511... a property interest in a Book-entry Funding Corporation Security and that it is a violation of the...
12 CFR 1511.1 - Definitions of terms.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Bank to effect a transfer of a Book-entry Funding Corporation Security, as set forth in Federal Reserve... Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING CORPORATION BOOK-ENTRY PROCEDURE § 1511... a property interest in a Book-entry Funding Corporation Security and that it is a violation of the...
12 CFR 1511.1 - Definitions of terms.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Bank to effect a transfer of a Book-entry Funding Corporation Security, as set forth in Federal Reserve... Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING CORPORATION BOOK-ENTRY PROCEDURE § 1511... a property interest in a Book-entry Funding Corporation Security and that it is a violation of the...
12 CFR 1511.1 - Definitions of terms.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Bank to effect a transfer of a Book-entry Funding Corporation Security, as set forth in Federal Reserve... Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING CORPORATION BOOK-ENTRY PROCEDURE § 1511... a property interest in a Book-entry Funding Corporation Security and that it is a violation of the...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL PROTECTION AND SECURITY..., officer, or person in charge, or any member of the crew of any such vessel fails to comply with any..., furniture, and equipment, shall be subject to seizure and forfeiture to the United States in the same manner...
28 CFR 540.15 - Restricted general correspondence.
Code of Federal Regulations, 2010 CFR
2010-07-01
... proposed correspondent would be a threat to the security or good order of the institution, or that the... without paying for the subscription; (3) Being a security risk; (4) Threatening a government official; or... the correspondent is involved in any violation of correspondence regulations, or would be a threat to...
School Security Gap (with Related Video)
ERIC Educational Resources Information Center
Skurnac, Steve
2012-01-01
Data security breaches in the educational sector can be devastating to institutions and the students and employees they serve. They carry the potential for identity theft, violations of federal and state laws, and loss of trust of students, alumni and employees. The Identity Theft Resource Center says that as of October 2011, education…
Fully device-independent conference key agreement
NASA Astrophysics Data System (ADS)
Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie
2018-02-01
We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.
Digital Photograph Security: What Plastic Surgeons Need to Know.
Thomas, Virginia A; Rugeley, Patricia B; Lau, Frank H
2015-11-01
Sharing and storing digital patient photographs occur daily in plastic surgery. Two major risks associated with the practice, data theft and Health Insurance Portability and Accountability Act (HIPAA) violations, have been dramatically amplified by high-speed data connections and digital camera ubiquity. The authors review what plastic surgeons need to know to mitigate those risks and provide recommendations for implementing an ideal, HIPAA-compliant solution for plastic surgeons' digital photography needs: smartphones and cloud storage. Through informal discussions with plastic surgeons, the authors identified the most common photograph sharing and storage methods. For each method, a literature search was performed to identify the risks of data theft and HIPAA violations. HIPAA violation risks were confirmed by the second author (P.B.R.), a compliance liaison and privacy officer. A comprehensive review of HIPAA-compliant cloud storage services was performed. When possible, informal interviews with cloud storage services representatives were conducted. The most common sharing and storage methods are not HIPAA compliant, and several are prone to data theft. The authors' review of cloud storage services identified six HIPAA-compliant vendors that have strong to excellent security protocols and policies. These options are reasonably priced. Digital photography and technological advances offer major benefits to plastic surgeons but are not without risks. A proper understanding of data security and HIPAA regulations needs to be applied to these technologies to safely capture their benefits. Cloud storage services offer efficient photograph sharing and storage with layers of security to ensure HIPAA compliance and mitigate data theft risk.
6 CFR 29.9 - Investigation and reporting of violation of PCII procedures.
Code of Federal Regulations, 2014 CFR
2014-01-01
... inappropriate purpose, the PCII Program Manager may disqualify that entity or person from future receipt of any... procedures. 29.9 Section 29.9 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY... disclosure of PCII immediately to the PCII Program Manager or the PCII Program Manager's designees. Suspected...
6 CFR 29.9 - Investigation and reporting of violation of PCII procedures.
Code of Federal Regulations, 2012 CFR
2012-01-01
... inappropriate purpose, the PCII Program Manager may disqualify that entity or person from future receipt of any... procedures. 29.9 Section 29.9 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY... disclosure of PCII immediately to the PCII Program Manager or the PCII Program Manager's designees. Suspected...
6 CFR 29.9 - Investigation and reporting of violation of PCII procedures.
Code of Federal Regulations, 2013 CFR
2013-01-01
... inappropriate purpose, the PCII Program Manager may disqualify that entity or person from future receipt of any... procedures. 29.9 Section 29.9 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY... disclosure of PCII immediately to the PCII Program Manager or the PCII Program Manager's designees. Suspected...
6 CFR 29.9 - Investigation and reporting of violation of PCII procedures.
Code of Federal Regulations, 2011 CFR
2011-01-01
... inappropriate purpose, the PCII Program Manager may disqualify that entity or person from future receipt of any... procedures. 29.9 Section 29.9 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY... disclosure of PCII immediately to the PCII Program Manager or the PCII Program Manager's designees. Suspected...
Dworkin, Shari L.; Lu, Tiffany; Grabe, Shelly; Kwena, Zachary; Mwaura-Muiru, Esther; Bukusi, Elizabeth
2014-01-01
Despite the recognized need for structural-level HIV prevention interventions that focus on economic empowerment to reduce women’s HIV risks, few science-based programs have focused on securing women’s land ownership as a primary or secondary HIV risk reduction strategy. The current study focused on a community-led land and property rights model that was implemented in two rural areas of western Kenya where HIV prevalence was high (24–30%) and property rights violations were common. The program was designed to reduce women’s HIV risk at the community level by protecting and enhancing women’s access to and ownership of land. Through in-depth interviews with 50 program leaders and implementers of this program we sought to identify the strategies that were used to prevent, mediate, and resolve property rights violations. Results included four strategies: (1) rights-based education of both women and men individually and at the community level, (2) funeral committees that intervene to prevent property grabbing and disinheritance, (3) paralegal training of traditional leaders and community members and local adjudication of cases of property rights violations, and (4) referring property rights violations to the formal justice system when these are not resolved at the community level. Study participants underscored that local mediation of cases resulted in a higher success rate than women experienced in the formal court system, underscoring the importance of community-level solutions to property rights violations. The current study assists researchers in understanding the steps needed to prevent and resolve women’s property rights violations so as to bolster the literature on potential structural HIV prevention interventions. Future research should rigorously test property rights programs as a structural HIV prevention intervention. PMID:24116828
Dworkin, Shari L; Lu, Tiffany; Grabe, Shelly; Kwena, Zachary; Mwaura-Muiru, Esther; Bukusi, Elizabeth
2014-01-01
Despite the recognized need for structural-level HIV prevention interventions that focus on economic empowerment to reduce women's HIV risks, few science-based programs have focused on securing women's land ownership as a primary or secondary HIV risk reduction strategy. The current study focused on a community-led land and property rights model that was implemented in two rural areas of western Kenya where HIV prevalence was high (24-30%) and property rights violations were common. The program was designed to reduce women's HIV risk at the community level by protecting and enhancing women's access to and ownership of land. Through in-depth interviews with 50 program leaders and implementers of this program we sought to identify the strategies that were used to prevent, mediate, and resolve property rights violations. Results included four strategies: (1) rights-based education of both women and men individually and at the community level, (2) funeral committees that intervene to prevent property grabbing and disinheritance, (3) paralegal training of traditional leaders and community members and local adjudication of cases of property rights violations, and (4) referring property rights violations to the formal justice system when these are not resolved at the community level. Study participants underscored that local mediation of cases resulted in a higher success rate than women experienced in the formal court system, underscoring the importance of community-level solutions to property rights violations. The current study assists researchers in understanding the steps needed to prevent and resolve women's property rights violations so as to bolster the literature on potential structural HIV prevention interventions. Future research should rigorously test property rights programs as a structural HIV prevention intervention.
Draft secure medical database standard.
Pangalos, George
2002-01-01
Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.
[How to establish the hospital information system security policies].
Gong, Qing-Yue; Shi, Cheng
2008-03-01
It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.
Min, Woo-Kie; Seo, Il; Na, Sang-Bong; Choi, Young-Seo; Choi, Ji-Yeon
2017-01-01
This study aimed to present radiologic analysis of minimal safe distance (MSD) and optimal screw angle (OSA) that enables to fix screws in a lateral mass safely without facet joint violation in open-door laminoplasty using a plate. A retrospective analysis was made of 22 patients (male: 17; female: 5), average age 62 years. Seventy-nine lateral mass screws were fixed among a total of 158 screws. MSD that doesn't allow 5-mm screws to violate a facet joint was measured for C3-C7 and a comparative analysis was performed. If the MSD is not secured, the OSA to be given to the cephalad direction is calculated to avoid violation of the facet joint. The screws violating inferior facet joints accounted for 34.1% of the screws fixed in inferior lateral mass. Joint surface to distal mini-screw distances were 3.18 ± 1.46 mm and 4.75 ± 1.71 mm in groups of facet joint violation and non-facet violation (FV), respectively ( p = 0.001). When 5-mm screws were inserted into a lateral mass, MSD was 4.39 ± 0.83 mm. The average MSD of C3, C4, and C5 was 4.05 ± 0.78 mm, 4.10 ± 0.70 mm, and 4.26 ± 0.74 mm, respectively. There was no significant differences among levels ( p > 0.05). The average MSD of C6 and C7 was 4.92 ± 0.81 mm and 4.80 ± 0.96 mm, respectively, showing significant differences from those of C3, C4, and C5 ( p < 0.05). If 6 mm of the MSD isn't secured, OSA showed in the cephalad direction of 11.5° for 5 mm and 22° for 4 mm approximately. We suggest that mini-screw on lateral mass can be fixed safely without FV, if they are fixed at MSD of 6 mm from a joint surface. Facet joint violation doesn't occur if an OSA is given in the cephalad direction in case of not enough MSD for mini-screws.
10 CFR 824.16 - Direction to NNSA contractors.
Code of Federal Regulations, 2011 CFR
2011-01-01
... INFORMATION SECURITY VIOLATIONS § 824.16 Direction to NNSA contractors. (a) Notwithstanding any other... compel attendance; (3) Disclosures of information or documents obtained during an investigation or...
Device independence for two-party cryptography and position verification with memoryless devices
NASA Astrophysics Data System (ADS)
Ribeiro, Jérémy; Thinh, Le Phuc; Kaniewski, Jedrzej; Helsen, Jonas; Wehner, Stephanie
2018-06-01
Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we improve the device-independent security proofs of Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004] for two-party cryptography (with memoryless devices) and we add a security proof for device-independent position verification (also memoryless devices) under different physical constraints on the adversary. We assess the quality of the devices by observing a Bell violation, and, as for Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004], security can be attained for any violation of the Clauser-Holt-Shimony-Horne inequality.
12 CFR 174.7 - Determination by the OCC.
Code of Federal Regulations, 2012 CFR
2012-01-01
..., dishonesty, breach of trust or fiduciary duties, organized crime or racketeering; (B) Violation of securities... furnishing a business plan projecting activities which are inconsistent with economical home financing. ...
The State Secrets Privilege and Other Limits on Litigation Involving Classified Information
2009-05-28
Privilege And Separation Of Powers , 75 FORDHAM L. REV. 1931, 1935 (Mar. 2007). 2 Editorial, Securing Lawsuits, WASH. POST, May 11, 2009, at A16...the Supreme Court invalidated a legislative enactment that required federal courts to reopen final decisions as a violation of the separation of powers principle...95 It might be argued that the retroactivity provision in H.R. 984 also reopens final judgments in violation of the separation of powers principle
2006 Report to Congress of the U.S.-China Economic And Security Review Commission
2006-11-01
percent of U.S. companies operating in China were hurt by intellectual property rights violations according to a business association survey in...property rights violations, according to one survey .47 Cur- rent estimates are that counterfeit and pirated products in China amount to eight percent of...ex- plained the reluctance of municipal officials to act by saying, ‘‘One local firm was making the labels, one the bottles, and one the shampoo
Bright nanoscale source of deterministic entangled photon pairs violating Bell's inequality.
Jöns, Klaus D; Schweickert, Lucas; Versteegh, Marijn A M; Dalacu, Dan; Poole, Philip J; Gulinatti, Angelo; Giudice, Andrea; Zwiller, Val; Reimer, Michael E
2017-05-10
Global, secure quantum channels will require efficient distribution of entangled photons. Long distance, low-loss interconnects can only be realized using photons as quantum information carriers. However, a quantum light source combining both high qubit fidelity and on-demand bright emission has proven elusive. Here, we show a bright photonic nanostructure generating polarization-entangled photon pairs that strongly violates Bell's inequality. A highly symmetric InAsP quantum dot generating entangled photons is encapsulated in a tapered nanowire waveguide to ensure directional emission and efficient light extraction. We collect ~200 kHz entangled photon pairs at the first lens under 80 MHz pulsed excitation, which is a 20 times enhancement as compared to a bare quantum dot without a photonic nanostructure. The performed Bell test using the Clauser-Horne-Shimony-Holt inequality reveals a clear violation (S CHSH > 2) by up to 9.3 standard deviations. By using a novel quasi-resonant excitation scheme at the wurtzite InP nanowire resonance to reduce multi-photon emission, the entanglement fidelity (F = 0.817 ± 0.002) is further enhanced without temporal post-selection, allowing for the violation of Bell's inequality in the rectilinear-circular basis by 25 standard deviations. Our results on nanowire-based quantum light sources highlight their potential application in secure data communication utilizing measurement-device-independent quantum key distribution and quantum repeater protocols.
The Impact of the World Bank and IMF on Education Rights
ERIC Educational Resources Information Center
Archer, David
2006-01-01
Education is a fundamental human right. As such it is clearly the responsibility of the state and a core element of any development policy committed to social justice. Securing the right to education is key to enabling people to secure other human rights, yet, according to this author, the right to education is violated by governments around the…
Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho
2016-03-01
Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.
A protect solution for data security in mobile cloud storage
NASA Astrophysics Data System (ADS)
Yu, Xiaojun; Wen, Qiaoyan
2013-03-01
It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.
An Integrative Behavioral Model of Information Security Policy Compliance
Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung
2014-01-01
The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized. PMID:24971373
An integrative behavioral model of information security policy compliance.
Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung
2014-01-01
The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized.
18 CFR 39.7 - Enforcement of Reliability Standards.
Code of Federal Regulations, 2013 CFR
2013-04-01
... violation that relates to a Cybersecurity Incident or that would jeopardize the security of the Bulk-Power... lawful, including a proceeding involving a Cybersecurity Incident. For a nonpublic proceeding, the user...
18 CFR 39.7 - Enforcement of Reliability Standards.
Code of Federal Regulations, 2012 CFR
2012-04-01
... violation that relates to a Cybersecurity Incident or that would jeopardize the security of the Bulk-Power... lawful, including a proceeding involving a Cybersecurity Incident. For a nonpublic proceeding, the user...
18 CFR 39.7 - Enforcement of Reliability Standards.
Code of Federal Regulations, 2011 CFR
2011-04-01
... violation that relates to a Cybersecurity Incident or that would jeopardize the security of the Bulk-Power... lawful, including a proceeding involving a Cybersecurity Incident. For a nonpublic proceeding, the user...
18 CFR 39.7 - Enforcement of Reliability Standards.
Code of Federal Regulations, 2014 CFR
2014-04-01
... violation that relates to a Cybersecurity Incident or that would jeopardize the security of the Bulk-Power... lawful, including a proceeding involving a Cybersecurity Incident. For a nonpublic proceeding, the user...
Judge says leading viatical firm violated securities laws.
1995-09-22
A Federal judge has agreed with the Securities and Exchange Commission (SEC) in its suit against Life Partners, a leading viatical settlement company. According to the SEC, Life Partners buys insurance policies from persons living with AIDS in its own name and then sells interests in these policies to investors. The SEC alleges that these interests fall under the Federal securities laws. Life Partners contends that it acts solely as an agent on behalf of investors, and therefore securities laws do not apply. The judge's injunction requires Life Partners to transfer its insurance policies to an independent agent until the case is resolved.
Health and Human Rights in Karen State, Eastern Myanmar.
Davis, William W; Mullany, Luke C; Shwe Oo, Eh Kalu; Richards, Adam K; Iacopino, Vincent; Beyrer, Chris
2015-01-01
Decades of conflict in eastern Myanmar have resulted in high prevalence of human rights violations and poor health outcomes. While recent ceasefire agreements have reduced conflict in this area, it is unknown whether this has resulted in concomitant reductions in human rights violations. We conducted a two-stage cluster survey of 686 households in eastern Myanmar to assess health status, access to healthcare, food security, exposure to human rights violations and identification of alleged perpetrators over the 12 months prior to January 2012, a period of near-absence of conflict in this region. Household hunger (FANTA-2 scale) was moderate/high in 91 (13.2%) households, while the proportion of households reporting food shortages in each month of 2011 ranged from 19.9% in December to 47.0% in September, with food insecurity peaking just prior to the harvest. Diarrhea prevalence in children was 14.2% and in everyone it was 5.8%. Forced labor was the most common human rights violation (185 households, 24.9%), and 210 households (30.6%) reported experiencing one or more human rights violations in 2011. Multiple logistic regression analysis identified associations between human rights violations and poor health outcomes. Human rights violations and their health consequences persist despite reduced intensity of conflict in eastern Myanmar. Ceasefire agreements should include language that protects human rights, and reconciliation efforts should address the health consequences of decades of human rights violations.
24 CFR 850.155 - Securing owner's responsibilities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... instrument. The debt shall be repayable in the event of a substantive, uncorrected violation by an owner of... development grant assistance outstanding, plus interest which is determined by the Secretary by adding two...
24 CFR 850.155 - Securing owner's responsibilities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... instrument. The debt shall be repayable in the event of a substantive, uncorrected violation by an owner of... development grant assistance outstanding, plus interest which is determined by the Secretary by adding two...
24 CFR 850.155 - Securing owner's responsibilities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... instrument. The debt shall be repayable in the event of a substantive, uncorrected violation by an owner of... development grant assistance outstanding, plus interest which is determined by the Secretary by adding two...
24 CFR 850.155 - Securing owner's responsibilities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... instrument. The debt shall be repayable in the event of a substantive, uncorrected violation by an owner of... development grant assistance outstanding, plus interest which is determined by the Secretary by adding two...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-05
..., to protect against international terrorism, and to implement counter-money laundering programs and... proceedings involving domestic and international money laundering, terrorist financing, tax violations, fraud...
Quantum-locked key distribution at nearly the classical capacity rate.
Lupo, Cosmo; Lloyd, Seth
2014-10-17
Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.
Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering.
Menon, Aditya Krishna; Jiang, Xiaoqian; Kim, Jihoon; Vaidya, Jaideep; Ohno-Machado, Lucila
2014-04-01
Many healthcare facilities enforce security on their electronic health records (EHRs) through a corrective mechanism: some staff nominally have almost unrestricted access to the records, but there is a strict ex post facto audit process for inappropriate accesses, i.e., accesses that violate the facility's security and privacy policies. This process is inefficient, as each suspicious access has to be reviewed by a security expert, and is purely retrospective, as it occurs after damage may have been incurred. This motivates automated approaches based on machine learning using historical data. Previous attempts at such a system have successfully applied supervised learning models to this end, such as SVMs and logistic regression. While providing benefits over manual auditing, these approaches ignore the identity of the users and patients involved in a record access. Therefore, they cannot exploit the fact that a patient whose record was previously involved in a violation has an increased risk of being involved in a future violation. Motivated by this, in this paper, we propose a collaborative filtering inspired approach to predicting inappropriate accesses. Our solution integrates both explicit and latent features for staff and patients, the latter acting as a personalized "finger-print" based on historical access patterns. The proposed method, when applied to real EHR access data from two tertiary hospitals and a file-access dataset from Amazon, shows not only significantly improved performance compared to existing methods, but also provides insights as to what indicates an inappropriate access.
Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering
Menon, Aditya Krishna; Jiang, Xiaoqian; Kim, Jihoon; Vaidya, Jaideep; Ohno-Machado, Lucila
2013-01-01
Many healthcare facilities enforce security on their electronic health records (EHRs) through a corrective mechanism: some staff nominally have almost unrestricted access to the records, but there is a strict ex post facto audit process for inappropriate accesses, i.e., accesses that violate the facility’s security and privacy policies. This process is inefficient, as each suspicious access has to be reviewed by a security expert, and is purely retrospective, as it occurs after damage may have been incurred. This motivates automated approaches based on machine learning using historical data. Previous attempts at such a system have successfully applied supervised learning models to this end, such as SVMs and logistic regression. While providing benefits over manual auditing, these approaches ignore the identity of the users and patients involved in a record access. Therefore, they cannot exploit the fact that a patient whose record was previously involved in a violation has an increased risk of being involved in a future violation. Motivated by this, in this paper, we propose a collaborative filtering inspired approach to predicting inappropriate accesses. Our solution integrates both explicit and latent features for staff and patients, the latter acting as a personalized “finger-print” based on historical access patterns. The proposed method, when applied to real EHR access data from two tertiary hospitals and a file-access dataset from Amazon, shows not only significantly improved performance compared to existing methods, but also provides insights as to what indicates an inappropriate access. PMID:24683293
Device-independent two-party cryptography secure against sequential attacks
NASA Astrophysics Data System (ADS)
Kaniewski, Jędrzej; Wehner, Stephanie
2016-05-01
The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser-Horne-Shimony-Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.
NASA Astrophysics Data System (ADS)
Kirby, Brian
Macroscopic quantum effects are of fundamental interest because they help us to understand the quantum-classical boundary, and may also have important practical applications in long-range quantum communications. Specifically we analyze a macroscopic generalization of the Franson interferometer, where violations of Bell's inequality can be observed using phase entangled coherent states created using weak nonlinearities. Furthermore we want to understand how these states, and other macroscopic quantum states, can be applied to secure quantum communications. We find that Bell's inequality can be violated at ranges of roughly 400 km in optical fiber when various unambiguous state discrimination techniques are applied. In addition Monte Carlo simulations suggest that quantum communications schemes based on macroscopic quantum states and random unitary transformations can be potentially secure at long distances. Lastly, we calculate the feasibility of creating the weak nonlinearity needed for the experimental realization of these proposals using metastable xenon in a high finesse cavity. This research suggests that quantum states created using macroscopic coherent states and weak nonlinearities may be a realistic path towards the realization of secure long-range quantum communications.
Code of Federal Regulations, 2010 CFR
2010-10-01
... from participating in programs under titles V, XVIII, XIX, and XX of the Social Security Act for a... in titles V, XVIII, XIX, and XX of the Act, if the violation involved the provision or ordering of...
18 CFR 39.7 - Enforcement of Reliability Standards.
Code of Federal Regulations, 2010 CFR
2010-04-01
... violation that relates to a Cybersecurity Incident or that would jeopardize the security of the Bulk-Power... Cybersecurity Incident. For a nonpublic proceeding, the user, owner or operator of the Bulk-Power System that is...
77 FR 31433 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-25
... to better audit the returns of U.S. corporations engaged in cross-border transactions with a related... violation of Income Tax Law. We need the taxpayer identification numbers, Social Security Number (SSN) or...
Security breaches: tips for assessing and limiting your risks.
Coons, Leeanne R
2011-01-01
As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.
Import Security: Assessing the Risks of Imported Food.
Welburn, Jonathan; Bier, Vicki; Hoerning, Steven
2016-11-01
We use data on food import violations from the FDA Operational and Administrative System for Import Support (OASIS) to address rising concerns associated with imported food, quantify import risks by product and by country of origin, and explore the usefulness of OASIS data for risk assessment. In particular, we assess whether there are significant trends in violations, whether import violations can be used to quantify risks by country and by product, and how import risks depend on economic factors of the country of origin. The results show that normalizing import violations by volume of imports provides a meaningful indicator of risk. We then use regression analysis to characterize import risks. Using this model, we analyze import risks by product type, violation type, and economic factors of the country of origin. We find that OASIS data are useful in quantifying food import risks, and that the rate of refusals provides a useful decision tool for risk management. Furthermore, we find that some economic factors are significant indicators of food import risk by country. © 2016 Society for Risk Analysis.
Improving the Automated Detection and Analysis of Secure Coding Violations
2014-06-01
eliminating software vulnerabilities and other flaws. The CERT Division produces books and courses that foster a security mindset in developers, and...website also provides a virtual machine containing a complete build of the Rosecheckers project on Linux . The Rosecheckers project leverages the...Compass/ROSE6 project developed at Law- rence Livermore National Laboratory. This project provides a high-level API for accessing the abstract syntax tree
31 CFR 500.203 - Effect of transfers violating the provisions of this chapter.
Code of Federal Regulations, 2010 CFR
2010-07-01
...” includes gold, silver, bullion, currency, coin, credit, securities (as that term is defined in section 2(1... documents of title, mortgages, liens, annuities, insurance policies, options and futures in commodities, and...
Code of Federal Regulations, 2013 CFR
2013-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2012 CFR
2012-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2014 CFR
2014-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
15 CFR 764.4 - Reporting of violations.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Enforcement, Bureau of Industry and Security,U.S. Department of Commerce, 14th Street and Constitution Avenue.... Department of Commerce, 14th Street and Constitution Avenue, N.W., Room H-6099C, Washington, D.C. 20230, Tel...
Code of Federal Regulations, 2010 CFR
2010-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2011 CFR
2011-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Realistic noise-tolerant randomness amplification using finite number of devices.
Brandão, Fernando G S L; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna
2016-04-21
Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology.
Realistic noise-tolerant randomness amplification using finite number of devices
NASA Astrophysics Data System (ADS)
Brandão, Fernando G. S. L.; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna
2016-04-01
Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology.
Experimental measurement-device-independent verification of quantum steering
NASA Astrophysics Data System (ADS)
Kocsis, Sacha; Hall, Michael J. W.; Bennet, Adam J.; Saunders, Dylan J.; Pryde, Geoff J.
