Code of Federal Regulations, 2010 CFR
2010-07-01
... Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.1 Purpose. (a) The purpose of this part is to implement the Motor Vehicle Theft Prevention Act, 42 U.S.C. 14171, which... vehicle theft prevention program. The program will be implemented by states and localities, at their sole...
Identity theft prevention in the healthcare setting.
Warren, Bryan
2005-01-01
How a healthcare security department has undertaken a program to prevent employees, patients, and visitors from becoming victims of Identity Theft as well as providing help for victims of this crime in mitigating their losses. An Identity Theft affidavit for ID theft victims is illustrated.
Getting ready for identity theft rules: creating a prevention program for your medical practice.
Cascardo, Debra
2009-01-01
Identity theft worries have found their way into medical practices. By August 1, 2009, all "creditors" must have a written program to prevent, detect, and minimize damage from identity theft. Any medical practice that bills patients is considered a creditor. Like HIPAA, these new Red Flag guidelines will serve to protect your practice from lawsuits as well as protect your patients from identity theft of their financial, personal, and medical information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.2 Definitions. For the purposes of this part: (a) The Act or the MVTPA means the Motor Vehicle Theft Prevention Act. (b) Owner... used automobile dealerships. (c) The Program refers to the National Voluntary Motor Vehicle Theft...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Theft or embezzlement from employment and training funds; improper inducement; obstruction of investigations and other criminal provisions. 632.124... NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Prevention of Fraud and Program Abuse § 632.124 Theft or...
Code of Federal Regulations, 2013 CFR
2013-01-01
.... Detecting Red Flags The Program's policies and procedures should address the detection of Red Flags in... Detection, Prevention, and Mitigation J Appendix J to Part 717 Banks and Banking NATIONAL CREDIT UNION...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 717.90 of this part...
Code of Federal Regulations, 2012 CFR
2012-01-01
.... Detecting Red Flags The Program's policies and procedures should address the detection of Red Flags in... Detection, Prevention, and Mitigation J Appendix J to Part 717 Banks and Banking NATIONAL CREDIT UNION...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 717.90 of this part...
Code of Federal Regulations, 2014 CFR
2014-01-01
.... Detecting Red Flags The Program's policies and procedures should address the detection of Red Flags in... Detection, Prevention, and Mitigation J Appendix J to Part 717 Banks and Banking NATIONAL CREDIT UNION...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 717.90 of this part...
Code of Federal Regulations, 2011 CFR
2011-01-01
.... Detecting Red Flags The Program's policies and procedures should address the detection of Red Flags in... Detection, Prevention, and Mitigation J Appendix J to Part 717 Banks and Banking NATIONAL CREDIT UNION...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 717.90 of this part...
Reducing Shrinkage in Convenience Stores by the Use of the PSI.
ERIC Educational Resources Information Center
Terris, William; Jones, John W.
This bibliography contains over 1,200 behavioral and property is a rapidly growing problem. Successful strategies are needed to reduce employee theft; new loss prevention techniques need to be developed and evaluated. Two loss prevention programs aimed at reducing employees' theft were compared by the measures of shrinkage rates. Initially, a…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-24
... From the Vehicle Theft Prevention Standard; Maserati North America Inc. AGENCY: National Highway... exemption of the Quattroporte vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft... motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-17
... for Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic... the Theft Prevention Standard. This document corrects the model year of the new Volkswagen vehicle... 543, Exemption from the Theft Prevention Standard. This petition is granted because the agency has...
Code of Federal Regulations, 2010 CFR
2010-01-01
... foreseeable risks to customers or to the safety and soundness of the financial institution or creditor from...) Notice from customers, victims of identity theft, law enforcement authorities, or other persons regarding... the Customer Identification Program rules implementing 31 U.S.C. 5318(l) (31 CFR 103.121); and (b...
Code of Federal Regulations, 2010 CFR
2010-01-01
... control reasonably foreseeable risks to customers or to the safety and soundness of the financial...; and (5) Notice from customers, victims of identity theft, law enforcement authorities, or other... verification set forth in the Customer Identification Program rules implementing 31 U.S.C. 5318(l)(31 CFR 103...
75 FR 6254 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-08
... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This petition is... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the...
76 FR 24402 - Federal Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-02
... [Docket No. NHTSA-2009-0069] RIN 2127-AK81 Federal Motor Vehicle Theft Prevention Standard AGENCY... of motor vehicles. E-mail is now included as a means to submit the target area designations. Under the Theft Prevention Standard, manufacturers of high theft passenger motor vehicle lines subject to...
Battling Employee Crime: A Review of Corporate Strategies and Programs.
ERIC Educational Resources Information Center
Traub, Stuart H.
1996-01-01
Discusses research on what businesses are doing to prevent employee theft and assesses the effectiveness of these strategies. Includes descriptive overviews of three categories of strategies to reduce and prevent crime in the workplace, including security, preemployment screening and education, and "whistle blowing" programs with…
76 FR 2444 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-13
... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention Standard. This... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-04
... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... 543, Exemption from the Theft Prevention Standard. This petition is granted because the agency has... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...
17 CFR 248.201 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., prevention, and mitigation of identity theft. 248.201 Section 248.201 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P, S-AM, AND S-ID Regulation S-ID: Identity Theft Red Flags § 248.201 Duties regarding the detection, prevention, and mitigation of identity theft...
17 CFR 162.30 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., prevention, and mitigation of identity theft. 162.30 Section 162.30 Commodity and Securities Exchanges... REPORTING ACT Identity Theft Red Flags § 162.30 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope of this subpart. This section applies to financial institutions or...
75 FR 71184 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-22
... and unlock all doors or to unlock only the driver's door, preventing forced entry into the vehicle... From the Vehicle Theft Prevention Standard; BMW AGENCY: National Highway Traffic Safety Administration... vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This...
75 FR 29812 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-27
... in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of... assemblies in motor vehicles related to performance. Volkswagen stated that it believes the immobilizer... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention...
16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
..., and mitigation of identity theft. 681.1 Section 681.1 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES § 681.1 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and...
12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED...) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity... soundness of the financial institution or creditor from identity theft, including financial, operational...
16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., and mitigation of identity theft. 681.1 Section 681.1 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES § 681.1 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and...
12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED...) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity... soundness of the financial institution or creditor from identity theft, including financial, operational...
16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
..., and mitigation of identity theft. 681.1 Section 681.1 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES § 681.1 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and...
12 CFR 391.22 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 391.22 Section 391.22 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION... Reporting § 391.22 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope... identity theft, including financial, operational, compliance, reputation, or litigation risks. (4) Credit...
12 CFR 391.22 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 391.22 Section 391.22 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION... Reporting § 391.22 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope... identity theft, including financial, operational, compliance, reputation, or litigation risks. (4) Credit...
12 CFR 391.22 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 391.22 Section 391.22 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION... Reporting § 391.22 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope... identity theft, including financial, operational, compliance, reputation, or litigation risks. (4) Credit...
12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 334.90 Section 334.90 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2011 CFR
2011-01-01
... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope...
12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2011 CFR
2011-01-01
... mitigation of identity theft. 571.90 Section 571.90 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 571.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 171.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 171.90 Section 171.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 171.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 171.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 171.90 Section 171.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 171.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 717.90 Section 717.90 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 571.90 Section 571.90 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 571.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 171.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 171.90 Section 171.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 171.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 334.90 Section 334.90 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 571.90 Section 571.90 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 571.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2011 CFR
2011-01-01
... mitigation of identity theft. 717.90 Section 717.90 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2011 CFR
2011-01-01
... mitigation of identity theft. 334.90 Section 334.90 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 334.90 Section 334.90 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope...
12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 571.90 Section 571.90 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 571.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 717.90 Section 717.90 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 717.90 Section 717.90 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
..., and mitigation of identity theft. 681.1 Section 681.1 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES § 681.1 Duties regarding the detection, prevention, and mitigation of identity theft. Link to an amendment published at 77 FR 72715, Dec. 6, 2012. (a...
75 FR 34526 - Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-17
... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic Safety... accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This document corrects certain...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... Jeep Patriot vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention...
Medical identity theft: prevention and reconciliation initiatives at Massachusetts General Hospital.
Judson, Timothy; Haas, Mark; Lagu, Tara
2014-07-01
Medical identity theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity theft and to better identify and respond to cases when they occur. Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%-85% of patients were showing photo identification at appointments. Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.
49 CFR 567.4 - Requirements for manufacturers of motor vehicles.
Code of Federal Regulations, 2010 CFR
2010-10-01
... applicable Federal motor vehicle safety, bumper, and theft prevention standards in effect on the date of... statement: “This vehicle conforms to all applicable Federal motor vehicle safety and theft prevention... conforms to the applicable Federal motor vehicle theft prevention standard in effect on the date of...
78 FR 19363 - Petition for Exemption From the Vehicle Theft Prevention Standard; Honda
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-29
... immobilizer device occurs automatically when the vehicle is started without any further action by the driver... From the Vehicle Theft Prevention Standard; Honda AGENCY: National Highway Traffic Safety... Honda Civic vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention...
77 FR 20486 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-04
... From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety... exemption of the Mitsubishi i-MiEV vehicle line in accordance with 49 CFR part 543, Exemption From the Theft... motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal...
12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 41.90 Section 41.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 41.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial institution or...
12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 41.90 Section 41.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 41.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial institution or...
12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2011 CFR
2011-01-01
... mitigation of identity theft. 41.90 Section 41.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 41.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial institution or...
12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 41.90 Section 41.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 41.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial institution or...
28 CFR 29.10 - Owner withdrawal from the program.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Owner withdrawal from the program. 29.10 Section 29.10 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.10 Owner withdrawal from the program. An owner may withdraw from the program at any time by...
Exploring the Identity-Theft Prevention Efforts of Consumers in the United States
ERIC Educational Resources Information Center
Lewis, Jacquelyne L.
2011-01-01
Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-08
...This document grants in full the Hyundai-Kia Motors Corporation (HATCI) petition for exemption of the Hyundai VI vehicle line in accordance with 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined that the antitheft device to be placed on the line as standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard.
49 CFR Appendix B to Part 591 - Section 591.5(f) Bond for the Entry of More Than a Single Vehicle
Code of Federal Regulations, 2010 CFR
2010-10-01
...) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS Pt. 591... Federal motor vehicle safety, or bumper, or theft prevention standards; and WHEREAS, pursuant to 49 CFR... to conform to the Federal motor vehicle safety, bumper, and theft prevention standards; and WHEREAS...
28 CFR 29.7 - Withdrawal from the program by states and localities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Withdrawal from the program by states and localities. 29.7 Section 29.7 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.7 Withdrawal from the program by states and localities. Any participating State...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-03
... Subject to the Federal Motor Vehicle Safety, Bumper, and Theft Prevention Standards. OMB Number: 2127-0002... Federal motor vehicle safety, bumper, and theft prevention standards administered by NHTSA. The... vehicles and motor vehicle equipment subject to the Federal motor vehicle safety, bumper, and theft...
76 FR 41557 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-14
... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... document grants in full the Mazda Motor Corporation (Mazda) petition for an exemption of the CX-5 vehicle... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B Appendix B to Part 541—Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject...
Code of Federal Regulations, 2010 CFR
2010-10-01
... insurers to report to the National Highway Traffic Safety Administration information about motor vehicle thefts and recoveries, the effects of the Federal motor vehicle theft prevention standard on those thefts...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.4 Definitions. (a... same make. (4) 1990/91 median theft rate means 3.5826 thefts per thousand vehicles produced. (5...
Basic bookkeeping and avoiding theft.
Nelson, Ian M
2008-07-01
Bookkeeping practices in dental offices may be relatively simple, but care must be taken to prevent employee theft. Well-chosen accounting software and routine office practices may facilitate smooth operations. Systems of internal control should be established to safeguard the practice's finances. The dental practitioner should be very involved in their practice's accounting to maintain order, prevent theft, and keep costs under control.
Seduction and Betrayal: An Insider's View of Insider Theft of Rare Materials.
ERIC Educational Resources Information Center
Traister, Daniel
1994-01-01
Discusses alternatives for dealing with insider theft of rare library materials, including publicizing losses and prosecuting. An example of insider theft is detailed. Ideas for preventing theft, including hiring practices and restricting access to materials, are considered. Suggestions for thinking through procedures to deal with the…
Design of power cable grounding wire anti-theft monitoring system
NASA Astrophysics Data System (ADS)
An, Xisheng; Lu, Peng; Wei, Niansheng; Hong, Gang
2018-01-01
In order to prevent the serious consequences of the power grid failure caused by the power cable grounding wire theft, this paper presents a GPRS based power cable grounding wire anti-theft monitoring device system, which includes a camera module, a sensor module, a micro processing system module, and a data monitoring center module, a mobile terminal module. Our design utilize two kinds of methods for detecting and reporting comprehensive image, it can effectively solve the problem of power and cable grounding wire box theft problem, timely follow-up grounded cable theft events, prevent the occurrence of electric field of high voltage transmission line fault, improve the reliability of the safe operation of power grid.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Procedures for selecting low theft light duty... TRUCK LINES TO BE COVERED BY THE THEFT PREVENTION STANDARD § 542.2 Procedures for selecting low theft... a low theft rate have major parts interchangeable with a majority of the covered major parts of a...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B...
The Step Method - Battling Identity Theft Using E-Retailers' Websites
NASA Astrophysics Data System (ADS)
Schulze, Marion; Shah, Mahmood H.
Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.
The Use of Electronic Book Theft Detection Systems in Libraries.
ERIC Educational Resources Information Center
Witt, Thomas B.
1996-01-01
Although electronic book theft detection systems can be a deterrent to library material theft, no electronic system is foolproof, and a total security program is necessary to ensure collection security. Describes how book theft detection systems work, their effectiveness, and the problems inherent in technology. A total security program considers…
Identity theft and your practice.
Asbell, Lisa
2010-01-01
Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.
78 FR 50014 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... about thefts of model year (MY) 2011 passenger motor vehicles that occurred in calendar year (CY) 2011... produced. Accordingly, Figure 1: Theft Rate Data Trend (1993-2011) has been amended to reflect the revised... comment, if submitted on behalf of an association, business, labor union, etc.). You may review DOT's...
IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud
2017-03-01
representative said that they felt they needed to provide their customers with some benefit and offered the services to give their customers peace of...satisfaction or reassurance. Some companies told us that they offered free identity theft services to give their customers peace of mind or provide...IDENTITY THEFT SERVICES Services Offer Some Benefits but Are Limited in Preventing Fraud Report to Congressional
Code of Federal Regulations, 2010 CFR
2010-10-01
... Theft Prevention to prevent or discourage the theft of motor vehicles, to prevent or discourage the sale or distribution in interstate commerce of used parts removed from stolen motor vehicles, and to help reduce the cost to consumers of comprehensive insurance coverage for motor vehicles. [62 FR 33756, June...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-31
... Module/SKREEM, or the Body Control Module/BCM are integral to the Body Computer Module (BCM) on the Fiat... addition to having to be cut to match the mechanical coding of the ignition lock cylinder and programmed...
Is your practice at risk for medical identity theft?
Weinstock, Donna
2014-01-01
Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.
NASA Astrophysics Data System (ADS)
Khair, Ummul; Jabbar Lubis, Abdul; Agustha, Indra; Dharmawati; Zulfin, M.
2017-12-01
The current electricity needs is very primary, all objects including electronics require power, it encourages people not to be able to save electricity so the theft of electric power would be done. The use of ACS712 current sensor as the sensor with arduino uno would find out the power consumption continuously and prevent the theft of electricity because of the use of electricity which has been determined by PLN and the people fetl that it is not enough for every house, so the author made a tool for prevention of theft of electric power by using the arduino uno, buzzer, ACS712 current sensor, lcd, and relay then the power usage can be controlled according to the use to prevent the occurrence of theft of electricity so the use can be seen directly on the lcd 16x2and GSM modem to give information to employees of PLN so that it can reduceelectrical theft by the public.
2013 Vehicle Theft Prevention Quick Reference Guide for the Law Enforcement Community
DOT National Transportation Integrated Search
2013-08-01
"This and future versions of the Vehicle TheftPrevention Quick Reference Guide for the Law Enforcement Community will provide comprehensive information for vehicle lines. The parts-marking requirements have been : extended to include: : all passe...
75 FR 30103 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-28
... (BCM), the PEP/RFA module and the PCM. Ford pointed out that in addition to the programmed key, the... concludes that the device will provide four of the five types of performance listed in Sec. 543.6(a)(3...
Tricks of the trade: Mechanism of brood theft in an ant.
Paul, Bishwarup; Annagiri, Sumana
2018-01-01
Thievery is ubiquitous in the animal kingdom, social insects not being an exception. Brood is invaluable for the survival of social insect colonies and brood theft is well documented in ants. In many species the stolen brood act as slaves in the thief colony as they take up tasks related to foraging, defence and colony maintenance. Slave-making (dulotic) ants are at an advantage as they gain workforce without investing in rearing immature young, and several slave-making species have been recorded in temperate regions. In the current study we investigate brood theft in a primitively eusocial ponerine ant Diacamma indicum that inhabits the tropics. In the context of colony relocation we asked how thieves steal brood and what victim colonies do to prevent theft. While exposed nests increased colonies' vulnerability, the relocation process itself did not enhance the chances of theft. Various aggressive interactions, in particular immobilization of intruders helped in preventing theft. Thieves that acted quickly, stayed furtive and stole unguarded brood were found to be successful. This comprehensive study of behavioural mechanism of theft reveals that these are the 'tricks' adopted by thieves.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION STANDARD § 543.2 Purpose. The purpose of... passenger motor vehicles to obtain an exemption from the parts-marking requirements of the vehicle theft... motor vehicle theft as compliance with the parts-marking requirements. This part also provides the...
Code of Federal Regulations, 2014 CFR
2014-04-01
... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Identity Theft Detection, Prevention, and Mitigation B Appendix B to Part 162 Commodity and Securities... Detection, Prevention, and Mitigation Section 162.30 requires each financial institution or creditor that...
49 CFR 543.9 - Terminating or modifying an exemption.
Code of Federal Regulations, 2010 CFR
2010-10-01
... TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION... compliance with the parts-marking requirements of part 541 in reducing and deterring motor vehicle theft... exemption has not been as effective as parts-marking in reducing and deterring motor vehicle theft. (2...
28 CFR 29.13 - No new conditions without consent.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false No new conditions without consent. 29.13 Section 29.13 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.13 No new conditions without consent. After the program has begun, new conditions under which a...
28 CFR 29.8 - Motor vehicle owner participation.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Motor vehicle owner participation. 29.8 Section 29.8 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.8 Motor vehicle owner participation. In order to participate in this program, the owner(s) of a...
28 CFR 29.8 - Motor vehicle owner participation.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Motor vehicle owner participation. 29.8 Section 29.8 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.8 Motor vehicle owner participation. In order to participate in this program, the owner(s) of a...
28 CFR 29.8 - Motor vehicle owner participation.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Motor vehicle owner participation. 29.8 Section 29.8 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.8 Motor vehicle owner participation. In order to participate in this program, the owner(s) of a...
28 CFR 29.8 - Motor vehicle owner participation.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Motor vehicle owner participation. 29.8 Section 29.8 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.8 Motor vehicle owner participation. In order to participate in this program, the owner(s) of a...