2015-01-01
Bell non-locality between distant quantum systems—that is, joint correlations which violate a Bell inequality—can be verified without trusting the measurement devices used, nor those performing the measurements. This leads to unconditionally secure protocols for quantum information tasks such as cryptographic key distribution. However, complete verification of Bell non-locality requires high detection efficiencies, and is not robust to typical transmission losses over long distances. In contrast, quantum or Einstein-Podolsky-Rosen steering, a weaker form of quantum correlation, can be verified for arbitrarily low detection efficiencies and high losses. The cost is that current steering-verification protocols require complete trust in one of the measurement devices and its operator, allowing only one-sided secure key distribution. Here we present measurement-device-independent steering protocols that remove this need for trust, even when Bell non-locality is not present. We experimentally demonstrate this principle for singlet states and states that do not violate a Bell inequality.
Experimental measurement-device-independent verification of quantum steering.
Kocsis, Sacha; Hall, Michael J W; Bennet, Adam J; Saunders, Dylan J; Pryde, Geoff J
2015-01-07
Bell non-locality between distant quantum systems--that is, joint correlations which violate a Bell inequality--can be verified without trusting the measurement devices used, nor those performing the measurements. This leads to unconditionally secure protocols for quantum information tasks such as cryptographic key distribution. However, complete verification of Bell non-locality requires high detection efficiencies, and is not robust to typical transmission losses over long distances. In contrast, quantum or Einstein-Podolsky-Rosen steering, a weaker form of quantum correlation, can be verified for arbitrarily low detection efficiencies and high losses. The cost is that current steering-verification protocols require complete trust in one of the measurement devices and its operator, allowing only one-sided secure key distribution. Here we present measurement-device-independent steering protocols that remove this need for trust, even when Bell non-locality is not present. We experimentally demonstrate this principle for singlet states and states that do not violate a Bell inequality.
Realistic noise-tolerant randomness amplification using finite number of devices
Brandão, Fernando G. S. L.; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna
2016-01-01
Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology. PMID:27098302
Health and Human Rights in Karen State, Eastern Myanmar
Davis, William W.; Mullany, Luke C.; Shwe Oo, Eh Kalu; Richards, Adam K.; Iacopino, Vincent; Beyrer, Chris
2015-01-01
Background Decades of conflict in eastern Myanmar have resulted in high prevalence of human rights violations and poor health outcomes. While recent ceasefire agreements have reduced conflict in this area, it is unknown whether this has resulted in concomitant reductions in human rights violations. Methods and Findings We conducted a two-stage cluster survey of 686 households in eastern Myanmar to assess health status, access to healthcare, food security, exposure to human rights violations and identification of alleged perpetrators over the 12 months prior to January 2012, a period of near-absence of conflict in this region. Household hunger (FANTA-2 scale) was moderate/high in 91 (13.2%) households, while the proportion of households reporting food shortages in each month of 2011 ranged from 19.9% in December to 47.0% in September, with food insecurity peaking just prior to the harvest. Diarrhea prevalence in children was 14.2% and in everyone it was 5.8%. Forced labor was the most common human rights violation (185 households, 24.9%), and 210 households (30.6%) reported experiencing one or more human rights violations in 2011. Multiple logistic regression analysis identified associations between human rights violations and poor health outcomes. Conclusion Human rights violations and their health consequences persist despite reduced intensity of conflict in eastern Myanmar. Ceasefire agreements should include language that protects human rights, and reconciliation efforts should address the health consequences of decades of human rights violations. PMID:26308850
Fernando Magarzo, M R
2000-01-01
The author studies the Appeal of revocation by the Kingdom of Holland against the Directive 98/44 concerning the juridical protection of biotechnological inventions. The main reasons of the Appeal are: the election of a mistaken juridical base; the infraction of the principle of subordination; the violation of the principle of juridical security; the non-fulfillment of the obligations of the International Law; the violation of the fundamental rights; and the infraction of the principle of collegiality.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Internet or other electronic media. (b) Local funding sources. HUD recommends that approved agencies seek and secure funding from funding sources that may include local and state governments, private... violate the provisions regarding conflicts of interest described in § 214.303(e). ...
31 CFR 535.203 - Effect of transfers violating the provisions of this part.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., silver, bullion, currency, coin, credit, securities (as that term is defined in section 2(l) of the..., insurance policies, options and futures in commodities, and evidences of any of the foregoing. The term...
Smart Push, Smart Pull, Sensor to Shooter in a Multi-Level Secure/Safe (MLS) Infrastructure
2006-05-04
policy violation with respect to: Security Safety Financial Posture Infrastructure The IATF identifies five levels: V1: Negligible effect V2: Minimal...MLS) Infrastructure Step 2: Determine Threat Levels Best practices also in the IATF Threats are ranked by assessing: Capability Resources Motivation...Risk Willingness The IATF identifies seven levels: T1: Inadvertent or accidental events Tripping over a power cord T2: Minimal resources – willing to
Device-independent security of quantum cryptography against collective attacks.
Acín, Antonio; Brunner, Nicolas; Gisin, Nicolas; Massar, Serge; Pironio, Stefano; Scarani, Valerio
2007-06-08
We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
Russia’s Proposal for a European Security Treaty: Motives and Implications
2010-09-01
their relations in the spirit of friendship and cooperation in conformity with international law.”17 The preamble states that the parties would be...ways. For example, thirty-five years ago, few could imagine that cyber security would become a significant trans-national threat. The bottom line is...supply cutoffs, cyber attacks, and export bans, which have significantly affected European neighbors. Furthermore, Moscow itself violates Article 1 of
Postselection-Loophole-Free Bell Test Over an Installed Optical Fiber Network.
Carvacho, Gonzalo; Cariñe, Jaime; Saavedra, Gabriel; Cuevas, Álvaro; Fuenzalida, Jorge; Toledo, Felipe; Figueroa, Miguel; Cabello, Adán; Larsson, Jan-Åke; Mataloni, Paolo; Lima, Gustavo; Xavier, Guilherme B
2015-07-17
Device-independent quantum communication will require a loophole-free violation of Bell inequalities. In typical scenarios where line of sight between the communicating parties is not available, it is convenient to use energy-time entangled photons due to intrinsic robustness while propagating over optical fibers. Here we show an energy-time Clauser-Horne-Shimony-Holt Bell inequality violation with two parties separated by 3.7 km over the deployed optical fiber network belonging to the University of Concepción in Chile. Remarkably, this is the first Bell violation with spatially separated parties that is free of the postselection loophole, which affected all previous in-field long-distance energy-time experiments. Our work takes a further step towards a fiber-based loophole-free Bell test, which is highly desired for secure quantum communication due to the widespread existing telecommunication infrastructure.
Postselection-Loophole-Free Bell Test Over an Installed Optical Fiber Network
NASA Astrophysics Data System (ADS)
Carvacho, Gonzalo; Cariñe, Jaime; Saavedra, Gabriel; Cuevas, Álvaro; Fuenzalida, Jorge; Toledo, Felipe; Figueroa, Miguel; Cabello, Adán; Larsson, Jan-Åke; Mataloni, Paolo; Lima, Gustavo; Xavier, Guilherme B.
2015-07-01
Device-independent quantum communication will require a loophole-free violation of Bell inequalities. In typical scenarios where line of sight between the communicating parties is not available, it is convenient to use energy-time entangled photons due to intrinsic robustness while propagating over optical fibers. Here we show an energy-time Clauser-Horne-Shimony-Holt Bell inequality violation with two parties separated by 3.7 km over the deployed optical fiber network belonging to the University of Concepción in Chile. Remarkably, this is the first Bell violation with spatially separated parties that is free of the postselection loophole, which affected all previous in-field long-distance energy-time experiments. Our work takes a further step towards a fiber-based loophole-free Bell test, which is highly desired for secure quantum communication due to the widespread existing telecommunication infrastructure.
12 CFR 308.602 - Removal, suspension, or debarment.
Code of Federal Regulations, 2014 CFR
2014-01-01
... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...
12 CFR 308.602 - Removal, suspension, or debarment.
Code of Federal Regulations, 2013 CFR
2013-01-01
... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...
12 CFR 308.602 - Removal, suspension, or debarment.
Code of Federal Regulations, 2012 CFR
2012-01-01
... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...
12 CFR 308.602 - Removal, suspension, or debarment.
Code of Federal Regulations, 2011 CFR
2011-01-01
... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Misconduct. 5.27 Section 5.27 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE INVESTIGATION REGULATIONS-PERSONNEL ACTION Definitions § 5.27 Misconduct. Misconduct is human behavior which violates some formal...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Misconduct. 5.27 Section 5.27 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE INVESTIGATION REGULATIONS-PERSONNEL ACTION Definitions § 5.27 Misconduct. Misconduct is human behavior which violates some formal...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Misconduct. 5.27 Section 5.27 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE INVESTIGATION REGULATIONS-PERSONNEL ACTION Definitions § 5.27 Misconduct. Misconduct is human behavior which violates some formal...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Misconduct. 5.27 Section 5.27 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE INVESTIGATION REGULATIONS-PERSONNEL ACTION Definitions § 5.27 Misconduct. Misconduct is human behavior which violates some formal...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Misconduct. 5.27 Section 5.27 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE INVESTIGATION REGULATIONS-PERSONNEL ACTION Definitions § 5.27 Misconduct. Misconduct is human behavior which violates some formal...
43 CFR 20.602 - Remedial action.
Code of Federal Regulations, 2012 CFR
2012-10-01
... considered only after attempts to obtain voluntary resolution have failed. Voluntary resolution may include: (i) Voluntary divestiture; (ii) Voluntary conversion to securities which are not prohibited, or the holding of which would not violate law or regulation; or (iii) Voluntary reassignment to another position...
43 CFR 20.602 - Remedial action.
Code of Federal Regulations, 2011 CFR
2011-10-01
... considered only after attempts to obtain voluntary resolution have failed. Voluntary resolution may include: (i) Voluntary divestiture; (ii) Voluntary conversion to securities which are not prohibited, or the holding of which would not violate law or regulation; or (iii) Voluntary reassignment to another position...
43 CFR 20.602 - Remedial action.
Code of Federal Regulations, 2013 CFR
2013-10-01
... considered only after attempts to obtain voluntary resolution have failed. Voluntary resolution may include: (i) Voluntary divestiture; (ii) Voluntary conversion to securities which are not prohibited, or the holding of which would not violate law or regulation; or (iii) Voluntary reassignment to another position...
43 CFR 20.602 - Remedial action.
Code of Federal Regulations, 2014 CFR
2014-10-01
... considered only after attempts to obtain voluntary resolution have failed. Voluntary resolution may include: (i) Voluntary divestiture; (ii) Voluntary conversion to securities which are not prohibited, or the holding of which would not violate law or regulation; or (iii) Voluntary reassignment to another position...
Conde, Crystal
2012-07-01
When it comes to enforcing HIPAA data security and privacy standards, the federal government means business. In fact, the government is conducting a national pilot program to audit 150 physicians and others that HIPAA covers as the first phase of a concerted effort to crack down on HIPAA violations.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false [Reserved] 133.45 Section 133.45 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY TRADEMARKS, TRADE NAMES, AND COPYRIGHTS Importations Violating Copyright Laws § 133.45 [Reserved] ...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false [Reserved] 133.41 Section 133.41 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY TRADEMARKS, TRADE NAMES, AND COPYRIGHTS Importations Violating Copyright Laws § 133.41 [Reserved] ...
45 CFR 164.308 - Administrative safeguards.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., contain, and correct security violations. (ii) Implementation specifications: (A) Risk analysis (Required). Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the... vulnerabilities to a reasonable and appropriate level to comply with § 164.306(a). (C) Sanction policy (Required...
Liability for Aiding and Abetting Securities Violations Act of 2009
Sen. Specter, Arlen [D-PA
2009-07-30
Senate - 09/17/2009 Committee on the Judiciary Senate Subcommittee on Crime and Drugs. Hearings held. With printed Hearing: S.Hrg. 111-369. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
77 FR 76098 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-26
...) (``Investment Company Act'') is intended to protect investors by fostering better fund compliance with... (``fund'') to: (i) Adopt and implement written policies and procedures reasonably designed to prevent violations of the federal securities laws by the fund, including procedures for oversight of compliance by...
6 CFR 15.70 - Compliance procedures.
Code of Federal Regulations, 2010 CFR
2010-01-01
... the Officer for Civil Rights and Civil Liberties, Department of Homeland Security, Washington, DC 20528. The Officer for Civil Rights and Civil Liberties shall be responsible for coordinating... remedy for each violation found; and (iii) A notice of the right to appeal. (2) Department employees are...
78 FR 17471 - Privacy Act of 1974
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-21
... (TIN), Address, Tax Return/Account Information IV. Electronic transmission specifics such as sender's... unclassified (SBU) information that is being transmitted in violation of IRS security policy that requires an...] IV. Information Return Master File (IRMF) [Treasury/IRS 22.061] V. CADE Individual Master File (IMF...
78 FR 37518 - Order Denying Export Privileges
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-21
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Order Denying Export Privileges In the... Texas, Lee Roy Perez (``Perez'') was convicted of violating Section 38 of the Arms Export Control Act... of knowingly and willfully exporting and causing to be exported and attempting to export and...
77 FR 60379 - Order Denying Export Privileges
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-03
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Order Denying Export Privileges In the... Andro Jamison (``Jamison'') was convicted of violating Section 38 of the Arms Export Control Act (22 U.S.C. 2778 (2000)) (``AECA''). Specifically, Jamison was convicted of knowingly and willfully exporting...
78 FR 60249 - Order Denying Export Privileges
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-01
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Order Denying Export Privileges In the... (``Silcox''), was convicted of violating Section 38 of the Arms Export Control Act (22 U.S.C. 2778 (2006 & Supp. IV 2010)) (``AECA''). Specifically, Silcox was convicted of knowingly and willfully exporting...
19 CFR 162.70 - Applicability.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Applicability. 162.70 Section 162.70 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) INSPECTION, SEARCH, AND SEIZURE Special Procedures for Certain Violations § 162.70 Applicability...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Definitions. 162.71 Section 162.71 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) INSPECTION, SEARCH, AND SEIZURE Special Procedures for Certain Violations § 162.71 Definitions...
15 CFR 719.1 - Scope and definitions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ENFORCEMENT... proceedings. Section 719.3 of the CWCR sets forth violations of the Chemical Weapons Convention for which the... of the export requirements imposed pursuant to the Chemical Weapons Convention and set forth in the...
15 CFR 719.1 - Scope and definitions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ENFORCEMENT... proceedings. Section 719.3 of the CWCR sets forth violations of the Chemical Weapons Convention for which the... of the export requirements imposed pursuant to the Chemical Weapons Convention and set forth in the...
15 CFR 719.1 - Scope and definitions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ENFORCEMENT... proceedings. Section 719.3 of the CWCR sets forth violations of the Chemical Weapons Convention for which the... of the export requirements imposed pursuant to the Chemical Weapons Convention and set forth in the...
15 CFR 719.1 - Scope and definitions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ENFORCEMENT... proceedings. Section 719.3 of the CWCR sets forth violations of the Chemical Weapons Convention for which the... of the export requirements imposed pursuant to the Chemical Weapons Convention and set forth in the...
15 CFR 719.1 - Scope and definitions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ENFORCEMENT... proceedings. Section 719.3 of the CWCR sets forth violations of the Chemical Weapons Convention for which the... of the export requirements imposed pursuant to the Chemical Weapons Convention and set forth in the...
Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel
2014-04-01
The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.
Mc Cormick, Christine
2013-07-01
Children have been affected by the Israeli-Palestinian conflict for several generations. Recent reports state that they are subject to a number of grave violations, ranging from killing and maiming to detention and ill-treatment. The monitoring and reporting mechanism (MRM) for United Nations Security Council Resolution 1612 (2005), although not formally mandated in Israel and the occupied Palestinian territories (oPt), has been successfully adapted and used by humanitarian and human rights agencies to support monitoring, reporting, and responding to violations against children. However, agencies in Israel and the oPt face a number of challenges in doing so, which are common in other countries where the MRM is employed. These include limited recognition and understanding of the issues, insufficient resources, and a difficult operational environment. Despite these challenges, local adaptation of the mechanism to reflect the specific situation of children and close collaboration have enabled these agencies to monitor and respond to violations against children in a more effective manner. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.
75 FR 72786 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-26
... DEPARTMENT OF COMMERCE Submission for OMB Review; Comment Request The Department of Commerce will... of information under the provisions of the Paperwork Reduction Act (44 U.S.C. chapter 35). Agency: Bureau of Industry and Security (BIS). Title: Voluntary Self-Disclosure of Violations of the Export...
75 FR 77828 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-14
... DEPARTMENT OF COMMERCE Submission for OMB Review; Comment Request The Department of Commerce will... of information under the provisions of the Paperwork Reduction Act (44 U.S.C. chapter 35). Agency: Bureau of Industry and Security. Title: Voluntary Self-Disclosure of Antiboycott Violations. OMB Control...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Applicability. 824.2 Section 824.2 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.2 Applicability. (a) General. These regulations apply to any person that has entered into a...
10 CFR 824.12 - Conduct of the hearing.
Code of Federal Regulations, 2011 CFR
2011-01-01
... DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.12 Conduct of the hearing. (a) DOE shall make a transcript of the hearing; (b... unauthorized disclosure of classified information or any other information protected from public disclosure by...
10 CFR 824.10 - Hearing Officer.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Hearing Officer. 824.10 Section 824.10 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.10 Hearing Officer. The Hearing Officer: (a) Is responsible for the administrative...
78 FR 37787 - Order Denying Export Privileges
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-24
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Order Denying Export Privileges In the... District of Texas, Manuel Mario Pavon (``Pavon'') was convicted of violating Section 38 of the Arms Export... knowingly and willfully exporting and causing to be exported and attempting to export and attempting to...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Applicability. 824.2 Section 824.2 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.2 Applicability. (a) General. These regulations apply to any person that has entered into a...
19 CFR 133.42 - Infringing copies or phonorecords.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Infringing copies or phonorecords. 133.42 Section 133.42 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY TRADEMARKS, TRADE NAMES, AND COPYRIGHTS Importations Violating Copyright Laws § 133...
44 CFR 18.605 - Inspector General report.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Congress. (d) The annual report shall include the following: All alleged violations relating to the agency... 44 Emergency Management and Assistance 1 2014-10-01 2014-10-01 false Inspector General report. 18... OF HOMELAND SECURITY GENERAL NEW RESTRICTIONS ON LOBBYING Agency Reports § 18.605 Inspector General...
44 CFR 18.605 - Inspector General report.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Congress. (d) The annual report shall include the following: All alleged violations relating to the agency... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Inspector General report. 18... OF HOMELAND SECURITY GENERAL NEW RESTRICTIONS ON LOBBYING Agency Reports § 18.605 Inspector General...
44 CFR 18.605 - Inspector General report.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Congress. (d) The annual report shall include the following: All alleged violations relating to the agency... 44 Emergency Management and Assistance 1 2013-10-01 2013-10-01 false Inspector General report. 18... OF HOMELAND SECURITY GENERAL NEW RESTRICTIONS ON LOBBYING Agency Reports § 18.605 Inspector General...
44 CFR 18.605 - Inspector General report.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Congress. (d) The annual report shall include the following: All alleged violations relating to the agency... 44 Emergency Management and Assistance 1 2012-10-01 2011-10-01 true Inspector General report. 18... OF HOMELAND SECURITY GENERAL NEW RESTRICTIONS ON LOBBYING Agency Reports § 18.605 Inspector General...
44 CFR 18.605 - Inspector General report.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Congress. (d) The annual report shall include the following: All alleged violations relating to the agency... 44 Emergency Management and Assistance 1 2011-10-01 2011-10-01 false Inspector General report. 18... OF HOMELAND SECURITY GENERAL NEW RESTRICTIONS ON LOBBYING Agency Reports § 18.605 Inspector General...
19 CFR 162.74 - Prior disclosure.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Prior disclosure. 162.74 Section 162.74 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) INSPECTION, SEARCH, AND SEIZURE Special Procedures for Certain Violations § 162.74 Prior...
The Growing Prospects for Maritime Security Cooperation in Southeast Asia
2005-01-01
reports of Admiral Fargo’s testimony.34 Six months later senior Malaysian and Indonesian officials, such as Malaysian deputy prime minister Najib Tun... Razak and Indonesian navy chief Bernard Kent Sondahk, were still criticizing perceived American intentions to violate their sovereignty.35 If sover
17 CFR 165.18 - Staff communications with whistleblowers from represented entities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Staff communications with... FUTURES TRADING COMMISSION WHISTLEBLOWER RULES § 165.18 Staff communications with whistleblowers from... Commission relating to a potential violation of the Commodity Exchange Act, the Commission's staff is...
Managing Professional and Nurse-Patient Relationship Boundaries in Mental Health.
Valente, Sharon M
2017-01-01
Caring nurse-patient relationships in mental health settings are key components in helping patients recover. These professional relationships provide a safe, trustworthy, reliable, and secure foundation for therapeutic interactions; however, nurses face challenges in setting and maintaining relationship boundaries. Although patients ask for special privileges, romantic interactions, and social media befriending, or offer expensive gifts, nurses must recognize that these boundary violations may erode trust and harm patients. These violations may also trigger discipline for nurses. Professional relationship guidelines must be applied with thoughtful consideration, and nurses must monitor their emotions and reactions in these relationships. The current article is a sharing of personal experiences about boundaries augmented by evidence in the literature, and focuses on managing potential boundary violations (i.e., social media, sexuality, over-involvement, and gift giving) in mental health settings. [Journal of Psychosocial Nursing and Mental Health Services, 55(1), 45-51.]. Copyright 2017, SLACK Incorporated.
NASA Astrophysics Data System (ADS)
Hiesmayr, Beatrix C.
2015-07-01
About 50 years ago John St. Bell published his famous Bell theorem that initiated a new field in physics. This contribution discusses how discrete symmetries relate to the big open questions of quantum mechanics, in particular: (i) how correlations stronger than those predicted by theories sharing randomness (Bell's theorem) relate to the violation of the CP symmetry and the P symmetry; and its relation to the security of quantum cryptography, (ii) how the measurement problem (“why do we observe no tables in superposition?”) can be polled in weakly decaying systems, (iii) how strongly and weakly interacting quantum systems are affected by Newton's self gravitation. These presented preliminary results show that the meson-antimeson systems and the hyperon- antihyperon systems are a unique laboratory to tackle deep fundamental questions and to contribute to the understand what impact the violation of discrete symmetries has.
Severity of Organized Item Theft in Computerized Adaptive Testing: A Simulation Study
ERIC Educational Resources Information Center
Yi, Qing; Zhang, Jinming; Chang, Hua-Hua
2008-01-01
Criteria had been proposed for assessing the severity of possible test security violations for computerized tests with high-stakes outcomes. However, these criteria resulted from theoretical derivations that assumed uniformly randomized item selection. This study investigated potential damage caused by organized item theft in computerized adaptive…
17 CFR 143.8 - Inflation-adjusted civil monetary penalties.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Inflation-adjusted civil... JURISDICTION General Provisions § 143.8 Inflation-adjusted civil monetary penalties. (a) Unless otherwise amended by an act of Congress, the inflation-adjusted maximum civil monetary penalty for each violation of...
17 CFR 12.13 - Complaint; election of procedure.
Code of Federal Regulations, 2010 CFR
2010-04-01
... RELATING TO REPARATIONS General Information and Preliminary Consideration of Pleadings § 12.13 Complaint; election of procedure. (a) In general. Any person complaining of a violation of any provision of the Act or... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Complaint; election of...
Learning That Makes a Difference: Pedagogy and Practice for Learning Abroad
ERIC Educational Resources Information Center
Benham Rennick, Joanne
2015-01-01
Society faces significant new challenges surrounding issues in human health; global security; environmental devastation; human rights violations; economic uncertainty; population explosion and regression; recognition of diversity, difference and special populations at home and abroad. In light of these challenges, there is a great opportunity, and…
10 CFR 824.15 - Collection of civil penalties.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Collection of civil penalties. 824.15 Section 824.15 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.15 Collection of civil penalties. If any person fails to pay an...
10 CFR 824.13 - Initial decision.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Initial decision. 824.13 Section 824.13 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.13 Initial decision. (a) The Hearing Officer shall issue an initial decision as soon as...
78 FR 37520 - Order Denying Export Privileges
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-21
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Order Denying Export Privileges In the... Molina, Jr. (``Molina'') was convicted of violating Section 38 of the Arms Export Control Act (22 U.S.C... attempting to export and causing to be exported from the United States to Mexico two AK47 semi-automatic...
77 FR 60377 - Order Denying Export Privileges
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-03
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Order Denying Export Privileges In the... causing to be violated the United States trade restriction with Iran by exporting and attempting to export... Foreign Assets Control for such an export. Avanessian was also convicted of one count of conspiracy (18 U...
77 FR 34342 - Order Denying Export Privileges
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-11
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Order Denying Export Privileges In the... Economic Powers Act (50 U.S.C. 1701 et seq. (2000)) (``IEEPA'') and violating Section 38 of the Arms Export Control Act (22 U.S.C. 2778 (2000)) (``AECA''). Specifically, Wu was convicted of illegally exporting...
17 CFR 205.3 - Issuer as client.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Issuer as client. 205.3... ISSUER § 205.3 Issuer as client. (a) Representing an issuer. An attorney appearing and practicing before...'s clients. (b) Duty to report evidence of a material violation. (1) If an attorney, appearing and...
Applying Automated Theorem Proving to Computer Security
2008-03-01
CS96]”. Violations of policy can also be specified in this model. La Padula [Pad90] discusses a domain-independent formal model which imple- ments a...Science Laboratory, SRI International, Menlo Park, CA, September 1999. Pad90. L.J. La Padula . Formal modeling in a generalized framework for ac- cess
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-23
... public interest by authorizing such Exchange Officer to take affirmative action when a transaction... for such a violation through an appropriate regulatory action. However, there is no rule mechanism in... of the Exchange mandated prohibition, even after being subject to a regulatory action, could...
33 CFR 151.61 - Inspection for compliance and enforcement.
Code of Federal Regulations, 2010 CFR
2010-07-01
... SECURITY (CONTINUED) POLLUTION VESSELS CARRYING OIL, NOXIOUS LIQUID SUBSTANCES, GARBAGE, MUNICIPAL OR... Protection to the Antarctic Treaty as it Pertains to Pollution from Ships Garbage Pollution and Sewage § 151... regulations and has not discharged plastics or other garbage in violation of the provisions of the Act or...
33 CFR 151.61 - Inspection for compliance and enforcement.
Code of Federal Regulations, 2011 CFR
2011-07-01
... SECURITY (CONTINUED) POLLUTION VESSELS CARRYING OIL, NOXIOUS LIQUID SUBSTANCES, GARBAGE, MUNICIPAL OR... Protection to the Antarctic Treaty as it Pertains to Pollution from Ships Garbage Pollution and Sewage § 151... regulations and has not discharged plastics or other garbage in violation of the provisions of the Act or...
19 CFR 162.79a - Other notice.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Other notice. 162.79a Section 162.79a Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) INSPECTION, SEARCH, AND SEIZURE Special Procedures for Certain Violations § 162.79a Other notice...
33 CFR 151.61 - Inspection for compliance and enforcement.
Code of Federal Regulations, 2013 CFR
2013-07-01
... SECURITY (CONTINUED) POLLUTION VESSELS CARRYING OIL, NOXIOUS LIQUID SUBSTANCES, GARBAGE, MUNICIPAL OR... Protection to the Antarctic Treaty as it Pertains to Pollution from Ships Garbage Pollution and Sewage § 151... regulations and has not discharged plastics or other garbage in violation of the provisions of the Act or...
33 CFR 151.61 - Inspection for compliance and enforcement.
Code of Federal Regulations, 2014 CFR
2014-07-01
... SECURITY (CONTINUED) POLLUTION VESSELS CARRYING OIL, NOXIOUS LIQUID SUBSTANCES, GARBAGE, MUNICIPAL OR... Protection to the Antarctic Treaty as it Pertains to Pollution from Ships Garbage Pollution and Sewage § 151... regulations and has not discharged plastics or other garbage in violation of the provisions of the Act or...
33 CFR 151.61 - Inspection for compliance and enforcement.
Code of Federal Regulations, 2012 CFR
2012-07-01
... SECURITY (CONTINUED) POLLUTION VESSELS CARRYING OIL, NOXIOUS LIQUID SUBSTANCES, GARBAGE, MUNICIPAL OR... Protection to the Antarctic Treaty as it Pertains to Pollution from Ships Garbage Pollution and Sewage § 151... regulations and has not discharged plastics or other garbage in violation of the provisions of the Act or...
44 CFR 61.5 - Special terms and conditions.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program INSURANCE COVERAGE AND RATES § 61.5 Special terms and conditions. (a) No new flood insurance or renewal of flood... other authority to be in violation of any flood plain, mudslide (i.e., mudflow) or flood-related erosion...
44 CFR 61.5 - Special terms and conditions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program INSURANCE COVERAGE AND RATES § 61.5 Special terms and conditions. (a) No new flood insurance or renewal of flood... other authority to be in violation of any flood plain, mudslide (i.e., mudflow) or flood-related erosion...
44 CFR 61.5 - Special terms and conditions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program INSURANCE COVERAGE AND RATES § 61.5 Special terms and conditions. (a) No new flood insurance or renewal of flood... other authority to be in violation of any flood plain, mudslide (i.e., mudflow) or flood-related erosion...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 3 2011-10-01 2011-10-01 false Civil penalty. 80.40 Section 80.40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS DISCLOSURE OF SAFETY STANDARDS AND COUNTRY OF REGISTRY § 80.40 Civil penalty. For each violation of the regulations in this part, the owner, operator...
10 CFR 824.15 - Collection of civil penalties.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Collection of civil penalties. 824.15 Section 824.15 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.15 Collection of civil penalties. If any person fails to pay an...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 3 2012-10-01 2012-10-01 false Civil penalty. 80.40 Section 80.40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS DISCLOSURE OF SAFETY STANDARDS AND COUNTRY OF REGISTRY § 80.40 Civil penalty. For each violation of the regulations in this part, the owner, operator...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 3 2014-10-01 2014-10-01 false Civil penalty. 80.40 Section 80.40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS DISCLOSURE OF SAFETY STANDARDS AND COUNTRY OF REGISTRY § 80.40 Civil penalty. For each violation of the regulations in this part, the owner, operator...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 3 2013-10-01 2013-10-01 false Civil penalty. 80.40 Section 80.40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS DISCLOSURE OF SAFETY STANDARDS AND COUNTRY OF REGISTRY § 80.40 Civil penalty. For each violation of the regulations in this part, the owner, operator...
10 CFR 824.4 - Civil penalties.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Civil penalties. 824.4 Section 824.4 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.4 Civil penalties. Link to an amendment published at 74 FR 66033, Dec. 14, 2009. (a) Any...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 3 2010-10-01 2010-10-01 false Civil penalty. 80.40 Section 80.40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS DISCLOSURE OF SAFETY STANDARDS AND COUNTRY OF REGISTRY § 80.40 Civil penalty. For each violation of the regulations in this part, the owner, operator...
7 CFR 1488.18 - Covenant against contingent fees.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Financing of Export Sales of Agricultural Commodities From Private Stocks Under CCC Export Credit Sales... exporter for the purpose of securing business. For breach or violation of this warranty, CCC shall have the... liability to CCC. Should the financing agreement be annulled, CCC will promptly consent to the reduction or...
7 CFR 1488.18 - Covenant against contingent fees.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Financing of Export Sales of Agricultural Commodities From Private Stocks Under CCC Export Credit Sales... exporter for the purpose of securing business. For breach or violation of this warranty, CCC shall have the... liability to CCC. Should the financing agreement be annulled, CCC will promptly consent to the reduction or...
7 CFR 1488.18 - Covenant against contingent fees.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Financing of Export Sales of Agricultural Commodities From Private Stocks Under CCC Export Credit Sales... exporter for the purpose of securing business. For breach or violation of this warranty, CCC shall have the... liability to CCC. Should the financing agreement be annulled, CCC will promptly consent to the reduction or...
Human rights of persons with mental disabilities. The European Convention of Human Rights.
Gostin, L O
2000-01-01
It is not necessary to recount the numerous charters and declarations ... to understand human rights.... All persons are born free and equal in dignity and rights. Everyone ... is entitled to all the rights and freedoms set forth in the international human rights instruments without discrimination, such as the rights to life, liberty, security of the person, privacy, health, education, work, social security, and to marry and found a family. Yet, violations of human rights are a reality to be found in every corner of the globe.
Nordling, Jamie Koenig; Boldt, Lea J.; O'Bleness, Jessica; Kochanska, Grazyna
2015-01-01
Although attachment security has been associated with children's rule-compatible conduct, the mechanism through which attachment influences early regard for rules is not well established. We hypothesized that effortful control would mediate the link between security and indicators of children's emerging regard for rules (discomfort following rule violations, internalization of parents' and experimenter's rules, few externalizing behaviors). In a longitudinal study, the Attachment Q-Set was completed by parents, effortful control was observed, and Regard for Rules was observed and rated by parents. The proposed model fit the data well: Children's security to mothers predicted their effortful control, which in turn had a direct link to a greater Regard for Rules. Children's security with fathers did not predict effortful control. The mother-child relationship appears particularly important for positive developmental cascades of self-regulation and socialization. PMID:27158193
Code of Federal Regulations, 2010 CFR
2010-01-01
... this subpart, subpart B of the Local Rules and the Uniform Rules shall apply to proceedings to order an... subpart, subpart B of the Local Rules and the Uniform Rules shall apply to proceedings by the Board of Directors to order a municipal securities dealer to cease and desist from any violation of law or regulation...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-08
... report position and account information in accordance with ISE Rule 415 into the Minor Rule Violation... Rule 415 requires each member to report to the Exchange the account and position information of any... option contracts dealt in on the Exchange. Members report this information on the Large Option Position...
77 FR 36328 - Agency Information Collection Activities; Request for Comment
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-18
... interpretation and enforcement of Hatch Act provisions on political activity in chapters 15 and 73 of title 5 of... 3255-0002; (3) Form OSC-13 (Complaint of Possible Prohibited Political Activity (Violation of the Hatch..., (2) provide a safe, secure channel for whistleblower disclosures, and (3) enforce the Hatch Act. The...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-01
... place of birth; passport and other travel document information; nationality; aliases; Alien Registration... date and time of a successful collection and confirmation from the FBI that the sample was able to be... alleged violations of criminal or immigration law (location, date, time, event category, types of criminal...
12 CFR 1026.52 - Limitations on fees.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Applicable to Credit Card Accounts and Open-End Credit Offered to College Students § 1026.52 Limitations on... required to pay with respect to a credit card account under an open-end (not home-secured) consumer credit... fees. A card issuer must not impose a fee for violating the terms or other requirements of a credit...
19 CFR 133.53 - Refund of duty.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Refund of duty. 133.53 Section 133.53 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... § 133.53 Refund of duty. If a violation of the trademark or copyright laws is not discovered until after...
26 CFR 1.280G-1 - Golden parachute payments.
Code of Federal Regulations, 2014 CFR
2014-04-01
... contingent on change—Q/A-22 Payments under agreement entered into after change—Q/A-23 Amount of payment... pursuant to an agreement that violates a generally enforced securities law or regulation. This type of... agreements entered into or renewed after June 14, 1984. Section 280G also applies to certain payments under...
26 CFR 1.280G-1 - Golden parachute payments.
Code of Federal Regulations, 2013 CFR
2013-04-01
... contingent on change—Q/A-22 Payments under agreement entered into after change—Q/A-23 Amount of payment... pursuant to an agreement that violates a generally enforced securities law or regulation. This type of... agreements entered into or renewed after June 14, 1984. Section 280G also applies to certain payments under...
26 CFR 1.280G-1 - Golden parachute payments.
Code of Federal Regulations, 2012 CFR
2012-04-01
... contingent on change—Q/A-22 Payments under agreement entered into after change—Q/A-23 Amount of payment... pursuant to an agreement that violates a generally enforced securities law or regulation. This type of... agreements entered into or renewed after June 14, 1984. Section 280G also applies to certain payments under...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
... processing of information and to aid the Ombudsman in assisting individuals and employers in making systemic... individuals and employers problems allowing the Ombudsman to make systemic recommendations to USCIS. The... prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where a record, either...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-17
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62602; File No. SR-CBOE-2010-069] Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Amend Its Minor Rule Violation Plan July 29, 2010. Correction In notice...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-15
... Building, 1111 Constitution Avenue NW., Washington, DC 20224. Due to building security procedures, visitors must enter at the Constitution Avenue entrance. In addition, all visitors must present photo..., 1111 Constitution Avenue NW., Washington, DC 20224 or sent electronically via the Federal eRulemaking...
15 CFR 720.1 - Denial of export privileges for convictions under 18 U.S.C. 229.
Code of Federal Regulations, 2011 CFR
2011-01-01
... threatening to use, a chemical weapon; or (b) Assisting or inducing, in any way, any person to violate... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS DENIAL OF EXPORT PRIVILEGES § 720.1 Denial of export privileges for...
15 CFR 720.1 - Denial of export privileges for convictions under 18 U.S.C. 229.
Code of Federal Regulations, 2010 CFR
2010-01-01
... threatening to use, a chemical weapon; or (b) Assisting or inducing, in any way, any person to violate... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS DENIAL OF EXPORT PRIVILEGES § 720.1 Denial of export privileges for...
76 FR 22625 - Reporting of Security Issues
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-22
...) Accessing the Government Printing Office's Web page at http://www.gpoaccess.gov/fr/index.html ; or (3... violations, threat information or criminal activities, vulnerabilities and intelligence was put in place...://data.bls.gov/cgi-bin/print.pl/oes/2009/may/naics2_48-49.htm and http://www.bls.gov/cpi/cpid1012.pdf...
28 CFR 31.303 - Substantive requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
...) of this section or pursuant to section 922(x) of title 18, United States Code (which prohibits the..., and Federal wards, but excluding Title 18 922(x) violators) and nonoffenders securely detained in any... court order provision or pursuant to title 18 U.S.C. section 922(x); (F) The total number of status...
Fiber-optic perimeter security system based on WDM technology
NASA Astrophysics Data System (ADS)
Polyakov, Alexandre V.
2017-10-01
Intelligent underground fiber optic perimeter security system is presented. Their structure, operation, software and hardware with neural networks elements are described. System allows not only to establish the fact of violation of the perimeter, but also to locate violations. This is achieved through the use of WDM-technology division spectral information channels. As used quasi-distributed optoelectronic recirculation system as a discrete sensor. The principle of operation is based on registration of the recirculation period change in the closed optoelectronic circuit at different wavelengths under microstrain exposed optical fiber. As a result microstrain fiber having additional power loss in a fiber optical propagating pulse, which causes a time delay as a result of switching moments of the threshold device. To separate the signals generated by intruder noise and interference, the signal analyzer is used, based on the principle of a neural network. The system detects walking, running or crawling intruder, as well as undermining attempts to register under the perimeter line. These alarm systems can be used to protect the perimeters of facilities such as airports, nuclear reactors, power plants, warehouses, and other extended territory.
Superfund: Funding for the Agency for Toxic Substances and Disease Registry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Neither the Environmental Protection Agency nor the Office of Management and Budget is violating the law by reviewing or revising the Agency for Toxic Substances and Disease Registry's budget request before the President submits it to Congress. The review also does not violate section III (n) of the superfund Amendments and Reauthorization Act of 1986 which secures minimum funding for ATSDR that can only be changed by Congress. However, GAO believes that this provision prohibits EPA from specifying how ATSDR should spend superfund money. It is therefore recommending that EPA not place any restrictions on the use of funds earmarkedmore » for ATSDR under section III(n) of SARA.« less
NASA Astrophysics Data System (ADS)
Yoshino, Ken-ichiro; Fujiwara, Mikio; Nakata, Kensuke; Sumiya, Tatsuya; Sasaki, Toshihiko; Takeoka, Masahiro; Sasaki, Masahide; Tajima, Akio; Koashi, Masato; Tomita, Akihisa
2018-03-01
Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power. Recently, GHz-clock decoy QKD systems have been realized by employing ultrafast optical communication devices. However, security loopholes of high-speed systems have not been fully explored yet. Here we point out a security loophole at the transmitter of the GHz-clock QKD, which is a common problem in high-speed QKD systems using practical band-width limited devices. We experimentally observe the inter-pulse intensity correlation and modulation pattern-dependent intensity deviation in a practical high-speed QKD system. Such correlation violates the assumption of most security theories. We also provide its countermeasure which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission. Our countermeasure is simple, effective and applicable to wide range of high-speed QKD systems, and thus paves the way to realize ultrafast and security-certified commercial QKD systems.
Chung, Ryoa
2017-03-01
In this article, I want to show that the securitization of health issues in the name of national interests led to the militarization of health care in the context of the war against terrorism. However, the connection between health and security also gave way to the emergence of the notion of human security, thus, converging with the human right to health approach and the cosmopolitan discourse on global health. These two perspectives on the relation between health and security lead to conflicting imperatives in the current state of counter-terrorism operations. I argue that when the securitization of health concerns in the name of national security conflicts with the provision of health care in the name of universal human rights, the higher moral end must trump the prudential one. Moreover, it is a duty to promote the human right to health when liberal democracies in foreign policies directly violate this moral ideal in the name of national security.
Applying your corporate compliance skills to the HIPAA security standard.
Carter, P I
2000-01-01
Compliance programs are an increasingly hot topic among healthcare providers. These programs establish policies and procedures covering billing, referrals, gifts, confidentiality of patient records, and many other areas. The purpose is to help providers prevent and detect violations of the law. These programs are voluntary, but are also simply good business practice. Any compliance program should now incorporate the Health Insurance Portability and Accountability Act (HIPAA) security standard. Several sets of guidelines for development of compliance programs have been issued by the federal government, and each is directed toward a different type of healthcare provider. These guidelines share certain key features with the HIPAA security standard. This article examines the common areas between compliance programs and the HIPAA security standard to help you to do two very important things: (1) Leverage your resources by combining compliance with the security standard with other legal and regulatory compliance efforts, and (2) apply the lessons learned in developing your corporate compliance program to developing strategies for compliance with the HIPAA security standard.
Federal securities law and the need to disclose the risk of canceling nuclear plant
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sponseller, D.
1984-11-08
Almost every electric utility company involved in nuclear plant construction has experienced difficulty as a result of the deteriorating condition of the nuclear industry as a whole. The thrust of a growing number of lawsuits brought against electric companies for alleged violations of federal securities laws is that the companies failed to reveal cost overruns, delays, and the risk of cancellation and write-off of nuclear plants in their annual reports and registration statements. A review of several suits and the disclosure requirements of securities statutes concludes that, although investors have known about utility problems, they have just become aware thismore » year that the entire financial viability of the electric companies is threatened.« less
Housing for the "Worst of the Worst" Inmates: Public Support for Supermax Prisons
ERIC Educational Resources Information Center
Mears, Daniel P.; Mancini, Christina; Beaver, Kevin M.; Gertz, Marc
2013-01-01
Despite concerns whether supermaximum security prisons violate human rights or prove effective, these facilities have proliferated in America over the past 25 years. This punishment--aimed at the "worst of the worst" inmates and involving 23-hr-per-day single-cell confinement with few privileges or services--has emerged despite little…
School Safety: Safer Schools with Different Kinds of Safety Personnel
ERIC Educational Resources Information Center
Herreras, Henry
2013-01-01
The purpose of this study was to investigate the difference between the total number of education code violations and the security personnel assigned by the school district. This study also proposed to examine factors such as socio-economic level of the district, the size of the district, and its location. Due to the increase in violence in…
ERIC Educational Resources Information Center
Yi, Qing; Zhang, Jinming; Chang, Hua-Hua
2006-01-01
Chang and Zhang (2002, 2003) proposed several baseline criteria for assessing the severity of possible test security violations for computerized tests with high-stakes outcomes. However, these criteria were obtained from theoretical derivations that assumed uniformly randomized item selection. The current study investigated potential damage caused…
10 CFR 824.11 - Rights of the person at the hearing.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Rights of the person at the hearing. 824.11 Section 824.11 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.11 Rights of the person at the hearing. The person may: (a) Testify or...
Strange Tales from the Trenches
ERIC Educational Resources Information Center
Ennis, Daniel; Flaten, Arne R.
2007-01-01
In this article, the authors share two stories about copyright violation and fraud: first, the story of a book whose author did not bother to secure permission to use many of the images it contained; and second, a candidate for a faculty position who was found to have created a fraudulent CV. Taken together, the authors say, these stories raise…
78 FR 61953 - Order Denying Export Privileges
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-08
..., Timothy Gormley (``Gormley''), was convicted of violating the International Emergency Economic Powers Act... Economic Powers Act (50 U.S.C. 1701-1706); 18 U.S.C. 793, 794 or 798; section 4(b) of the Internal Security... Emergency Economic Powers Act (50 U.S.C. 1701, et seq. (2006 & Supp. IV 2010)). I have received notice of...
10 CFR 824.11 - Rights of the person at the hearing.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Rights of the person at the hearing. 824.11 Section 824.11 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.11 Rights of the person at the hearing. The person may: (a) Testify or...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-29
... of Rule 19d-1(c)(1) of the Act \\3\\ requiring that a self- regulatory organization (``SRO'') promptly... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70927; File No. 4-669] Self-Regulatory Organizations; Topaz Exchange, LLC; Notice of Filing of Proposed Minor Rule Violation Plan November 22, 2013...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-13
... Rule 19d-1(c)(1) of the Act \\3\\ requiring that a self- regulatory organization (``SRO'') promptly file... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68170; File No. 4-655] Self-Regulatory Organizations; BOX Options Exchange LLC; Notice of Filing of Proposed Minor Rule Violation Plan November 6, 2012...
15 CFR 719.2 - Violations of the Act subject to administrative and criminal enforcement proceedings.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE... person may willfully fail or refuse to permit entry or inspection, or disrupt, delay or otherwise impede... willfully fail or refuse: (i) To establish or maintain any record required by the Act or the CWCR; or (ii...
19 CFR 162.75 - Seizures limited under section 592, Tariff Act of 1930, as amended.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Seizures limited under section 592, Tariff Act of... OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) INSPECTION, SEARCH, AND SEIZURE Special Procedures for Certain Violations § 162.75 Seizures limited under section 592, Tariff Act of 1930, as amended...
Code of Federal Regulations, 2011 CFR
2011-10-01
... under the influence of, or impaired by, alcohol or a controlled substance, and for traffic violations... social security account number, if a State collects such data. Access to NDR Data Essentially only... information to that being mandated by FRA. Furnishing additional information, such as the person's Social...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-16
... international cargo shipping; Respondent Njoroge Muhia is Chief Executive Officer for African Shipping... containers and chassis to Mombasa Kenya, violated Section 10(d)(1) of the Shipping Act, 46 U.S.C. 41102(c), by ``failing to ensure that Ms. Barbara[`s] (sic) container was delivered safely, securely and on...
Code of Federal Regulations, 2014 CFR
2014-01-01
... government agency or State housing finance agency must: (1) Comply with all applicable State law requirements... any provision of law for damages or other relief in connection with any alleged violation of any... U.S. Department of Housing and Urban Development to provide such counseling. (2) Definitions. For...
Experimental quantum cryptography with qutrits
NASA Astrophysics Data System (ADS)
Gröblacher, Simon; Jennewein, Thomas; Vaziri, Alipasha; Weihs, Gregor; Zeilinger, Anton
2006-05-01
We produce two identical keys using, for the first time, entangled trinary quantum systems (qutrits) for quantum key distribution. The advantage of qutrits over the normally used binary quantum systems is an increased coding density and a higher security margin. The qutrits are encoded into the orbital angular momentum of photons, namely Laguerre Gaussian modes with azimuthal index l + 1, 0 and -1, respectively. The orbital angular momentum is controlled with phase holograms. In an Ekert-type protocol the violation of a three-dimensional Bell inequality verifies the security of the generated keys. A key is obtained with a qutrit error rate of approximately 10%.
An approach to geotracking patients with Alzheimer's disease.
Yuce, Yilmaz Kemal; Gulkesen, Kemal Hakan; Barcin, Ebru Nur
2012-01-01
Recently, numerous systems for geo-tracking Alzheimer's patients with dementia have been developed and reported to be functional for the purposes of security and data collection. However, studies stated possible loss of freedom and autonomy for patients, along with violations of their privacy, which may lead to loss of prestige/dignity. In this study, a geotracking system that aims to balance patients' security and their need for privacy and autonomy is proposed. The system introduces a personalized, four-level temporal geofence based tracking, warning and notification protocol that incorporates a safety check mechanism operating over Global System for Mobile Communications network.
Takai-Igarashi, Takako; Kinoshita, Kengo; Nagasaki, Masao; Ogishima, Soichi; Nakamura, Naoki; Nagase, Sachiko; Nagaie, Satoshi; Saito, Tomo; Nagami, Fuji; Minegishi, Naoko; Suzuki, Yoichi; Suzuki, Kichiya; Hashizume, Hiroaki; Kuriyama, Shinichi; Hozawa, Atsushi; Yaegashi, Nobuo; Kure, Shigeo; Tamiya, Gen; Kawaguchi, Yoshio; Tanaka, Hiroshi; Yamamoto, Masayuki
2017-07-06
With the goal of realizing genome-based personalized healthcare, we have developed a biobank that integrates personal health, genome, and omics data along with biospecimens donated by volunteers of 150,000. Such a large-scale of data integration involves obvious risks of privacy violation. The research use of personal genome and health information is a topic of global discussion with regard to the protection of privacy while promoting scientific advancement. The present paper reports on our plans, current attempts, and accomplishments in addressing security problems involved in data sharing to ensure donor privacy while promoting scientific advancement. Biospecimens and data have been collected in prospective cohort studies with the comprehensive agreement. The sample size of 150,000 participants was required for multiple researches including genome-wide screening of gene by environment interactions, haplotype phasing, and parametric linkage analysis. We established the T ohoku M edical M egabank (TMM) data sharing policy: a privacy protection rule that requires physical, personnel, and technological safeguards against privacy violation regarding the use and sharing of data. The proposed policy refers to that of NCBI and that of the Sanger Institute. The proposed policy classifies shared data according to the strength of re-identification risks. Local committees organized by TMM evaluate re-identification risk and assign a security category to a dataset. Every dataset is stored in an assigned segment of a supercomputer in accordance with its security category. A security manager should be designated to handle all security problems at individual data use locations. The proposed policy requires closed networks and IP-VPN remote connections. The mission of the biobank is to distribute biological resources most productively. This mission motivated us to collect biospecimens and health data and simultaneously analyze genome/omics data in-house. The biobank also has the mission of improving the quality and quantity of the contents of the biobank. This motivated us to request users to share the results of their research as feedback to the biobank. The TMM data sharing policy has tackled every security problem originating with the missions. We believe our current implementation to be the best way to protect privacy in data sharing.
Shetty, Yashashri C; Saiyed, Aafreen A
2015-05-01
The US Food and Drug Administration (FDA) issues warning letters to all research stakeholders if unacceptable deficiencies are found during site visits. Warning letters issued by the FDA between January 2011 and December 2012 to clinical investigators and institutional review boards (IRBs) were reviewed for various violation themes and compared to similar studies in the past. Warning letters issued to sponsors between January 2005 and December 2012 were analysed for the first time for a specific set of violations using descriptive statistics. Failure to protect subject safety and to report adverse events to IRBs was found to be significant compared to prior studies for clinical investigators, while failure to follow standard operating procedures and maintain documentation was noted as significant in warning letters to IRBs. Failure to maintain minutes of meeting and to follow written procedures for continuing review were new substantial violations in warning letters issued to IRBs. Forty-six warning letters were issued to sponsors, the most common violations being failure to follow a monitoring schedule (58.69%), failure to obtain investigator agreement (34.78%), failure to secure investigators' compliance (30.43%), and failure to maintain data records and ship documents to investigators (30.43%). Appropriate methods for handling clinical trial procedural violations should be developed and implemented worldwide. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Multiple Object Based RFID System Using Security Level
NASA Astrophysics Data System (ADS)
Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha
2007-12-01
RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.