Code of Federal Regulations, 2010 CFR
2010-10-01
... theft prevention standard. Criteria 1. Retail price of the vehicle line. 2. Vehicle image or marketing strategy. 3. Vehicle lines with which the new line is intended to compete, and the theft rates of such...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-08
... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY: National Highway Traffic Safety Administration, Department of Transportation (DOT). ACTION: Grant of...
Tricks of the trade: Mechanism of brood theft in an ant
Paul, Bishwarup
2018-01-01
Thievery is ubiquitous in the animal kingdom, social insects not being an exception. Brood is invaluable for the survival of social insect colonies and brood theft is well documented in ants. In many species the stolen brood act as slaves in the thief colony as they take up tasks related to foraging, defence and colony maintenance. Slave-making (dulotic) ants are at an advantage as they gain workforce without investing in rearing immature young, and several slave-making species have been recorded in temperate regions. In the current study we investigate brood theft in a primitively eusocial ponerine ant Diacamma indicum that inhabits the tropics. In the context of colony relocation we asked how thieves steal brood and what victim colonies do to prevent theft. While exposed nests increased colonies’ vulnerability, the relocation process itself did not enhance the chances of theft. Various aggressive interactions, in particular immobilization of intruders helped in preventing theft. Thieves that acted quickly, stayed furtive and stole unguarded brood were found to be successful. This comprehensive study of behavioural mechanism of theft reveals that these are the ‘tricks’ adopted by thieves. PMID:29489858
49 CFR 567.7 - Requirements for persons who alter certified vehicles.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Federal motor vehicle safety, Bumper, and Theft Prevention standards, and (2) Assumes legal responsibility... Vehicle Safety, Bumper and Theft Prevention Standards affected by the alteration and in effect in (month... vehicles. 567.7 Section 567.7 Transportation Other Regulations Relating to Transportation (Continued...
An approach to meeting the spent fuel standard
DOE Office of Scientific and Technical Information (OSTI.GOV)
Makhijani, A.
1996-05-01
The idea of the spent fuel standard is that there should be a high surface gamma radiation to prevent theft. For purposes of preventing theft, containers should be massive, and the plutonium should be difficult to extract. This report discusses issues associated with the spent fuel standard.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-30
... the vehicle. The antenna module translates the radio frequency signal received from the key into a... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-30
... response back to the vehicle. The antenna module translates the radio frequency signal received from the... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-24
... vehicle. The antenna module translates the radio frequency signal received from the key into a digital... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors Corporation AGENCY: National...
Under Lock and Key: Preventing Campus Theft of Electronic Equipment.
ERIC Educational Resources Information Center
Harrison, J. Phil
1996-01-01
A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-29
... International Policy, Fuel Economy and Consumer Programs, National Highway Traffic Safety Administration, 1200... key, powered by a battery and consists of a transmitter/receiver which communicates with the EWS... and starter. The ignition and fuel supply are only released when a correct coded release signal has...
76 FR 14119 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-15
... embarrassment or harm to the reputations of the record subjects, harm to economic or property interests, identity theft or fraud, or harm to the programs (whether maintained by VA or another agency or entity... respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. This routine...
Security Considerations for Archives: Rare Book, Manuscript, and Other Special Collections.
ERIC Educational Resources Information Center
Cupp, Christian M.
The first of six sections in this guide to security for special collections in archives and libraries discusses the importance of security and the difficulty of preventing theft of archival materials. The second section, which focuses on planning, recommends an inservice training program for staff, a planned communications network between library…
Code of Federal Regulations, 2013 CFR
2013-01-01
.... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...
Code of Federal Regulations, 2014 CFR
2014-01-01
.... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...
Code of Federal Regulations, 2012 CFR
2012-01-01
.... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...
Code of Federal Regulations, 2012 CFR
2012-01-01
.... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...
Code of Federal Regulations, 2014 CFR
2014-01-01
.... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...
Code of Federal Regulations, 2011 CFR
2011-01-01
.... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...
Code of Federal Regulations, 2013 CFR
2013-01-01
.... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...
Logo Burn-In. Microcomputing Working Paper Series.
ERIC Educational Resources Information Center
Drexel Univ., Philadelphia, PA. Microcomputing Program.
This paper describes a hot-stamping operation undertaken at Drexel University in an attempt to prevent computer theft on campus. The program was initiated in response to the University's anticipated receipt of up to 3,000 Macintosh microcomputers per year and the consequent publicity the university was receiving. All clusters of computers (e.g.,…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-08
... From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars North America, Inc. AGENCY... of petition for exemption. SUMMARY: This document grants in full the Porsche Cars North America, Inc... the occupant compartment of the car. The ignition key contains a radio signal transponder, which...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-18
... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo AGENCY: National Highway Traffic... transponder is not identified, the CEM will not send an approved key signal to the IAU and the vehicle will be...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-24
... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors R&D of America, Inc. AGENCY: National... petition for exemption. SUMMARY: This document grants in full the Mitsubishi Motors R&D of America, Inc.'s...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-15
... Federal Motor Vehicle Theft Prevention Standard was extended to include all passenger cars and... Vehicle Theft Prevention Standard (Part 541), all passenger cars, and multipurpose passenger vehicles with..., 565 and 567. Part 541 The Motor Vehicle Information and Cost Savings Act was amended by the Anti-Car...
75 FR 31837 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
... agency comparing its proposed device to antitheft devices already installed in the Aston Martin Vantage... effective in contributing to a 63.5% reduction in the theft rate for the Aston Martin Vantage Line... Martin Vantage vehicle line and 0.6784 for the MY 2007. MBUSA also referenced theft data published by the...
SMR forum: Too many hands in the corporate cookie jar.
Bullard, P D; Resnik, A J
1983-01-01
Theft by employees costs American businesses and their customers many billions of dollars each year. Despite concerted efforts to reduce the problem, it appears to continue to grow. Most of these efforts concentrate on limiting the opportunity to steal. However, because the motivations for theft are varied, preventing it often requires more than tighter security. In this paper, the authors explore the extent of the problem, its causes, motivations behind employee theft, and some cost-effective ways of reducing the incidence of theft.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.2 Purpose. The purpose of this standard is to reduce the incidence of motor vehicle thefts by facilitating the tracing and...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation... AGRICULTURE GENERAL Community Programs Guaranteed Loans § 3575.73 Replacement of loss, theft, destruction... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...
Code of Federal Regulations, 2010 CFR
2010-10-01
... AND THEFT PREVENTION STANDARDS § 591.2 Purpose. The purpose of this part is to ensure that motor vehicles and motor vehicle equipment permanently imported into the United States conform with theft...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-11
...This document grants in full the petition of Hyundai-Kia Motors Corporation (HATCI) in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention Standard, for the Kia Amanti vehicle line beginning with model year (MY) 2009. This petition is granted because the agency has determined that the antitheft device to be placed on the line as standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard. HATCI requested confidential treatment for its information and attachments submitted in support of its petition. In a letter dated January 30, 2008, the agency denied HATCI's request for confidential treatment. Subsequently, HATCI requested reconsideration of the determination. In a letter dated September 25, 2008, the agency granted the petitioner's request for reconsideration of confidential treatment of the indicated areas of its petition.
76 FR 61477 - Petition for Exemption from the Vehicle Theft Prevention Standard; Volkswagen
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-04
...: This document grants in full the Volkswagen Group of America's (VW) petition for exemption of the Audi... requirements of the Theft Prevention Standard(49 CFR part 541) for the Audi A4 allroad vehicle line beginning... new Audi A4 allroad vehicle line. VW will install its passive, transponder-based electronic engine...
Code of Federal Regulations, 2014 CFR
2014-04-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Identity Theft Detection, Prevention, and Mitigation A Appendix A to Subpart C of Part 248 Commodity and...
75 FR 11005 - Final Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-10
..., Inc. (Nissan). In its comments, VW informed the agency that the entries for the Audi RS4, Audi A8, Audi A4/A4 Quattro/S4/S4 Avant and Audi RS4 were listed with incorrect manufacturer designations. The final theft data has been revised to reflect that Audi is the manufacturer for [[Page 11007
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.3 Application. (a) Except... high theft in accordance with 49 CFR 542.1; and (iv) Light duty trucks with a gross vehicle weight...
75 FR 47720 - Final Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-09
..., Inc. (Nissan). In its comments, VW informed the agency that the entries for the Audi RS4, Audi A8, Audi A4/A4 Quattro/S4/S4 Avant and Audi RS4 were listed with incorrect manufacturer designations. The final theft data has been revised to reflect that Audi is the manufacturer for the Audi RS4, Audi A8...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 6 2014-10-01 2014-10-01 false Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 6 2012-10-01 2012-10-01 false Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 6 2011-10-01 2011-10-01 false Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting...
Identity Theft in Community Mental Health Patients
Klopp, Jonathon; Konrad, Shane; Yanofski, Jason
2007-01-01
Identity theft is a serious problem in the United States, and persons with enduring mental illnesses may be particularly vulnerable to becoming victims of this crime. Victims of identity theft experience a variety of consequences that include financial loss and serious emotional distress. Little is known about the impact of identity theft on individuals with mental illnesses. The two cases from a community mental health center presented in this article demonstrate many of the facets that may be associated with an increased risk for becoming the victim of identity theft. A summary of preventive steps as well as steps involved in resolving the crime once one has become a victim are presented. PMID:20806029
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-21
...This final rule announces NHTSA's determination that there are no new model year (MY) 2011 light duty truck lines subject to the parts-marking requirements of the Federal motor vehicle theft prevention standard because they have been determined by the agency to be high-theft or because they have a majority of interchangeable parts with those of a passenger motor vehicle line. This final rule also identifies those vehicle lines that have been granted an exemption from the parts-marking requirements because the vehicles are equipped with antitheft devices determined to meet certain statutory criteria.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-12
...This final rule announces NHTSA's determination that there are no new model year (MY) 2012 light duty truck lines subject to the parts-marking requirements of the Federal motor vehicle theft prevention standard because they have been determined by the agency to be high-theft or because they have a majority of interchangeable parts with those of a passenger motor vehicle line. This final rule also identifies those vehicle lines that have been granted an exemption from the parts-marking requirements because the vehicles are equipped with antitheft devices determined to meet certain statutory criteria.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-23
...This final rule announces NHTSA's determination that there are no new model year (MY) 2014 light duty truck lines subject to the parts-marking requirements of the Federal motor vehicle theft prevention standard because they have been determined by the agency to be high-theft or because they have a majority of interchangeable parts with those of a passenger motor vehicle line. This final rule also identifies those vehicle lines that have been granted an exemption from the parts-marking requirements because the vehicles are equipped with antitheft devices determined to meet certain statutory criteria.
Combating employee theft in the healthcare industry.
Marquet, Christopher T
2011-01-01
The healthcare industry is especially susceptible to internal fraud and employee theft, the author's research has found. He presents details of 14 costly healthcare embezzlements that took place in three months and gives insight into schemes employed on the most common types of embezzlement. He also describes proactive steps which can be taken to prevent, detect and respond to this phenomenon as well as providing a primer on conducting an internal theft investigation.
75 FR 18885 - Agency Information Collection Activities: Proposed Collection; Comments Requested
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
... of information collection under review: Interstate firearms shipment report of theft/loss. The...: Interstate Firearms Shipment Report of Theft/Loss. (3) Agency form number, if any, and the applicable... is part of a voluntary program in which the common carrier and/or shipper report losses or thefts of...
75 FR 6706 - Agency Information Collection Activities: Proposed Collection; Comments Requested
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-10
... of Information Collection Under Review: Interstate Firearms Shipment Report of Theft/Loss. The...: Interstate Firearms Shipment Report of Theft/Loss. (3) Agency form number, if any, and the applicable... a voluntary program in which the common carrier and/or shipper report losses or thefts of firearms...
'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.
Nettle, Daniel; Nott, Kenneth; Bateson, Melissa
2012-01-01
Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98), a large effect compared to other place-based crime prevention interventions. The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.
Investigating the Identity Theft Prevention Strategies in M-Commerce
ERIC Educational Resources Information Center
Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed
2016-01-01
Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…
Barker, Edward D.; Tremblay, Richard E.; van Lier, Pol A.C.; Vitaro, Frank; Nagin, Daniel S.; Assaad, Jean-Marc; Séguin, Jean R.
2012-01-01
There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been shown to be either positively or not related to neurocognition. The specificity of these links needs further examination because attention deficit hyperactivity disorder (ADHD) links to both physical aggression and neurocognitive variation. The development of self-reported physical aggression and theft, from age 11 to 17 years, was studied in a prospective at-risk male cohort via a dual process latent growth curve model. Seven neurocognitive tests at age 20 were regressed on the growth parameters of physical aggression and theft. The links between neurocognition and the growth parameters of physical aggression and theft were adjusted for ADHD symptoms at ages 11 and 15 (parent, child and teacher reports). Results indicated that verbal abilities were negatively related to physical aggression while they were positively associated with theft. However, inductive reasoning was negatively associated with increases in theft across adolescence. Symptoms of ADHD accounted for part of the neurocognitive test links with physical aggression but did not account for the associations with theft. These differences emphasize the importance of examining specific CD behaviors to better understand their neurodevelopmental mechanisms. They also suggest that youth who engage in different levels of physical aggression or theft behaviors may require different preventive and corrective interventions. PMID:21046606
Barker, Edward D; Tremblay, Richard E; van Lier, Pol A C; Vitaro, Frank; Nagin, Daniel S; Assaad, Jean-Marc; Séguin, Jean R
2011-01-01
There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been shown to be either positively or not related to neurocognition. The specificity of these links needs further examination because attention deficit hyperactivity disorder (ADHD) links to both physical aggression and neurocognitive variation. The development of self-reported physical aggression and theft, from age 11 to 17 years, was studied in a prospective at-risk male cohort via a dual process latent growth curve model. Seven neurocognitive tests at age 20 were regressed on the growth parameters of physical aggression and theft. The links between neurocognition and the growth parameters of physical aggression and theft were adjusted for ADHD symptoms at ages 11 and 15 (parent, child and teacher reports). Results indicated that verbal abilities were negatively related to physical aggression while they were positively associated with theft. However, inductive reasoning was negatively associated with increases in theft across adolescence. Symptoms of ADHD accounted for part of the neurocognitive test links with physical aggression but did not account for the associations with theft. These differences emphasize the importance of examining specific CD behaviors to better understand their neurodevelopmental mechanisms. They also suggest that youth who engage in different levels of physical aggression or theft behaviors may require different preventive and corrective interventions. © 2010 Wiley-Liss, Inc.
Doubly illegal: Qualitative accounts of underage alcohol access through theft
Jennings, Vanessa K.; Friese, Bettina; Moore, Roland S.; Grube, Joel W.
2012-01-01
This study investigated sources of alcohol for underage drinkers. In-depth, semi-structured interviews were individually conducted with 47 youths, ages 15–18, who reported drinking within the last 12 months, to explore alcohol access. Theft was one method that some youths reported using to obtain alcohol. In addition to 9% of respondents who reported stealing alcohol from commercial outlets themselves, a total of 26% respondents reported occasions when their close friends stole alcohol. Our findings unveiled that teens had a body of knowledge that some drew upon for stealing alcohol. Youths revealed detailed knowledge about store layout, theft protection devices and store policies. In particular, respondents disclosed knowledge about which aisles have blind spots, how to remove security tops on bottles, and no-chase policies. Theft of alcohol from commercial sources may be reduced by examining the weaknesses of existing theft prevention practices, and revising store policies. PMID:22303285
Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.
Mburu, Lucy Waruguru; Helbich, Marco
2016-01-01
Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.
Media coverage of controlled substance diversion through theft or loss.
Brushwood, David B; Kimberlin, Carole A
2004-01-01
To determine the frequency of media reports of controlled substance diversion. Quantitative search of news articles from LexisNexis Academic, using search strings related to four different types of controlled substance diversion. Not applicable. Not applicable. Number of media reports about diversion of controlled substances at the prescriber or dispenser levels, through pharmacy robberies or thefts, and through hijackings or robberies of shipments. Media reports of controlled substance diversion indicate that theft and loss are important problems and that inappropriate prescribing and dispensing are substantial problems as well. Leaks of controlled substances from the closed system of distribution seem to be increasing as rapidly through theft and loss as through inappropriate prescribing and dispensing. During the five biennia between 1993 and 2002, these percentage increases in media reports were observed for the different types of diversion: 200% for prescribers; 350% for dispensers; 133% for pharmacy robberies and thefts; and 1,800% for thefts from shipping channels. A balanced approach to the prevention of controlled substance diversion, aimed at reducing illicit acquisition of drugs from theft and loss as well as from prescribing and dispensing, may produce the greatest success without adversely affecting the quality of patient care.
‘Cycle Thieves, We Are Watching You’: Impact of a Simple Signage Intervention against Bicycle Theft
Nettle, Daniel; Nott, Kenneth; Bateson, Melissa
2012-01-01
Background Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of ‘watching eyes’ has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. Methodology and Principal Findings We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04–8.98), a large effect compared to other place-based crime prevention interventions. Conclusions and Significance The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending. PMID:23251615
75 FR 19673 - Petition for Exemption From the Vehicle Theft Prevention Standard; Saab
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-15
... module (BCM), passive entry passive start module (PEPS), intrusion/inclination sensor, an immobilizer... must be performed by communication between the PEPS and the BCM jointly with the UID (key fob... Saab 9-3, has been designed to enhance the functionality and theft protection provided by Saab's first...
Impact of identity theft on methods of identification.
McLemore, Jerri; Hodges, Walker; Wyman, Amy
2011-06-01
Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.
Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK
Helbich, Marco
2016-01-01
Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use. PMID:27643788
76 FR 2598 - Final Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-14
... ``Quattro'' and ``Avant'' should be deleted from the Volkswagen and Audi vehicle line nomenclature. The..., Quattro and Avant have been deleted from the vehicle line nomenclature for the Volkswagen and Audi vehicle lines. Therefore, the entry for the Audi A6/A6 Quattro/S6/ S6 Avant has been changed to the Audi A6 and...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-13
... the Security Controller as long as the PET is in close proximity to the car and the driver either... exemption. SUMMARY: This document grants in full the petition of Tesla Motors Inc's. (Tesla) for an exemption of the Model S vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft...
Xu, Jianhua
2012-04-01
Using the example of motorcycle ban policy in Guangzhou, the capital of Guangdong province, this article examines how situational crime prevention strategies are used in contemporary urban China. The article argues that although a motorcycle ban policy may reduce motorcycle snatch theft (feiche qiangduo) in Guangzhou, it inevitably caused a problem of displacement. However, some types of displacement are desirable for local government. An argument about drive-away policing is proposed in this article to understand policing styles in contemporary China. In addition, the article argues that motorcycle ban, as a strategy to prevent snatch theft and robbery, is also a strategy to deal with the crisis in police legitimacy. Therefore, crime prevention in China has more social and political significance than just reducing crime.