NASA Astrophysics Data System (ADS)
Jogenfors, Jonathan; Larsson, Jan-Åke
2017-08-01
In any Bell test, loopholes can cause issues in the interpretation of the results, since an apparent violation of the inequality may not correspond to a violation of local realism. An important example is the coincidence-time loophole that arises when detector settings might influence the time when detection will occur. This effect can be observed in many experiments where measurement outcomes are to be compared between remote stations because the interpretation of an ostensible Bell violation strongly depends on the method used to decide coincidence. The coincidence-time loophole has previously been studied for the Clauser-Horne-Shimony-Holt and Clauser-Horne inequalities, but recent experiments have shown the need for a generalization. Here, we study the generalized "chained" inequality by Pearle, Braunstein, and Caves (PBC) with N ≥2 settings per observer. This inequality has applications in, for instance, quantum key distribution where it has been used to reestablish security. In this paper we give the minimum coincidence probability for the PBC inequality for all N ≥2 and show that this bound is tight for a violation free of the fair-coincidence assumption. Thus, if an experiment has a coincidence probability exceeding the critical value derived here, the coincidence-time loophole is eliminated.
1995-10-06
Viatical Benefits, a viatical settlement company in Fort Lauderdale, FL, is reportedly under investigation by the Securities and Exchange Commission (SEC) for using high-pressure sales tactics to sell policies to investors. The SEC has declined comment, and Egbert Jaeger, the president of Viatical Benefits, has denied any investigation. This investigation follows a preliminary injunction filed by a Federal judge against Life Partners Inc. of Waco, TX, in August. The SEC claimed that Life Partners repackaged life insurance contracts as securities for investors, in violation of Federal securities laws. Viatical settlements enable persons with HIV to sell their life insurance policies at a discount, providing clients with sixty to eighty percent of the face value in cash to use for living expenses. Viatical settlement companies usually act as brokers in the sale of the policies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rice, Mark J.; Bonebrake, Christopher A.; Dayley, Greg K.
Inter-Control Center Communications Protocol (ICCP), defined by the IEC 60870-6 TASE.2 standard, was developed to enable data exchange over wide area networks between electric system entities, including utility control centers, Independent System Operators (ISOs), Regional Transmission Operators (RTOs) and Independent Power Producers (IPP) also known as Non-Utility Generators (NUG). ICCP is an unprotected protocol, and as a result is vulnerable to such actions as integrity violation, interception or alteration, spoofing, and eavesdropping. Because of these vulnerabilities with unprotected ICCP communication, security enhancements, referred to as Secure ICCP, have been added and are included in the ICCP products that utilities havemore » received since 2003 when the standard was defined. This has resulted in an ICCP product whose communication can be encrypted and authenticated to address these vulnerabilities.« less
14 CFR 13.29 - Civil penalties: Streamlined enforcement procedures for certain security violations.
Code of Federal Regulations, 2010 CFR
2010-01-01
...), and 13.16 (f) through (l) of this chapter are used, as well as paragraphs (a) through (d) of this... shall be issued in that amount; or (2) Submit to the agency attorney identified in the material...) Unless a petition for review is filed with a U.S. Court of Appeals in a timely manner, a final decision...
Follow-up evaluation of fire hazard inspection procedures...Butte County, California
William S. Folkman
1968-01-01
A study made in 1966 in Butte County, Calif., to assess the effectiveness of fire hazard inspection procedures was repeated in 1967. Purpose of the inspections is to secure compliance with fire safety requirements. The observed drop in number of violations suggests a carryover effect in 1967 from the first study. In many cases, personal contact was still necessary to...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Filing and service of papers other... Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS ENFORCEMENT § 785.6 Filing and service of papers other than the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-20
... provisions of Rule 19d-1(c)(1) of the Act \\4\\ requiring that a self-regulatory organization promptly file... Commission adopted amendments to paragraph (c) of Rule 19d-1 to allow self-regulatory organizations (``SROs... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63113; File No. 4-616] Self-Regulatory...
Security Engineering FY17 Systems Aware Cybersecurity
2017-12-07
11 Figure 4 A hierarchical controls model that defines the expected service of a UAV. Each level is...defined by a generic control structure. Inadequate control in each level can cause an adversarial action to degrade the expected service and produce a...and can completely violate the systems expected service by escalating their privileges by either using the attack vectors presented individually or
AFCOMS (Air Force Commissary Service): Does this SOA Need an Executive Development Program?
1985-03-01
ll)NALHuKAU U STADARS 19,l liii I0 AAfR WAR COLLG RESEARCH REPORT LZ? e lNo. AU-AWC-35-011 - N4 AFCOMS: DOES THIS SQA NEED AN EXECUTIVE cm...high incidence of safety and physical security violations. Serious deficiencies existed in the financial management area. Accounting errors were not
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-19
... DEPARTMENT OF COMMERCE Bureau of Industry and Security In the Matter of: Andrew Vincent O'Donnell, Inmate Number--62355- 019, USP Atlanta, U.S. Penitentiary, P.O. Box 15060, Atlanta, GA 30315; Order..., Andrew Vincent O'Donnell (``O'Donnell''), was convicted of violating Section 38 of the Arms Export...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... DEPARTMENT OF COMMERCE Bureau of Industry and Security In the Matter of: Dan Tran Dang, 1010 W.... District Court, Central District of California, Dan Tran Dang (``Dang'') was convicted of violating Section... interest at the time of his conviction. Accordingly, it is hereby ordered: I. Until April 17, 2022, Dan...
Yue, Xiao; Wang, Huiju; Jin, Dawei; Li, Mingqiang; Jiang, Wei
2016-10-01
Healthcare data are a valuable source of healthcare intelligence. Sharing of healthcare data is one essential step to make healthcare system smarter and improve the quality of healthcare service. Healthcare data, one personal asset of patient, should be owned and controlled by patient, instead of being scattered in different healthcare systems, which prevents data sharing and puts patient privacy at risks. Blockchain is demonstrated in the financial field that trusted, auditable computing is possible using a decentralized network of peers accompanied by a public ledger. In this paper, we proposed an App (called Healthcare Data Gateway (HGD)) architecture based on blockchain to enable patient to own, control and share their own data easily and securely without violating privacy, which provides a new potential way to improve the intelligence of healthcare systems while keeping patient data private. Our proposed purpose-centric access model ensures patient own and control their healthcare data; simple unified Indicator-Centric Schema (ICS) makes it possible to organize all kinds of personal healthcare data practically and easily. We also point out that MPC (Secure Multi-Party Computing) is one promising solution to enable untrusted third-party to conduct computation over patient data without violating privacy.
NASA Astrophysics Data System (ADS)
Abdenov, A. Zh; Trushin, V. A.; Abdenova, G. A.
2018-01-01
The paper considers the questions of filling the relevant SIEM nodes based on calculations of objective assessments in order to improve the reliability of subjective expert assessments. The proposed methodology is necessary for the most accurate security risk assessment of information systems. This technique is also intended for the purpose of establishing real-time operational information protection in the enterprise information systems. Risk calculations are based on objective estimates of the adverse events implementation probabilities, predictions of the damage magnitude from information security violations. Calculations of objective assessments are necessary to increase the reliability of the proposed expert assessments.
Secure TRNG with random phase stimulation
NASA Astrophysics Data System (ADS)
Wieczorek, Piotr Z.
2017-08-01
In this paper a novel TRNG concept is proposed which is a vital part of cryptographic systems. The proposed TRNG involves phase variability of a pair of ring oscillators (ROs) to force the multiple metastable events in a flip-flop (FF). In the solution, the ROs are periodically activated to ensure the violation of the FF timing and resultant state randomness, while the TRNG circuit adapts the structure of ROs to obtain the maximum entropy and circuit security. The TRNG can be implemented in inexpensive re-programmable devices (CPLDs or FPGAs) without the use of Digital Clock Managers (DCMs). Preliminary test results proved the circuit's immunity to the intentional frequency injection attacks.
UNIX security in a supercomputing environment
NASA Technical Reports Server (NTRS)
Bishop, Matt
1989-01-01
The author critiques some security mechanisms in most versions of the Unix operating system and suggests more effective tools that either have working prototypes or have been implemented, for example in secure Unix systems. Although no computer (not even a secure one) is impenetrable, breaking into systems with these alternate mechanisms will cost more, require more skill, and be more easily detected than penetrations of systems without these mechanisms. The mechanisms described fall into four classes (with considerable overlap). User authentication at the local host affirms the identity of the person using the computer. The principle of least privilege dictates that properly authenticated users should have rights precisely sufficient to perform their tasks, and system administration functions should be compartmentalized; to this end, access control lists or capabilities should either replace or augment the default Unix protection system, and mandatory access controls implementing multilevel security models and integrity mechanisms should be available. Since most users access supercomputing environments using networks, the third class of mechanisms augments authentication (where feasible). As no security is perfect, the fourth class of mechanism logs events that may indicate possible security violations; this will allow the reconstruction of a successful penetration (if discovered), or possibly the detection of an attempted penetration.
Protection of nurses rights in Turkey: A study on nurses' opinions.
Bahcecik, Nefise; Ozturk, Havva; Tiryaki, Hanife
2016-09-01
To evaluate nurses' opinions on the violation and protection of their rights at public hospitals. The descriptive study was conducted between May and November 2013 at 11 hospitals affiliated with the Association of Public Hospitals in Istanbul, Turkey. Data was gathered using a questionnaire consisting of 59 questions on demographic characteristics, professions, and rights of nurses. Of the 1,808 respondents, 1,374(76%) said nurse's rights were not protected and 994(55%) believed that their rights were not protected at public hospitals. However, 1,027(56.8%) of the nurses stated that their right to job security was protected, while 1,448(80.1%) reported violation of their right to adequate pay and 1,289(71.3%) reported violation or non-recognition of the right to participate in the political decision-making processes that directly affect the nursing profession. Those who were middle-aged and those who had bachelor's degree believed their rights were not protected, and considered nursing as a weak profession that was unable to protect its rights (p<0.001). Nurses believed their rights, especially those about salary, were not sufficiently protected.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-11
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Yufeng Wei, a/k/a Annie Wei, 165 Beech... Court, District of Massachusetts, Yufeng Wei, a/k/a Annie Wei (``Wei'') was convicted of violating the.... Until January 28, 2021, Yufeng Wei, a/k/a Annie Wei, with a last known address at: 165 Beech Street...
Code of Federal Regulations, 2010 CFR
2010-04-01
... section if such person shows that: (1) The individual(s) making the investment decision on behalf of such... individual(s) making investment decision(s) would not violate paragraph (a) of this section, which policies... on behalf of the offering person or such issuer, to purchase or sell or cause to be purchased or sold...
Practical device-independent quantum cryptography via entropy accumulation.
Arnon-Friedman, Rotem; Dupuis, Frédéric; Fawzi, Omar; Renner, Renato; Vidick, Thomas
2018-01-31
Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed "entropy accumulation", which asserts that the total amount of entropy of a large system is the sum of its parts. We use this property to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Recent experimental progress, which enabled loophole-free Bell tests, suggests that the achieved parameters are technologically accessible. Our work hence provides the theoretical groundwork for experimental demonstrations of device-independent cryptography.
Traffic violations in Guangdong Province of China: speeding and drunk driving.
Zhang, Guangnan; Yau, Kelvin K W; Gong, Xiangpu
2014-03-01
The number of speeding- and drunk driving-related injuries in China surged in the years immediately preceding 2004 and then began to decline. However, the percent decrease in the number of speeding and drunk driving incidents (decrease by 22%) is not proportional to the corresponding percent decrease in number of automobile accident-related injuries (decrease by 47%) from the year 2004 to 2010 (Traffic Management Bureau, Ministry of Public Security, Annual Statistical Reports on Road Traffic Accidents). Earlier studies have established traffic violations as one of the major risks threatening road safety. In this study, we examine in greater detail two important types of traffic violation events, speeding and drunk driving, and attempt to identify significant risk factors associated with these types of traffic violations. Risk factors in several different dimensions, including driver, vehicle, road and environmental factors, are considered. We analyze the speeding (N=11,055) and drunk driving (N=10,035) data for the period 2006-2010 in Guangdong Province, China. These data, obtained from the Guangdong Provincial Security Department, are extracted from the Traffic Management Sector-Specific Incident Case Data Report and are the only comprehensive and official source of traffic accident data in China. Significant risk factors associating with speeding and drunk driving are identified. We find that several factors are associated with a significantly higher probability of both speeding and drunk driving, particularly male drivers, private vehicles, the lack of street lighting at night and poor visibility. The impact of other specific and unique risk factors for either speeding or drunk driving, such as hukou, road type/grades, commercial vehicles, compulsory third party insurance and vehicle safety status, also require particular attention. Legislative or regulatory measures targeting different vehicle types and/or driver groups with respect to the various driver, vehicle, road and environmental risk factors can subsequently be devised to reduce the speeding and drunk driving rates. As the country with the highest number of traffic accident fatalities in the world, applying these findings in workable legislation and enforcement to reduce speeding and drunk driving rates will save tens of thousands of lives. Copyright © 2013 Elsevier Ltd. All rights reserved.
Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage
Gui, Xiaolin; An, Jian; Zhao, Jianqiang; Zhang, Xuejun
2014-01-01
As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. But sufficient security analysis for standard Hilbert curve (SHC) is seldom proceeded. In this paper, we propose an index modification method for SHC (SHC∗) and a density-based space filling curve (DSC) to improve the security of SHC; they can partially violate the distance-preserving property of SHC, so as to achieve better security. We formally define the indistinguishability and attack model for measuring the privacy disclosure risk of spatial transformation methods. The evaluation results indicate that SHC∗ and DSC are more secure than SHC, and DSC achieves the best index generation performance. PMID:25097865
NASA Astrophysics Data System (ADS)
Bovino, Fabio Antonio; Messina, Angelo
2016-10-01
In a very simplistic way, the Command and Control functions can be summarized as the need to provide the decision makers with an exhaustive, real-time, situation picture and the capability to convey their decisions down to the operational forces. This two-ways data and information flow is vital to the execution of current operations and goes far beyond the border of military operations stretching to Police and disaster recovery as well. The availability of off-the shelf technology has enabled hostile elements to endanger the security of the communication networks by violating the traditional security protocols and devices and hacking sensitive databases. In this paper an innovative approach based to implementing Device Independent Quantum Key Distribution system is presented. The use of this technology would prevent security breaches due to a stolen crypto device placed in an end-to-end communication chain. The system, operating with attenuated laser, is practical and provides the increasing of the distance between the legitimate users.
Protecting location privacy for outsourced spatial data in cloud storage.
Tian, Feng; Gui, Xiaolin; An, Jian; Yang, Pan; Zhao, Jianqiang; Zhang, Xuejun
2014-01-01
As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. But sufficient security analysis for standard Hilbert curve (SHC) is seldom proceeded. In this paper, we propose an index modification method for SHC (SHC(∗)) and a density-based space filling curve (DSC) to improve the security of SHC; they can partially violate the distance-preserving property of SHC, so as to achieve better security. We formally define the indistinguishability and attack model for measuring the privacy disclosure risk of spatial transformation methods. The evaluation results indicate that SHC(∗) and DSC are more secure than SHC, and DSC achieves the best index generation performance.
Evaluating the risk of industrial espionage
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bott, T.F.
1998-12-31
A methodology for estimating the relative probabilities of different compromise paths for protected information by insider and visitor intelligence collectors has been developed based on an event-tree analysis of the intelligence collection operation. The analyst identifies target information and ultimate users who might attempt to gain that information. The analyst then uses an event tree to develop a set of compromise paths. Probability models are developed for each of the compromise paths that user parameters based on expert judgment or historical data on security violations. The resulting probability estimates indicate the relative likelihood of different compromise paths and provide anmore » input for security resource allocation. Application of the methodology is demonstrated using a national security example. A set of compromise paths and probability models specifically addressing this example espionage problem are developed. The probability models for hard-copy information compromise paths are quantified as an illustration of the results using parametric values representative of historical data available in secure facilities, supplemented where necessary by expert judgment.« less
Experimental temporal quantum steering
Bartkiewicz, Karol; Černoch, Antonín; Lemr, Karel; Miranowicz, Adam; Nori, Franco
2016-01-01
Temporal steering is a form of temporal correlation between the initial and final state of a quantum system. It is a temporal analogue of the famous Einstein-Podolsky-Rosen (spatial) steering. We demonstrate, by measuring the photon polarization, that temporal steering allows two parties to verify if they have been interacting with the same particle, even if they have no information about what happened with the particle in between the measurements. This is the first experimental study of temporal steering. We also performed experimental tests, based on the violation of temporal steering inequalities, of the security of two quantum key distribution protocols against individual attacks. Thus, these results can lead to applications for secure quantum communications and quantum engineering. PMID:27901121
Air Force Journal of Logistics. Volume 34, Numbers 3 and 4, 2011
2011-01-01
best value. Since these scores are mathematically derived, they violate some agencies* procurement policies (those that require qualitative ratings...the trust fund assets will be exhausted and Social Security will lack the resources to pay all promised benefits. According to SSA actuaries ...education programs (masters degrees) than either the Air Force or the Army. This was quite surprising. Mathematical Model to Determine Senior Officers
Latin American Regional Cooperative Security: Civil-Military Relations and Economic Interdependence
2002-09-01
continuing economic crisis and hyperinflation. His successor, President Carlos Menem , constructed a foreign policy aimed at “projecting the image of...construct an intermediate-range guided missile (Escdé and Fontana, 51). However, under the Menem presidency, Argentina shifted to a U.S.-friendly...President Carlos Menem took office. He saw an opportunity to capitalize on the military’s vulnerability from convictions for human rights violations
Prediction-error in the context of real social relationships modulates reward system activity.
Poore, Joshua C; Pfeifer, Jennifer H; Berkman, Elliot T; Inagaki, Tristen K; Welborn, Benjamin L; Lieberman, Matthew D
2012-01-01
The human reward system is sensitive to both social (e.g., validation) and non-social rewards (e.g., money) and is likely integral for relationship development and reputation building. However, data is sparse on the question of whether implicit social reward processing meaningfully contributes to explicit social representations such as trust and attachment security in pre-existing relationships. This event-related fMRI experiment examined reward system prediction-error activity in response to a potent social reward-social validation-and this activity's relation to both attachment security and trust in the context of real romantic relationships. During the experiment, participants' expectations for their romantic partners' positive regard of them were confirmed (validated) or violated, in either positive or negative directions. Primary analyses were conducted using predefined regions of interest, the locations of which were taken from previously published research. Results indicate that activity for mid-brain and striatal reward system regions of interest was modulated by social reward expectation violation in ways consistent with prior research on reward prediction-error. Additionally, activity in the striatum during viewing of disconfirmatory information was associated with both increases in post-scan reports of attachment anxiety and decreases in post-scan trust, a finding that follows directly from representational models of attachment and trust.
Efficient Secure and Privacy-Preserving Route Reporting Scheme for VANETs
NASA Astrophysics Data System (ADS)
Zhang, Yuanfei; Pei, Qianwen; Dai, Feifei; Zhang, Lei
2017-10-01
Vehicular ad-hoc network (VANET) is a core component of intelligent traffic management system which could provide various of applications such as accident prediction, route reporting, etc. Due to the problems caused by traffic congestion, route reporting becomes a prospective application which can help a driver to get optimal route to save her travel time. Before enjoying the convenience of route reporting, security and privacy-preserving issues need to be concerned. In this paper, we propose a new secure and privacy-preserving route reporting scheme for VANETs. In our scheme, only an authenticated vehicle can use the route reporting service provided by the traffic management center. Further, a vehicle may receive the response from the traffic management center with low latency and without violating the privacy of the vehicle. Experiment results show that our scheme is much more efficiency than the existing one.
Israel: Background and Relations With the United States
2006-08-31
million to secure the deal. In May 2006, prominent U.S. investor Warren Buffet announced that he was buying 80% of Iscar, a major Israeli metalworks, for...President Bush noted the need to take into account changed “realities on the ground, including already existing major Israeli population centers” (i.e...made cluster bombs violated agreements that restrict use of the weapons to military targets. Other Current Issues Military Sales. Israel accounts for
Rep. McCaul, Michael T. [R-TX-10
2012-06-21
House - 07/11/2012 Referred to the Subcommittee on Intellectual Property, Competition and the Internet. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
JPRS Report, China, Provincial Government Work Reports.
1992-06-19
with the law , and be determined to curb the rising momentum of ferocious criminal cases. We must control various social trends in good time...public security took a favorable turn. A number of cases involving violation of discipline and law were cracked and dealt with, and new results... law , be conscious in abiding by state laws and regulations, and subject themselves to the supervision of the people’s congresses and their standing
Repair Works for Uplift and Seepage Control in Existing Concrete Dams
1989-08-01
used ,-Z.I eFauted SECUR!TY CASSi CATON O -- _AC: A!I other eCltOln are OOsnIte 19.ABSTRACT (continued) reqards the geotechnical properties of the...the safety requirements for the works, and imply important losses of human lives and property ; and incidents are associated with violations of the...and operation of the reservoir and environment conditions) and with structural properties (geometrical, mechanical, hydraulic, thermal, etc.). For the
Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions
NASA Astrophysics Data System (ADS)
Gupta, Ankur; Awasthi, Lalit K.
Peer-to-Peer networks have been widely used for sharing millions of terabytes of content, for large-scale distributed computing and for a variety of other novel applications, due to their scalability and fault-tolerance. However, the scope of P2P networks has somehow been limited to individual computers connected to the internet. P2P networks are also notorious for blatant copyright violations and facilitating several kinds of security attacks. Businesses and large organizations have thus stayed away from deploying P2P applications citing security loopholes in P2P systems as the biggest reason for non-adoption. In theory P2P applications can help fulfill many organizational requirements such as collaboration and joint projects with other organizations, access to specialized computing infrastructure and finally accessing the specialized information/content and expert human knowledge available at other organizations. These potentially beneficial interactions necessitate that the research community attempt to alleviate the security shortcomings in P2P systems and ensure their acceptance and wide deployment. This research paper therefore examines the security issues prevalent in enabling cross-organizational P2P interactions and provides some technical insights into how some of these issues can be resolved.
Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming
2015-11-30
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.
IT Security Support for the Spaceport Command Control System Development
NASA Technical Reports Server (NTRS)
Varise, Brian
2014-01-01
My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.
Barrett, Jason R; French, P Edward
2013-01-01
The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.
Collmann, Jeff; Cooper, Ted
2007-01-01
This case study describes and analyzes a breach of the confidentiality and integrity of personally identified health information (e.g. appointment details, answers to patients' questions, medical advice) for over 800 Kaiser Permanente (KP) members through KP Online, a web-enabled health care portal. The authors obtained and analyzed multiple types of qualitative data about this incident including interviews with KP staff, incident reports, root cause analyses, and media reports. Reasons at multiple levels account for the breach, including the architecture of the information system, the motivations of individual staff members, and differences among the subcultures of individual groups within as well as technical and social relations across the Kaiser IT program. None of these reasons could be classified, strictly speaking, as "security violations." This case study, thus, suggests that, to protect sensitive patient information, health care organizations should build safe organizational contexts for complex health information systems in addition to complying with good information security practice and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) of 1996.
2008-12-01
ICE Office of Investigations uses its legal authority to investigate issues such as immigration crime , human rights violations, and human smuggling...communities. Crimes committed by foreign nationals — many exploited by terrorists — pose ideological, legal and resource challenges to state and local...umbrella of the Special Agent In Charge (SAC) in Denver , Colorado . Utah ICE OI falls under the supervisory umbrella of the Assistant Special Agent In
A Secure and Privacy-Preserving Targeted Ad-System
NASA Astrophysics Data System (ADS)
Androulaki, Elli; Bellovin, Steven M.
Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.
A Transferrable Belief Model Representation for Physical Security of Nuclear Materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
David Gerts
This work analyzed various probabilistic methods such as classic statistics, Bayesian inference, possibilistic theory, and Dempster-Shafer theory of belief functions for the potential insight offered into the physical security of nuclear materials as well as more broad application to nuclear non-proliferation automated decision making theory. A review of the fundamental heuristic and basic limitations of each of these methods suggested that the Dempster-Shafer theory of belief functions may offer significant capability. Further examination of the various interpretations of Dempster-Shafer theory, such as random set, generalized Bayesian, and upper/lower probability demonstrate some limitations. Compared to the other heuristics, the transferrable beliefmore » model (TBM), one of the leading interpretations of Dempster-Shafer theory, can improve the automated detection of the violation of physical security using sensors and human judgment. The improvement is shown to give a significant heuristic advantage over other probabilistic options by demonstrating significant successes for several classic gedanken experiments.« less
1994-09-01
Pipeline stock is calculated by forecasting the projected requirements due to transportation time and counting out the amount of stock needed to cover...the "lead time" delay. Time needed for the transportation of an order is referred to as the lead time. "Lead time is the amount of time between the...Defenae Logistica Agency The Defense Logistics Agency (DLA) is an agency of the Department of Defense. "The National Security Act (NSA) established
The Magic Background of Pearl Harbor. Volume 3 (August 5, 1941 - October 17, 1941)
1977-01-01
174. Change Predicted in Japanese-American Relations hhu__nn _uu_u uu__h_nn_u_uu- 175. Washington Warns Tokyo of Security Violation 177. Japa...u u u u n 251. Consul Nihro Reports Trend Toward Philippine Independence 252. Filipinos Predict Japanese Occupation of Thailand u u u- u u u _n- u u...expansionist program but when. If the United States were to lose the present opportunity to Japan’s reactions to any circumstances could not be predicted
Information Assurance and Forensic Readiness
NASA Astrophysics Data System (ADS)
Pangalos, Georgios; Katos, Vasilios
Egalitarianism and justice are amongst the core attributes of a democratic regime and should be also secured in an e-democratic setting. As such, the rise of computer related offenses pose a threat to the fundamental aspects of e-democracy and e-governance. Digital forensics are a key component for protecting and enabling the underlying (e-)democratic values and therefore forensic readiness should be considered in an e-democratic setting. This position paper commences from the observation that the density of compliance and potential litigation activities is monotonically increasing in modern organizations, as rules, legislative regulations and policies are being constantly added to the corporate environment. Forensic practices seem to be departing from the niche of law enforcement and are becoming a business function and infrastructural component, posing new challenges to the security professionals. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, we advocate that computer forensics need to be applied to all investigatory, monitoring and auditing activities. This would result into an inflation of the responsibilities of the Information Security Officer. After exploring some commonalities and differences between IS audit and computer forensics, we present a list of strategic challenges the organization and, in effect, the IS security and audit practitioner will face.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heberlein, L.T.; Dias, G.V.; Levitt, K.N.
1989-11-01
The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, ourmore » work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.« less
Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming
2015-01-01
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost. PMID:26633396
Analysis of health professional security behaviors in a real clinical setting: an empirical study.
Fernández-Alemán, José Luis; Sánchez-Henarejos, Ana; Toval, Ambrosio; Sánchez-García, Ana Belén; Hernández-Hernández, Isabel; Fernandez-Luque, Luis
2015-06-01
The objective of this paper is to evaluate the security behavior of healthcare professionals in a real clinical setting. Standards, guidelines and recommendations on security and privacy best practices for staff personnel were identified using a systematic literature review. After a revision process, a questionnaire consisting of 27 questions was created and responded to by 180 health professionals from a public hospital. Weak passwords were reported by 62.2% of the respondents, 31.7% were unaware of the organization's procedures for discarding confidential information, and 19.4% did not carry out these procedures. Half of the respondents (51.7%) did not take measures to ensure that the personal health information on the computer monitor could not be seen by unauthorized individuals, and 57.8% were unaware of the procedure established to report a security violation. The correlation between the number of years in the position and good security practices was not significant (Pearson's r=0.085, P=0.254). Age was weakly correlated with good security practices (Pearson's r=-0.169, P=0.028). A Mann-Whitney test showed no significant difference between the respondents' security behavior as regards gender (U=2536, P=0.792, n=178). The results of the study suggest that more efforts are required to improve security education for health personnel. It was found that both preventive and corrective actions are needed to prevent health staff from causing security incidents. Healthcare organizations should: identify the types of information that require protection, clearly communicate the penalties that will be imposed, promote security training courses, and define what the organization considers improper behavior to be and communicate this to all personnel. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Framework for behavioral analytics in anomaly identification
NASA Astrophysics Data System (ADS)
Touma, Maroun; Bertino, Elisa; Rivera, Brian; Verma, Dinesh; Calo, Seraphin
2017-05-01
Behavioral Analytics (BA) relies on digital breadcrumbs to build user profiles and create clusters of entities that exhibit a large degree of similarity. The prevailing assumption is that an entity will assimilate the group behavior of the cluster it belongs to. Our understanding of BA and its application in different domains continues to evolve and is a direct result of the growing interest in Machine Learning research. When trying to detect security threats, we use BA techniques to identify anomalies, defined in this paper as deviation from the group behavior. Early research papers in this field reveal a high number of false positives where a security alert is triggered based on deviation from the cluster learned behavior but still within the norm of what the system defines as an acceptable behavior. Further, domain specific security policies tend to be narrow and inadequately represent what an entity can do. Hence, they: a) limit the amount of useful data during the learning phase; and, b) lead to violation of policy during the execution phase. In this paper, we propose a framework for future research on the role of policies and behavior security in a coalition setting with emphasis on anomaly detection and individual's deviation from group activities.
Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram
2015-11-01
Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian
2015-06-01
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.
Device-independent randomness generation from several Bell estimators
NASA Astrophysics Data System (ADS)
Nieto-Silleras, Olmo; Bamps, Cédric; Silman, Jonathan; Pironio, Stefano
2018-02-01
Device-independent randomness generation and quantum key distribution protocols rely on a fundamental relation between the non-locality of quantum theory and its random character. This relation is usually expressed in terms of a trade-off between the probability of guessing correctly the outcomes of measurements performed on quantum systems and the amount of violation of a given Bell inequality. However, a more accurate assessment of the randomness produced in Bell experiments can be obtained if the value of several Bell expressions is simultaneously taken into account, or if the full set of probabilities characterizing the behavior of the device is considered. We introduce protocols for device-independent randomness generation secure against classical side information, that rely on the estimation of an arbitrary number of Bell expressions or even directly on the experimental frequencies of measurement outcomes. Asymptotically, this results in an optimal generation of randomness from experimental data (as measured by the min-entropy), without having to assume beforehand that the devices violate a specific Bell inequality.
Smart Grid Constraint Violation Management for Balancing and Regulating Purposes
Bhattarai, Bishnu; Kouzelis, Konstantinos; Mendaza, Iker; ...
2017-03-29
The gradual active load penetration in low voltage distribution grids is expected to challenge their network capacity in the near future. Distribution system operators should for this reason resort to either costly grid reinforcements or to demand side management mechanisms. Since demand side management implementation is usually cheaper, it is also the favorable solution. To this end, this article presents a framework for handling grid limit violations, both voltage and current, to ensure a secure and qualitative operation of the distribution grid. This framework consists of two steps, namely a proactive centralized and subsequently a reactive decentralized control scheme. Themore » former is employed to balance the one hour ahead load while the latter aims at regulating the consumption in real-time. In both cases, the importance of fair use of electricity demand flexibility is emphasized. Thus, it is demonstrated that this methodology aids in keeping the grid status within preset limits while utilizing flexibility from all flexibility participants.« less
McGann v. H & H Music Company.
1991-11-04
The U.S. Court of Appeals affirmed a U.S. District Court holding that the plaintiff-employee was not discriminated against under the Employee Retirement Income Security Act (ERISA) when his employer became self-insured and reduced the maximum lifetime medical benefits for employees with AIDS from $1,000,000 to $5,000. ERISA does not mandate that employers provide any particular benefits. ERISA is violated, however, when an employee is discriminated against for exercising any right to which he/she is entitled or when there is interference with the attainment of any right to which an employee may become entitled. The court held that there was no ERISA violation because the reduction in coverage affected all current and future employees with AIDS and was not directed against the plaintiff in particular, and because there was no evidence that the reduction was done for any reason other than reducing plan cost. Additionally, the continued coverage was not a right the plaintiff was entitled to because the defendant company never promised indefinite million dollar coverage.
A novel key management solution for reinforcing compliance with HIPAA privacy/security regulations.
Lee, Chien-Ding; Ho, Kevin I-J; Lee, Wei-Bin
2011-07-01
Digitizing medical records facilitates the healthcare process. However, it can also cause serious security and privacy problems, which are the major concern in the Health Insurance Portability and Accountability Act (HIPAA). While various conventional encryption mechanisms can solve some aspects of these problems, they cannot address the illegal distribution of decrypted medical images, which violates the regulations defined in the HIPAA. To protect decrypted medical images from being illegally distributed by an authorized staff member, the model proposed in this paper provides a way to integrate several cryptographic mechanisms. In this model, the malicious staff member can be tracked by a watermarked clue. By combining several well-designed cryptographic mechanisms and developing a key management scheme to facilitate the interoperation among these mechanisms, the risk of illegal distribution can be reduced.
Mullany, Luke C; Lee, Catherine I; Yone, Lin; Paw, Palae; Oo, Eh Kalu Shwe; Maung, Cynthia; Lee, Thomas J; Beyrer, Chris
2008-12-23
Health indicators are poor and human rights violations are widespread in eastern Burma. Reproductive and maternal health indicators have not been measured in this setting but are necessary as part of an evaluation of a multi-ethnic pilot project exploring strategies to increase access to essential maternal health interventions. The goal of this study is to estimate coverage of maternal health services prior to this project and associations between exposure to human rights violations and access to such services. Selected communities in the Shan, Mon, Karen, and Karenni regions of eastern Burma that were accessible to community-based organizations operating from Thailand were surveyed to estimate coverage of reproductive, maternal, and family planning services, and to assess exposure to household-level human rights violations within the pilot-project target population. Two-stage cluster sampling surveys among ever-married women of reproductive age (15-45 y) documented access to essential antenatal care interventions, skilled attendance at birth, postnatal care, and family planning services. Mid-upper arm circumference, hemoglobin by color scale, and Plasmodium falciparum parasitemia by rapid diagnostic dipstick were measured. Exposure to human rights violations in the prior 12 mo was recorded. Between September 2006 and January 2007, 2,914 surveys were conducted. Eighty-eight percent of women reported a home delivery for their last pregnancy (within previous 5 y). Skilled attendance at birth (5.1%), any (39.3%) or > or = 4 (16.7%) antenatal visits, use of an insecticide-treated bed net (21.6%), and receipt of iron supplements (11.8%) were low. At the time of the survey, more than 60% of women had hemoglobin level estimates < or = 11.0 g/dl and 7.2% were Pf positive. Unmet need for contraceptives exceeded 60%. Violations of rights were widely reported: 32.1% of Karenni households reported forced labor and 10% of Karen households had been forced to move. Among Karen households, odds of anemia were 1.51 (95% confidence interval [CI] 0.95-2.40) times higher among women reporting forced displacement, and 7.47 (95% CI 2.21-25.3) higher among those exposed to food security violations. The odds of receiving no antenatal care services were 5.94 (95% CI 2.23-15.8) times higher among those forcibly displaced. Coverage of basic maternal health interventions is woefully inadequate in these selected populations and substantially lower than even the national estimates for Burma, among the lowest in the region. Considerable political, financial, and human resources are necessary to improve access to maternal health care in these communities.
Responding to chemical weapons violations in Syria: legal, health, and humanitarian recommendations.
Brooks, Julia; Erickson, Timothy B; Kayden, Stephanie; Ruiz, Raul; Wilkinson, Stephen; Burkle, Frederick M
2018-01-01
The repeated use of prohibited chemical weapons in the Syrian conflict poses serious health, humanitarian, and security threats to civilians, healthcare personnel, and first responders. Moreover, the use of chemical weapons constitutes a clear and egregious violation of international law-likely amounting to a war crime-for which continued impunity is setting a dangerous precedent in relation to current and future conflicts. This debate article calls upon concerned states, organizations, and individuals to respond urgently and unequivocally to this serious breach of international legal and humanitarian norms. Based on health, humanitarian, and legal findings, this article calls for concrete action to: 1) reduce the risk of chemical weapons being used in current and future conflicts; 2) review and support the preparedness equipment and antidote supplies of first responders, humanitarian organizations, and military forces operating in Syria; 3) support international mechanisms for monitoring and enforcing the prohibition on chemical weapons, including through criminal accountability; 4) support civilian victims of chemical weapons attacks, including refugees; and 5) re-commit to the complete elimination of chemical weapons in compliance with the Chemical Weapons Convention (1993), a comprehensive treaty that bans chemical weapons and requires their complete destruction. All involved states and organizations should take urgent steps to ensure the protection of the most vulnerable victims of conflict, including victims of chemical weapons attacks in Syria, and to reinforce international law in the face of such serious violations.
Analyzing fault and severity in pedestrian-motor vehicle accidents in China.
Zhang, Guangnan; Yau, Kelvin K W; Zhang, Xun
2014-12-01
The number of pedestrian-motor vehicle accidents and pedestrian deaths in China surged in recent years. However, a large scale empirical research on pedestrian traffic crashes in China is lacking. In this study, we identify significant risk factors associated with fault and severity in pedestrian-motor vehicle accidents. Risk factors in several different dimensions, including pedestrian, driver, vehicle, road and environmental factors, are considered. We analyze 6967 pedestrian traffic accident reports for the period 2006-2010 in Guangdong Province, China. These data, obtained from the Guangdong Provincial Security Department, are extracted from the Traffic Management Sector-Specific Incident Case Data Report. Pedestrian traffic crashes have a unique inevitability and particular high risk, due to pedestrians' fragility, slow movement and lack of lighting equipment. The empirical analysis of the present study has the following policy implications. First, traffic crashes in which pedestrians are at fault are more likely to cause serious injuries or death, suggesting that relevant agencies should pay attention to measures that prevent pedestrians from violating traffic rules. Second, both the attention to elderly pedestrians, male and experienced drivers, the penalty to drunk driving, speeding, driving without a driver's license and other violation behaviors should be strengthened. Third, vehicle safety inspections and safety training sessions for truck drivers should be reinforced. Fourth, improving the road conditions and road lighting at night are important measures in reducing the probability of accident casualties. Fifth, specific road safety campaigns in rural areas, and education programs especially for young children and teens should be developed and promoted. Moreover, we reveal a country-specific factor, hukou, which has significant effect on the severity in pedestrian accidents due to the discrepancy in the level of social insurance/security, suggesting that equal social security level among urban and rural people should be set up. In addition, establishing a comprehensive liability distribution system for non-urban areas and roadways will be conducive to both pedestrians' and drivers' voluntary compliance with traffic rules. Copyright © 2014. Published by Elsevier Ltd.
Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.
Jandl, T
1998-01-01
This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.
Secure data aggregation in heterogeneous and disparate networks using stand off server architecture
NASA Astrophysics Data System (ADS)
Vimalathithan, S.; Sudarsan, S. D.; Seker, R.; Lenin, R. B.; Ramaswamy, S.
2009-04-01
The emerging global reach of technology presents myriad challenges and intricacies as Information Technology teams aim to provide anywhere, anytime and anyone access, for service providers and customers alike. The world is fraught with stifling inequalities, both from an economic as well as socio-political perspective. The net result has been large capability gaps between various organizational locations that need to work together, which has raised new challenges for information security teams. Similar issues arise, when mergers and acquisitions among and between organizations take place. While integrating remote business locations with mainstream operations, one or more of the issues including the lack of application level support, computational capabilities, communication limitations, and legal requirements cause a serious impediment thereby complicating integration while not violating the organizations' security requirements. Often resorted techniques like IPSec, tunneling, secure socket layer, etc. may not be always techno-economically feasible. This paper addresses such security issues by introducing an intermediate server between corporate central server and remote sites, called stand-off-server. We present techniques such as break-before-make connection, break connection after transfer, multiple virtual machine instances with different operating systems using the concept of a stand-off-server. Our experiments show that the proposed solution provides sufficient isolation for the central server/site from attacks arising out of weak communication and/or computing links and is simple to implement.
Applications of high-dimensional photonic entaglement
NASA Astrophysics Data System (ADS)
Broadbent, Curtis J.
This thesis presents the results of four experiments related to applications of higher dimensional photonic entanglement. (1) We use energy-time entangled biphotons from spontaneous parametric down-conversion (SPDC) to implement a large-alphabet quantum key distribution (QKD) system which securely transmits up to 10 bits of the random key per photon. An advantage over binary alphabet QKD is demonstrated for quantum channels with a single-photon transmission-rate ceiling. The security of the QKD system is based on the measurable reduction of entanglement in the presence of eavesdropping. (2) We demonstrate the preservation of energy-time entanglement in a tunable slow-light medium. The fine-structure resonances of a hot Rubidium vapor are used to slow one photon from an energy-time entangled biphoton generated with non-degenerate SPDC. The slow-light medium is placed in one arm of a Franson interferometer. The observed Franson fringes witness the presence of entanglement and quantify a delay of 1.3 biphoton correlation lengths. (3) We utilize holograms to discriminate between two spatially-coherent single-photon images. Heralded single photons are created with degenerate SPDC and sent through one of two transmission masks to make single-photon images with no spatial overlap. The single-photon images are sent through a previously prepared holographic filter. The filter discriminates the single-photon images with an average confidence level of 95%. (4) We employ polarization entangled biphotons generated from non-collinear SPDC to violate a generalized Leggett-Garg inequality with non-local weak measurements. The weak measurement is implemented with Fresnel reflection of a microscope coverslip on one member of the entangled biphoton. Projective measurement with computer-controlled polarizers on the entangled state after the weak measurement yields a joint probability with three degrees of freedom. Contextual values are then used to determine statistical averages of measurement operations from the joint probability. Correlations between the measured averages are shown to violate the upper bound of three distinct two-object Leggett-Garg inequalities derived from assumptions of macro-realism. A relationship between the violation of two-object Leggett-Garg inequalities and strange non-local weak values is derived and experimentally demonstrated.
Kish, Laszlo B; Abbott, Derek; Granqvist, Claes G
2013-01-01
Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.
Kish, Laszlo B.; Abbott, Derek; Granqvist, Claes G.
2013-01-01
Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law–Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged. PMID:24358129
High court asked to review differing definitions of 'disability'.
1997-02-21
[Name removed] applied for and received Social Security benefits after losing his job at The Disney Stores, Inc. [Name removed], who has AIDS, alleges he was fired in violation of the Americans with Disabilities Act (ADA). The 3rd U.S. Circuit Court of Appeals said [name removed] could not sue [name removed] because of a discrepancy between his statements on the disability application and in the lawsuit. The Court said he had to choose between suing and accepting disability benefits. The court would not accept [name removed]'s argument that the definitions of disability under the Social Security Act and the ADA differed significantly. The U.S. Supreme Court has been asked to overturn this ruling. In a related case, the Michigan Court of Appeals invoked judicial estoppel to bar a worker from suing his employer under the State Handicappers' Civil Rights Act.
The Slow Control System of the Auger Fluorescence Detectors
NASA Astrophysics Data System (ADS)
Barenthien, N.; Bethge, C.; Daumiller, K.; Gemmeke, H.; Kampert, K.-H.; Wiebusch, C.
2003-07-01
The fluorescence detector (FD) of the Pierre Auger experiment [1] comprises 24 telescopes that will be situated in 4 remote buildings in the Pampa Amarilla. It is planned to run the fluorescence detectors in absence of operators on site. Therefore, the main task of the Slow Control System (SCS) is to ensure a secure remote operation of the FD system. The Slow Control System works autonomously and continuously monitors those parameters which may disturb a secure operation. Commands from the data-acquisition system or the remote operator are accepted only if they do not violate safety rules that depend on the actual experimental conditions (e.g. high-voltage, wind-sp eed, light, etc.). In case of malfunctions (power failure, communication breakdown, ...) the SCS performs an orderly shutdown and subsequent startup of the fluorescence detector system. The concept and the implementation of the Slow Control System are presented.
Bykov, I Iu; Kolkutin, V V; Tolmachev, I A; Dmitriev, E G
2000-04-01
The article deals with the questions concerning the problem of person identification, different extreme situations. This problem is closely connected with ensuring of national security of Russia. The authors give the definition of person's right in contact with constant threat to violate this right. Two categories of person's properties are analysed (material and not material) with the help of which it is possible to establish identity of man and his personality. It is noted that protection of person's rights is carried out in six forms. For the first time the possibilities to create organisational system of person identification in the form of Federal service are discussed that must be legislatively secured. Scientific investigation of this problem allowed the authors to submit concrete proposals concerning the question of organisation of state service for person identification.
Leveraging Social Links for Trust and Privacy in Networks
NASA Astrophysics Data System (ADS)
Cutillo, Leucio Antonio; Molva, Refik; Strufe, Thorsten
Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in distributed systems and networks. We suggest a solution that both aims at avoiding any centralized control and leverages on the real life trust between users, that is part of the social network application itself. An anonymization technique based on multi-hop routing among trusted nodes guarantees privacy in data access and, generally speaking, in all the OSN operations.
Randomness Amplification under Minimal Fundamental Assumptions on the Devices
NASA Astrophysics Data System (ADS)
Ramanathan, Ravishankar; Brandão, Fernando G. S. L.; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Wojewódka, Hanna
2016-12-01
Recently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components and in a situation where the violation of a Bell inequality only guarantees that some outcomes of the device for specific inputs exhibit randomness? Here, we solve this question and present a device-independent protocol for randomness amplification of Santha-Vazirani sources using a device consisting of two nonsignaling components. We show that the protocol can amplify any such source that is not fully deterministic into a fully random source while tolerating a constant noise rate and prove the composable security of the protocol against general no-signaling adversaries. Our main innovation is the proof that even the partial randomness certified by the two-party Bell test [a single input-output pair (u* , x* ) for which the conditional probability P (x*|u*) is bounded away from 1 for all no-signaling strategies that optimally violate the Bell inequality] can be used for amplification. We introduce the methodology of a partial tomographic procedure on the empirical statistics obtained in the Bell test that ensures that the outputs constitute a linear min-entropy source of randomness. As a technical novelty that may be of independent interest, we prove that the Santha-Vazirani source satisfies an exponential concentration property given by a recently discovered generalized Chernoff bound.
Sousa, Cindy A; Kemp, Susan; El-Zuhairi, Mona
2014-11-01
Political violence is increasingly played out within everyday civilian environments, particularly family homes. Yet, within the literature on political violence and mental health, the role of threats to home remains under-explored. Using focus group data from 32 Palestinian women, this paper explores the implications of violations to the home within political violence. Threats to the privacy, control, and constancy of the family home - key dimensions of ontological security (Giddens, 1990) emerged as central themes in women's narratives. Surveillance, home invasions, and actual or threatened destruction of women's home environments provoked fear, anxiety, grief, humiliation, and helplessness, particularly as women struggled to protect their children. Women also described how they mobilized the home for economic, familial and cultural survival. Study findings illuminate the impact of threats to intimate environments on the well-being of women and their families living with chronic political violence, and underscore the importance of attention to violations of place and home in research on civilian experiences of and responses to political violence. Copyright © 2014 Elsevier Ltd. All rights reserved.
N.C. college to pay $325,000 to coach fired because of AIDS.
1995-05-05
To settle a discrimination lawsuit, Campbell University agreed to pay $325,000 to a physical education instructor fired in 1993 after the university learned he had AIDS. Officials from the North Carolina university said the instructor, known as John Doe, posed a direct threat to students and himself. The Equal Employment Opportunities Commission (EEOC) sued in April 1994 on Doe's behalf, saying the university violated the Americans with Disabilities Act (ADA). Doe's attorney also charged the university with violating the Rehabilitation Act and the Employee Retirement Income Security Act (ERISA). According to EEOC officials, the university decided to settle after learning that medical experts were prepared to testify that Doe could perform his job without endangering anyone. As part of the settlement, Doe will return to the payroll, but at a new job which he developed. In addition, the university agreed to keep confidential the medical information of its employees, purge Doe's personnel file of any references to his medical condition or the discrimination complaint, and provide AIDS awareness and sensitivity training to university managers and supervisors.
Mullany, Luke C; Lee, Catherine I; Yone, Lin; Paw, Palae; Oo, Eh Kalu Shwe; Maung, Cynthia; Lee, Thomas J; Beyrer, Chris
2008-01-01
Background Health indicators are poor and human rights violations are widespread in eastern Burma. Reproductive and maternal health indicators have not been measured in this setting but are necessary as part of an evaluation of a multi-ethnic pilot project exploring strategies to increase access to essential maternal health interventions. The goal of this study is to estimate coverage of maternal health services prior to this project and associations between exposure to human rights violations and access to such services. Methods and Findings Selected communities in the Shan, Mon, Karen, and Karenni regions of eastern Burma that were accessible to community-based organizations operating from Thailand were surveyed to estimate coverage of reproductive, maternal, and family planning services, and to assess exposure to household-level human rights violations within the pilot-project target population. Two-stage cluster sampling surveys among ever-married women of reproductive age (15–45 y) documented access to essential antenatal care interventions, skilled attendance at birth, postnatal care, and family planning services. Mid-upper arm circumference, hemoglobin by color scale, and Plasmodium falciparum parasitemia by rapid diagnostic dipstick were measured. Exposure to human rights violations in the prior 12 mo was recorded. Between September 2006 and January 2007, 2,914 surveys were conducted. Eighty-eight percent of women reported a home delivery for their last pregnancy (within previous 5 y). Skilled attendance at birth (5.1%), any (39.3%) or ≥ 4 (16.7%) antenatal visits, use of an insecticide-treated bed net (21.6%), and receipt of iron supplements (11.8%) were low. At the time of the survey, more than 60% of women had hemoglobin level estimates ≤ 11.0 g/dl and 7.2% were Pf positive. Unmet need for contraceptives exceeded 60%. Violations of rights were widely reported: 32.1% of Karenni households reported forced labor and 10% of Karen households had been forced to move. Among Karen households, odds of anemia were 1.51 (95% confidence interval [CI] 0.95–2.40) times higher among women reporting forced displacement, and 7.47 (95% CI 2.21–25.3) higher among those exposed to food security violations. The odds of receiving no antenatal care services were 5.94 (95% CI 2.23–15.8) times higher among those forcibly displaced. Conclusions Coverage of basic maternal health interventions is woefully inadequate in these selected populations and substantially lower than even the national estimates for Burma, among the lowest in the region. Considerable political, financial, and human resources are necessary to improve access to maternal health care in these communities. PMID:19108601
Semantic policy and adversarial modeling for cyber threat identification and avoidance
NASA Astrophysics Data System (ADS)
DeFrancesco, Anton; McQueary, Bruce
2009-05-01
Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.
1985-04-24
newborn in Bethlehem in order to Jerusalem court found Capucci guilty of all charges in the kill Jesus Christ among them, Barsoun added, "History...right is a step towards the peace for which of accusations and threats are based, as well as on Jesus worked. The violations of Jerusalem and...the milita.y hospital . In a way, I felt relief. Better tohave Embassy were able to communicate by telephone with Diego out of the hands of terrorists
Social Justice as a Lens for Understanding Workplace Mistreatment.
Moffa, Christine; Longo, Joy
2016-01-01
Workplace mistreatment can be viewed as a social injustice that prohibits one from achieving optimal well-being. Cognitive and interpersonal skills required of nurses can be impacted by workplace mistreatment, thus extending injustices by violating the rights of patients to optimal care. The purpose of this article is to view workplace mistreatment through the lens of Powers and Faden's theory of social justice. Workplace mistreatment is explored through the 6 dimensions of well-being, including health, personal security, reasoning, respect, attachment, and self-determination, identified in the theory. The implications for practice and policy are discussed and recommendations for research made.
Deterministic and efficient quantum cryptography based on Bell's theorem
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen Zengbing; Pan Jianwei; Physikalisches Institut, Universitaet Heidelberg, Philosophenweg 12, 69120 Heidelberg
2006-05-15
We propose a double-entanglement-based quantum cryptography protocol that is both efficient and deterministic. The proposal uses photon pairs with entanglement both in polarization and in time degrees of freedom; each measurement in which both of the two communicating parties register a photon can establish one and only one perfect correlation, and thus deterministically create a key bit. Eavesdropping can be detected by violation of local realism. A variation of the protocol shows a higher security, similar to the six-state protocol, under individual attacks. Our scheme allows a robust implementation under the current technology.
Synchronic interval Gaussian mixed-integer programming for air quality management.