Using aerial infrared thermography to detect utility theft of service
NASA Astrophysics Data System (ADS)
Stockton, Gregory R.; Lucas, R. Gillem
2012-06-01
Natural gas and electric utility companies, public utility commissions, consumer advocacy groups, city governments, state governments and the federal government United States continue to turn a blind eye towards utility energy theft of service which we conservatively estimate is in excess of 10 billion a year. Why? Many in the United States have exhausted their unemployment benefits. The amounts for federal funding for low income heating assistance programs (LIHEAP) funds were cut by nearly 40% for 2012 to 3.02 billion. "At peak funding ($5.1 billion in 2009), the program was national in scale but still only had enough resources to support roughly 1/4 of the eligible households.i" Contributions to charities are down and the number of families below the poverty line who are unable to pay to heat their houses continues to rise. Many of the less fortunate in our society now consider theft and fraud to be an attractive option for their supply of natural gas and/or electricity. A record high mild winter in 2011-2012 coupled with 10-year low natural gas prices temporarily obscured the need for low income heating assistance programs (LIHEAPs) from the news and federal budgets, but cold winters will return. The proliferation of smart meters and automated meter infrastructures across our nation can do little to detect energy theft because the thieves can simply by-pass the meters, jumper around the meters and/or steal meters from abandoned houses and use them. Many utility systems were never set-up to stop these types of theft. Even with low-cost per identified thief method using aerial infrared thermography, utilities continue to ignore theft detection.
77 FR 38024 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-26
... AUDI AUDI S4/S5...... 11 7,068 1.5563 38 NISSAN PATHFINDER...... 16 10,308 1.5522 39 GENERAL MOTORS............ DODGE NITRO..... 17 19,432 0.8748 88 AUDI AUDI A3......... 4 4,587 0.8720 89 HYUNDAI GENESIS......... 25... CROSSTOUR 29 34,114 0.8501 93 HONDA CIVIC 217 259,907 0.8349 94 AUDI AUDI TT......... 1 1,201 0.8326 95...
Identity Theft - The National Guard
Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front name. Social Security Numbers - If after doing everything in your power to clear up the effects of identity theft you discover someone is still fraudulently using your Social Security Number, you can
A study for prevent theft of the bike design and analysis
NASA Astrophysics Data System (ADS)
Huang, Yu-Che; Huang, Tai-Shen
2017-10-01
This research will deal with the analysis and design of an anti-theft bicycle. At the first, the structure of the bicycle lock device will be focused. Therefore, all related academic journals, dissertations, and patent were collected, ordered, classified, and analysis in order to understand the phase of the developing tendency towards the bicycle lock apparatus presently. Nowadays, a wave of riding bicycles all over the world is quite prevailing. Also, the bicycles incline to be high-price sporting and recreational equipment. Due to this, the rate of stolen bicycles has increased as well. Even though there are many different types of bicycle locks sold on the market, they are unable to work out effectively to prevent from being stolen because they are easy to be broken. In this case, the target design in this research will be mainly put on the simple structure and facile use enabling users feeling secure to park their bicycles. The design also includes a lock that works together with the bicycle frame to provide a new option of anti-theft design for bicycles. We defined the functional requirements by the process of an innovative mechanical design, before designing the fundamental bicycle structure of the present anti-theft bicycle and finally integrate all the requirements of design. The SolidWorks software was used to draw a 3D model of the anti-theft bicycle; the ANSYS software was also used to do CAE analysis, to understand the distribution of stress, so that the design and the requirements of use are met.
77 FR 58500 - Final Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-21
......... CHEVROLET CAMARO.... 190 117,961 1.6107 36 FORD MOTOR CO....... FOCUS 279 176,089 1.5844 37 AUDI AUDI S4/S5....8783 87 CHRYSLER DODGE NITRO......... 17 19,432 0.8748 88 AUDI AUDI A3 4 4,587 0.8720 89 HYUNDAI... ACCORD CROSSTOUR.... 29 34,114 0.8501 93 HONDA CIVIC 217 259,907 0.8349 94 AUDI AUDI TT 1 1,201 0.8326 95...
Deterring and remedying employee theft.
Buzogany, Bill; Mueller, Michael J
2010-01-01
Employee theft of patient-related information for personal financial gain is a serious threat to the success and financial viability of many healthcare providers. You can safeguard your financial interest in your patient base by taking three preventative measures designed to dissuade your employees from stealing from you. The first step is the implementation of policies and procedures that inform your employees that patient-related information is a valuable business asset that you vigorously protect from misappropriation. The second step is strictly limiting and monitoring employee access to patient-related information. The third step is educating your employees of the potential legal consequences to them in the event they steal from you and, in the event of theft, pursuing all legal remedies available to you.
Code of Federal Regulations, 2014 CFR
2014-07-01
... disability; (6) Upon receipt of a valid identity theft report as defined in section 603(q)(4) of the Fair... furnished by the lender is a result of an alleged identity theft as defined in § 682.402(e)(14), for a... requirements of the teacher loan forgiveness program in § 682.216; and (iii) In yearly increments (or a lesser...
Code of Federal Regulations, 2011 CFR
2011-04-01
... controlled substances within one business day of discovery of the theft or loss. The supplier is responsible... selected pursuant to paragraph (e) of this section, within one business day of discovery of such theft or... of business; (2) The specific controlled substances lost; (3) Whether the loss of the controlled...
Code of Federal Regulations, 2010 CFR
2010-04-01
... controlled substances within one business day of discovery of the theft or loss. The supplier is responsible... selected pursuant to paragraph (e) of this section, within one business day of discovery of such theft or... of business; (2) The specific controlled substances lost; (3) Whether the loss of the controlled...
Cook, Philip J
2018-06-01
Some law enforcement officials and other observers have asserted that theft is the primary source of guns to crime. In fact, the role of theft in supplying the guns used in robbery, assault, and murder is unknown, and current evidence provides little guidance about whether an effective program to reduce gun theft would reduce gun violence. The current article analyzes publicly available national data on gun theft together with a unique data set for Chicago. The results tend to support a conclusion that stolen guns play only a minor role in crime. First, publicly available data are used to calculate that thefts are only about 1% of all gun transactions nationwide. Second, an analysis of original data from Chicago demonstrates that less than 3% of crime guns recovered by the police have been reported stolen to the Chicago Police Department (CPD). If a gun is reported stolen, there is a 20% chance that it will be recovered, usually in conjunction with an arrest for illegal carrying. Less than half of those picked up with a stolen gun have a criminal record that includes violent offenses. Third, results from surveys of convicted criminals, both nationally and in Chicago, suggest that it is rare for respondents to have stolen the gun used in their most recent crime. The data on which these results are based have various shortcomings. A research agenda is proposed that would provide more certainty about the role of theft.
Workplace violence: impact, causes, and prevention.
Dillon, Bobbie L
2012-01-01
Using a variety of sources, the author explores the complex reasons for aggression and violence in workplace settings, as well as suggesting means of prevention and intervention. Literature Review. Studies indicate workplace violence affects more than half of U.S. organizations, yet nearly 70 percent have no programs or policies to deal with this problem. Research indicates that aggressive behavior of a psychological nature often precedes physical violence in the workforce, yet employers regularly ignore warning signs even when reported by employees. Costs to U.S. employers are estimated in the millions due to employee absences, medical costs, theft, and costs related to litigation. Organizations with cultures which support fair working conditions and zero-tolerance for workplace aggression have been shown to help mitigate workplace violence.
75 FR 50733 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-17
... 38 GENERAL MOTORS CHEVROLET MALIBU 423 155,433 2.7214 39 KIA RIO 92 35,014 2.6275 40 AUDI AUDI S8/S8.../SOLARA 390 257,638 1.5138 81 FORD MOTOR CO MERCURY GRAND MARQUIS 66 44,071 1.4976 82 AUDI AUDI A3/A3... HYUNDAI ELANTRA 160 109,498 1.4612 86 AUDI AUDI A6/A6 QUATTRO/S6/S6 AVANT 24 16,651 1.4414 87 KIA SPORTAGE...
78 FR 41016 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-09
... NISSAN ALTIMA 387 179,269 2.1588 18 AUDI AUDI A8 10 4,751 2.1048 19 MAZDA 6 52 25,456 2.0427 20 GENERAL...,821 1.5360 34 TOYOTA YARIS 38 24,850 1.5292 35 AUDI AUDI A3 10 6,734 1.4850 36 CHRYSLER 300 42 28,373....1383 59 FORD MOTOR CO...... FUSION 239 211,964 1.1276 60 AUDI AUDI A6 8 7,108 1.1255 61 CHRYSLER 200 72...
76 FR 65610 - Final Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-24
...) 2009 vehicles produced) 1 AUDI AUDI S8 2 227 8.8106 2 FORD MOTOR CO...... SHELBY GT 5 581 8.6059 3 BMW... 31,667 3.3789 13 CHRYSLER SEBRING 65 19,588 3.3184 14 AUDI AUDI A8 6 1,810 3.3149 15 VOLVO V70 3 996...,346 1.3532 73 NISSAN FRONTIER PICKUP.... 31 23,030 1.3461 74 VOLVO S40 9 6,743 1.3347 75 AUDI AUDI A3...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL-VOLUME LINE REPORTING REQUIREMENTS § 545.3 Applicability. This subpart applies to manufacturers of motor vehicles. ...
76 FR 36486 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-22
... produced) 1 AUDI AUDI S8 2 227 8.8106 2 FORD MOTOR CO SHELBY GT 5 581 8.6059 3 BMW M5 2 264 7.5758 4... 107 31,667 3.3789 12 CHRYSLER SEBRING 65 19,588 3.3184 13 AUDI AUDI A8 6 1,810 3.3149 14 VOLVO V70 3... FRONTIER PICKUP........ 31 23,030 1.3461 74 VOLVO S40 9 6,743 1.3347 75 AUDI AUDI A3 5 3,761 1.3294 76 FORD...
A Healthy Approach to Fitness Center Security.
ERIC Educational Resources Information Center
Sturgeon, Julie
2000-01-01
Examines techniques for keeping college fitness centers secure while maintaining an inviting atmosphere. Building access control, preventing locker room theft, and suppressing causes for physical violence are discussed. (GR)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-01
...The National Highway Traffic Safety Administration (NHTSA) published a document in the Federal Register of June 21, 2010, announcing NHTSA's determination that there were no new model year (MY) 2011 light-duty truck lines subject to the requirements of the Federal motor vehicle theft prevention standard. The final rule also identified those vehicle lines that had been granted an exemption from the parts- marking requirements for the 2011 model year and those vehicle lines the agency removed because certain vehicle lines had been discontinued more than 5 years ago. This document corrects certain information published in the SUPPLEMENTARY INFORMATION section and Appendix A-I listing of the final rule. All previous information associated with the published notice remains the same.
Teachers' Guide: Rural Crime Prevention Guide for Young People.
ERIC Educational Resources Information Center
Wurschmidt, Todd N.; Phillips, G. Howard
Crimes against property (vandalism, theft, and burglary) committed by teenagers are increasing at an alarming rate in rural America. The content of this manual aims to reverse this pernicious trend by providing rural Ohio secondary students with preventative education which supplements existing civics and government courses. Hopefully, presenting…
Nuclear Power Plant Security and Vulnerabilities
2009-03-18
Commercial Spent Nuclear Fuel Storage , Public Report...systems that prevent hot nuclear fuel from melting even after the chain reaction has stopped, and storage facilities for highly radioactive spent nuclear ... nuclear fuel cycle facilities must defend against to prevent radiological sabotage and theft of strategic special nuclear material. NRC licensees use
Smartphone Theft Prevention Act
Sen. Klobuchar, Amy [D-MN
2014-02-12
Senate - 02/12/2014 Read twice and referred to the Committee on Commerce, Science, and Transportation. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Metal Theft Prevention Act of 2013
Sen. Klobuchar, Amy [D-MN
2013-02-27
Senate - 06/17/2013 Placed on Senate Legislative Calendar under General Orders. Calendar No. 88. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Metal Theft Prevention Act of 2013
Rep. Paulsen, Erik [R-MN-3
2013-02-27
House - 04/08/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Identity Theft Prevention Act of 2011
Rep. Paul, Ron [R-TX-14
2011-01-07
House - 02/08/2011 Referred to the Subcommittee on Government Organization, Efficiency, and Financial Management . (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Code of Federal Regulations, 2010 CFR
2010-10-01
...-0039 Part 566 2127-0043 Consolidated owners' manual requirements for vehicles and equipment (§§ 571.126... Theft Prevention Standard and Labeling Requirements (parts 541, 565, 567 and § 571.115) 2127-0510...
Tax Crimes and Identity Theft Prevention Act
Rep. Castor, Kathy [D-FL-14
2013-02-06
House - 02/28/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Anti Theft Mechanism Through Face recognition Using FPGA
NASA Astrophysics Data System (ADS)
Sundari, Y. B. T.; Laxminarayana, G.; Laxmi, G. Vijaya
2012-11-01
The use of vehicle is must for everyone. At the same time, protection from theft is also very important. Prevention of vehicle theft can be done remotely by an authorized person. The location of the car can be found by using GPS and GSM controlled by FPGA. In this paper, face recognition is used to identify the persons and comparison is done with the preloaded faces for authorization. The vehicle will start only when the authorized personís face is identified. In the event of theft attempt or unauthorized personís trial to drive the vehicle, an MMS/SMS will be sent to the owner along with the location. Then the authorized person can alert the security personnel for tracking and catching the vehicle. For face recognition, a Principal Component Analysis (PCA) algorithm is developed using MATLAB. The control technique for GPS and GSM is developed using VHDL over SPTRAN 3E FPGA. The MMS sending method is written in VB6.0. The proposed application can be implemented with some modifications in the systems wherever the face recognition or detection is needed like, airports, international borders, banking applications etc.
A novel anti-theft security system for photovoltaic modules
NASA Astrophysics Data System (ADS)
Khan, Wasif Ali; Lim, Boon-Han; Lai, An-Chow; Chong, Kok-Keong
2017-04-01
Solar farms are considered as easy target for thieves because of insufficient protection measures. Existing anti-theft approaches are based on system level and are not very preventive and efficient because these can be bypassed with some technical knowledge. Additionally, it is difficult for security guards to tackle them as robbers come in a form of a gang equipped with heavy weapons. In this paper, a low power auto shut-off and non-destructive system is proposed for photovoltaic (PV) modules to achieve better level of security at module level. In proposed method, the power generation function of the PV module will be shut-off internally and cannot be re-activated by unauthorized personnel, in the case of theft. Hence, the PV module will not be functional even sold to new customers. The system comprises of a microcontroller, a low power position sensor, a controllable semiconductor switch and a wireless reactive-able system. The anti-theft system is developed to be laminated inside PV module and will be interconnected with solar cells so it becomes difficult for thieves to temper. The position of PV module is retrieved by position sensor and stored in a microcontroller as an initial reference value. Microcontroller uses this stored reference value to control power supply of PV module via power switch. The stored reference value can be altered using wireless circuitry by following authentication protocol. It makes the system non-destructive as anti-theft function can be reset again by authorized personnel, if it is recovered after theft or moved for maintenance purposes. The research component includes the design of a position sensing circuit, an auto shut-off circuit, a reactive-able wireless security protection algorithm and finally the integration of the multiple circuits.
Code of Federal Regulations, 2011 CFR
2011-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation A Appendix A to Part 681 Commercial Practices FEDERAL TRADE COMMISSION...
Code of Federal Regulations, 2012 CFR
2012-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation A Appendix A to Part 681 Commercial Practices FEDERAL TRADE COMMISSION...
Code of Federal Regulations, 2013 CFR
2013-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation A Appendix A to Part 681 Commercial Practices FEDERAL TRADE COMMISSION...
Code of Federal Regulations, 2014 CFR
2014-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation A Appendix A to Part 681 Commercial Practices FEDERAL TRADE COMMISSION...
Taxpayer Identity Theft Prevention and Enforcement Act of 2014
Rep. Marchant, Kenny [R-TX-24
2014-07-29
House - 09/26/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
49 CFR Appendix C to Part 591 - Power of Attorney and Agreement
Code of Federal Regulations, 2010 CFR
2010-10-01
... TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS Pt. 591, App. C Appendix C to...
Secondary Metal Theft Prevention Act of 2009
Sen. Klobuchar, Amy [D-MN
2009-02-11
Senate - 02/11/2009 Read twice and referred to the Committee on Commerce, Science, and Transportation. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
7 CFR 247.28 - Storage and inventory of commodities.
Code of Federal Regulations, 2014 CFR
2014-01-01
..., DEPARTMENT OF AGRICULTURE CHILD NUTRITION PROGRAMS COMMODITY SUPPLEMENTAL FOOD PROGRAM § 247.28 Storage and... must provide for storage of commodities that protects them from theft, spoilage, damage or destruction...
7 CFR 247.28 - Storage and inventory of commodities.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., DEPARTMENT OF AGRICULTURE CHILD NUTRITION PROGRAMS COMMODITY SUPPLEMENTAL FOOD PROGRAM § 247.28 Storage and... must provide for storage of commodities that protects them from theft, spoilage, damage or destruction...
7 CFR 247.28 - Storage and inventory of commodities.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., DEPARTMENT OF AGRICULTURE CHILD NUTRITION PROGRAMS COMMODITY SUPPLEMENTAL FOOD PROGRAM § 247.28 Storage and... must provide for storage of commodities that protects them from theft, spoilage, damage or destruction...
7 CFR 247.28 - Storage and inventory of commodities.
Code of Federal Regulations, 2013 CFR
2013-01-01
..., DEPARTMENT OF AGRICULTURE CHILD NUTRITION PROGRAMS COMMODITY SUPPLEMENTAL FOOD PROGRAM § 247.28 Storage and... must provide for storage of commodities that protects them from theft, spoilage, damage or destruction...
7 CFR 247.28 - Storage and inventory of commodities.
Code of Federal Regulations, 2012 CFR
2012-01-01
..., DEPARTMENT OF AGRICULTURE CHILD NUTRITION PROGRAMS COMMODITY SUPPLEMENTAL FOOD PROGRAM § 247.28 Storage and... must provide for storage of commodities that protects them from theft, spoilage, damage or destruction...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Application. 567.2 Section 567.2 Transportation..., DEPARTMENT OF TRANSPORTATION CERTIFICATION § 567.2 Application. (a) This part applies to manufacturers... Safety, Bumper and Theft Prevention Standards. ...
Medicare Identity Theft Prevention Act of 2012
Rep. Johnson, Sam [R-TX-3
2011-04-13
Senate - 12/21/2012 Received in the Senate and Read twice and referred to the Committee on Finance. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Social Security Number Fraud and Identity Theft Prevention Act
Rep. Coffman, Mike [R-CO-6
2009-05-19
House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
77 FR 15351 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-15
... of Automobile Manufacturers requesting an extension of the comment period. The petitioner argued that.... On February 29, 2012, the Alliance of Automobile Manufacturers (Alliance) sent a letter to NHTSA...
75 FR 15621 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-30
... Transportation (DOT). ACTION: Final rule. SUMMARY: Pursuant to a statutory mandate in the Cameron Gulbransen Kids.... Statutory Mandate and Background On February 28, 2008, the ``Cameron Gulbransen Kids Transportation Safety...
Code of Federal Regulations, 2012 CFR
2012-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 41 Banks and Banking COMPTROLLER OF THE CURRENCY...
Code of Federal Regulations, 2013 CFR
2013-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 222 Banks and Banking FEDERAL RESERVE SYSTEM...
Code of Federal Regulations, 2013 CFR
2013-01-01
... should take steps to ensure that the activity of the service provider is conducted in accordance with... financial institution or creditor detects a fraud or active duty alert; (c) Implementing any requirements... Detection, Prevention, and Mitigation J Appendix J to Part 334 Banks and Banking FEDERAL DEPOSIT INSURANCE...