Cheng, Guanhui; Huang, Guohe Gordon; Dong, Cong
2015-12-15
To reveal the synchronism of interval uncertainties, the tradeoff between system optimality and security, the discreteness of facility-expansion options, the uncertainty of pollutant dispersion processes, and the seasonality of wind features in air quality management (AQM) systems, a synchronic interval Gaussian mixed-integer programming (SIGMIP) approach is proposed in this study. A robust interval Gaussian dispersion model is developed for approaching the pollutant dispersion process under interval uncertainties and seasonal variations. The reflection of synchronic effects of interval uncertainties in the programming objective is enabled through introducing interval functions. The proposition of constraint violation degrees helps quantify the tradeoff between system optimality and constraint violation under interval uncertainties. The overall optimality of system profits of an SIGMIP model is achieved based on the definition of an integrally optimal solution. Integer variables in the SIGMIP model are resolved by the existing cutting-plane method. Combining these efforts leads to an effective algorithm for the SIGMIP model. An application to an AQM problem in a region in Shandong Province, China, reveals that the proposed SIGMIP model can facilitate identifying the desired scheme for AQM. The enhancement of the robustness of optimization exercises may be helpful for increasing the reliability of suggested schemes for AQM under these complexities. The interrelated tradeoffs among control measures, emission sources, flow processes, receptors, influencing factors, and economic and environmental goals are effectively balanced. Interests of many stakeholders are reasonably coordinated. The harmony between economic development and air quality control is enabled. Results also indicate that the constraint violation degree is effective at reflecting the compromise relationship between constraint-violation risks and system optimality under interval uncertainties. This can help decision makers mitigate potential risks, e.g. insufficiency of pollutant treatment capabilities, exceedance of air quality standards, deficiency of pollution control fund, or imbalance of economic or environmental stress, in the process of guiding AQM. Copyright © 2015 Elsevier B.V. All rights reserved.
Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities
Solodov, Alexander; Williams, Adam; Al Hanaei, Sara; ...
2017-04-18
Unmanned aerial vehicles (UAV) are among the major growing technologies that have many beneficial applications, yet they can also pose a significant threat. Recently, several incidents occurred with UAVs violating privacy of the public and security of sensitive facilities, including several nuclear power plants in France. The threat of UAVs to the security of nuclear facilities is of great importance and is the focus of this work. This paper presents an overview of UAV technology and classification, as well as its applications and potential threats. We show several examples of recent security incidents involving UAVs in France, USA, and Unitedmore » Arab Emirates. Further, the potential threats to nuclear facilities and measures to prevent them are evaluated. The importance of measures for detection, delay, and response (neutralization) of UAVs at nuclear facilities are discussed. An overview of existing technologies along with their strength and weaknesses are shown. Finally, the results of a gap analysis in existing approaches and technologies is presented in the form of potential technological and procedural areas for research and development. Furthermore based on this analysis, directions for future work in the field can be devised and prioritized.« less
Hausler, K; Godden, S M; Schneider, M J; Lightfield, A R; Bulthaus, M; Haines, D
2013-04-01
The objective was to conduct a study to investigate if violative meat residues are detected in very young bob veal calves that are fed first-milking colostrum harvested from cows that were dry treated, on-label, with cephapirin benzathine. First-milking colostrum was collected from cows that were given intramammary treatment at dry off, on-label, with cephapirin benzathine (ToMORROW, Boehringer Ingelheim Vetmedica Inc., St. Joseph, MO). Newborn bull calves meeting study inclusion criteria were removed from their dams shortly after birth and before suckling, and assigned to 1 of 2 trials. For the first trial, 6 treated calves were fed 3.8L of fresh maternal colostrum and 1 control calf was fed 1.5 doses of a plasma-derived colostrum replacer (Secure Calf Colostrum Replacer, VitaPlus Inc., Madison, WI) within 1h after birth. For the second trial, 5 treated calves were fed 3.8L of fresh maternal colostrum and 1 control calf was fed 1.5 doses of Secure Calf Colostrum Replacer within 1h after birth. All calves were humanely euthanized at 24h (trial 1) or 48h (trial 2) of age, and tissues were harvested for antimicrobial residue testing. Samples of maternal colostrum and colostrum replacer were also submitted for antimicrobial residue testing. Kidneys collected from all study calves tested negative for cephapirin benzathine residues when using both the KIS assay (Charm Sciences, Lawrence, MA) and liquid chromatography-tandem mass spectrometry analysis. The potential transfer of cephapirin from cows treated on-label at dry off to calves via colostrum may not be a significant source of cephapirin residues in veal tissues. Copyright © 2013 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.
Protecting clinical data in PACS, teleradiology systems, and research environments
NASA Astrophysics Data System (ADS)
Meissner, Marion C.; Collmann, Jeff R.; Tohme, Walid G.; Mun, Seong K.
1997-05-01
As clinical data is more widely stored in electronic patient record management systems and transmitted over the Internet and telephone lines, it becomes more accessible and therefore more useful, but also more vulnerable. Computer systems such as PACS, telemedicine applications, and medical research networks must protect against accidental or deliberate modification, disclosure, and violation of patient confidentiality in order to be viable. Conventional wisdom in the medical field and among lawmakers legislating the use of electronic medical records suggests that, although it may improve access to information, an electronic medical record cannot be as secure as a traditional paper record. This is not the case. Information security is a well-developed field in the computer and communications industry. If medical information systems, such as PACS, telemedicine applications, and research networks, properly apply information security techniques, they can ensure the accuracy and confidentiality of their patient information and even improve the security of their data over a traditional paper record. This paper will elaborate on some of these techniques and discuss how they can be applied to medical information systems. The following systems will be used as examples for the analysis: a research laboratory at Georgetown University Medical Center, the Deployable Radiology system installed to support the US Army's peace- keeping operation in Bosnia, a kidney dialysis telemedicine system in Washington, D.C., and various experiences with implementing and integrating PACS.
Chen, Qian; Abercrombie, Robert K; Sheldon, Frederick T.
2015-09-23
Industrial Control Systems (ICS) are commonly used in industries such as oil and natural gas, transportation, electric, water and wastewater, chemical, pharmaceutical, pulp and paper, food and beverage, as well as discrete manufacturing (e.g., automotive, aerospace, and durable goods.) SCADA systems are generally used to control dispersed assets using centralized data acquisition and supervisory control.Originally, ICS implementations were susceptible primarily to local threats because most of their components were located in physically secure areas (i.e., ICS components were not connected to IT networks or systems). The trend toward integrating ICS systems with IT networks (e.g., efficiency and the Internet ofmore » Things) provides significantly less isolation for ICS from the outside world thus creating greater risk due to external threats. Albeit, the availability of ICS/SCADA systems is critical to assuring safety, security and profitability. Such systems form the backbone of our national cyber-physical infrastructure.Herein, we extend the concept of mean failure cost (MFC) to address quantifying availability to harmonize well with ICS security risk assessment. This new measure is based on the classic formulation of Availability combined with Mean Failure Cost (MFC). Finally, the metric offers a computational basis to estimate the availability of a system in terms of the loss that each stakeholder stands to sustain as a result of security violations or breakdowns (e.g., deliberate malicious failures).« less
Fear of communicating fear versus fear of terrorism: A human rights violation or a sign of our time?
Anyanwu, Chika
2018-02-01
At its very first session, the United Nations General Assembly, adopted Resolution 59(I) which states that "freedom of information is a fundamental human right and … the touchstone of all the freedoms to which the United Nations is consecrated". In 1948, it proclaimed the Universal Declaration of Human Rights in Paris. Article 19 of that Declaration states that "everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers". When we place these basic human rights against current global terror threats, and consequent restrictive antiterror legislations to combat them, the question becomes whether Article 19 is still relevant in the context of today's changed security landscape. The aim of this paper is to explore ways that anti-terror legislations can balance between national security, and the protection of freedom of information.
Lee, Tian-Fu
2013-12-01
A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.
CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection
Dai, Huning; Murphy, Christian; Kaiser, Gail
2010-01-01
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations and inputs together with a certain runtime environment. One approach to detecting these vulnerabilities is fuzz testing. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, we present a new testing methodology called Configuration Fuzzing. Configuration Fuzzing is a technique whereby the configuration of the running application is mutated at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks “security invariants” that, if violated, indicate a vulnerability. We discuss the approach and introduce a prototype framework called ConFu (CONfiguration FUzzing testing framework) for implementation. We also present the results of case studies that demonstrate the approach’s feasibility and evaluate its performance. PMID:21037923
Atom-Role-Based Access Control Model
NASA Astrophysics Data System (ADS)
Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong
Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.
Post-conflict health reconstruction: search for a policy.
Rubenstein, Leonard S
2011-10-01
Despite increasing experience in health reconstruction in societies emerging from conflict, the policy basis for investing in the development of equitable and effective health systems in the wake of war remains unsettled. Consideration of post-conflict health reconstruction is almost entirely absent in donor policies on global health. Practically by default, health programmes are seen increasingly as an element of stabilisation and security interventions in the aftermath of armed conflict. That perspective, however, lacks an evidence base and can skew health programmes towards short-term security and stabilisation goals that have a marginal impact and violate the principles of equity, non-discrimination, and quality, which are central to sound health systems and public acceptance of them. A better approach is to ground policy in legitimacy, viewing health both as a core social institution and one that, if developed according to human rights principles, including equity, non-discrimination, participation and accountability, can advance the effectiveness and the quality of governance in the emerging state. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.
Gladden, Matthew E.
2017-01-01
Previous works exploring the challenges of ensuring information security for neuroprosthetic devices and their users have typically built on the traditional InfoSec concept of the “CIA Triad” of confidentiality, integrity, and availability. However, we argue that the CIA Triad provides an increasingly inadequate foundation for envisioning information security for neuroprostheses, insofar as it presumes that (1) any computational systems to be secured are merely instruments for expressing their human users' agency, and (2) computing devices are conceptually and practically separable from their users. Drawing on contemporary philosophy of technology and philosophical and critical posthumanist analysis, we contend that futuristic neuroprostheses could conceivably violate these basic InfoSec presumptions, insofar as (1) they may alter or supplant their users' biological agency rather than simply supporting it, and (2) they may structurally and functionally fuse with their users to create qualitatively novel “posthumanized” human-machine systems that cannot be secured as though they were conventional computing devices. Simultaneously, it is noted that many of the goals that have been proposed for future neuroprostheses by InfoSec researchers (e.g., relating to aesthetics, human dignity, authenticity, free will, and cultural sensitivity) fall outside the scope of InfoSec as it has historically been understood and touch on a wide range of ethical, aesthetic, physical, metaphysical, psychological, economic, and social values. We suggest that the field of axiology can provide useful frameworks for more effectively identifying, analyzing, and prioritizing such diverse types of values and goods that can (and should) be pursued through InfoSec practices for futuristic neuroprostheses. PMID:29163010
Gladden, Matthew E
2017-01-01
Previous works exploring the challenges of ensuring information security for neuroprosthetic devices and their users have typically built on the traditional InfoSec concept of the "CIA Triad" of confidentiality, integrity, and availability. However, we argue that the CIA Triad provides an increasingly inadequate foundation for envisioning information security for neuroprostheses, insofar as it presumes that (1) any computational systems to be secured are merely instruments for expressing their human users' agency, and (2) computing devices are conceptually and practically separable from their users. Drawing on contemporary philosophy of technology and philosophical and critical posthumanist analysis, we contend that futuristic neuroprostheses could conceivably violate these basic InfoSec presumptions, insofar as (1) they may alter or supplant their users' biological agency rather than simply supporting it, and (2) they may structurally and functionally fuse with their users to create qualitatively novel "posthumanized" human-machine systems that cannot be secured as though they were conventional computing devices. Simultaneously, it is noted that many of the goals that have been proposed for future neuroprostheses by InfoSec researchers (e.g., relating to aesthetics, human dignity, authenticity, free will, and cultural sensitivity) fall outside the scope of InfoSec as it has historically been understood and touch on a wide range of ethical, aesthetic, physical, metaphysical, psychological, economic, and social values. We suggest that the field of axiology can provide useful frameworks for more effectively identifying, analyzing, and prioritizing such diverse types of values and goods that can (and should) be pursued through InfoSec practices for futuristic neuroprostheses.
Sexuality and women's rights in armed conflict in Sri Lanka.
Tambiah, Yasmin
2004-05-01
The discourse of human rights in armed conflict situations is well adapted to respond to violence and violation, invoking internationally agreed principles of civil and political rights. However, in areas where the subject or domain of rights discourse is contested or controversial, human rights advocates appear less prepared to promote and defend such rights. Sexuality is one such domain. This paper explores the complex sexual choices women in Sri Lanka have had to negotiate, particularly widows and sex workers, within a context of ethnic conflict, militarisation and war. It argues that sexuality cannot be defined exclusively in terms of violation, even in a context dominated by violence, and that the sexual ordering of society may be subverted in such conditions. Newly widowed women and sex workers have had to negotiate self-determination as well as take responsibility for earning income and heading households, in spite of contrary community pressures. For women, political and economic rights are closely linked with the ability to determine their sexual and reproductive choices. The challenge to women's and human rights advocates is how to articulate sexual autonomy as a necessary right on a par with others, and strategise to secure this right during armed conflict and postwar reconstruction.
Social/Ethical Issues in Predictive Insider Threat Monitoring
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Frincke, Deborah A.; Zabriskie, Mariah
2011-01-01
Combining traditionally monitored cybersecurity data with other kinds of organizational data is one option for inferring the motivations of individuals, which may in turn allow early prediction and mitigation of insider threats. While unproven, some researchers believe that this combination of data may yield better results than either cybersecurity or organizational data would in isolation. However, this nontraditional approach creates a potential conflict between goals, such as conflicts between organizational security improvements and individual privacy considerations. There are many facets to debate. Should warning signs of a potential malicious insider be addressed before a malicious event has occurred to preventmore » harm to the organization and discourage the insider from violating the organization’s rules? Would intervention violate employee trust or legal guidelines? What about the possibilities of misuse? Predictive approaches cannot be validated a priori; false accusations can affect the career of the accused; and collection/monitoring of certain types of data may affect employee morale. In this chapter, we explore some of the social and ethical issues stemming from predictive insider threat monitoring and discuss ways that a predictive modeling approach brings to the forefront social and ethical issues that should be considered and resolved by stakeholders and communities of interest.« less
How to securely replicate services
NASA Technical Reports Server (NTRS)
Reiter, Michael; Birman, Kenneth
1992-01-01
A method is presented for constructing replicated services that retain their availability and integrity despite several servers and clients corrupted by an intruder, in addition to others failing benignly. More precisely, a service is replicated by n servers in such a way that a correct client will accept a correct server's response if, for some prespecified parameter k, at least k servers are correct and fewer than k servers are corrupt. The issue of maintaining causality among client requests is also addressed. A security breach resulting from an intruder's ability to effect a violation of causality in the sequence of requests processed by the service is illustrated. An approach to counter this problem is proposed that requires fewer than k servers to be corrupt and that is live if at least k+b servers are correct, where b is the assumed maximum total number of corrupt servers in any system run. An important and novel feature of these schemes is that the client need not be able to identify or authenticate even a single server. Instead, the client is required only to possess at most two public keys for the service. The practicality of these schemes is illustrated through a discussion of several issues pertinent to their implementation and use, and their intended role in a secure version of the Isis system is also described.
Kim, Yong-Woon; Cho, Namin; Jang, Hye-Jung
2018-01-01
Information technology involves a risk of privacy violation in providing easy access to confidential information,such as personal information and medical information through the Internet. In this study, we investigated medical information security to gain a better understanding of trends in research related to medical information security. We researched papers published on '의료정보' and 'medical information' in various Korean journals during a 10-year period from 2005 to 2015. We also analyzed these journal papers for each fiscal year; these papers were categorized into the areas of literature research and empirical research, and were further subdivided according to themes and subjects. It was confirmed that 48 papers were submitted to 35 academic journals. There were 33 (68.8%) literature review articles, and analysis of secondary data was not carried out at all. In terms of empirical research, 8 (16.7%) surveys and 7 (14.6%) program developments were studied. As a result of analyzing these papers according to the research theme by research method, 17 (35.4%) papers on laws, systems, and policies were the most numerous. It was found that among the literature research papers on medical personnel were the most common, and among the empirical research papers, research on experts in information protection and medical personnel were the most common. We suggest that further research should be done in terms of social perception, human resource development, and technology development to improve risk management in medical information systems.
Notes on recent approaches concerning the Kirchhoff-law-Johnson-noise-based secure key exchange
NASA Astrophysics Data System (ADS)
Kish, Laszlo B.; Horvath, Tamas
2009-08-01
We critically analyze the results and claims in [P.-L. Liu, Phys. Lett. A 373 (2009) 901]. We show that the strong security leak appeared in the simulations is only an artifact and not caused by “multiple reflections”. Since no wave modes exist at cable length of 5% of the shortest wavelength of the signal, no wave is present to reflect it. In the high wave impedance limit, the conditions used in the simulations are heavily unphysical (requiring cable diameters up to 28000 times greater than the measured size of the known universe) and the results are modeling artifacts due to the unphysical values. At the low cable impedance limit, the observed artifacts are due to violating the recommended (and tested) conditions by neglecting the cable capacitance restrictions and using about 100 times longer cable than recommended without cable capacitance compensation arrangement. We implement and analyze the general circuitry of Liu's circulator [P.-L. Liu, Phys. Lett. A 373 (2009) 901] and confirm that they are conceptually secure against passive attacks. We introduce an asymmetric, more robust version without feedback loop. Then we crack all these systems by an active attack: a circulator-based man-in-the middle attack. Finally, we analyze the proposed method to increase security by dropping only high-risk bits. We point out the differences between different types of high-risk bits and show the shortage of this strategy for some simple key exchange protocols.
Migrant Farmworker Housing Regulation Violations in North Carolina
Arcury, Thomas A.; Weir, Maria; Chen, Haiying; Summers, Phillip; Pelletier, Lori E.; Galván, Leonardo; Bischoff, Werner E.; Mirabelli, Maria C.; Quandt, Sara A.
2013-01-01
Background The quality of housing provided to migrant farmworkers is often criticized, but few studies have investigated these housing conditions. This analysis examines housing regulation violations experienced by migrant farmworkers in North Carolina, and the associations of camp characteristics with the presence of housing violations. Methods Data were collected in183 eastern North Carolina migrant farmworker camps in 2010. Housing regulation violations for the domains of camp, sleeping room, bathroom, kitchen, laundry room, and general housing, as well as total violations were assessed using North Carolina Department of Labor standards. Results Violations of housing regulations were common, ranging from 4 to 22 per camp. Housing regulation violations were common in all domains; the mean number of camp violations was 1.6, of sleeping room violations was 3.8, of bathroom violations was 4.5, of kitchen violations was 2.3, of laundry room violations was 1.2, and of general housing violations was 3.1. The mean number of total housing violations was 11.4. Several camp characteristics were consistently associated with the number of violations; camps with workers having H-2A visas, with North Carolina Department of Labor Certificates of Inspection posted, and assessed early in the season had fewer violations. Conclusions These results argue for regulatory changes to improve the quality of housing provided to migrant farmworkers, including stronger regulations and the more vigorous enforcement of existing regulations. PMID:22237961
Advancing the science of forensic data management
NASA Astrophysics Data System (ADS)
Naughton, Timothy S.
2002-07-01
Many individual elements comprise a typical forensics process. Collecting evidence, analyzing it, and using results to draw conclusions are all mutually distinct endeavors. Different physical locations and personnel are involved, juxtaposed against an acute need for security and data integrity. Using digital technologies and the Internet's ubiquity, these diverse elements can be conjoined using digital data as the common element. This result is a new data management process that can be applied to serve all elements of the community. The first step is recognition of a forensics lifecycle. Evidence gathering, analysis, storage, and use in legal proceedings are actually just distinct parts of a single end-to-end process, and thus, it is hypothesized that a single data system that can also accommodate each constituent phase using common network and security protocols. This paper introduces the idea of web-based Central Data Repository. Its cornerstone is anywhere, anytime Internet upload, viewing, and report distribution. Archives exist indefinitely after being created, and high-strength security and encryption protect data and ensure subsequent case file additions do not violate chain-of-custody or other handling provisions. Several legal precedents have been established for using digital information in courts of law, and in fact, effective prosecution of cyber crimes absolutely relies on its use. An example is a US Department of Agriculture division's use of digital images to back up its inspection process, with pictures and information retained on secure servers to enforce the Perishable Agricultural Commodities Act. Forensics is a cumulative process. Secure, web-based data management solutions, such as the Central Data Repository postulated here, can support each process step. Logically marrying digital technologies with Internet accessibility should help nurture a thought process to explore alternatives that make forensics data accessible to authorized individuals, whenever and wherever they need it.
Wages, wage violations, and pesticide safety experienced by migrant farmworkers in North Carolina.
Robinson, Erin; Nguyen, Ha T; Isom, Scott; Quandt, Sara A; Grzywacz, Joseph G; Chen, Haiying; Arcury, Thomas A
2011-01-01
Farmworkers have the potential to receive wages that fail to meet minimum wage standards. This analysis describes wages and minimum wage violations among farmworkers, and it determines associations of wage violations with personal characteristics and pesticide safety regulation violations. Data are from a cross-sectional survey of 300 eastern North Carolina farmworkers conducted in June through August, 2009. Most farmworkers (90.0%) were paid by the hour, but 11.7 percent received piece-rate pay. Wage violations were prevalent among farmworkers: 18.3 percent of all farmworkers, 45.3 percent of farmworkers without H-2A visas, and 3.6 percent of farmworkers with H-2A visas experienced wage violations. Most farmworkers experienced numerous pesticide safety violations. Personal characteristics were not associated with wage violations among farmworkers without H-2A visas, but some pesticide safety violations were associated with wage violations. The association of violations indicates that some growers generally violate regulations. Greater enforcement of all regulations is needed.
WAGES, WAGE VIOLATIONS, AND PESTICIDE SAFETY EXPERIENCED BY MIGRANT FARMWORKERS IN NORTH CAROLINA*
ROBINSON, ERIN; NGUYEN, HA T.; ISOM, SCOTT; QUANDT, SARA A.; GRZYWACZ, JOSEPH G.; CHEN, HAIYING; ARCURY, THOMAS A.
2012-01-01
Farmworkers have the potential to receive wages that fail to meet minimum wage standards. This analysis describes wages and minimum wage violations among farmworkers, and it determines associations of wage violations with personal characteristics and pesticide safety regulation violations. Data are from a cross-sectional survey of 300 eastern North Carolina farmworkers conducted in June through August, 2009. Most farmworkers (90.0%) were paid by the hour, but 11.7 percent received piece-rate pay. Wage violations were prevalent among farmworkers: 18.3 percent of all farmworkers, 45.3 percent of farmworkers without H-2A visas, and 3.6 percent of farmworkers with H-2A visas experienced wage violations. Most farmworkers experienced numerous pesticide safety violations. Personal characteristics were not associated with wage violations among farmworkers without H-2A visas, but some pesticide safety violations were associated with wage violations. The association of violations indicates that some growers generally violate regulations. Greater enforcement of all regulations is needed. PMID:21733804
Experimentally Generated Random Numbers Certified by the Impossibility of Superluminal Signaling
NASA Astrophysics Data System (ADS)
Bierhorst, Peter; Shalm, Lynden K.; Mink, Alan; Jordan, Stephen; Liu, Yi-Kai; Rommal, Andrea; Glancy, Scott; Christensen, Bradley; Nam, Sae Woo; Knill, Emanuel
Random numbers are an important resource for applications such as numerical simulation and secure communication. However, it is difficult to certify whether a physical random number generator is truly unpredictable. Here, we exploit the phenomenon of quantum nonlocality in a loophole-free photonic Bell test experiment to obtain data containing randomness that cannot be predicted by any theory that does not also allow the sending of signals faster than the speed of light. To certify and quantify the randomness, we develop a new protocol that performs well in an experimental regime characterized by low violation of Bell inequalities. Applying an extractor function to our data, we obtain 256 new random bits, uniform to within 10- 3 .
A new way to protect privacy in large-scale genome-wide association studies.
Kamm, Liina; Bogdanov, Dan; Laur, Sven; Vilo, Jaak
2013-04-01
Increased availability of various genotyping techniques has initiated a race for finding genetic markers that can be used in diagnostics and personalized medicine. Although many genetic risk factors are known, key causes of common diseases with complex heritage patterns are still unknown. Identification of such complex traits requires a targeted study over a large collection of data. Ideally, such studies bring together data from many biobanks. However, data aggregation on such a large scale raises many privacy issues. We show how to conduct such studies without violating privacy of individual donors and without leaking the data to third parties. The presented solution has provable security guarantees. Supplementary data are available at Bioinformatics online.
12 CFR 21.11 - Suspicious Activity Report.
Code of Federal Regulations, 2010 CFR
2010-01-01
... an actual or potential victim of a criminal violation, or series of criminal violations, or that the... it was either an actual or potential victim of a criminal violation, or series of criminal violations... of a criminal violation, or series of criminal violations, or that the bank was used to facilitate a...
12 CFR 21.11 - Suspicious Activity Report.
Code of Federal Regulations, 2012 CFR
2012-01-01
... either an actual or potential victim of a criminal violation, or series of criminal violations, or that... it was either an actual or potential victim of a criminal violation, or series of criminal violations... of a criminal violation, or series of criminal violations, or that the bank was used to facilitate a...
NASA Technical Reports Server (NTRS)
Zuschlag, Michael
2005-01-01
This document provides the results from a study into the apparent factors and causes of violations of restricted airspace, particularly temporary flight restrictions (TFRs) and air defense identification zones (ADIZs). By illuminating the reasons for these violations, this study aims to take the first step towards reducing them. The study assesses the basic characteristics of restricted airspace violations as well as the probable causes and factors contributing to violations. Results from the study imply most violations occur where the restriction has been in place for a significant amount of time prior to the violation. Additionally, the study results imply most violations are not due to the pilot simply being unaware of the airspace at the time of violation. In most violations, pilots are aware of the presence of the restricted airspace but have incorrect information about it, namely, its exact boundaries or procedures for authorized penetration. These results imply that the best means to reduce violations of restricted airspace is to improve the effectiveness of providing pilots the details required to avoid the airspace.