Code of Federal Regulations, 2013 CFR
2013-01-01
... the financial institution or creditor should take steps to ensure that the activity of the service... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation Appendix to Subpart C of Part 391 Banks and Banking FEDERAL DEPOSIT...
Code of Federal Regulations, 2011 CFR
2011-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 41 Banks and Banking COMPTROLLER OF THE CURRENCY...
Code of Federal Regulations, 2014 CFR
2014-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 222 Banks and Banking FEDERAL RESERVE SYSTEM...
Code of Federal Regulations, 2013 CFR
2013-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 41 Banks and Banking COMPTROLLER OF THE CURRENCY...
Code of Federal Regulations, 2014 CFR
2014-01-01
... should take steps to ensure that the activity of the service provider is conducted in accordance with... financial institution or creditor detects a fraud or active duty alert; (c) Implementing any requirements... Detection, Prevention, and Mitigation J Appendix J to Part 334 Banks and Banking FEDERAL DEPOSIT INSURANCE...
Code of Federal Regulations, 2014 CFR
2014-01-01
... the financial institution or creditor should take steps to ensure that the activity of the service... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation Appendix to Subpart C of Part 391 Banks and Banking FEDERAL DEPOSIT...
Code of Federal Regulations, 2011 CFR
2011-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 222 Banks and Banking FEDERAL RESERVE SYSTEM...
Code of Federal Regulations, 2012 CFR
2012-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 222 Banks and Banking FEDERAL RESERVE SYSTEM...
Code of Federal Regulations, 2014 CFR
2014-01-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 41 Banks and Banking COMPTROLLER OF THE CURRENCY...
Code of Federal Regulations, 2012 CFR
2012-01-01
... should take steps to ensure that the activity of the service provider is conducted in accordance with... financial institution or creditor detects a fraud or active duty alert; (c) Implementing any requirements... Detection, Prevention, and Mitigation J Appendix J to Part 334 Banks and Banking FEDERAL DEPOSIT INSURANCE...
Antitheft container for instruments
NASA Technical Reports Server (NTRS)
Kerley, J. J., Jr.
1979-01-01
Antitheft container is used to prevent theft of calculators, portable computers, and other small instruments. Container design is simple and flexible enough to allow easy access to display or input systems of instruments, while not interfering with power input to device.
78 FR 4195 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-18
..., transmitter key, electronic ignition starter switch control unit (EIS), the engine control module (ECM) and... immobilizer function. The interlinked system includes the engine, EIS, transmitter key, TCM and ECM (including...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-29
...) transceiver and a microprocessor and it initiates the ignition process by communicating with the BCM through SKIS. The microprocessor-based SKIS hardware and software also use electronic messages to communicate...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-30
... (RFHM), Ignition Node Module (IGNM), Engine Control Module, Body Controller Module, Sentry Key... disable engine operation and immobilize the vehicle after two seconds of running. This process is also...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Definitions. 543.4 Section 543.4 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION STANDARD § 543.4 Definitions. (a...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-03
...), Ignition Node Module (IGNM), Engine Control Module (ECM), Body Controller Module (BCM), Sentry Key..., Chrysler stated that the RFHM sends an invalid key message to the ECM, which will disable engine operation...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-04
...), assembly, transponder key amplifier, security indicator, ignition key and Electronic control module (ECM... been verified, the immobilizer allows the ECM to start the engine. Toyota also stated that there will...
76 FR 8400 - National Highway Traffic Safety Administration
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-14
... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety Administration (NHTSA) Department of Transportation (DOT). ACTION: Grant of petition for exemption. SUMMARY: This...
ERIC Educational Resources Information Center
Baine, Martha S.
1993-01-01
Reports on a survey of high school students' attitudes toward the destruction of materials in their school library media center. The association of rule breaking with grade level, reasons for the behavior, willingness to report violators, and respondents' preferred preventative measures (e.g., improved photocopying services) are discussed.…
76 FR 16472 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-23
... a separate encrypted message to the body control module, the PEP/RFA module and the PCM. Ford... for the Volvo S60 for MYs 2006-2008 are 1.3803, 0.6907 and 2.3543 respectively. Using an average of 3...(a)(3): Promoting activation; preventing defeat or circumvention of the device by unauthorized...
Employee satisfaction and theft: testing climate perceptions as a mediator.
Kulas, John T; McInnerney, Joanne E; DeMuth, Rachel Frautschy; Jadwinski, Victoria
2007-07-01
Employee theft of both property and time is an expensive and pervasive problem for American organizations. One antecedent of theft behaviors is employee dissatisfaction, but not all dissatisfied employees engage in withdrawal or theft behaviors. The authors tested a model of theft behavior by using an organization's climate for theft as an explanatory mechanism. They found that dissatisfaction influenced employee theft behaviors through the intermediary influence of employees' individual perceptions of the organization's climate for theft. The authors encourage organizations to pay attention to such climate elements and take action to alter employee perceptions if they reflect permissive attitudes toward theft.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burger, J.R.
Loss control, both as a phrase and a concept, isn't used very widely in the U.S. coal industry although a U.S. manufacturer has cut accidents 71% and increased productivity 40% using the system. Safety is a part of the loss control concept, but it goes beyond traditional accident and illness prevention to become management control of anything that can result in loss or property damage. This includes what ILCI calls incidents, that is, ''any undesired or unwanted event that could (or does) degrade the efficiency of the business operation.'' These incidents could be accidents, quality or production problems, or evenmore » security breaches (such as thefts). So while safety is always a basic element-loss control also includes absenteeism control, security, fire prevention and industrial hygiene, since they're all interrelated disciplines for reducing loss. A baseline evaluation is followed by recommendations and guidance in self-sustaining corrective measures. This program would cost about $3,500 the first year. Possibly this approach is not used in the U.S. because miners feel that with all the legislation and regulation of the industry no further program is needed.« less
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Reports of loss or theft or attempted theft or... Requirements § 74.11 Reports of loss or theft or attempted theft or unauthorized production of special nuclear... plutonium shall notify the NRC Operations Center within 1 hour of discovery of any loss or theft or other...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Application. 543.3 Section 543.3 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION STANDARD § 543.3 Application. This part...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Scope. 541.1 Section 541.1 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.1 Scope. This standard...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Scope. 543.1 Section 543.1 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION STANDARD § 543.1 Scope. This part...
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.1 Scope. This part establishes procedures governing the importation of motor vehicles and motor vehicle equipment subject to the Federal motor vehicle safety, bumper...
49 CFR 545.4 - Response to inquiries.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL..., 2007, each manufacturer must, upon request from the Office of Vehicle Safety Compliance, provide information identifying the vehicles (by make, model, and vehicle identification number) that have been...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Purpose. 545.2 Section 545.2 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL-VOLUME LINE...
78 FR 4192 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-18
... Smart Power Distribution Junction Box (SPDJB), the PEPS/RFA module, the power train control module and a... listed in Sec. 543.6(a)(3): promoting activation; attracting attention to the efforts of unauthorized...
Code of Federal Regulations, 2011 CFR
2011-01-01
... institution or creditor or to a fraudulent Web site. Appropriate responses may include the following: (a... consumer report; or b. The Social Security Number (SSN) has not been issued, or is listed on the Social...
Code of Federal Regulations, 2012 CFR
2012-10-01
.... (2) Chapter 303—National Driver Register. (3) Chapter 305—National Automobile Title Information.... (7) Chapter 327—Odometers. (8) Chapter 329—Automobile Fuel Economy. (9) Chapter 331—Theft Prevention... and maintenance, traffic control devices, identification and surveillance of accident locations, and...
Code of Federal Regulations, 2011 CFR
2011-10-01
.... (2) Chapter 303—National Driver Register. (3) Chapter 305—National Automobile Title Information.... (7) Chapter 327—Odometers. (8) Chapter 329—Automobile Fuel Economy. (9) Chapter 331—Theft Prevention... and maintenance, traffic control devices, identification and surveillance of accident locations, and...
49 CFR 543.8 - Duration of exemption.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Duration of exemption. 543.8 Section 543.8 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION STANDARD § 543.8 Duration of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-04
... Crosstrek, Toyota Prius and the Volkswagen Audi A4 Allroad (MPV). Subsequent to publishing the April 12.... Therefore, the agency is removing the Ford Five-Hundred (2007) and Volkswagen Audi Allroad vehicle lines...
49 CFR 545.4 - Response to inquiries.
Code of Federal Regulations, 2012 CFR
2012-10-01
... information identifying the vehicles (by make, model, and vehicle identification number) that have been... vehicles (by make, model, and vehicle identification number) that are excluded from the requirements of 49... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL...
49 CFR 545.4 - Response to inquiries.
Code of Federal Regulations, 2014 CFR
2014-10-01
... information identifying the vehicles (by make, model, and vehicle identification number) that have been... vehicles (by make, model, and vehicle identification number) that are excluded from the requirements of 49... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL...
49 CFR 545.4 - Response to inquiries.
Code of Federal Regulations, 2013 CFR
2013-10-01
... information identifying the vehicles (by make, model, and vehicle identification number) that have been... vehicles (by make, model, and vehicle identification number) that are excluded from the requirements of 49... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL...
49 CFR 545.4 - Response to inquiries.
Code of Federal Regulations, 2011 CFR
2011-10-01
... information identifying the vehicles (by make, model, and vehicle identification number) that have been... vehicles (by make, model, and vehicle identification number) that are excluded from the requirements of 49... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-30
... process. Key components of the antitheft device will include a passive immobilizer, a warning message... feature as standard equipment. When the system is activated, the alarm will trigger if one of the doors...
42 CFR 1001.201 - Conviction relating to program or health care fraud.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 5 2010-10-01 2010-10-01 false Conviction relating to program or health care fraud... Permissive Exclusions § 1001.201 Conviction relating to program or health care fraud. (a) Circumstance for... misdemeanor relating to fraud, theft, embezzlement, breach of fiduciary responsibility, or other financial...
42 CFR 1001.201 - Conviction relating to program or health care fraud.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 5 2011-10-01 2011-10-01 false Conviction relating to program or health care fraud... Permissive Exclusions § 1001.201 Conviction relating to program or health care fraud. (a) Circumstance for... misdemeanor relating to fraud, theft, embezzlement, breach of fiduciary responsibility, or other financial...
ERIC Educational Resources Information Center
St. Lifer, Evan
1994-01-01
Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…
Librarians: Caretakers or Crimefighters?
ERIC Educational Resources Information Center
Arterburn, Tom R.
1996-01-01
Discusses how libraries can deal with criminal and disruptive behavior, including vandalism, theft, and threats toward individual safety. Security measures proposed and/or implemented by various public and academic libraries, and the Library of Congress, are highlighted. Also included are a list of crisis prevention tips and suggestions for…
National Airspace System. Operational Requirements.
1984-10-01
1. Access to manned NAS tacilities shall be control’ed at all times to prevent intc.rruptio;i of service., distraction of specialists, and theft of...user requirements which cannot otherwise be accomplished. ALTRVs are approved by the appropriate FAA facility. AREA CONTROL1 FACILITY (ACF) - A
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.3 Applicability. This part applies to any person offering a motor vehicle or item of motor vehicle equipment for importation into the United States. [55 FR 11378...
49 CFR 591.8 - Conformance bond and conditions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.8 Conformance bond and conditions. (a) The bond required under section 591.6(c) for importation of a vehicle not originally manufactured...
49 CFR 592.9 - Forfeiture of bond.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Federal motor vehicle safety, bumper, and theft prevention standard in effect at the time the vehicle was... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) REGISTERED IMPORTERS OF VEHICLES NOT ORIGINALLY MANUFACTURED TO CONFORM TO THE FEDERAL MOTOR VEHICLE SAFETY STANDARDS § 592.9 Forfeiture of bond. A Registered...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Federal Theft Prevention Standards (part 541 of this chapter), are applicable to the vehicle. ... and location of, and other requirements for, the certification label to be affixed to motor vehicles as required by the National Traffic and Motor Vehicle Safety Act, as amended (the Vehicle Safety Act...
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL-VOLUME LINE REPORTING REQUIREMENTS § 545.1 Scope. This part establishes requirements for manufacturers of motor vehicles..., concerning the number of vehicles that meet the requirements of 49 CFR part 541, and the number of vehicles...
49 CFR 591.6 - Documents accompanying declarations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.6 Documents accompanying... public roads, or that the equipment item was not manufactured for use on a motor vehicle or is not an...
Getting Graphic at the School Library.
ERIC Educational Resources Information Center
Kan, Kat
2003-01-01
Provides information for school libraries interested in acquiring graphic novels. Discusses theft prevention; processing and cataloging; maintaining the collection; what to choose, with two Web sites for more information on graphic novels for libraries; collection development decisions; and Japanese comics called Manga. Includes an annotated list…
Social Security Number Privacy and Identity Theft Prevention Act of 2009
Rep. Tanner, John S. [D-TN-8
2009-07-23
07/24/2009 Sponsor introductory remarks on measure. (All Actions) Notes: For further action, see S.3789, which became Public Law 111-318 on 12/18/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Liquid volume monitoring based on ultrasonic sensor and Arduino microcontroller
NASA Astrophysics Data System (ADS)
Husni, M.; Siahaan, D. O.; Ciptaningtyas, H. T.; Studiawan, H.; Aliarham, Y. P.
2016-04-01
Incident of oil leakage and theft in oil tank often happens. To prevent it, the liquid volume insides the tank needs to be monitored continuously. Aim of the study is to calculate the liquid volume inside oil tank on any road condition and send the volume data and location data to the user. This research use some ultrasonic sensors (to monitor the fluid height), Bluetooth modules (to sent data from the sensors to the Arduino microcontroller), Arduino Microcontroller (to calculate the liquid volume), and also GPS/GPRS/GSM Shield module (to get location of vehicle and sent the data to the Server). The experimental results show that the accuracy rate of monitoring liquid volume inside tanker while the vehicle is in the flat road is 99.33% and the one while the vehicle is in the road with elevation angle is 84%. Thus, this system can be used to monitor the tanker position and the liquid volume in any road position continuously via web application to prevent illegal theft.
LANL Safeguards and Security Assurance Program. Revision 6
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-04-03
The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impactsmore » on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms.« less
RxPATROL: a Web-based tool for combating pharmacy theft.
Smith, Meredith Y; Graham, J Aaron; Haddox, J David; Steffey, Amy
2009-01-01
To report the incidence of pharmacy-related burglaries and robberies and characteristics of pharmacies where such crimes have occurred using recent data from Rx Pattern Analysis Tracking Robberies & Other Losses (RxPATROL), a national Web-based information clearinghouse on pharmacy-related theft of prescription medications and over-the-counter products. Descriptive, nonexperimental study. United States between 2005 and 2006. Not applicable. Not applicable. Number of pharmacy theft reports received; incident type, date, and location; point of entry; and pharmacy security features. Between 2005 and 2006, 202 pharmacy burglary and 299 pharmacy robbery reports from 45 different states were filed with RxPATROL. More than 70% of pharmacies reporting such crimes lacked a security camera. Among those reporting a burglary, 60% lacked dead bolt locks, a solid exterior door, a motion detector device, or a safe or vault for storage of controlled substances. Burglars most often obtained access to the pharmacy via the front door. RxPATROL is a Web-based tool that can assist pharmacies and law enforcement in collaborating more effectively to combat and prevent pharmacy-related crimes.
Insider Threat - Material Control and Accountability Mitigation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Powell, Danny H; Elwood Jr, Robert H; Roche, Charles T
2011-01-01
The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur bymore » an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with compensating mitigation can decrease the risk of an insider performing a malicious act without detection.« less
Nuclear Theft: Real and Imagined Dangers
1976-03-01
are utilized in connection with fossil fuel energy research and development programs and related activities conducted by the Bureau of Mines "energy... development associated with the U.S. nuclear weapons program . Addition- ally, ERDA conducts related programs which include power reactor design... development , nuclear propulsion, and other systems associated with space programs . The military and ERDA enjoy a symbiotic relationship in that nuclear
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL-VOLUME LINE REPORTING REQUIREMENTS § 545.8 Records. Each manufacturer shall maintain records of the Vehicle Identification Number for each vehicle for which information is reported under §§ 545.6(b)(2) and 545.7(b)(2...
Code of Federal Regulations, 2011 CFR
2011-10-01
... means the vehicle identification number required by part 565 of this chapter. [59 FR 64168, Dec. 13..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.4 Definitions. (a... surface means, with respect to a vehicle part, a surface that is not directly exposed to sun and...
Code of Federal Regulations, 2014 CFR
2014-10-01
... means the vehicle identification number required by part 565 of this chapter. [59 FR 64168, Dec. 13..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.4 Definitions. (a... surface means, with respect to a vehicle part, a surface that is not directly exposed to sun and...
Code of Federal Regulations, 2012 CFR
2012-10-01
... means the vehicle identification number required by part 565 of this chapter. [59 FR 64168, Dec. 13..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.4 Definitions. (a... surface means, with respect to a vehicle part, a surface that is not directly exposed to sun and...
Code of Federal Regulations, 2013 CFR
2013-10-01
... means the vehicle identification number required by part 565 of this chapter. [59 FR 64168, Dec. 13..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.4 Definitions. (a... surface means, with respect to a vehicle part, a surface that is not directly exposed to sun and...
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL-VOLUME LINE REPORTING REQUIREMENTS § 545.8 Records. Each manufacturer shall maintain records of the Vehicle Identification Number for each vehicle for which information is reported under §§ 545.6(b)(2) and 545.7(b)(2...
Evaluating Library Security Problems and Solutions.
ERIC Educational Resources Information Center
Nicely, Chris
1993-01-01
Discusses different types of security systems for libraries and explains the differences between electromagnetic, radio-frequency, and microwave technologies. A list of questions to assist in system evaluation is provided; and preventive measures used to curtail theft and protocol for handling situations that trigger security alarms are included.…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-28
..., Office of Vehicle Safety Compliance (NVS-223), National Highway Traffic Safety Administration, West... INFORMATION: National Highway Traffic Safety Administration Title: Importation of Vehicles and Equipment Subject to the Federal Motor Vehicle Safety, Bumper, and Theft Prevention Standards. OMB Number: 2127-0002...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-16
... , including any personal information provided. Please see the Privacy Act heading below. Privacy Act: Anyone... pertaining to odometer tampering and disclosure requirements and vehicle theft prevention. 66 FR 41149. On... disclosure requirements. 75 FR 5246. We have reviewed the civil penalty amounts in 49 CFR part 578 and, in...
Medical identity theft: an emerging problem for informatics.
Gillette, William; Patrick, Timothy B
2007-10-11
This poster reports a preliminary review of medical identity theft. Financial identity theft has received a great deal of media attention. Medical identity theft is a particular kind of identity theft that has received little attention. There are two main subtypes of medical identity theft. In the first type the stolen medical identity is used to receive medical services, and in the second type the stolen medical identity is used to commit healthcare fraud.
Security systems engineering overview
NASA Astrophysics Data System (ADS)
Steele, Basil J.
1997-01-01
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.
Performance improvement in the JCAHO environment of care.
Hill, Scott A
2002-01-01
Using security management to demonstrate performance improvement for JCAHO can be a viable option. The article illustrates how a program for reducing theft became the basis for demonstrating performance improvement.
77 FR 64409 - Designation of Taiwan for the Visa Waiver Program
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-22
... and passport holders from designated Visa Waiver Program countries \\1\\ may apply for admission to the... for nationals of the country; (2) a government certification that it issues machine-readable passports... about the theft or loss of passports; (5) the government acceptance for repatriation any citizen, former...
32 CFR 34.23 - Property management system.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Property management system. 34.23 Section 34.23... Requirements Property Standards § 34.23 Property management system. The recipient's property management system... control system shall be in effect to insure adequate safeguards to prevent loss, damage, or theft of the...
28 CFR 29.6 - Limited participation by states and localities permitted.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Limited participation by states and localities permitted. 29.6 Section 29.6 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.6 Limited participation by states and localities permitted. A State or...
28 CFR 29.12 - Specified conditions under which stops may be authorized.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Specified conditions under which stops may be authorized. 29.12 Section 29.12 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.12 Specified conditions under which stops may be authorized. A...
28 CFR 29.5 - Notification of law enforcement officials.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Notification of law enforcement officials. 29.5 Section 29.5 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.5 Notification of law enforcement officials. In addition to the actions enumerated in § 29.4...
Crime Prevention Teaching Kit #2.
ERIC Educational Resources Information Center
Commercial Union Insurance Companies, Boston, MA.
Three lesson plans for grades seven through nine explore the social, moral, and financial impact of auto and bicycle theft and drinking and driving. Used individually or together as a complete unit, the lesson plans contain dramatic skits derived from real-life experiences of adolescents. Students simulate tough decision making in the face of…
Alternatives to Vandalism: "Cooperation or Wreckreation."
ERIC Educational Resources Information Center
Scrimger, Glen C.; Elder, Rory
Recommendations for preventing school vandalism and theft are provided in this guide. Following an introduction which cites factors related to school violence and steps which can be taken to reduce crime, the following general measures are discussed: (1) firm and fair school discipline including codes of conduct; (2) enforcement against loitering…
Play a Part in Crime Prevention.
ERIC Educational Resources Information Center
Commercial Union Insurance Companies, Boston, MA.
These units of study will help students in grades five through nine understand the effects various crimes have on individuals, families, and communities. They can be used by teachers, police departments, boy and girl scouts, and community groups. The units deal with shoplifting, buying stolen goods, employee theft, and vandalism. Each lesson…
Code of Federal Regulations, 2010 CFR
2010-01-01
..., procedures, and other arrangements that control reasonably foreseeable risks to customers or to the safety... other suspicious activity related to, a covered account; and (5) Notice from customers, victims of... policies and procedures regarding identification and verification set forth in the Customer Identification...
28 CFR 29.9 - Motor vehicles for hire.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Motor vehicles for hire. 29.9 Section 29.9 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.9 Motor vehicles for hire. (a) Any person who is in the business of renting or leasing motor...
28 CFR 29.9 - Motor vehicles for hire.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Motor vehicles for hire. 29.9 Section 29.9 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.9 Motor vehicles for hire. (a) Any person who is in the business of renting or leasing motor...
28 CFR 29.9 - Motor vehicles for hire.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Motor vehicles for hire. 29.9 Section 29.9 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.9 Motor vehicles for hire. (a) Any person who is in the business of renting or leasing motor...
32 CFR 34.23 - Property management system.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Property management system. 34.23 Section 34.23... Requirements Property Standards § 34.23 Property management system. The recipient's property management system... control system shall be in effect to insure adequate safeguards to prevent loss, damage, or theft of the...
Technology for Anonymity: Names By Other Nyms.
ERIC Educational Resources Information Center
Wayner, Peter
1999-01-01
Provides a summary of some of the technical solutions for producing anonymous communication on the Internet and presents an argument that anonymity is as much a part of crime prevention as requiring people to provide their names. Discusses identity theft; the three major techniques that make anonymous cash possible; and anonymizing Internet…
ERIC Educational Resources Information Center
Connecticut State Dept. of Education, Hartford. Div. of Educational Administration.
This handbook is designed to assist persons who are concerned with preventing or minimizing property damage to schools through vandalism, arson, and theft, and with avoiding bodily injuries in and around school buildings. Many of the suggestions, while directed at the planning of new buildings, can be adapted to lessen the incidence of vandalism…
Security of Data, Stored in Information Systems of Bulgarian Municipal Administrations
NASA Astrophysics Data System (ADS)
Kapralyakov, Petko
2011-12-01
Massive influx of information technology in municipal administrations increases their efficiency in delivering public services but increased the risk of theft of confidential information electronically. The report proposed an approach for improving information security for small municipal governments in Bulgaria through enhanced intrusion detection and prevention system.
49 CFR 591.7 - Restrictions on importations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.7 Restrictions on importations. (a) A vehicle or... a vehicle or equipment item under § 591.5(j) does not intend to export or destroy the vehicle or...
49 CFR Appendix C to Part 591 - Power of Attorney and Agreement
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 7 2011-10-01 2011-10-01 false Power of Attorney and Agreement C Appendix C to Part 591 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY... EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS Pt. 591, App. C Appendix C to...
Violence in Schools. Research in Brief.
ERIC Educational Resources Information Center
Toby, Jackson
This brief summarizes what is presently known about violence in schools and provides recommendations for preventing the violence. The following findings are presented concerning the prevalence of school violence: (1) both teachers and students are in greater danger of losing their property through theft than of being assaulted or robbed; (2) both…
Doctors aren't immune to theft and fraud
Marcus, Gary
1995-01-01
A chartered accountant says the problem of fraud within medical practices is far from rare, even though prevention is relatively simple. Gary Marcus provides advice to physicians about ways to spot fraud within their practices and things they can do to prevent it. No matter how small your practice or how long you have had the same employees, says Marcus, given the right circumstances anyone might steal from you. Imagesp940-a PMID:7697586
The Relationship between Cell Phone Use and Identity Theft
ERIC Educational Resources Information Center
Saunders, Lewis O.
2014-01-01
The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…
19 CFR 19.3 - Bonded warehouses; alterations; relocation; suspensions; discontinuance.
Code of Federal Regulations, 2010 CFR
2010-04-01
... acts which would constitute a felony, or a misdemeanor involving theft, smuggling, or a theft-connected... theft, smuggling, or a theft-connected crime, resulting from acts committed while a corporate officer...
19 CFR 158.26 - Loss or theft in public stores.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Loss or theft in public stores. 158.26 Section 158... Casualty, Loss, or Theft While in Customs Custody § 158.26 Loss or theft in public stores. In the case of alleged loss or theft while the merchandise is in the public stores, there shall be filed a declaration of...
27 CFR 555.165 - Failure to report theft or loss.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Failure to report theft or..., Seizures and Forfeitures § 555.165 Failure to report theft or loss. (a) Any person who has knowledge of the theft or loss of any explosive materials from his stock and fails to report the theft or loss within 24...
Development of car theft crime index in peninsular Malaysia
NASA Astrophysics Data System (ADS)
Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat
2014-06-01
Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.
19 CFR 19.48 - Suspension or revocation of the privilege of operating a container station; hearings.
Code of Federal Regulations, 2010 CFR
2010-04-01
... committed acts which would constitute a felony, or a misdemeanor involving theft, smuggling, or a theft... theft, smuggling, or a theft-connected crime, resulting from acts committed while a corporate officer...
Education: Can It Make a Difference?
ERIC Educational Resources Information Center
Moe, Jeanne M.; Letts, Kelly A.
1998-01-01
Intrigue of the Past is a Utah program designed to combat vandalism and theft of archaeological resources by educating students in grades 4-12 to value and conserve the past. Evaluation data suggest that the program failed to instill more responsible attitudes in students in rural areas where recreational "pot hunting" is a longstanding…
16 CFR 602.1 - Effective dates.
Code of Federal Regulations, 2011 CFR
2011-01-01
... identification of possible instances of identity theft; (iii) Section 115, concerning truncation of the social... theft victims; (v) Section 152, concerning blocking of information resulting from identity theft; (vi) Section 153, concerning the coordination of identity theft complaint investigations; (vii) Section 154...
Consumptive emasculation: the ecological and evolutionary consequences of pollen theft.
Hargreaves, Anna L; Harder, Lawrence D; Johnson, Steven D
2009-05-01
Many of the diverse animals that consume floral rewards act as efficient pollinators; however, others 'steal' rewards without 'paying' for them by pollinating. In contrast to the extensive studies of the ecological and evolutionary consequences of nectar theft, pollen theft and its implications remain largely neglected, even though it affects plant reproduction more directly. Here we review existing studies of pollen theft and find that: (1) most pollen thieves pollinate other plant species, suggesting that theft generally arises from a mismatch between the flower and thief that precludes pollen deposition, (2) bees are the most commonly documented pollen thieves, and (3) the floral traits that typically facilitate pollen theft involve either spatial or temporal separation of sex function within flowers (herkogamy and dichogamy, respectively). Given that herkogamy and dichogamy occur commonly and that bees are globally the most important floral visitors, pollen theft is likely a greatly under-appreciated component of floral ecology and influence on floral evolution. We identify the mechanisms by which pollen theft can affect plant fitness, and review the evidence for theft-induced ecological effects, including pollen limitation. We then explore the consequences of pollen theft for the evolution of floral traits and sexual systems, and conclude by identifying key directions for future research.
An Operator's Guide to Safe and Enjoyable Bicycling.
ERIC Educational Resources Information Center
San Jose Dept. of Public Works, CA.
Addressed to young persons and adults, this booklet delineates the duties and rights applicable to bicyclists as drivers of vehicles. The following topics are discussed: Rules of the road, defensive bicycling techniques, the bicycle as a machine, registration and theft prevention, walking the bike, bike routes, and recreational and group rides.…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-12
... description and diagram of the identity, design and location of the components of the antitheft device for the... the antitheft device and the immobilization features are constructed and designed within the vehicle's... test. Additionally, FUSA stated that since the immobilization features are designed and constructed...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-29
... identity, design, and location of the components of the antitheft device for the Subaru [confidential.... Additionally, FUSA stated that because the immobilization features are designed and constructed within the... provided a comparative table showing how its device is similar to other manufacturers' devices that have...
28 CFR 29.3 - Administration by the Bureau of Justice Assistance.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Administration by the Bureau of Justice Assistance. 29.3 Section 29.3 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.3 Administration by the Bureau of Justice Assistance. The Director of the Bureau...
28 CFR 29.11 - Sale or other transfer of an enrolled vehicle.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Sale or other transfer of an enrolled vehicle. 29.11 Section 29.11 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.11 Sale or other transfer of an enrolled vehicle. Upon the transferral of...
28 CFR 29.4 - Election to participate by states and localities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Election to participate by states and localities. 29.4 Section 29.4 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.4 Election to participate by states and localities. (a) Any State or locality...
Code of Federal Regulations, 2010 CFR
2010-01-01
... risks to customers or to the safety and soundness of the financial institution or creditor from identity... unusual use of, or other suspicious activity related to, a covered account; and (5) Notice from customers... policies and procedures regarding identification and verification set forth in the Customer Identification...
12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2010 CFR
2010-01-01
... appendix J, the following definitions apply: (1) Account means a continuing relationship established by a... directors, a designated employee at the level of senior management. (3) Covered account means: (i) An... offers or maintains for which there is a reasonably foreseeable risk to customers or to the safety and...
Code of Federal Regulations, 2010 CFR
2010-01-01
... risks to customers or to the safety and soundness of the financial institution or creditor from identity... unusual use of, or other suspicious activity related to, a covered account; and (5) Notice from customers... policies and procedures regarding identification and verification set forth in the Customer Identification...
12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Appendix J, the following definitions apply: (1) Account means a continuing relationship established by a... directors, a designated employee at the level of senior management. (3) Covered account means: (i) An... offers or maintains for which there is a reasonably foreseeable risk to customers or to the safety and...
12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2010 CFR
2010-01-01
... section and appendix J, the following definitions apply: (1) Account means a continuing relationship... board of directors, a designated employee at the level of senior management. (3) Covered account means... institution or creditor offers or maintains for which there is a reasonably foreseeable risk to customers or...
76 FR 77183 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-12
...: Attempts to shut down the propulsion system without first moving the gear selection control to the ``park... selection control to ``park'' (for vehicles with a ``park'' position), or exits a vehicle without first... without first moving the gear selection control to the ``park'' position (for vehicles with a ``park...
49 CFR 567.5 - Requirements for manufacturers of vehicles manufactured in two or more stages.
Code of Federal Regulations, 2010 CFR
2010-10-01
... applicable Federal Motor Vehicle Safety Standards, [and Bumper and Theft Prevention Standards, if applicable... 49 Transportation 6 2010-10-01 2010-10-01 false Requirements for manufacturers of vehicles... CERTIFICATION § 567.5 Requirements for manufacturers of vehicles manufactured in two or more stages. (a...
12 CFR 391.23 - Duties of card issuers regarding changes of address.
Code of Federal Regulations, 2012 CFR
2012-01-01
... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of..., App. Appendix to Subpart C of Part 391—Interagency Guidelines on Identity Theft Detection, Prevention...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false Theft. 11.412 Section 11.412 Indians BUREAU OF INDIAN... Criminal Offenses § 11.412 Theft. A person who, without permission of the owner, shall take, shoplift... thereto shall be guilty of theft, a misdemeanor. ...
NASA Astrophysics Data System (ADS)
Steadman, Keva Ullanda
Electricity theft is a relatively unknown crime with high economic costs. In this dissertation, I try to identify the factors that motivate persons to steal electricity. First, I use a panel dataset of 97 countries spanning the five year period 2003--2007 to estimate a model that describes the effect of the unemployment rate, GDP per capita, male population and urbanization on theft, robbery and homicide rates. The results are consistent with previous empirical work on crime and economic opportunity. The second and main contribution of this paper is to estimate the same model using distribution loss as a proxy for electricity theft. The results show that the unemployment rate, a key explanatory economic factor for crime, cannot explain variation in electricity theft, although there is some evidence, albeit weak, supporting correlation in rich countries. Therefore, policies that target the reduction of property crime through a reduction in unemployment will have no effect on electricity theft. The third contribution relates to the role that political institutions play in the incentives to steal electricity. After control for socioeconomic factors, I find that there is no relationship between political governance indicators and electricity theft. In the second and third chapters, I compare the United States, a high income, low electricity theft country with Jamaica, a middle income, high electricity theft country. The effect of unemployment on electricity theft mirrors the results found in the first chapter. In the United States, electricity theft is affected by changes in economic conditions but in Jamaica, it is not. These results suggest that the state of institutions plays a role in how social norms are determined. Poor countries will be more likely than rich countries to have weak institutions with social norms that encourage electricity theft.
78 FR 47009 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-02
... action to submit an information collection request to the Office of Management and Budget (OMB) and... accounting programs and to confirm the absence of (or detect the occurrence of) SNM theft or diversion. NUREG...
A Developmental Study of School Theft.
ERIC Educational Resources Information Center
Dodson, Peter K.; Evans, Ellis D.
1985-01-01
Students (N=200) in grades 4 through 8 and 10 completed questionnaire measuring perceptions of school theft incidence and seriousness, personal responsibility for correcting theft, causal attributions of theft, and perceived consequences of thievery. Main grade effect was observed for personal responsibility and consequences, but represented…
19 CFR 146.53 - Shortages and overages.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., as such, of any: (1) Theft or suspected theft of merchandise; (2) Merchandise not properly admitted.... Except in a case of theft or suspected theft, the operator need not file a report with the port director... otherwise secure damaged merchandise to preserve its identity as damaged merchandise. ...
19 CFR 146.53 - Shortages and overages.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., as such, of any: (1) Theft or suspected theft of merchandise; (2) Merchandise not properly admitted.... Except in a case of theft or suspected theft, the operator need not file a report with the port director... otherwise secure damaged merchandise to preserve its identity as damaged merchandise. ...
Code of Federal Regulations, 2010 CFR
2010-10-01
... coverage means the indemnification of motor vehicle owners by an insurer against losses due to fire, theft... that issue motor vehicle insurance policies, vehicle theft means an actual physical removal of a motor... lease and not covered by theft insurance policies issued by insurers of motor vehicles, “vehicle theft...
14 CFR 1214.609 - Loss or theft.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Loss or theft. 1214.609 Section 1214.609... Flights § 1214.609 Loss or theft. (a) Responsibility. The National Aeronautics and Space Administration will not be responsible for the loss or theft of, or damage to, items carried in OFK's or PPK's. (b...
26 CFR 1.165-8 - Theft losses.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Theft losses. 1.165-8 Section 1.165-8 Internal... TAXES (CONTINUED) Itemized Deductions for Individuals and Corporations § 1.165-8 Theft losses. (a... arising from theft is allowable as a deduction under section 165(a) for the taxable year in which the loss...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 12 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation..., theft, destruction, mutilation, or defacement of Loan Note Guarantee or Assignment Guarantee Agreement... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...
27 CFR 24.265 - Losses by theft.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Losses by theft. 24.265... OF THE TREASURY LIQUORS WINE Losses of Wine § 24.265 Losses by theft. The proprietor shall be liable... to the satisfaction of the appropriate TTB officer that the theft did not occur as the result of...
Motor Vehicle Theft. Special Report.
ERIC Educational Resources Information Center
Harlow, Caroline Wolf
Thirteen years of data from the National Crime Survey were analyzed to examine the characteristics of motor vehicle theft, to identify trends during the past 13 years, and to determine who are most likely to be victims of motor vehicle theft. All motor vehicle thefts reported to the National Crime Survey from 1973 through 1985 were examined.…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-13
.... If the Smart Key has a discharged battery or is damaged, there is an emergency key blade that can be..., thermal stress/shock tests, material resistance tests, dry heat, dust and fluid ingress tests). Jaguar... requirements incident to the disposition of all Part 543 petitions. Advanced listing, including the release of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-18
... Smart Key has a discharged battery or is damaged, the emergency key blade can be used to unlock the door... cycling, high and low temperature cycling, mechanical shock, random vibration, thermal stress/shock tests... to the disposition of all Part 543 petitions. Advanced listing, including the release of future...
Code of Federal Regulations, 2010 CFR
2010-01-01
...-DESI use. (iv) To prevent misuse of the Web-DESI account: (A) If Web-DESI user account information (i.e... the loss, theft or compromise of the user account information, immediately, by calling BIS at (202..., DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS GENERAL INFORMATION REGARDING DECLARATION...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-19
...) petition for exemption of the Audi confidential vehicle line in accordance with 49 CFR part 543, Exemption... 2015 Audi vehicle line. The petition requested an exemption from parts- marking requirement pursuant to... the components of the antitheft device for its Audi vehicle line. Volkswagen will install its...
ERIC Educational Resources Information Center
Lacourse, Eric; Baillargeon, Raymond; Dupere, Veronique; Vitaro, Frank; Romano, Elisa; Tremblay, Richard
2010-01-01
Background: Investigating the latent structure of conduct disorder (CD) can help clarify how symptoms related to aggression, property destruction, theft, and serious violations of rules cluster in individuals with this disorder. Discovering homogeneous subtypes can be useful for etiologic, treatment, and prevention purposes depending on the…
16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2010 CFR
2010-01-01
... following definitions apply: (1) Account means a continuing relationship established by a person with a... employee at the level of senior management. (3) Covered account means: (i) An account that a financial... for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the...