DOE Office of Scientific and Technical Information (OSTI.GOV)
El Hariri, Mohamad; Faddel, Samy; Mohammed, Osama
Decentralized and hierarchical microgrid control strategies have lain the groundwork for shaping the future smart grid. Such control approaches require the cooperation between microgrid operators in control centers, intelligent microcontrollers, and remote terminal units via secure and reliable communication networks. In order to enhance the security and complement the work of network intrusion detection systems, this paper presents an artificially intelligent physical model-checking that detects tampered-with circuit breaker switching control commands whether, due to a cyber-attack or human error. In this technique, distributed agents, which are monitoring sectionalized areas of a given microgrid, will be trained and continuously adapted tomore » verify that incoming control commands do not violate the physical system operational standards and do not put the microgrid in an insecure state. The potential of this approach has been tested by deploying agents that monitor circuit breakers status commands on a 14-bus IEEE benchmark system. The results showed the accuracy of the proposed framework in characterizing the power system and successfully detecting malicious and/or erroneous control commands.« less
Flores, Dalmacio; McKinney, Ross; Arscott, Joyell; Barroso, Julie
Requiring parental consent in studies with sexual minority youth (SMY) can sometimes be problematic as participants may have yet to disclose their sexual orientation, may not feel comfortable asking parents' permission, and may promote a self-selection bias. We discuss rationale for waiving parental consent, strategies to secure waivers from review boards, and present participants' feedback on research without parents' permission. We share our institutional review board proposal in which we made a case that excluding SMY from research violates ethical research principles, does not recognize their autonomy, and limits collection of sexuality data. Standard consent policies may inadvertently exclude youth who are at high risk for negative health outcomes or may potentially put them at risk because of forced disclosure of sexual orientation. Securing a waiver addresses these concerns and allows for rich data, which is critical for providers to have a deeper understanding of their unique sexual health needs. To properly safeguard and encourage research informed by SMY, parental consent waivers may be necessary. Copyright © 2017 Elsevier Inc. All rights reserved.
Crigger, B J
1990-01-01
The Missouri law considered in Webster v. Reproductive Health Services has a preamble that states the life begins at conception. However if this is the case then there are tremendous implications that must be considered. The case of Unnamed, unknown fetus of Farrar v. John Ashcroft et al. involves a pregnant women convicted and imprisoned who is claiming that her fetus's constitutional right to due process has been violated and that is has been imprisoned without trial. Anti-abortion activists do not believe that the illegal incarceration argument is valid. Age is another issue up for re-definition. If the law holds then age should start being measured at conception and not birth. This would make everybody in Missouri 9 months older. Many privileges in our society are based on age: social security, drinking, driving, military service or eligibility for public office. Currently the breadth of the preamble has not been finalized in the Missouri courts. However, courts have already accepted "necessity defense" and acquitted prolife demonstrators for trespassing at abortion clinics. The court cited the preamble when it wrote that the trespassing violations were necessary as an emergency measure to avoid the death and maiming of unborn children. For now it is up to the courts to decide how this law's preamble will affect Missouri law.
Zhang, Shoujian; Su, Yikun
2018-01-01
This research developed and tested a model of the social contagion effect of coworkers’ safety violations on individual workers within construction crews. Both situational and routine safety violations were considered in this model. Empirical data were collected from 345 construction workers in China using a detailed questionnaire. The results showed that both types of safety violations made by coworkers were significantly related to individuals’ perceived social support and production pressure. Individuals’ attitudinal ambivalence toward safety compliance mediated the relationships between perceived social support and production pressure and both types of individuals’ safety violations. However, safety motivation only mediated the effects of perceived social support and production pressure on individuals’ situational safety violations. Further, this research supported the differences between situational and routine safety violations. Specifically, we found that individuals were more likely to imitate coworkers’ routine safety violations than their situational safety violations. Coworkers’ situational safety violations had an indirect effect on individuals’ situational safety violations mainly through perceived social support and safety motivation. By contrast, coworkers’ routine safety violations had an indirect effect on individuals’ routine safety violations mainly through perceived production pressure and attitudinal ambivalence. Finally, the theoretical and practical implications, research limitations, and future directions were discussed. PMID:29673149
Liang, Huakang; Lin, Ken-Yu; Zhang, Shoujian; Su, Yikun
2018-04-17
This research developed and tested a model of the social contagion effect of coworkers’ safety violations on individual workers within construction crews. Both situational and routine safety violations were considered in this model. Empirical data were collected from 345 construction workers in China using a detailed questionnaire. The results showed that both types of safety violations made by coworkers were significantly related to individuals’ perceived social support and production pressure. Individuals’ attitudinal ambivalence toward safety compliance mediated the relationships between perceived social support and production pressure and both types of individuals’ safety violations. However, safety motivation only mediated the effects of perceived social support and production pressure on individuals’ situational safety violations. Further, this research supported the differences between situational and routine safety violations. Specifically, we found that individuals were more likely to imitate coworkers’ routine safety violations than their situational safety violations. Coworkers’ situational safety violations had an indirect effect on individuals’ situational safety violations mainly through perceived social support and safety motivation. By contrast, coworkers’ routine safety violations had an indirect effect on individuals’ routine safety violations mainly through perceived production pressure and attitudinal ambivalence. Finally, the theoretical and practical implications, research limitations, and future directions were discussed.
Kim, Yong-Woon; Cho, Namin
2018-01-01
Objectives Information technology involves a risk of privacy violation in providing easy access to confidential information,such as personal information and medical information through the Internet. In this study, we investigated medical information security to gain a better understanding of trends in research related to medical information security. Methods We researched papers published on ‘의료정보’ and ‘medical information’ in various Korean journals during a 10-year period from 2005 to 2015. We also analyzed these journal papers for each fiscal year; these papers were categorized into the areas of literature research and empirical research, and were further subdivided according to themes and subjects. Results It was confirmed that 48 papers were submitted to 35 academic journals. There were 33 (68.8%) literature review articles, and analysis of secondary data was not carried out at all. In terms of empirical research, 8 (16.7%) surveys and 7 (14.6%) program developments were studied. As a result of analyzing these papers according to the research theme by research method, 17 (35.4%) papers on laws, systems, and policies were the most numerous. It was found that among the literature research papers on medical personnel were the most common, and among the empirical research papers, research on experts in information protection and medical personnel were the most common. Conclusions We suggest that further research should be done in terms of social perception, human resource development, and technology development to improve risk management in medical information systems. PMID:29503754
Glanz, Karen; Keenan, Brendan T.; Branas, Charles C.
2017-01-01
Objectives: We explored how restaurant inspection frequency and restaurant neighborhood sociodemographic characteristics are related to food safety inspection outcomes in chain and nonchain restaurants to better understand external factors that may influence inspection outcomes. Methods: We categorized the results of restaurant inspections in Philadelphia, Pennsylvania, in 2013 and 2014 by restaurant type (chain or nonchain), inspection frequency (1, 2, or ≥3 per 2-year study period), and violation type (total number of violations, foodborne-illness risk factor violation, or good retail practice violation). We collected 2013 US Census block group sociodemographic data for each restaurant neighborhood. We used nested mixed-effects regression analyses to determine the association between restaurant inspection frequency and inspection violations, as well as between inspection violations and restaurant neighborhood sociodemographic variables, stratified by restaurant type. Results: Compared with nonchain restaurants, chain restaurants had significantly fewer total violations per inspection (mean [SD]: 6.5 [4.6] vs 9.6 [6.8] violations, P < .001). For nonchain restaurants, an increase from 1 to 2 inspections resulted in 0.8 (P < .001) fewer mean violations per inspection, and an increase from 1 to ≥3 inspections resulted in 1.6 (P < .001) fewer mean violations; this association was not seen in chain restaurants. For nonchain restaurants, a higher proportion of black residents in a restaurant neighborhood was associated with 0.6 (P < .001) fewer mean foodborne-illness risk factor violations but 1.0 (P < .001) more mean good retail practice violations per inspection. Conclusions: A risk-based stratified approach to restaurant food safety inspection frequency, based on whether or not restaurants are part of chains, could reduce the frequency of violations, particularly in restaurants with the most violations. PMID:28060568
Leinwand, Sarah E; Glanz, Karen; Keenan, Brendan T; Branas, Charles C
We explored how restaurant inspection frequency and restaurant neighborhood sociodemographic characteristics are related to food safety inspection outcomes in chain and nonchain restaurants to better understand external factors that may influence inspection outcomes. We categorized the results of restaurant inspections in Philadelphia, Pennsylvania, in 2013 and 2014 by restaurant type (chain or nonchain), inspection frequency (1, 2, or ≥3 per 2-year study period), and violation type (total number of violations, foodborne-illness risk factor violation, or good retail practice violation). We collected 2013 US Census block group sociodemographic data for each restaurant neighborhood. We used nested mixed-effects regression analyses to determine the association between restaurant inspection frequency and inspection violations, as well as between inspection violations and restaurant neighborhood sociodemographic variables, stratified by restaurant type. Compared with nonchain restaurants, chain restaurants had significantly fewer total violations per inspection (mean [SD]: 6.5 [4.6] vs 9.6 [6.8] violations, P < .001). For nonchain restaurants, an increase from 1 to 2 inspections resulted in 0.8 ( P < .001) fewer mean violations per inspection, and an increase from 1 to ≥3 inspections resulted in 1.6 ( P < .001) fewer mean violations; this association was not seen in chain restaurants. For nonchain restaurants, a higher proportion of black residents in a restaurant neighborhood was associated with 0.6 ( P < .001) fewer mean foodborne-illness risk factor violations but 1.0 ( P < .001) more mean good retail practice violations per inspection. A risk-based stratified approach to restaurant food safety inspection frequency, based on whether or not restaurants are part of chains, could reduce the frequency of violations, particularly in restaurants with the most violations.
Understanding procedural violations using Safety-I and Safety-II: The case of community pharmacies.
Jones, Christian E L; Phipps, Denham L; Ashcroft, Darren M
2018-06-01
Procedural violations are known to occur in a range of work settings, and are an important topic of interest with regard to safety management. A Safety-I perspective sees violations as undesirable digressions from standardised procedures, while a Safety-II perspective sees violations as adaptations to a complex work system. This study aimed to apply both perspectives to the examination of violations in community pharmacies. Twenty-four participants (13 pharmacists and 11 pharmacy support staff) were purposively sampled to participate in semi-structured interviews using the critical incident technique. Participants described violations they made during the course of their work. Interviews were digitally recorded, transcribed verbatim and analysed using template analysis. Community pharmacies located in England and Wales. 31 procedural violations were described during the interviews revealing multiple reasons for violations in this setting. Our findings suggest that from a Safety-II perspective, staff violated to adapt to situations and to manage safety. However, participants also violated procedures in order to maintain productivity which was found to increase risk in some, but not all situations. Procedural violations often relied on the context in which staff were working, resulting in the violation being deemed rational to the individual making the violation, yet the behaviour may be difficult to justify from an outside perspective. Combining Safety-I and Safety-II perspectives provided a detailed understanding of the underlying reasons for procedural violations. Our findings identify aspects of practice that could benefit from targeted interventions to help support staff in providing safe patient care.
48 CFR 403.104-7 - Violations or possible violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Violations or possible violations. 403.104-7 Section 403.104-7 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 403.104-7 Violations or...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Violations. 33.21 Section 33.21 Energy NUCLEAR REGULATORY COMMISSION SPECIFIC DOMESTIC LICENSES OF BROAD SCOPE FOR BYPRODUCT MATERIAL Violations § 33.21 Violations. (a) The Commission may obtain an injunction or other court order to prevent a violation of the provisions...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Violations. 33.21 Section 33.21 Energy NUCLEAR REGULATORY COMMISSION SPECIFIC DOMESTIC LICENSES OF BROAD SCOPE FOR BYPRODUCT MATERIAL Violations § 33.21 Violations. (a) The Commission may obtain an injunction or other court order to prevent a violation of the provisions...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Violations. 33.21 Section 33.21 Energy NUCLEAR REGULATORY COMMISSION SPECIFIC DOMESTIC LICENSES OF BROAD SCOPE FOR BYPRODUCT MATERIAL Violations § 33.21 Violations. (a) The Commission may obtain an injunction or other court order to prevent a violation of the provisions...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Violations. 33.21 Section 33.21 Energy NUCLEAR REGULATORY COMMISSION SPECIFIC DOMESTIC LICENSES OF BROAD SCOPE FOR BYPRODUCT MATERIAL Violations § 33.21 Violations. (a) The Commission may obtain an injunction or other court order to prevent a violation of the provisions...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Violations. 33.21 Section 33.21 Energy NUCLEAR REGULATORY COMMISSION SPECIFIC DOMESTIC LICENSES OF BROAD SCOPE FOR BYPRODUCT MATERIAL Violations § 33.21 Violations. (a) The Commission may obtain an injunction or other court order to prevent a violation of the provisions...
Speeded Recognition of Ungrammaticality: Double Violations.
ERIC Educational Resources Information Center
Moore, Timothy E.; Biederman, Irving
1979-01-01
The speed at which sentences with various kinds of violations could be rejected was studied. Compatible with the sequential model was the finding that noun-verb and adjective-noun double violations did not result in shorter reaction times than noun-verb single violations, although double violations were judged less acceptable. (Author/RD)
Benign violations: making immoral behavior funny.
McGraw, A Peter; Warren, Caleb
2010-08-01
Humor is an important, ubiquitous phenomenon; however, seemingly disparate conditions seem to facilitate humor. We integrate these conditions by suggesting that laughter and amusement result from violations that are simultaneously seen as benign. We investigated three conditions that make a violation benign and thus humorous: (a) the presence of an alternative norm suggesting that the situation is acceptable, (b) weak commitment to the violated norm, and (c) psychological distance from the violation. We tested the benign-violation hypothesis in the domain of moral psychology, where there is a strong documented association between moral violations and negative emotions, particularly disgust. Five experimental studies show that benign moral violations tend to elicit laughter and amusement in addition to disgust. Furthermore, seeing a violation as both wrong and not wrong mediates behavioral displays of humor. Our account is consistent with evolutionary accounts of laughter, explains humor across many domains, and suggests that humor can accompany negative emotion.
Rule-violations sensitise towards negative and authority-related stimuli.
Wirth, Robert; Foerster, Anna; Rendel, Hannah; Kunde, Wilfried; Pfister, Roland
2018-05-01
Rule violations have usually been studied from a third-person perspective, identifying situational factors that render violations more or less likely. A first-person perspective of the agent that actively violates the rules, on the other hand, is only just beginning to emerge. Here we show that committing a rule violation sensitises towards subsequent negative stimuli as well as subsequent authority-related stimuli. In a Prime-Probe design, we used an instructed rule-violation task as the Prime and a word categorisation task as the Probe. Also, we employed a control condition that used a rule inversion task as the Prime (instead of rule violations). Probe targets were categorised faster after a violation relative to after a rule-based response if they related to either, negative valence or authority. Inversions, however, primed only negative stimuli and did not accelerate the categorisation of authority-related stimuli. A heightened sensitivity towards authority-related targets thus seems to be specific to rule violations. A control experiment showed that these effects cannot be explained in terms of semantic priming. Therefore, we propose that rule violations necessarily activate authority-related representations that make rule violations qualitatively different from simple rule inversions.
Validity of suspected alcohol and drug violations in aviation employees.
Li, Guohua; Brady, Joanne E; DiMaggio, Charles; Baker, Susan P; Rebok, George W
2010-10-01
In the United States, transportation employees who are suspected of using alcohol and drugs are subject to reasonable-cause testing. This study aims to assess the validity of suspected alcohol and drug violations in aviation employees. Using reasonable-cause testing and random testing data from the Federal Aviation Administration for the years 1995-2005, we calculated the positive predictive value (PPV) and positive likelihood ratio (LR+) of suspected alcohol and drug violations. The true status of violations was based on testing results, with an alcohol violation being defined as a blood alcohol concentration of ≥0.04 mg/dl and a drug violation as a test positive for marijuana, cocaine, amphetamines, phencyclidine or opiates. During the 11-year study period, a total of 2284 alcohol tests and 2015 drug tests were performed under the reasonable-cause testing program. The PPV was 37.7% [95% confidence interval (CI), 35.7-39.7%] for suspected alcohol violations and 12.6% (95% CI, 11.2-14.1%) for suspected drug violations. Random testing revealed an overall prevalence of 0.09% for alcohol violations and 0.6% for drug violations. The LR+ was 653.6 (95% CI, 581.7-734.3) for suspected alcohol violations and 22.5 (95% CI, 19.6-25.7) for suspected drug violations. The discriminative power of reasonable-cause testing suggests that, despite its limited positive predictive value, physical and behavioral observation represents an efficient screening method for detecting alcohol and drug violations. The limited positive predictive value of reasonable-cause testing in aviation employees is due in part to the very low prevalence of alcohol and drug violations. © 2010 The Authors, Addiction © 2010 Society for the Study of Addiction.
Validity of Suspected Alcohol and Drug Violations in Aviation Employees
Li, Guohua; Brady, Joanne E.; DiMaggio, Charles; Baker, Susan P.; Rebok, George W.
2012-01-01
Introduction In the United States, transportation employees who are suspected of using alcohol and drugs are subject to reasonable-cause testing. This study aims to assess the validity of suspected alcohol and drug violations in aviation employees. Methods Using reasonable-cause testing and random testing data from the Federal Aviation Administration for the years 1995 through 2005, we calculated the positive predictive value (PPV) and positive likelihood ratio (LR+) of suspected alcohol and drug violations. The true status of violations was based on testing results, with an alcohol violation being defined as a blood alcohol concentration of ≥40 mg/dL and a drug violation as a test positive for marijuana, cocaine, amphetamines, phencyclidine, or opiates. Results During the 11-year study period, a total of 2,284 alcohol tests and 2,015 drug tests were performed under the reasonable-cause testing program. The PPV was 37.7% [95% confidence interval (CI), 35.7–39.7%] for suspected alcohol violations and 12.6% (95% CI, 11.2–14.1%) for suspected drug violations. Random testing revealed an overall prevalence of 0.09% (601/649,796) for alcohol violations and 0.6% (7,211/1,130,922) for drug violations. The LR+ was 653.6 (95% CI, 581.7–734.3) for suspected alcohol violations and 22.5 (95% CI, 19.6–25.7) for suspected drug violations. Discussion The discriminative power of reasonable-cause testing suggests that, despite its limited positive predictive value, physical and behavioral observation represents an efficient screening method for detecting alcohol and drug violations. The limited positive predictive value of reasonable-cause testing in aviation employees is due in part to the very low prevalence of alcohol and drug violations. PMID:20712820
Patterns of chemical residues detected in US beef carcasses between 1991 and 1993.
Gibbons, S N; Kaneene, J B; Lloyd, J W
1996-08-01
A study of data from 12 states in the Food Safety Inspection Service's Residue Violation Information System was conducted to describe patterns of violative chemical residues in US beef during 1991, 1992, and 1993. In 1991, 3,249 violative residues were found in 2,734 carcasses in the 12 states included in the study. In 1992, 3,132 violative residues were found in 2,813 carcasses, and in 1993, 2,317 violative residues were found in 2,051 carcasses. During each of the 3 years, the Calf Antibiotic and Sulfonamide Test and Swab Test On Premises projects detected most of the violative residues, and producers/independent growers and dairy farms were recorded as the responsible sources for most of the violations. Also, most of the animals found to have violative residues were bob calves and culled cows. In bob calves, neomycin was the most frequently identified violative chemical, followed by tetracycline, gentamicin, oxytetracycline, and penicillin. In culled cows, penicillin was the most frequently identified violative chemical and was the chemical most frequently found in combination with other chemicals in cows with multiple violative residues. Distribution patterns of violative chemical residues by slaughter class and residue type varied among the 5 Food Safety Inspection Service regions. These specific regional characteristics support the need for customized intervention, education, assessment, and prevention programs.
40 CFR 80.30 - Liability for violations of diesel fuel control and prohibitions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 16 2011-07-01 2011-07-01 false Liability for violations of diesel... Prohibitions § 80.30 Liability for violations of diesel fuel control and prohibitions. (a) Violations at refiners or importers facilities. Where a violation of a diesel fuel standard set forth in § 80.29 is...
40 CFR 80.30 - Liability for violations of diesel fuel control and prohibitions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 16 2010-07-01 2010-07-01 false Liability for violations of diesel... Prohibitions § 80.30 Liability for violations of diesel fuel control and prohibitions. (a) Violations at refiners or importers facilities. Where a violation of a diesel fuel standard set forth in § 80.29 is...
Code of Federal Regulations, 2010 CFR
2010-07-01
... not more than the sum of $25,000 for every day of such violation and the amount of economic benefit or... constitute a separate day of violation for each and every day the gasoline in violation remains at any place... separate day of violation for each and every day the detergent in violation remains at any place in the...
Code of Federal Regulations, 2010 CFR
2010-07-01
... not more than the sum of $25,000 for every day of such violation and the amount of economic benefit or... constitute a separate day of violation for each and every day the gasoline in violation remains at any place... separate day of violation for each and every day the detergent in violation remains at any place in the...
Gender Role Violations and the Sexual Double Standard.
Zaikman, Yuliana; Marks, Michael J; Young, Tara M; Zeiber, Jacqueline A
2016-12-01
The sexual double standard (SDS) suggests that women are evaluated negatively and men positively for engaging in similar sexual behaviors. According to social role theory, the SDS exists due to gender role structures. Consequently, perceived violations of women's sexual behavior are associated with the SDS. In addition to gender role violations of sexual behavior, two additional violations of gender roles exist: heterosexual sexual orientation norms and gender role characteristics. The current study aims to investigate whether the SDS persists for sexual orientation-violating and gender role characteristic-violating targets, and to examine which of the three gender role violations influence evaluations of others' sexual behavior. A U.S. sample of 483 participants evaluated target individuals who were either female or male, heterosexual/gay man or lesbian, feminine or masculine, and had 1 or 12 sexual partners. Results indicate that SDS persists for gender role-violating targets but is exhibited differently for targets violating heterosexual sexual orientation norms and gender role characteristics.
Rauscher, Kimberly; Runyan, Carol
2012-01-01
This study investigated adolescent worker fatalities involving violations of the child labor laws and/or Occupational Safety and Health Administration (OSHA) standards, as well as the enforcement activity involved in each case. Medical examiner records were used to identify work-related deaths among adolescents ages 11-17 between 1990 and 2008 and child labor violations. Investigations from state and federal Departments of Labor (DOL) were used to determine inspection activity, identify OSHA violations, and confirm child labor violations. Fifty-two percent of cases involved one or more child labor violations. Nine cases were investigated by either the U.S. or North Carolina DOL; among them, four had child labor violations. Eleven cases were investigated by the North Carolina DOL and all involved OSHA violations. Significant child labor and OSHA violations exist in adolescent worker fatalities in North Carolina, and gaps exist in enforcement at both the federal and state level, signaling needed improvements in the protection of adolescent workers.
48 CFR 903.303 - Reporting suspected antitrust violations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Violations 903.303 Reporting suspected antitrust violations. (a) Potential anti-competitive practices, such as described in 48 CFR 3.301, and antitrust law violations as described in 48 CFR 3.303, evidenced in...
48 CFR 903.303 - Reporting suspected antitrust violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Violations 903.303 Reporting suspected antitrust violations. (a) Potential anti-competitive practices, such as described in FAR 3.301, and antitrust law violations as described in FAR 3.303, evidenced in bids...
9 CFR 88.6 - Violations and penalties.
Code of Federal Regulations, 2010 CFR
2010-01-01
... TRANSPORTATION OF EQUINES FOR SLAUGHTER § 88.6 Violations and penalties. (a) The Secretary is authorized to... equine transported in violation of the regulations of this part will be considered a separate violation...
Trends in Nitrate Drinking Water Violations Across the US ...
Background/Question/Methods Safe drinking water is essential for the health and well-being of humans and life on Earth. Previous studies have shown that groundwater and other sources of drinking water can be contaminated with nitrate above the 10 mg nitrate-N L-1 maximum contaminant level (MCL), which is known to have adverse health effects, including certain cancers. Public water systems (PWS) across the US have been required since 1979 to report violations of the nitrate MCL to the US Environmental Protection Agency’s Safe Drinking Water Information System (SDWIS). The objective of this research was to use SDWIS data to assess temporal and spatial trends for nitrate violations. We collected data from SDWIS on the number of PWS that violated the nitrate MCL at least once each year. The proportion of systems in violation each year was calculated by diving the number of systems in violation by the total number of active systems that year. The number of people served by systems in violation was calculated by summing the number of people served by each PWS in violation. Results/Conclusions We found that the number and proportion of systems in violation for nitrate significantly increased over time, almost doubling from 280 (0.16%) to 527 (0.33%) systems between 1994 and 2010. The increase in number and proportion of systems in violation is attributed to an increase in violations for groundwater systems, whereas violations for surface water systems have
48 CFR 2803.104-10 - Violations or possible violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... General IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Safeguards 2803.104-10 Violations... action to be taken. The types of actions that would normally be taken when a violation has occurred that...
Committing driving violations: an observational study comparing city, town and village.
Rosenbloom, Tova; Ben-Eliyahu, Adar; Nemrodov, Dan; Biegel, Ariela; Perlman, Amotz
2009-01-01
This article compares observed driving behavior in a city, a town, and a village. Unobtrusive observations were made at intersections in each residential type. Five violation types were observed: (a) not wearing a seat belt (seat belt violation); (b) not using a safety seat for a child (safety seat violation for children); (c) not using a speaker while speaking on the phone (on-phone violation); (d) failing to comply with a 'give way' sign ('give way' sign violation); and (e) stopping in an undesignated area (undesignated stop violation). It was expected that in accordance with the anonymity hypothesis that the bigger residential areas' rate of traffic violations would be higher. The effects of the residential type, drivers' gender, and age were assessed using the multiple regression model. The stepwise method of evaluation was employed. The model converged on step 3 (Adjusted R square=0.039). Residential type and gender contributed significantly to the model. Consistent with prior research, male drivers committed more violations than female drivers. Chi-square analyses were used to test the distribution of violations by the settlement types. Overall, more drivers committed violations in the two small residential areas than in the city, with 30% of city drivers, 43% of town drivers, and 51% of village drivers committing at least one violation (chi2 (2)=37.65, p<0.001). Moreover, in the town and the village, a combination of one or more violations was committed more often than in the city(chi2 (1)=34.645, p<0.001). Accordingly, more drivers committed violations in the two small settlements (48.4%) than in the city (30.6%). Possible explanations for the observed results were provided in the Discussion section. The conclusions of this paper are that drivers in small villages tend to disobey traffic laws. Therefore, efforts have to be made in companies to take this issue in consideration while running fleets in companies located in small places far from the center.