12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2010 CFR
2010-01-01
... following definitions apply: (1) Account means a continuing relationship established by a person with a... employee at the level of senior management. (3) Covered account means: (i) An account that a financial... for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the...
76 FR 4991 - Petition for Exemption From the Vehicle Theft Prevention Standard; Suzuki
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-27
... include an electronically coded key fob, Body Control Module (BCM), Engine Control Module (ECM) and a... results are identical, the BCM will send data to the ECM allowing the vehicle to start. If either the key..., Suzuki stated that the ECM will prohibit operation of the vehicle. In addressing the specific content...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-15
... receiver, electrical key and an electronic control module (ECM). The conventional key components consist of a transponder key ECU assembly, transponder key coil, security indicator, ignition key and an ECM... certification ECU and steering lock ECU receive confirmation of the valid key, allowing the ECM to start the...
49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.
Code of Federal Regulations, 2013 CFR
2013-10-01
... key to activate the engine or motor. Vehicle type, as used in S5.1.2, refers to passenger car, truck... motion. S3. Application. This standard applies to all passenger cars, and to trucks and multipurpose... (by physical or electronic means), enables the vehicle operator to activate the engine or motor. Open...
49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.
Code of Federal Regulations, 2014 CFR
2014-10-01
... key to activate the engine or motor. Vehicle type, as used in S5.1.2, refers to passenger car, truck... motion. S3. Application. This standard applies to all passenger cars, and to trucks and multipurpose... (by physical or electronic means), enables the vehicle operator to activate the engine or motor. Open...
49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.
Code of Federal Regulations, 2012 CFR
2012-10-01
... key to activate the engine or motor. Vehicle type, as used in S5.1.2, refers to passenger car, truck... motion. S3. Application. This standard applies to all passenger cars, and to trucks and multipurpose... (by physical or electronic means), enables the vehicle operator to activate the engine or motor. Open...
Avoid the Plague: Tips and Tricks for Preventing and Detecting Plagiarism
ERIC Educational Resources Information Center
Bolkan, J. V.
2006-01-01
Plagiarism is an ugly word. Copying someone else's work and attempting to claim credit for one's self is an act that involves a number of ethical failings--theft, laziness, coveting, and lying among others. Many educators blame the Internet for what they perceive as the rise of plagiarism. Although the Internet certainly enables more efficient…
Impeding Students' Efforts to Cheat in Online Classes
ERIC Educational Resources Information Center
Hearn Moore, Paula; Head, J. Derrick; Griffin, Richard B.
2017-01-01
This paper identifies several methods a student could use to cheat while enrolled in an online course. Problems encountered in conducting an online course and in administering an online exam involve: (1) identifying the test taker, (2) preventing the theft of the exam, (3) combating the unauthorized use of textbooks and/or notes, (4) preparing an…
ERIC Educational Resources Information Center
Haworth-Roberts, A., Ed.
Greater use of expensive equipment by schools has also increased the potential for vandalism and theft, giving an increased role to intruder alarm systems. This document provides guidance on the management and technical aspects of forming policies for installing and operating intruder alarm systems in educational buildings. Also provided are…
ERIC Educational Resources Information Center
Whitehouse, B.; Patel, M.; Gofton, K.
Recent years have shown an increase in arson, theft, and vandalism committed in educational facilities resulting in a need for managers to formulate security policies. This document provides technical advice and guidance on policy for the design, specification, installation, maintenance, operation, and management of closed circuit TV (CCTV)…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-17
..., installation of a seat belt warning lamp, and recalibration of the speedometer/odometer to show speed in miles... Theft Protection and Rollaway Prevention: installation of a U.S.-model micro switch in the steering lock...: installation of an information placard containing manufacturer specifications for seating capacity and loading...
49 CFR 545.7 - Reporting requirements for vehicles listed in § 541.3(b)(2).
Code of Federal Regulations, 2010 CFR
2010-10-01
... VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL-VOLUME LINE REPORTING REQUIREMENTS § 545.7 Reporting requirements for vehicles listed in § 541.3(b)(2). (a) General reporting requirements. Within 60 days after the... 49 Transportation 6 2010-10-01 2010-10-01 false Reporting requirements for vehicles listed in Â...
49 CFR 545.6 - Reporting requirements for vehicles listed in § 541.3(a)(1).
Code of Federal Regulations, 2010 CFR
2010-10-01
... VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL-VOLUME LINE REPORTING REQUIREMENTS § 545.6 Reporting requirements for vehicles listed in § 541.3(a)(1). (a) General reporting requirements. Within 60 days after the... 49 Transportation 6 2010-10-01 2010-10-01 false Reporting requirements for vehicles listed in Â...
49 CFR 591.9 - Petitions for remission or mitigation of forfeiture.
Code of Federal Regulations, 2010 CFR
2010-10-01
... VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.9 Petitions... forfeiture only if the motor vehicle has been imported pursuant to paragraph 591.5(f) and the condition not met relates to the compliance of a passenger motor vehicle with part 581 of this chapter. (b) A...
49 CFR 545.6 - Reporting requirements for vehicles listed in § 541.3(a)(1).
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 6 2013-10-01 2013-10-01 false Reporting requirements for vehicles listed in § 541.3(a)(1). 545.6 Section 545.6 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND...
49 CFR 545.7 - Reporting requirements for vehicles listed in § 541.3(b)(2).
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 6 2013-10-01 2013-10-01 false Reporting requirements for vehicles listed in § 541.3(b)(2). 545.7 Section 545.7 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND...
Yao, Shuyang; Kuja-Halkola, Ralf; Thornton, Laura M; Norring, Claes; Almqvist, Catarina; D'Onofrio, Brian M; Lichtenstein, Paul; Långström, Niklas; Bulik, Cynthia M; Larsson, Henrik
2017-09-01
We examined epidemiological associations between anorexia nervosa (AN) and bulimia nervosa (BN) and risks of committing theft and other crimes in a nationwide female population. Females born in Sweden during 1979-1998 (N = 957,106) were followed from age 15 for up to 20 years using information on clinically diagnosed AN and BN (exposures), convictions of theft and other crimes (outcomes), psychiatric comorbidities, and familial relatedness from Swedish national registers. We estimated hazard ratios (HRs) of criminality in exposed versus unexposed females using Cox proportional hazards regressions and explored how comorbidities and unmeasured familial factors explained the associations. The cumulative incidence of convictions of theft (primarily petty theft) and other crimes was higher in exposed females (AN: 11.60% theft, 7.39% other convictions; BN: 17.97% theft, 13.17% other convictions) than in unexposed females (∼5% theft, ∼6% other convictions). The significantly increased risk of being convicted of theft in exposed females (AN: HR = 2.51, 95% confidence interval = [2.29, 2.74], BN: 4.31 [3.68, 5.05]) was partially explained by comorbidities; unmeasured familial factors partially explained the association with convictions of theft in BN but not in AN. Females with BN had a doubled risk of convictions of other crimes, which was partially explained by comorbidities. Individuals with eating disorders had increased risk for convictions of theft and potentially other crimes. Results underscore the importance of regular forensic screening and encourage research on mechanisms underlying the relation between crime and eating disorder psychopathology and efforts to determine how best to address such relation in treatment. © 2017 Wiley Periodicals, Inc.
Vehicle Theft Identification and Intimation Using GSM & IOT
NASA Astrophysics Data System (ADS)
Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva
2017-11-01
Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.
A Proactive Approach to Building Security.
ERIC Educational Resources Information Center
Winters, Sharon
1994-01-01
Describes building security procedures developed at the Hampton Public Library (Virginia) to deal with problem patrons. Highlights include need for the library monitor program; staffing patterns; monitor selection criteria; training procedures; library behavior guidelines; library policy statements; theft detection systems; and sample job…
78 FR 78512 - Privacy Act of 1974, as Amended; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... Purpose(s): The purpose of this system of records is to establish a manual and electronic database that..., identity theft or fraud, or harm to the security or integrity of this system or other systems or programs...
7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or... circumstances of the loss, theft, or destruction of the guarantee; and (vi) The lender or holder, shall present...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Notes § 1901.509 Loss, theft, destruction, mutilation, or defacement of insured notes, insurance... writing. (iv) A full statement of circumstances of the loss, theft, or destruction of the note. (2) An...
19 CFR 112.46 - Report of loss or theft.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft. 112.46 Section 112.46... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.46 Report of loss or theft. The loss or theft of an identification card shall be promptly reported by the cardholder to the port director. ...
27 CFR 478.39a - Reporting theft or loss of firearms.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of... Administrative and Miscellaneous Provisions § 478.39a Reporting theft or loss of firearms. Each licensee shall report the theft or loss of a firearm from the licensee's inventory (including any firearm which has been...
27 CFR 555.30 - Reporting theft or loss of explosive materials.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of... and Miscellaneous Provisions § 555.30 Reporting theft or loss of explosive materials. (a) Any licensee or permittee who has knowledge of the theft or loss of any explosive materials from his stock shall...
7 CFR 3015.170 - Damage, loss, or theft of equipment.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Damage, loss, or theft of equipment. 3015.170 Section... Damage, loss, or theft of equipment. (a) Applicability. This section applies to equipment with a unit... damage, loss, or theft, the recipient does not have a control system in effect as required by § 3015.169...
Theft of information in the take-grant protection model
NASA Technical Reports Server (NTRS)
Bishop, Matt
1989-01-01
Using the information transfer extensions to the Take-Grant Protection Model, the concept of theft of information is defined and necessary and sufficient conditions for such theft to occur are presented, as well as bounds on the number of actors involved in such theft. Finally, the application of these results to reference monitors are explored.
Delinquency, depression, and substance use disorder among child welfare-involved adolescent females.
Lalayants, Marina; Prince, Jonathan D
2014-04-01
Although adolescents with delinquency are known to have higher-than-average rates of depression or substance use disorder (SUD), research on the topic is inconsistent. It remains unclear weather depression or SUD leads to delinquency, whether delinquency leads to depression or SUD, or whether there is bi-directionality. Utilizing the National Survey of Child and Adolescent Well-Being (Wave I: 2008-2009; Wave II: 18 months later: N=5872), we used logistic regression to predict depression from delinquency (and vice versa), and SUD from delinquency (and vice versa). After inclusion of control variables, we found that females with minor theft in Wave I were more than 4 times as likely (adjusted odds ratio [aOR]=4.34; 95% CI: 1.10-17.16) as females without minor theft to be depressed in Wave II, and those with public disorder in Wave I were almost 3 times as likely (aOR=2.74; 95% CI: 1.03-7.30) as those without public disorder to have SUD in Wave II. Overall delinquency also predicted depression or SUD, and SUD predicted delinquency. Practitioners could address risk for depression or SUD among child welfare-involved adolescent females by focusing on overall delinquency or on specific types of delinquency (minor theft for depression and public disorder for SUD) and by offering interventions (e.g., cognitive-behavioral psychotherapy) that have been shown to be effective in preventing depression or SUD. In addition, with respect to our finding that SUD predicts delinquency among adolescent females, practitioners can help prevent delinquency by offering interventions (e.g., intensive outpatient treatments) that have well documented effectiveness in addressing SUD. Copyright © 2013 Elsevier Ltd. All rights reserved.
Delinquency, depression, and substance use disorder among child welfare-involved adolescent females
Lalayants, Marina
2014-01-01
Although adolescents with delinquency are known to have higher-than-average rates of depression or substance use disorder (SUD), research on the topic is inconsistent. It remains unclear weather depression or SUD leads to delinquency, whether delinquency leads to depression or SUD, or whether there is bi-directionality. Utilizing the National Survey of Child and Adolescent Well-Being (Wave I: 2008–2009; Wave II: 18 months later: N = 5872), we used logistic regression to predict depression from delinquency (and vice versa), and SUD from delinquency (and vice versa). After inclusion of control variables, we found that females with minor theft in Wave I were more than 4 times as likely (adjusted odds ratio [aOR] = 4.34; 95% CI: 1.10–17.16) as females without minor theft to be depressed in Wave II, and those with public disorder in Wave I were almost 3 times as likely (aOR = 2.74; 95% CI: 1.03–7.30) as those without public disorder to have SUD in Wave II. Overall delinquency also predicted depression or SUD, and SUD predicted delinquency. Practitioners could address risk for depression or SUD among child welfare-involved adolescent females by focusing on overall delinquency or on specific types of delinquency (minor theft for depression and public disorder for SUD) and by offering interventions (e.g., cognitive-behavioral psychotherapy) that have been shown to be effective in preventing depression or SUD. In addition, with respect to our finding that SUD predicts delinquency among adolescent females, practitioners can help prevent delinquency by offering interventions (e.g., intensive outpatient treatments) that have well documented effectiveness in addressing SUD. PMID:24060474
Code of Federal Regulations, 2010 CFR
2010-10-01
... lines that are likely to have high or low theft rates. 542.1 Section 542.1 Transportation Other... OF TRANSPORTATION PROCEDURES FOR SELECTING LIGHT DUTY TRUCK LINES TO BE COVERED BY THE THEFT... or low theft rates. (a) Scope. This section sets forth the procedures for motor vehicle manufacturers...
19 CFR 158.21 - Allowance in duties for casualty, loss, or theft while in Customs custody.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Allowance in duties for casualty, loss, or theft... LOST, DAMAGED, ABANDONED, OR EXPORTED Casualty, Loss, or Theft While in Customs Custody § 158.21 Allowance in duties for casualty, loss, or theft while in Customs custody. Section 563(a), Tariff Act of...
19 CFR 122.185 - Report of loss or theft of Customs access seal.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Report of loss or theft of Customs access seal... Report of loss or theft of Customs access seal. The loss or theft of an approved Customs access seal must be promptly reported in writing by the employee to the port director. The Customs access seal may be...
19 CFR 122.185 - Report of loss or theft of Customs access seal.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft of Customs access seal... Report of loss or theft of Customs access seal. The loss or theft of an approved Customs access seal must be promptly reported in writing by the employee to the port director. The Customs access seal may be...
Examining the Effects of a Low-Cost Prompt to Reduce Retail Theft
ERIC Educational Resources Information Center
Rafacz, Sharlet D.; Boyce, Thomas E.; Williams, W. Larry
2011-01-01
The present study evaluated the extent to which a low-cost, antitheft intervention impacted theft and sales in a multiple baseline design across two grocery stores. Previous research has measured the impact on theft of items that have a sign indicating their high theft rate and stickers next to or on the items. In contrast, this study tracked four…
7 CFR 331.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2010 CFR
2010-01-01
... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...
7 CFR 331.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2011 CFR
2011-01-01
... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...
7 CFR 331.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2012 CFR
2012-01-01
... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...
7 CFR 331.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2013 CFR
2013-01-01
... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...
7 CFR 331.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2014 CFR
2014-01-01
... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...
Unlocking the condoms: The effect on sales and theft.
Ashwood, Daniel; Farris, Karen B; Campo, Shelly; Aquilino, Mary L; Losch, Mary
2011-01-01
Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies. Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.
Building a Secure Library System.
ERIC Educational Resources Information Center
Benson, Allen C.
1998-01-01
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Carter, Ned; Holmström, Anne; Simpanen, Monica; Melin, Lennart
1988-01-01
Shoplifting and employee theft constitute a major problem for retailers. Previous research has described techniques for effectively reducing either type of theft but has not addressed the problem of thefts of unspecified origin. In a grocery store we evaluated the effect of identifying for employees frequently stolen products from three groups of items and graphing, twice weekly in the lunchroom, losses for the separate groups. After the products were identified and losses graphed, thefts from the three groups dropped from eight per day to two per day. PMID:16795718
A Pattern for Increased Monitoring for Intellectual Property Theft by Departing Insiders
2012-04-01
2012 TECHNICAL REPORT CMU/SEI-2012-TR-008 ESC-TR-2012-008 CERT® Program http://www.sei.cmu.edu SEI markings v3.2 / 30 August 2011... Programs Conference (PLoP) 2011 (http://www.hillside.net/plop/2011/). This material is based upon work funded and supported by the United States...research project at the CERT® Program is identifying enterprise architectural patterns to protect against the insider threat to organizations. This
12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2010 CFR
2010-01-01
... section and appendix J, the following definitions apply: (1) Account means a continuing relationship... 15 U.S.C. 1681a(r)(5). (5) Creditor has the same meaning as in 15 U.S.C. 1681a(r)(5). (6) Customer..., or a designated employee at the level of senior management in the oversight, development...
78 FR 28018 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-13
... (ECM). Nissan will also install an audible and visible alarm system on the Infiniti QX60 as standard... and transmitted to the BCM. The ECM then requests the BCM to start the encrypted communication. If the encrypted code is correct, the BCM sends an ``OK-code'' and encrypted code to the ECM. If the code is not...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-27
..., transmission control ECU, electronic control module (ECM) and security indicator. The Prius v wagon will... located on the instrument panel to start the vehicle. The correct key has to be recognized by the ECM in... receive confirmation of the valid key and allows the ECM to start the engine. On the Prius v model, the...
75 FR 19458 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-14
... vehicle itself from being stolen when the back door and all of the side doors are closed and locked. If... occurs when the ignition is turned to the ``OFF'' position and all the doors are closed and locked through the use of the key or the remote control mechanism. Deactivation occurs when all the doors are...
76 FR 36615 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-22
... from being stolen when the back door and all of the side doors are closed and locked. If any of the... the ``OFF'' position and all the doors are closed and locked through the use of the key or the remote control mechanism. Deactivation occurs when all the doors are unlocked with the key or remote [[Page 36616...
77 FR 15843 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-16
... vehicle and the vehicle itself from being stolen when the back door and all of the side doors are closed... automatically when the ignition key is turned to the ``OFF'' position and all the doors are closed and locked through the use of the key or the remote control mechanism. Deactivation occurs when all the doors are...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-09
... must be recognized by the EWS/CAS control unit in order for the vehicle to start. The transponder... in the mechanical keys make the locks almost impossible to pick and the keys impossible to duplicate... description of the antitheft device is necessary in order to notify law enforcement agencies of new vehicle...
49 CFR Appendix A to Part 591 - Section 591.5(f) Bond for the Entry of a Single Vehicle
Code of Federal Regulations, 2010 CFR
2010-10-01
... VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS Pt. 591, App. A Appendix A to Part 591—Section 591.5(f) Bond for the Entry of a Single Vehicle Department of Transportation... Vehicle A Appendix A to Part 591 Transportation Other Regulations Relating to Transportation (Continued...
ERIC Educational Resources Information Center
Scandroglio, Barbara; Lopez-Martinez, Jorge; San Jose, M. Carmen
2008-01-01
This work presents different lines of intervention in the local, group, family and educational contexts aimed at prevention of some deviant behaviors--such as violence, theft and certain patterns of trafficking and use of legal and illegal substances--as practiced by a minority of young people and youth sub-culture groups. These interventions are…
Code of Federal Regulations, 2010 CFR
2010-01-01
... consumer report. 2. A consumer reporting agency provides a notice of credit freeze in response to a request for a consumer report. 3. A consumer reporting agency provides a notice of address discrepancy, as defined in § 717.82(b) of this part. 4. A consumer report indicates a pattern of activity that is...
28 CFR 29.11 - Sale or other transfer of an enrolled vehicle.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Sale or other transfer of an enrolled vehicle. 29.11 Section 29.11 Judicial Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.11 Sale or other transfer of an enrolled vehicle. Upon the transferral of ownership of an enrolled vehicle, the transferring...
49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.
Code of Federal Regulations, 2010 CFR
2010-10-01
... pounds) or less with an automatic transmission that includes a “park” position shall be equipped with a... forward up a 10 percent grade and stop it with the service brakes. (b) Apply the parking brake (if present). (c) Move the gear selection control to “park.” (d) Note the vehicle position. (e) Release the parking...
49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.
Code of Federal Regulations, 2011 CFR
2011-10-01
... pounds) or less with an automatic transmission that includes a “park” position shall be equipped with a... forward up a 10 percent grade and stop it with the service brakes. (b) Apply the parking brake (if present). (c) Move the gear selection control to “park.” (d) Note the vehicle position. (e) Release the parking...
49 CFR 567.4 - Requirements for manufacturers of motor vehicles.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., or the door edge that meets the door-latch post, next to the driver's seating position, or if none of... applicable Federal motor vehicle safety, bumper, and theft prevention standards in effect on the date of... standards in effect on the date of manufacture shown above.” The expression “U.S.” or “U.S.A.” may be...
49 CFR 567.4 - Requirements for manufacturers of motor vehicles.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., or the door edge that meets the door-latch post, next to the driver's seating position, or if none of... applicable Federal motor vehicle safety, bumper, and theft prevention standards in effect on the date of... standards in effect on the date of manufacture shown above.” The expression “U.S.” or “U.S.A.” may be...
49 CFR 567.4 - Requirements for manufacturers of motor vehicles.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., or the door edge that meets the door-latch post, next to the driver's seating position, or if none of... applicable Federal motor vehicle safety, bumper, and theft prevention standards in effect on the date of... standards in effect on the date of manufacture shown above.” The expression “U.S.” or “U.S.A.” may be...
Sweet sins: frequency and psychiatric motivation for theft among adolescents with type 1 diabetes.
Butwicka, Agnieszka; Fendler, Wojciech M; Zalepa, Adam; Szadkowska, Agnieszka; Gmitrowicz, Agnieszka; Młynarski, Wojciech M
2011-06-01
Behavioral problems are an issue among adolescents with type 1 diabetes (T1D). The authors hypothesize that theft, possibly because of an underlying psychiatric morbidity, may be a way of procuring sweets leading to worse glycemic control. To evaluate psychiatric morbidity and the association of theft and metabolic control among children and adolescents with T1D, using data from an interim analysis of an ongoing quality-of-life and psychiatric comorbidity study. One hundred and nine consecutively hospitalized individuals aged 8-18 years with T1D were asked about incidents of theft. The data on psychiatric morbidity were taken from an ongoing longitudinal study using semi-structured diagnostic interview (KSADS-PL). Overall, 10 children (9%) reported that they had committed theft. Primary motivation for theft was reported as either direct or indirect gain of sweets. Patients who admitted to theft were more likely to have worse metabolic control expressed by glycated hemoglobin (HbA1c) [10.4% (interquartile range 9.8-11.8) vs. 7.7% (6.9-8.8); p < 0.0001] and higher odds of having psychiatric morbidity (odds ratio 8.2; 95% confidence interval 1.9-34.2) than their peers. In the subgroup analysis of patients with psychiatric morbidity, HbA1c was significantly higher if having committed a theft was reported [10.2% (9.4-11.9) vs. 8.1% (7.2-9.2); p < 0.001]. No significant differences in socioeconomic status, clinical factors, or rates of complications were found. Theft may be a factor negatively affecting metabolic control in children with T1D and underlying psychiatric co-morbidity. Psychiatric morbidity is more frequent among patients with T1D and a history of theft. © 2011 John Wiley & Sons A/S.
Well-Being and Functioning at Work Following Thefts and Robberies: A Comparative Study
Setti, Ilaria; van der Velden, Peter G.; Sommovigo, Valentina; Ferretti, Maria S.; Giorgi, Gabriele; O'Shea, Deirdre; Argentero, Piergiorgio
2018-01-01
Thefts and robberies may be traumatizing experiences for employees. The aim of this study is to explore to what extent experiencing robberies and/or thefts at work affect workers' mental health, coping-self-efficacy, social support seeking, workload and job satisfaction. Drawing on Conservation of Resources theory, this research contributes to our understanding of the psychological sequelae of robbery and theft for employees working in small businesses. The few studies on the effects of robberies and thefts in the past have predominantly focused on bank employees. A sample of Italian tobacconists and jewelers completed an anonymous self-report questionnaire examining the experience of robbery and/or theft, social support seeking (Coping Orientation to Problem Experienced scale, COPE-IV), psycho-somatic well-being (General Health Questionnaire, GHQ-12), job satisfaction (a single item). Victims of thefts and/or robberies reported their PTSD symptoms (Impact of Event- Revised 6, IES-R-6) and trauma-related coping self-efficacy (Coping Self-Efficacy scale, CSE-7), based on the last event (N = 319). Descriptive analyses, ANOVA, ANCOVA and multiple regressions analyses have been carried out. The results indicated that victims of thefts and robberies experienced greater workload, higher psycho-physical complaints and greater tendency to seek social support in comparison with their non-affected counterparts. They additionally experienced more post-traumatic symptomatology and perceived lower coping self-efficacy, when compared to those who experienced thefts “only.” Multiple regression analyses revealed that CSE was positively related to job satisfaction, although the presence of psycho-physical symptoms was the main predictor of job satisfaction among both non-affected and affected employees. PTSD was not an independent predictor of job satisfaction. In sum, robberies and/or thefts exposure undermines differently workers' well-being. PMID:29515488
Security systems engineering overview
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steele, B.J.
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, andmore » counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).« less
Young children will lie to prevent a moral transgression.
Harvey, Teresa; Davoodi, Telli; Blake, Peter R
2018-01-01
Children believe that it is wrong to tell lies, yet they are willing to lie prosocially to adhere to social norms and to protect a listener's feelings. However, it is not clear whether children will lie instrumentally to intervene on behalf of a third party when a moral transgression is likely to occur. In three studies (N=270), we investigated the conditions under which 5- to 8-year-olds would tell an "interventional lie" in order to misdirect one child who was seeking another child in a park. In Study 1, older children lied more when the seeker intended to steal a toy from another child than when the seeker intended to give cookies to the child. In Study 2, the transgression (stealing) was held constant, but harm to the victim was either emphasized or deemphasized. Children at all ages were more likely to lie to prevent the theft when harm was emphasized. In Study 3, harm to the victim was held constant and the act of taking was described as either theft or a positive action. Children at all ages were more likely to lie when the transgression was emphasized. We conclude that by 5years of age, children are capable of lying to prevent a moral transgression but that this is most likely to occur when both the transgression and the harm to the victim are salient. Published by Elsevier Inc.
Dog Theft: A Case for Tougher Sentencing Legislation.
Harris, Lauren K
2018-05-22
Dogs, and other companion animals, are currently classed as "property" in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere "property" are used to support this argument. The review concludes that the Sentencing Council's guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that "theft of a companion animal" should be listed in the Sentencing Council's guidelines as an aggravating factor.
The Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution.
Alavi, Hamid Reza
2011-01-01
Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals' tendency to addiction, theft and prostitution in Kerman city, Iran. The statistical population of this study is those individuals who had a record of addiction, theft and prostitution in Kerman prison, and the ordinary individuals. The research sample consisted of 300 individuals, 200 of whom were those with record of addiction, theft and prostitution in the central prison of Kerman city, and 100 ordinary people. Because some of the research questionnaires were not returned, only 283 questionnaires were analyzed. The instrument for determining the respondents' self-esteem was Eysenck Self-esteem Inventory. Self-esteem had a meaningful role in the individual's tendency to addiction, theft and prostitution. On the basis of the research results, it can be concluded that those who are involved in addiction, theft and prostitution have a lower self-esteem compared with the ordinary person. Thus, it is necessary to increase an individual's self-esteem in order to decrease their tendency to addiction, theft and prostitution.
The Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution
Alavi, Hamid Reza
2011-01-01
Background Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals’ tendency to addiction, theft and prostitution in Kerman city, Iran. Methods The statistical population of this study is those individuals who had a record of addiction, theft and prostitution in Kerman prison, and the ordinary individuals. The research sample consisted of 300 individuals, 200 of whom were those with record of addiction, theft and prostitution in the central prison of Kerman city, and 100 ordinary people. Because some of the research questionnaires were not returned, only 283 questionnaires were analyzed. The instrument for determining the respondents’ self-esteem was Eysenck Self-esteem Inventory. Findings Self-esteem had a meaningful role in the individual’s tendency to addiction, theft and prostitution. Conclusion On the basis of the research results, it can be concluded that those who are involved in addiction, theft and prostitution have a lower self-esteem compared with the ordinary person. Thus, it is necessary to increase an individual’s self-esteem in order to decrease their tendency to addiction, theft and prostitution. PMID:24494126
Preventing employee theft: 15 techniques for preventing bookkeeping embezzlement.
Hills, Laura Sachs
2004-01-01
Medical practices are unfortunately the target of embezzlement more often than you might think. This article offers practical suggestions for keeping your employees honest and thwarting a would-be embezzler. It describes the common symptoms of an embezzler at work and offers 15 practical techniques for preventing bookkeeping embezzlement. This article also suggests a simple method for conducting mini-audits from time to time and precautions to take to ensure the reliability of computer passwords. The article advocates keeping tighter control of office supplies and a method for spotting telephone abuse. Finally, it offers suggestions for dealing with employees who steal time on the job.
Unlocking the condoms: The effect on sales and theft
Ashwood, Daniel; Farris, Karen B.; Campo, Shelly; Aquilino, Mary L.; Losch, Mary
2010-01-01
Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Objective Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies Methods Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Results Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. Conclusion After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies. PMID:25132889
Exploring the psychological and somatic impact of identity theft.
Sharp, Tracy; Shreve-Neiger, Andrea; Fremouw, William; Kane, John; Hutton, Shawn
2004-01-01
Identity theft is a new and growing form of white-collar crime. This exploratory study examined the psychological and somatic impact of identity theft and coping methods utilized by victims. Thirty-seven victims of identity theft participated in regional victim focus groups. Participants completed a victim impact questionnaire designed by the authors and the Brief Symptom Inventory-18 (BSI-18). The majority of participants expressed an increase in maladaptive psychological and somatic symptoms post victimization. Results on the BSI indicated that identity theft victims with unresolved cases, in contrast to those with resolved cases, were more likely to have clinically elevated scores when compared with a normative sample. Relatively similar coping mechanisms were utilized across victims. The results from this study suggest that victims of identity theft do have increased psychological and physical distress, and for those whose cases remain unresolved, distress is maintained over time.
Utility Considerations in Emotional Stability Monitoring for Nuclear Plant Personnel,
Training, and (4) Employee assistance program. Some data exists which show more acts of sabotage, theft, or vandalism occur in environments in which...definition of criteria and the judgment of a professional psychologist or psychiatrist who knows the job environment . Finally, it must provide
Shigenobu, Kazue; Ikeda, Manabu; Fukuhara, Ryuji; Maki, Naruhiko; Hokoishi, Kazuhiko; Nebu, Akihiko; Komori, Kenjiro; Tanabe, Hirotaka
2002-03-01
Delusions of theft (delusions involving the theft of possessions) are one of the most frequent neuropsychiatric manifestations of Alzheimer's disease (AD). The current study investigated the presence and extent of such delusions before and after drug treatment in a group of AD patients, and the consequent effects on the burden of care on caregivers. The study was an open-label cohort design. The delusions studied consisted only of those involving theft of possessions. Sixteen AD patients served as subjects in order to assess the efficacy of Risperidone administration, in the reduction or elimination of these delusions. The caregiver burden was evaluated using the Zarit Caregiver Burden Interview (ZBI) before the administration of Risperidone and 12 weeks after administration, for cases where delusions of theft were eliminated or reduced. The burden of care on caregivers was significantly reduced (p < 0.001) through the elimination or reduction of delusions of theft. Delusions of theft are considered to be a major factor in increasing the burden of care, and the treatment of these, through appropriate drug therapy, is therefore of great importance in the continuation of satisfactory care in the home. Copyright 2002 John Wiley & Sons, Ltd.
ERIC Educational Resources Information Center
Wadmany, Rivka; Zeichner, Orit; Melamed, Orly
2014-01-01
Students in a teacher training college in Israel have developed and taught curricula on the intelligent use of the Web. The educational programs were based on activities thematically related to the world of digital citizenship, such as the rights of the child and the Internet, identity theft, copyrights, freedom of expression and its limitations,…
Emotional intelligence and criminal behavior.
Megreya, Ahmed M
2015-01-01
A large body of research links criminality to cognitive intelligence and personality traits. This study examined the link between emotional intelligence (EI) and criminal behavior. One hundred Egyptian adult male offenders who have been sentenced for theft, drug dealing or murder and 100 nonoffenders were administered the Bar-On Emotional Quotient Inventory (EQ-i). The offenders had lower levels of EI than the nonoffenders. In addition, EI varied as a function of the types of offenses. Namely, it decreased in magnitude with crime severity (lowest for murder, higher for drug dealing, and highest for theft). These results converged with the direct/ indirect aggression theory suggesting that indirect aggression requires more social intelligence than physical aggression. Forensic intervention programs should therefore include EI training, especially when violence is involved. © 2014 American Academy of Forensic Sciences.
12 CFR 222.1 - Purpose, scope, and effective dates.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) Section 114, concerning procedures for the identification of possible instances of identity theft; (iii...)(1), concerning the summary of rights of identity theft victims; (v) Section 152, concerning blocking of information resulting from identity theft; (vi) Section 153, concerning the coordination of...
76 FR 1507 - Departmental Offices; Privacy Act of 1974, as Amended
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-10
... governmental, Tribal, self-regulatory or professional organizations if that organization has jurisdiction over... or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether...
Reyns, Bradford W; Henson, Billy
2016-08-01
Available evidence suggests that identity theft is a growing problem that has significant consequences for victims, not the least of which is billions of dollars in financial losses. However, very little is known about the correlates or causes of identity theft victimization. Utilizing a nationally representative sample of individuals from the Canadian General Social Survey, the current study attempts to address this deficiency by examining the link between victims' online routine activities and their online identity theft victimization. It was found that certain routine activities directly influence the likelihood of experiencing identity theft. Potential research and policy implications also are discussed. © The Author(s) 2015.
7 CFR 3015.170 - Damage, loss, or theft of equipment.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., and (ii) The damage, loss, or theft is not due to an act of God. (2) Equipment replaced. If the... § 3015.169(c) or (ii) The damage, loss, or theft is due to an act of God. (2) Recipient not compensated...
On the Statistical Dependency of Identity Theft on Demographics
NASA Astrophysics Data System (ADS)
di Crescenzo, Giovanni
An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.
Children's Stealing: A Review of Theft-Control Procedures for Parents and Teachers.
ERIC Educational Resources Information Center
Williams, Ruth Lyn Meese
1985-01-01
Guidelines are offered to parents and teachers for dealing with "normal" and aberrant theft while maintaining respect for the child's right to privacy. It is noted that theft is resistant to traditional intervention; however, successful behavioral interventions have been devised. (Author/CL)
ERIC Educational Resources Information Center
Miech, Richard A.; Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.
2015-01-01
Substance use is a leading cause of preventable morbidity and mortality, and it is in large part why people in the U.S. have the highest probability among 17 high-income nations of dying by age 50. Substance use is also an important contributor to many social ills including child and spouse abuse, violence more generally, theft, suicide, and more;…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
...] Agency Information Collection Activities: Proposed Collection; Comments Requested: Report of Theft or... currently approved collection. (2) Title of the Form/Collection: Report of Theft or Loss of Explosives. (3... for-profit. Other: None. Need for Collection Losses or theft of explosives must, by statute be...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-26
... Licensee Firearms Inventory Theft/ Loss Report ACTION: 60-Day Notice of Information Collection Under Review... the Form/Collection: Federal Firearms Licensee Firearms Inventory Theft/Loss Report. (3) Agency form..., Tobacco, Firearms and Explosives and to the appropriate local authorities any theft or loss of a firearm...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-31
... Licensee Firearms Inventory Theft/ Loss Report ACTION: 30-Day Notice of Information Collection Under Review... approved collection. (2) Title of the Form/Collection: Federal Firearms Licensee Firearms Inventory Theft... authorities any theft or loss of a firearm from the licensee's inventory or collection within a specific time...
43 CFR 423.25 - Vandalism, tampering, and theft.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Vandalism, tampering, and theft. 423.25 Section 423.25 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION... of Conduct § 423.25 Vandalism, tampering, and theft. (a) You must not tamper or attempt to tamper...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-23
...] Agency Information Collection Activities: Proposed Collection; Comments Requested; Report of Theft or... of Theft or Loss of Explosives. (3) Agency form number, if any, and the applicable component of the... abstract: Primary: Business or other for-profit. Other: None. Need for Collection Losses or theft of...
31 CFR 306.113 - Cases not requiring bonds of indemnity.
Code of Federal Regulations, 2011 CFR
2011-07-01
... GOVERNING U.S. SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306... relief for the loss, theft, destruction, mutilation, or defacement of registered securities in any of the...: (a) If the loss, theft, destruction, mutilation, or defacement, as the case may be, occurred while...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... Approved Collection for Which Approval Has Expired, Identity Theft Supplement (ITS) to the National Crime... Form/Collection: Identity Theft Supplement (ITS) to the National Crime Victimization Survey. (3) Agency... administered to persons 16 years or older in NCVS sampled households in the United States. The Identity Theft...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-25
... Approved Collection for Which Approval Has Expired, Identity Theft Supplement (ITS) to the National Crime... approved collection for which approval has expired. (2) Title of the Form/Collection: Identity Theft... United States. The Identity Theft Supplement (ITS) to the National Crime Victimization Survey collects...
78 FR 12623 - Insurer Reporting Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-25
... NHTSA's regulation requiring motor vehicle insurers to submit information on the number of thefts and recoveries of insured vehicles and actions taken by the insurer to deter or reduce motor vehicle theft. NHTSA..., which requires insurers to submit information about the make, model, and year of all vehicle thefts, the...
Identity Theft: Trends and Issues
2010-01-05
mitigate the effects of identity theft, one option Congress may consider is whether to strengthen data breach notification requirements. Such requirements...identity theft complaints to the FTC as well as in the number of reported data breaches placing personally identifiable information at risk. This report...23 Effects of Data Breaches ..................................................................................................... 24
Worst theft losses are for Mercedes model; 2 of 3 worst are for acura
DOT National Transportation Integrated Search
2000-05-13
The Highway Loss Data Institute's annual list of vehicles with worst theft losses has Mercedes S class heading the list of passenger vehicles with the highest insurance losses for theft. Overall losses for this car are 10 times higher than the averag...
The Technical Problems of Anti-theft Diagnostics in a Traction Network
NASA Astrophysics Data System (ADS)
Mikulski, Jerzy; Młynczak, Jakub
2012-02-01
The paper presents an analysis of traction lines theft in the Katowice division of the Railroad Development Company (Zakład Linii Kolejowych - ZLK) as well as the principles for the anti-theft protection system, currently in development. The problem of theft is a very important issue concerning the safety of rail transportation. It is also a significant economic problem, as the cost of recreating a stolen network is very high. Moreover, the Administrator of the infrastructure bears the cost of compensation for any delays in train schedules.
Minkler, Meredith; Salvatore, Alicia L; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas
2014-06-01
Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice.