Lorentz-violating electrodynamics and the cosmic microwave background.
Kostelecký, V Alan; Mewes, Matthew
2007-07-06
Possible Lorentz-violating effects in the cosmic microwave background are studied. We provide a systematic classification of renormalizable and nonrenormalizable operators for Lorentz violation in electrodynamics and use polarimetric observations to search for the associated violations.
Jusyte, Aiste; Pfister, Roland; Mayer, Sarah V; Schwarz, Katharina A; Wirth, Robert; Kunde, Wilfried; Schönenberg, Michael
2017-09-01
Classic findings on conformity and obedience document a strong and automatic drive of human agents to follow any type of rule or social norm. At the same time, most individuals tend to violate rules on occasion, and such deliberate rule violations have recently been shown to yield cognitive conflict for the rule-breaker. These findings indicate persistent difficulty to suppress the rule representation, even though rule violations were studied in a controlled experimental setting with neither gains nor possible sanctions for violators. In the current study, we validate these findings by showing that convicted criminals, i.e., individuals with a history of habitual and severe forms of rule violations, can free themselves from such cognitive conflict in a similarly controlled laboratory task. These findings support an emerging view that aims at understanding rule violations from the perspective of the violating agent rather than from the perspective of outside observer.
Moral Violations Reduce Oral Consumption
Chan, Cindy; Van Boven, Leaf; Andrade, Eduardo B.; Ariely, Dan
2014-01-01
Consumers frequently encounter moral violations in everyday life. They watch movies and television shows about crime and deception, hear news reports of corporate fraud and tax evasion, and hear gossip about cheaters and thieves. How does exposure to moral violations influence consumption? Because moral violations arouse disgust and because disgust is an evolutionarily important signal of contamination that should provoke a multi-modal response, we hypothesize that moral violations affect a key behavioral response to disgust: reduced oral consumption. In three experiments, compared with those in control conditions, people drank less water and chocolate milk while (a) watching a film portraying the moral violations of incest, (b) writing about moral violations of cheating or theft, and (c) listening to a report about fraud and manipulation. These findings imply that “moral disgust” influences consumption in ways similar to core disgust, and thus provide evidence for the associations between moral violations, emotions, and consumer behavior. PMID:25125931
Avery, Chris; Humphrey, Charles; Balany, Jo Anne
2014-11-01
Health inspections are performed at nursing homes to identify and reduce risk and to help maintain a safe environment for nursing home residents. The study described in this article aimed to identify the most frequent violations, types of violations (hygiene or structural), and repeat violations in nursing home facilities during health inspections; and to determine if the age of the facility influenced inspection scores. Nursing home health inspection forms (N = 131) completed between 2005 and 2011 in Pitt County, North Carolina, were analyzed. Results indicated that 60% of all violations were hygiene-related and could possibly be corrected without significant financial investments by management. Significant correlations occurred between the total number of violations and the facility age (p = .003) and between the number of repeat violations and total violations (p < .001). The average inspection score for nursing homes could be increased by more than three points if sanitation practices were improved.
Steffen, Joan E; Fassler, Ella A; Reardon, Kevin J; Egilman, David S
2018-01-01
In 2001, DePuy, a wholly-owned subsidiary of Johnson & Johnson (J&J/DePuy), initiated a seeding study called the "Multi-center, Prospective, Clinical Evaluation of Pinnacle Acetabular Implants in Total Hip Arthroplasty" (PIN Study). J&J/DePuy designed this study to develop new business opportunities during the launch of their Pinnacle Hip System (PHS) and generate survivorship data for marketing. This article, the first review of a seeding trial for a medical device, examines internal company documents relating to the PIN Study; the analysis herein focuses on the integrity of J&J/DePuy's research practices in conception, implementation, and analysis. J&J/DePuy violated the study protocol and manipulated data; consented participants in violation of standards protecting human subjects; and did not secure Institutional Review Board approval for all study sites. J&J/DePuy used PIN Study results as the "fundamental selling point" for the PHS. Medical device seeding trials are distinct from previously-documented pharmaceutical seeding trials because companies can profit directly from device sales and because these studies may be the first clinical evaluation of the device (as was the case for the PIN Study). Seeding trials are malleable marketing projects, not rigorous scientific studies. Regulatory bodies, physicians, and others should be vigilant for persuasive marketing accounts disguised as science.
Female Genital Mutilation Reconstruction: A Preliminary Report.
Chang, Catherine S; Low, David W; Percec, Ivona
2017-09-01
Female genital mutilation (FGM) is internationally recognized as a violation of human rights. Though rarely discussed, FGM is prevalent, affecting hundreds of millions of females worldwide. We believe that is important for plastic surgeons to be informed and prepared to address the surgical and emotional needs of these women. We present our experience on treatment of women subjected to FGM. Three consecutive patients were treated by our clitoral restoration procedure. The procedure involves conscious sedation and involves wide release of scar tissue around the labia majora and clitoris. Labial flaps are elevated and secured down to the periosteum and the clitoris is allowed to remucosalize. Three females with grade II mutilation were treated. The average age was 32.3-years-old and the average follow up was 305 days. All patients self-reported improved sexual function and decreased embarrassment with their partners. And all recommended the treatment to other women subjected to FGM. FGM is a violation of the basic rights of women and children. Plastic surgeons can help these women restore their physical and psychological sense of well-being by providing effective reconstructive options. Our goal is to raise awareness of this problem and describe a simple yet effective treatment for women that have been subject to FGM. 5. © 2017 The American Society for Aesthetic Plastic Surgery, Inc. Reprints and permission: journals.permissions@oup.com
Random numbers certified by Bell's theorem.
Pironio, S; Acín, A; Massar, S; de la Giroday, A Boyer; Matsukevich, D N; Maunz, P; Olmschenk, S; Hayes, D; Luo, L; Manning, T A; Monroe, C
2010-04-15
Randomness is a fundamental feature of nature and a valuable resource for applications ranging from cryptography and gambling to numerical simulation of physical and biological systems. Random numbers, however, are difficult to characterize mathematically, and their generation must rely on an unpredictable physical process. Inaccuracies in the theoretical modelling of such processes or failures of the devices, possibly due to adversarial attacks, limit the reliability of random number generators in ways that are difficult to control and detect. Here, inspired by earlier work on non-locality-based and device-independent quantum information processing, we show that the non-local correlations of entangled quantum particles can be used to certify the presence of genuine randomness. It is thereby possible to design a cryptographically secure random number generator that does not require any assumption about the internal working of the device. Such a strong form of randomness generation is impossible classically and possible in quantum systems only if certified by a Bell inequality violation. We carry out a proof-of-concept demonstration of this proposal in a system of two entangled atoms separated by approximately one metre. The observed Bell inequality violation, featuring near perfect detection efficiency, guarantees that 42 new random numbers are generated with 99 per cent confidence. Our results lay the groundwork for future device-independent quantum information experiments and for addressing fundamental issues raised by the intrinsic randomness of quantum theory.
NASA Astrophysics Data System (ADS)
Lu, Shasha; Guan, Xingliang; Zhou, Min; Wang, Yang
2014-05-01
A large number of mathematical models have been developed to support land resource allocation decisions and land management needs; however, few of them can address various uncertainties that exist in relation to many factors presented in such decisions (e.g., land resource availabilities, land demands, land-use patterns, and social demands, as well as ecological requirements). In this study, a multi-objective interval-stochastic land resource allocation model (MOISLAM) was developed for tackling uncertainty that presents as discrete intervals and/or probability distributions. The developed model improves upon the existing multi-objective programming and inexact optimization approaches. The MOISLAM not only considers economic factors, but also involves food security and eco-environmental constraints; it can, therefore, effectively reflect various interrelations among different aspects in a land resource management system. Moreover, the model can also help examine the reliability of satisfying (or the risk of violating) system constraints under uncertainty. In this study, the MOISLAM was applied to a real case of long-term urban land resource allocation planning in Suzhou, in the Yangtze River Delta of China. Interval solutions associated with different risk levels of constraint violation were obtained. The results are considered useful for generating a range of decision alternatives under various system conditions, and thus helping decision makers to identify a desirable land resource allocation strategy under uncertainty.
32 CFR 636.19 - Point system application.
Code of Federal Regulations, 2010 CFR
2010-07-01
... § 636.19 Point system application. Table 636.19 Violation: Parking in a handicap zone Points assessed: 3 Violation: Parking against a yellow curb Points assessed: 3 Violation: Parking within 10 feet of a fire... parking violations Points assessed: 2 ...
32 CFR 636.19 - Point system application.
Code of Federal Regulations, 2011 CFR
2011-07-01
... § 636.19 Point system application. Table 636.19 Violation: Parking in a handicap zone Points assessed: 3 Violation: Parking against a yellow curb Points assessed: 3 Violation: Parking within 10 feet of a fire... parking violations Points assessed: 2 ...
32 CFR 636.19 - Point system application.
Code of Federal Regulations, 2014 CFR
2014-07-01
... § 636.19 Point system application. Table 636.19 Violation: Parking in a handicap zone Points assessed: 3 Violation: Parking against a yellow curb Points assessed: 3 Violation: Parking within 10 feet of a fire... parking violations Points assessed: 2 ...
32 CFR 636.19 - Point system application.
Code of Federal Regulations, 2012 CFR
2012-07-01
... § 636.19 Point system application. Table 636.19 Violation: Parking in a handicap zone Points assessed: 3 Violation: Parking against a yellow curb Points assessed: 3 Violation: Parking within 10 feet of a fire... parking violations Points assessed: 2 ...
32 CFR 636.19 - Point system application.
Code of Federal Regulations, 2013 CFR
2013-07-01
... § 636.19 Point system application. Table 636.19 Violation: Parking in a handicap zone Points assessed: 3 Violation: Parking against a yellow curb Points assessed: 3 Violation: Parking within 10 feet of a fire... parking violations Points assessed: 2 ...
Schalk, René; De Ruiter, Melanie; Van Loon, Joost; Kuijpers, Evy; Van Regenmortel, Tine
2018-01-01
Recently, scholars have emphasized the importance of examining how employees cope with psychological contract violation and how the coping process contributes to psychological contract violation resolution and post-violation psychological contracts. Recent work points to the important role of problem-focused coping. Yet, to date, problem-focused coping strategies have not been conceptualized on a continuum from constructive to destructive strategies. Consequently, potential differences in the use of specific types of problem-focused coping strategies and the role these different strategies play in the violation resolution process has not been explored. In this study, we stress the importance of focusing on different types of problem-focused coping strategies. We explore how employee upward dissent strategies, conceptualized as different forms of problem-focused coping, contribute to violation resolution and post-violation psychological contracts. Two sources of data were used. In-depth interviews with supervisors of a Dutch car lease company provided 23 case descriptions of employee-supervisor interactions after a psychological contract violation. Moreover, a database with descriptions of Dutch court sentences provided eight case descriptions of employee-organization interactions following a perceived violation. Based on these data sources, we explored the pattern of upward dissent strategies employees used over time following a perceived violation. We distinguished between functional (thriving and reactivation), dysfunctional (impairment and dissolution) and deserted psychological contract end states and explored whether different dissent patterns over time differentially contributed to the dissent outcome (i.e., psychological contract end state). The results of our study showed that the use of problem-focused coping is not as straightforward as suggested by the post-violation model. While the post-violation model suggests that problem-focused coping will most likely contribute positively to violation resolution, we found that this also depends on the type of problem-focused coping strategy used. That is, more threatening forms of problem-focused coping (i.e., threatening resignation as a way to trigger one’s manager/organization to resolve the violation) mainly contributed to dysfunctional and deserted PC end states. Yet, in some instances the use of these types of active coping strategies also contributed to functional violation resolution. These findings have important implications for the literature on upward dissent strategies and psychological contract violation repair. PMID:29467692
Schalk, René; De Ruiter, Melanie; Van Loon, Joost; Kuijpers, Evy; Van Regenmortel, Tine
2018-01-01
Recently, scholars have emphasized the importance of examining how employees cope with psychological contract violation and how the coping process contributes to psychological contract violation resolution and post-violation psychological contracts. Recent work points to the important role of problem-focused coping. Yet, to date, problem-focused coping strategies have not been conceptualized on a continuum from constructive to destructive strategies. Consequently, potential differences in the use of specific types of problem-focused coping strategies and the role these different strategies play in the violation resolution process has not been explored. In this study, we stress the importance of focusing on different types of problem-focused coping strategies. We explore how employee upward dissent strategies, conceptualized as different forms of problem-focused coping, contribute to violation resolution and post-violation psychological contracts. Two sources of data were used. In-depth interviews with supervisors of a Dutch car lease company provided 23 case descriptions of employee-supervisor interactions after a psychological contract violation. Moreover, a database with descriptions of Dutch court sentences provided eight case descriptions of employee-organization interactions following a perceived violation. Based on these data sources, we explored the pattern of upward dissent strategies employees used over time following a perceived violation. We distinguished between functional (thriving and reactivation), dysfunctional (impairment and dissolution) and deserted psychological contract end states and explored whether different dissent patterns over time differentially contributed to the dissent outcome (i.e., psychological contract end state). The results of our study showed that the use of problem-focused coping is not as straightforward as suggested by the post-violation model. While the post-violation model suggests that problem-focused coping will most likely contribute positively to violation resolution, we found that this also depends on the type of problem-focused coping strategy used. That is, more threatening forms of problem-focused coping (i.e., threatening resignation as a way to trigger one's manager/organization to resolve the violation) mainly contributed to dysfunctional and deserted PC end states. Yet, in some instances the use of these types of active coping strategies also contributed to functional violation resolution. These findings have important implications for the literature on upward dissent strategies and psychological contract violation repair.
Kollareth, Dolichan; Russell, James A
2018-03-01
Disgust has been hypothesized to be uniquely linked to violations of a distinct moral domain (called divinity, purity, or sacred) aimed at preserving one's body from contamination with pathogens and preserving one's soul from violations of what is sacred. Here we examined whether the same emotion-core disgust-occurs when witnessing both types of violation, and we proposed a specific method for doing so. In two studies (N = 160; 240), American and Indian participants indicated their emotional reaction to (stories depicting) sacred or nonsacred violations, each either with or without pathogens. Both Americans and Indians felt "grossed out" (a term for core disgust) by events with pathogens (whether violations of the sacred or not). They felt disgusted and angered, but not grossed out, by violations of the sacred. For both Americans and Indians, grossed out was never the modal emotion when a sacred violation did not involve pathogens. Results were inconsistent with a focus on any single emotion: sacred violations were associated with several different negative emotions. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
NASA Astrophysics Data System (ADS)
Thomas, M. A.
2016-12-01
The Waste Isolation Pilot Plant (WIPP) is the only deep geological repository for transuranic waste in the United States. As the Science Advisor for the WIPP, Sandia National Laboratories annually evaluates site data against trigger values (TVs), metrics whose violation is indicative of conditions that may impact long-term repository performance. This study focuses on a groundwater-quality dataset used to redesign a TV for the Culebra Dolomite Member (Culebra) of the Permian-age Rustler Formation. Prior to this study, a TV violation occurred if the concentration of a major ion fell outside a range defined as the mean +/- two standard deviations. The ranges were thought to denote conditions that 95% of future values would fall within. Groundwater-quality data used in evaluating compliance, however, are rarely normally distributed. To create a more robust Culebra groundwater-quality TV, this study employed the randomization test, a non-parametric permutation method. Recent groundwater compositions considered TV violations under the original ion concentration ranges are now interpreted as false positives in light of the insignificant p-values calculated with the randomization test. This work highlights that the normality assumption can weaken as the size of a groundwater-quality dataset grows over time. Non-parametric permutation methods are an attractive option because no assumption about the statistical distribution is required and calculating all combinations of the data is an increasingly tractable problem with modern workstations. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. This research is funded by WIPP programs administered by the Office of Environmental Management (EM) of the U.S. Department of Energy. SAND2016-7306A
Privacy-preserving techniques of genomic data-a survey.
Aziz, Md Momin Al; Sadat, Md Nazmus; Alhadidi, Dima; Wang, Shuang; Jiang, Xiaoqian; Brown, Cheryl L; Mohammed, Noman
2017-11-07
Genomic data hold salient information about the characteristics of a living organism. Throughout the past decade, pinnacle developments have given us more accurate and inexpensive methods to retrieve genome sequences of humans. However, with the advancement of genomic research, there is a growing privacy concern regarding the collection, storage and analysis of such sensitive human data. Recent results show that given some background information, it is possible for an adversary to reidentify an individual from a specific genomic data set. This can reveal the current association or future susceptibility of some diseases for that individual (and sometimes the kinship between individuals) resulting in a privacy violation. Regardless of these risks, our genomic data hold much importance in analyzing the well-being of us and the future generation. Thus, in this article, we discuss the different privacy and security-related problems revolving around human genomic data. In addition, we will explore some of the cardinal cryptographic concepts, which can bring efficacy in secure and private genomic data computation. This article will relate the gaps between these two research areas-Cryptography and Genomics. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
How to securely replicate services (preliminary version)
NASA Technical Reports Server (NTRS)
Reiter, Michael; Birman, Kenneth
1992-01-01
A method is presented for constructing replicated services that retain their availability and integrity despite several servers and clients being corrupted by an intruder, in addition to others failing benignly. More precisely, a service is replicated by 'n' servers in such a way that a correct client will accept a correct server's response if, for some prespecified parameter, k, at least k servers are correct and fewer than k servers are correct. The issue of maintaining causality among client requests is also addressed. A security breach resulting from an intruder's ability to effect a violation of causality in the sequence of requests processed by the service is illustrated. An approach to counter this problem is proposed that requires that fewer than k servers are corrupt and, to ensure liveness, that k is less than or = n - 2t, where t is the assumed maximum total number of both corruptions and benign failures suffered by servers in any system run. An important and novel feature of these schemes is that the client need not be able to identify or authenticate even a single server. Instead, the client is required only to possess at most two public keys for the service.
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han; Lin, Tsung-Hung
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes. PMID:28759615
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 3 2010-01-01 2010-01-01 false Violations. 490.206 Section 490.206 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Mandatory State Fleet Program § 490.206 Violations. Violations of this subpart are subject to investigation and enforcement under subpart...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 3 2011-01-01 2011-01-01 false Violations. 490.206 Section 490.206 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Mandatory State Fleet Program § 490.206 Violations. Violations of this subpart are subject to investigation and enforcement under subpart...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 3 2014-01-01 2014-01-01 false Violations. 490.206 Section 490.206 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Mandatory State Fleet Program § 490.206 Violations. Violations of this subpart are subject to investigation and enforcement under subpart...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 3 2013-01-01 2013-01-01 false Violations. 490.310 Section 490.310 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fuel Provider Vehicle Acquisition Mandate § 490.310 Violations. Violations of this subpart are subject to investigation and...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 3 2012-01-01 2012-01-01 false Violations. 490.206 Section 490.206 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Mandatory State Fleet Program § 490.206 Violations. Violations of this subpart are subject to investigation and enforcement under subpart...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 3 2012-01-01 2012-01-01 false Violations. 490.310 Section 490.310 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fuel Provider Vehicle Acquisition Mandate § 490.310 Violations. Violations of this subpart are subject to investigation and...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 3 2014-01-01 2014-01-01 false Violations. 490.310 Section 490.310 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fuel Provider Vehicle Acquisition Mandate § 490.310 Violations. Violations of this subpart are subject to investigation and...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 3 2011-01-01 2011-01-01 false Violations. 490.310 Section 490.310 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fuel Provider Vehicle Acquisition Mandate § 490.310 Violations. Violations of this subpart are subject to investigation and...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 3 2010-01-01 2010-01-01 false Violations. 490.310 Section 490.310 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fuel Provider Vehicle Acquisition Mandate § 490.310 Violations. Violations of this subpart are subject to investigation and...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 3 2013-01-01 2013-01-01 false Violations. 490.206 Section 490.206 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Mandatory State Fleet Program § 490.206 Violations. Violations of this subpart are subject to investigation and enforcement under subpart...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Violations. 32.301 Section 32.301 Energy NUCLEAR REGULATORY COMMISSION SPECIFIC DOMESTIC LICENSES TO MANUFACTURE OR TRANSFER CERTAIN ITEMS CONTAINING BYPRODUCT MATERIAL Violations § 32.301 Violations. (a) The Commission may obtain an injunction or other...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Violations. 32.301 Section 32.301 Energy NUCLEAR REGULATORY COMMISSION SPECIFIC DOMESTIC LICENSES TO MANUFACTURE OR TRANSFER CERTAIN ITEMS CONTAINING BYPRODUCT MATERIAL Violations § 32.301 Violations. (a) The Commission may obtain an injunction or other...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Violations. 34.121 Section 34.121 Energy NUCLEAR REGULATORY COMMISSION LICENSES FOR INDUSTRIAL RADIOGRAPHY AND RADIATION SAFETY REQUIREMENTS FOR INDUSTRIAL RADIOGRAPHIC OPERATIONS Violations § 34.121 Violations. (a) The Commission may obtain an injunction or other...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Violations. 34.121 Section 34.121 Energy NUCLEAR REGULATORY COMMISSION LICENSES FOR INDUSTRIAL RADIOGRAPHY AND RADIATION SAFETY REQUIREMENTS FOR INDUSTRIAL RADIOGRAPHIC OPERATIONS Violations § 34.121 Violations. (a) The Commission may obtain an injunction or other...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Violations. 34.121 Section 34.121 Energy NUCLEAR REGULATORY COMMISSION LICENSES FOR INDUSTRIAL RADIOGRAPHY AND RADIATION SAFETY REQUIREMENTS FOR INDUSTRIAL RADIOGRAPHIC OPERATIONS Violations § 34.121 Violations. (a) The Commission may obtain an injunction or other...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Violations. 34.121 Section 34.121 Energy NUCLEAR REGULATORY COMMISSION LICENSES FOR INDUSTRIAL RADIOGRAPHY AND RADIATION SAFETY REQUIREMENTS FOR INDUSTRIAL RADIOGRAPHIC OPERATIONS Violations § 34.121 Violations. (a) The Commission may obtain an injunction or other...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Violations. 34.121 Section 34.121 Energy NUCLEAR REGULATORY COMMISSION LICENSES FOR INDUSTRIAL RADIOGRAPHY AND RADIATION SAFETY REQUIREMENTS FOR INDUSTRIAL RADIOGRAPHIC OPERATIONS Violations § 34.121 Violations. (a) The Commission may obtain an injunction or other...
Eleven essential steps to purchasing or selling a medical practice.
Barrett, William
2014-01-01
Based on our experience in representing more than 100 doctors and medical specialists in practice sales and acquisitions, we have identified 11 key considerations important to a deal. There are several issues to consider while going through the process of buying or selling a practice including the implementation of a "letter of intent" as a first step rather than drafting a contract, securing a lease, and verifying the property is not in violation of the local zoning requirements. There are also considerations with regard to the patients, which range from how will the accounts receivable at the time of the closing be handled to who is responsible for the handling of continued treatment in an ongoing case after a deal is finalized. This article details these considerations and more.
Rosenthal, Erika
2003-01-01
The pesticide poisoning deaths of 24 children in an isolated Peruvian village make a compelling case that corporate accountability for pesticide poisonings in the developing south should be examined from a human rights perspective. Highly toxic pesticides cannot be used safely under prevailing socioeconomic conditions. The industry asserts that the deaths of these children were accidental, blaming misuse. Tragedies such as these poisonings are not accidents, but foreseeable, and therefore preventable. Sales of highly toxic pesticides that cause repeated and predictable poisonings violate the fundamental human rights to life, health, and security of person. The Tauccamarca tragedy is a clear example of the urgency of applying a precautionary, human rights approach to pesticide issues in the developing south.
Heralded amplification of path entangled quantum states
NASA Astrophysics Data System (ADS)
Monteiro, F.; Verbanis, E.; Caprara Vivoli, V.; Martin, A.; Gisin, N.; Zbinden, H.; Thew, R. T.
2017-06-01
Device-independent quantum key distribution (DI-QKD) represents one of the most fascinating challenges in quantum communication, exploiting concepts of fundamental physics, namely Bell tests of nonlocality, to ensure the security of a communication link. This requires the loophole-free violation of a Bell inequality, which is intrinsically difficult due to losses in fibre optic transmission channels. Heralded photon amplification (HPA) is a teleportation-based protocol that has been proposed as a means to overcome transmission loss for DI-QKD. Here we demonstrate HPA for path entangled states and characterise the entanglement before and after loss by exploiting a recently developed displacement-based detection scheme. We demonstrate that by exploiting HPA we are able to reliably maintain high fidelity entangled states over loss-equivalent distances of more than 50 km.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Violations. 76.131 Section 76.131 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Enforcement § 76.131 Violations. (a) The Commission may obtain an injunction or other court order to prevent a violation of the...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Violations. 76.131 Section 76.131 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Enforcement § 76.131 Violations. (a) The Commission may obtain an injunction or other court order to prevent a violation of the...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Violations. 76.131 Section 76.131 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Enforcement § 76.131 Violations. (a) The Commission may obtain an injunction or other court order to prevent a violation of the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Violations. 76.131 Section 76.131 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Enforcement § 76.131 Violations. (a) The Commission may obtain an injunction or other court order to prevent a violation of the...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Violations. 76.131 Section 76.131 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Enforcement § 76.131 Violations. (a) The Commission may obtain an injunction or other court order to prevent a violation of the...
48 CFR 303.303 - Reporting suspected antitrust violations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Reporting suspected antitrust violations. 303.303 Section 303.303 Federal Acquisition Regulations System HEALTH AND HUMAN... Antitrust Violations 303.303 Reporting suspected antitrust violations. (h) The HCA shall provide a copy of...
48 CFR 303.303 - Reporting suspected antitrust violations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Reporting suspected antitrust violations. 303.303 Section 303.303 Federal Acquisition Regulations System HEALTH AND HUMAN... Antitrust Violations 303.303 Reporting suspected antitrust violations. (h) The HCA shall provide a copy of...