Chan, Lai Gwen; Bharat, Saluja; Dani, Dhaval Kirti
2013-06-01
In Singapore, theft and related crimes constitute more than 50% of all reported crime, and are the most common offences committed by accused persons remanded to the Institute of Mental Health (IMH), Singapore. There is a need for better understanding of the forensic psychiatric aspects of such offenders. This study aimed to determine the prevalence of psychiatric disorders among theft offenders remanded or referred for forensic assessment in 2010, compare the differences between first-time and repeat theft offenders, and identify the factors associated with reoffence. Forensic evaluations of inpatient and outpatient theft offenders that were conducted at IMH in the year 2010 were retrieved and reviewed. The sociodemographic and clinical data of first-time and repeat theft offenders were collected and compared using Student's t-test and chi-square test for continuous and categorical variables, respectively. Multivariate regression was used to identify the factors that were predictive of repeat offence. Overall, 10% of offenders had no mental illness. Substance use disorders, mood disorders and psychotic disorders were the most common diagnoses. Psychotic disorders were significantly less common in repeat offenders. Repeat offenders also tended to have a history of conduct problems in childhood. Noncompliance with psychiatric treatment was positively associated with repeat offence, while psychotic disorders were negatively associated. The pattern of psychiatric morbidity among theft offenders in Singapore has changed over the last ten years. Kleptomania remains rare. Significant differences between first-time and repeat offenders have implications on the treatment, follow-up and rehabilitation of theft offenders in Singapore.
76 FR 45763 - Privacy Act of 1974, as Amended
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-01
... the suspected or confirmed compromise, there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs..., minimize, or remedy such harm; (2) Another Federal or state agency to: (a) Permit a decision as to access...
75 FR 29548 - Privacy Act of 1974; Notice of New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-26
... maintained behind a firewall certified by the National Computer Security Association. RETENTION AND DISPOSAL... agencies, entities when (1) the Agency suspects or has confirmed that the security or confidentiality of..., identity theft or fraud, or harm to the security or integrity or this system or other systems or programs...
Information Security in the 1990s: Keeping the Locks on.
ERIC Educational Resources Information Center
Kovac, Ron J.
1999-01-01
As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-18
... Shipment Report of Theft/Loss ACTION: 30-Day Notice. The Department of Justice (DOJ), Bureau of Alcohol... Form/Collection: Interstate Firearms Shipment Report of Theft/Loss. (3) Agency form number, if any, and... report losses or thefts of firearms from interstate shipments. ATF uses this information to ensure that...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-24
... Collection Activities: Proposed Collection; Comments Requested: Report of Theft or Loss of Controlled...: Extension of a currently approved collection. (2) Title of the Form/Collection: Report of Theft or Loss of... complete and submit DEA-106 upon discovery of a theft or significant loss of controlled substances. This...
31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... DEBT RESTRICTIVE ENDORSEMENTS OF U.S. BEARER SECURITIES § 328.8 Loss, theft, or destruction of...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-23
... Collection Activities: Proposed Collection; Comments Requested: Reports of Suspicious Orders or Theft/Loss of...) Title of the Form/Collection: Reports of Suspicious Orders or Theft/Loss of Listed Chemicals/Machines... collection: Form number: Notification of suspicious orders and thefts is provided in writing on an as needed...
College Students, Internet Use, and Protection from Online Identity Theft
ERIC Educational Resources Information Center
Norum, Pamela S.; Weagley, Robert O.
2007-01-01
The Internet has experienced phenomenal growth in higher education. In addition to many pedagogical benefits, there are potential risks to the student users, including identity theft. This study examined the extent to which selected online practices that could minimize the risk of financial identity theft are used by college students. Data were…
27 CFR 478.33a - Theft of firearms.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND... and Miscellaneous Provisions § 478.33a Theft of firearms. No person shall steal or unlawfully take or...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-29
... Collection; Comments Requested: Report of Theft or Loss of Controlled Substances; DEA Form 106 AGENCY...) Title of the Form/Collection: Report of Theft or Loss of Controlled Substances (DEA Form 106). (3... DEA-106 upon discovery of a theft or significant loss of controlled substances. This provides accurate...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-18
... Collection Activities: Proposed Collection; Comments Requested: Reports of Suspicious Orders or Theft/Loss of...: Reports of Suspicious Orders or Theft/Loss of Listed Chemicals/Machines. (3) Agency form number, if any...: Notification of suspicious orders and thefts is provided in writing on an as needed basis and does not occur...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-26
... Shipment Report of Theft/Loss ACTION: 60-Day notice. The Department of Justice (DOJ), Bureau of Alcohol... Form/Collection: Interstate Firearms Shipment Report of Theft/Loss. (3) Agency form number, if any, and... report losses or thefts of firearms from interstate shipments. ATF uses this information to ensure that...
27 CFR 28.302 - Notice to exporter.
Code of Federal Regulations, 2011 CFR
2011-04-01
... been lost by theft, he will advise the exporter by letter: (a) Of the identity of the containers; (b) Of the amount of the loss; (c) Of the circumstances indicating diversion or theft; (d) That allowance... transportation, as described in § 28.301, whether by theft or otherwise, the appropriate TTB officer may require...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 12 2011-01-01 2011-01-01 false Loss, theft, destruction, mutilation, or defacement... Notes § 1901.509 Loss, theft, destruction, mutilation, or defacement of insured notes, insurance... different from the present address; the capacity of person certifying, if other than owner; the identity of...
27 CFR 28.316 - Notice to exporter.
Code of Federal Regulations, 2010 CFR
2010-04-01
... unlawfully diverted, or had been lost by theft, he will advise the exporter by letter: (a) Of the identity of the containers; (b) Of the amount of the loss; (c) Of the circumstances indicating diversion or theft... described in § 28.315, whether by theft or otherwise, the appropriate TTB officer may require the exporter...
27 CFR 28.302 - Notice to exporter.
Code of Federal Regulations, 2010 CFR
2010-04-01
... been lost by theft, he will advise the exporter by letter: (a) Of the identity of the containers; (b) Of the amount of the loss; (c) Of the circumstances indicating diversion or theft; (d) That allowance... transportation, as described in § 28.301, whether by theft or otherwise, the appropriate TTB officer may require...
27 CFR 28.316 - Notice to exporter.
Code of Federal Regulations, 2011 CFR
2011-04-01
... unlawfully diverted, or had been lost by theft, he will advise the exporter by letter: (a) Of the identity of the containers; (b) Of the amount of the loss; (c) Of the circumstances indicating diversion or theft... described in § 28.315, whether by theft or otherwise, the appropriate TTB officer may require the exporter...
Wayward Prescriptions: Costs of Fraud in Payor Plans
Kaye, Thomas
2008-01-01
The cost of prescription drugs and medical devices has increased dramatically over the past several years. This increase has exceeded the annual average inflation index, making medical products desired sources of ill-gotten financial gains through diversion, theft, fraud, and deceit. With databases often being compromised, personal health information, personal identification, and therapy history are all available to be used by thieves through deception and misrepresentation, and are being traded on clandestine websites. With increasing values of medical services, wanted efforts continue to emerge in profiteering schemes, using illicit deals for financial gains by exploiting what was once perceived as sacred areas of medical care. Estimates of healthcare resource costs in dollars, lives, and products exceed $200 billion. Select examples of fraud in our medical services are presented that expose plan members to the risks of loss and theft that can compromise the privacy of their health records. The author outlines prevention steps for payors to guard against such practices. PMID:25126240
NASA Astrophysics Data System (ADS)
Sihombing, P.; Siregar, Y. M.; Tarigan, J. T.; Jaya, I.; Turnip, A.
2018-03-01
Security system is one of the common problems to protect an environment such as personal house or a warehouse. There are numerous methods and technologies that can be used as part of a security system. In this paper, we present a security system that offers a better efficiency. The purpose of this study is to build a system that can monitor home security at any time in particular fire and theft. Through sensors, the system will be able to provide warning information of hazard conditions via LCD monitor, sound, and alarm. This information will be sent automatically to the home owner’s smartphone as well as to the corresponding to the security agency. Thus the prevention of theft and fire hazards can be immediately anticipated by the police and firefighters. The system will also notify the position of the coordinates of the location of the building (the house) by a link to the Google map in order to make it easier to get the location quickly.
Salvatore, Alicia L.; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas
2014-01-01
Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice. PMID:24825200
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-18
... Collection Activities: Proposed Collection; Comments Requested: Reports of Suspicious Orders or Theft/Loss of... Suspicious Orders or Theft/Loss of Listed Chemicals/Machines. (3) Agency form number, if any, and the... suspicious orders and thefts is provided in writing on an as needed basis and does not occur using a form...
34 CFR 682.208 - Due diligence in servicing a loan.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 90 days of its acquisition of the loan. (3) Upon receipt of a valid identity theft report as defined... bureau that information furnished by the lender is a result of an alleged identity theft as defined in... identity theft report, the lender receives from the borrower evidence specified in § 682.402(e)(3)(v), the...
34 CFR 685.215 - Discharge for false certification of student eligibility or unauthorized payment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... the individual's eligibility for a Direct Loan as a result of the crime of identity theft committed... applied to charges owed by the student to the school. (4) Identity theft. In the case of an individual... identity theft and is requesting a discharge, the individual shall— (i) Certify that the individual did not...
16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...
What Price Privacy? (and why identity theft is about neither identity nor theft)
2004-01-01
justify. It might be pos- sible to collect data on occurrence of identity theft correlated with consumer behavior so that probabilities of at least...needs to learn from experience, so consumer behavior is likely to lag behind any current reality. So one answer is that the expected cost 6 of privacy
42 CFR 73.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2011 CFR
2011-10-01
... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...
42 CFR 73.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2012 CFR
2012-10-01
... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...
9 CFR 121.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2010 CFR
2010-01-01
... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...
9 CFR 121.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2011 CFR
2011-01-01
... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...
9 CFR 121.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2013 CFR
2013-01-01
... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...
42 CFR 73.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2013 CFR
2013-10-01
... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...
42 CFR 73.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2014 CFR
2014-10-01
... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...
9 CFR 121.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2012 CFR
2012-01-01
... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...
42 CFR 73.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2010 CFR
2010-10-01
... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...
9 CFR 121.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2014 CFR
2014-01-01
... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...
12 CFR Appendix I to Part 1022 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Summary of Consumer Identity Theft Rights I Appendix I to Part 1022 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION FAIR CREDIT REPORTING (REGULATION V) Pt. 1022, App. I Appendix I to Part 1022—Summary of Consumer Identity Theft Rights The...
16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2013 CFR
2013-01-01
... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...
16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...
12 CFR Appendix I to Part 1022 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Summary of Consumer Identity Theft Rights I Appendix I to Part 1022 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION FAIR CREDIT REPORTING (REGULATION V) Pt. 1022, App. I Appendix I to Part 1022—Summary of Consumer Identity Theft Rights The...
16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...
16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...
12 CFR Appendix I to Part 1022 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Summary of Consumer Identity Theft Rights I Appendix I to Part 1022 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION FAIR CREDIT REPORTING (REGULATION V) Pt. 1022, App. I Appendix I to Part 1022—Summary of Consumer Identity Theft Rights The...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-22
... reports on their motor vehicle theft loss experiences. An insurer included in any of the appendices that...: Congress enacted the Motor Vehicle Theft Law Enforcement Act of 1984 (Pub. L. 98-547). This legislation... report includes information about thefts and recoveries of motor vehicles, the rating rules used by the...
20 CFR 429.204 - Are there any restrictions on what is allowable?
Code of Federal Regulations, 2010 CFR
2010-04-01
... disaster, theft from quarters (as limited by § 429.203(c)(1)), or under other reasonable circumstances in which it would be in the Government's best interest to make payment. In cases involving theft from quarters, the evidence must conclusively show that your quarters were locked at the time of the theft...
Do Data Breach Disclosure Laws Reduce Identity Theft?
ERIC Educational Resources Information Center
Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro
2011-01-01
In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…
Modeling the number of car theft using Poisson regression
NASA Astrophysics Data System (ADS)
Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura
2016-10-01
Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.
Opportunistic brood theft in the context of colony relocation in an Indian queenless ant
Paul, Bishwarup; Paul, Manabi; Annagiri, Sumana
2016-01-01
Brood is a very valuable part of an ant colony and behaviours increasing its number with minimum investment is expected to be favoured by natural selection. Brood theft has been well documented in ants belonging to the subfamilies Myrmicinae and Formicinae. In this study we report opportunistic brood theft in the context of nest relocation in Diacamma indicum, belonging to the primitively eusocial subfamily Ponerinae. Pupae was the preferred stolen item both in laboratory conditions and in natural habitat and a small percentage of the members of a colony acting as thieves stole about 12% of the brood of the victim colony. Stolen brood were not consumed but became slaves. We propose a new dimension to the risks of relocation in the form of brood theft by conspecific neighbours and speculate that examination of this phenomenon in other primitively eusocial species will help understand the origin of brood theft in ants. PMID:27796350
Opportunistic brood theft in the context of colony relocation in an Indian queenless ant.
Paul, Bishwarup; Paul, Manabi; Annagiri, Sumana
2016-10-31
Brood is a very valuable part of an ant colony and behaviours increasing its number with minimum investment is expected to be favoured by natural selection. Brood theft has been well documented in ants belonging to the subfamilies Myrmicinae and Formicinae. In this study we report opportunistic brood theft in the context of nest relocation in Diacamma indicum, belonging to the primitively eusocial subfamily Ponerinae. Pupae was the preferred stolen item both in laboratory conditions and in natural habitat and a small percentage of the members of a colony acting as thieves stole about 12% of the brood of the victim colony. Stolen brood were not consumed but became slaves. We propose a new dimension to the risks of relocation in the form of brood theft by conspecific neighbours and speculate that examination of this phenomenon in other primitively eusocial species will help understand the origin of brood theft in ants.
27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-28
... risks to FCU members or to an FCU's safety and soundness. Each FCU also must develop an Identity Theft... forms of activity that indicate the possible existence of identity theft. In addition, 12 CFR 717.90 requires each FCU to establish reasonable policies and procedures to address the risk of identity theft...
Identity Theft and Consumer Health Education: A Case Study Teaching the Skill of Decision Making
ERIC Educational Resources Information Center
Jefson, Cristy A.
2007-01-01
Identity theft is the fastest growing white-collar crime in America, increasing 40% annually. Identity theft occurs when personal-identifying information, such as a social security number, date of birth, or address, is used to commit fraud. From January 1, 2005, to December 31, 2005, 255,565 people in the United States were victims of identity…
A Report on the Moffitt Undergraduate Library Book Theft Study.
ERIC Educational Resources Information Center
Kaske, Neal K.; Thompson, Donald D.
A study was conducted at the Moffitt Undergraduate Library of the University of California at Berkeley to determine the extent and the cost of book losses due to theft and to determine the cost-effectiveness of book security systems. A sample inventory was taken and the theft rate (13.7%) was statistically derived. The rate of loss was translated…
27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...
The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan
2007-04-11
27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect
Barker, Edward D; Séguin, Jean R; White, Helene Raskin; Bates, Marsha E; Lacourse, Eric; Carbonneau, René; Tremblay, Richard E
2007-05-01
Neurocognitive mechanisms have long been hypothesized to influence developmental trajectories of antisocial behavior. However, studies examining this association tend to aggregate a variety of problem behaviors that may be differently affected by neurocognitive deficits. To describe the developmental trajectories of physical violence and theft from adolescence to adulthood, their associations, and the neurocognitive characteristics of individuals following different patterns of trajectory association. Accelerated cohort-sequential, longitudinal design. Rutgers Health and Human Development Project. Six hundred ninety-eight men. Self-reports of physical violence (ages 12-24 years) and theft (ages 12-31 years) were collected across 5 waves. Neurocognitive performance was assessed with executive function and verbal IQ tests between late adolescence and early adulthood. The majority (55%) of subjects showed an increased frequency of theft during the study period, while only a minority (13%) evinced an increasing frequency of physical violence. Executive function and verbal IQ performance were negatively related to high frequency of physical violence but were unrelated to theft [corrected]. Developmental trajectories of physical violence and theft during adolescence and early adulthood are different and differently related to neurocognitive functioning. Global indexes of antisocial behavior mask the development of antisocial behavior subtypes and putative causal mechanisms.
76 FR 59733 - Privacy Act of 1974, as Amended; Notice To Amend an Existing System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-27
... name, alias, address, date of birth, social security number, blood degree, enrollment/BIA number, date... suspected or confirmed compromise there is a risk of harm to economic or property interest, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs whether...
ERIC Educational Resources Information Center
National Association of School Security Directors, Bellevue, WA.
Workshop materials, all from Broward County (Florida), include job descriptions for the positions of director of security, security investigator, security specialist, and security patrolman. A security report also contains charts reflecting arson, vandalism, and theft costs from the school in years 1970 through 1979. The last section contains…
Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.
ERIC Educational Resources Information Center
Trinkaus-Randall, Gregor
1998-01-01
Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…
ERIC Educational Resources Information Center
Sanga, Sushma
2016-01-01
Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…
ERIC Educational Resources Information Center
van Lier, Pol A. C.; Vitaro, Frank; Barker, Edward D.; Koot, Hans M.; Tremblay, Richard E.
2009-01-01
Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of…
ERIC Educational Resources Information Center
Patford, Janet; Tranent, Peter
2013-01-01
Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…
1990-09-01
expanded in a specific direction if movement is indicated. Controlled dumping at precise coordinates or at marker buoys may reduce the required survey area...of the meters or theft of the marker buoys. Subsurface markers using acoustic releases prevent vandalism and loss of marker buoys, but they...data from field studies such as impact investigations ’Underwood 1981; Heck and Horowitz 1984; Hurlbert 1984; Millard and Lettenmaier 1986; Stewart
Carter, N; Kindstedt, A; Melin, L
1995-01-01
We used an A-B-A design to evaluate the effects of two commonly used promotional activities-price reduction and increased exposure, in combination and separately-on sales and thefts of candy at a grocery store. The combination of activities and the increased exposure condition produced the greatest increases in sales. The combination of activities was also associated with the greatest increase in thefts.
Developmental Trajectories of Male Physical Violence and Theft
Barker, Edward D.; Séguin, Jean R.; White, Helene Raskin; Bates, Marsha E.; Lacourse, Éric; Carbonneau, René; Tremblay, Richard E.
2012-01-01
Context Neurocognitive mechanisms have long been hypothesized to influence developmental trajectories of antisocial behavior. However, studies examining this association tend to aggregate a variety of problem behaviors that may be differently affected by neurocognitive deficits. Objective To describe the developmental trajectories of physical violence and theft from adolescence to adulthood, their associations, and the neurocognitive characteristics of individuals following different patterns of trajectory association. Design Accelerated cohort-sequential, longitudinal design. Setting Rutgers Health and Human Development Project. Participants Six hundred ninety-eight men. Main Outcome Measures Self-reports of physical violence (ages 12–24 years) and theft (ages 12–31 years) were collected across 5 waves. Neurocognitive performance was assessed with executive function and verbal IQ tests between late adolescence and early adulthood. Results The majority (55%) of subjects showed an increased frequency of theft during the study period, while only a minority (13%) evinced an increasing frequency of physical violence. Executive function and verbal IQ performance were negatively related to high frequency of physical violence but positively related to high frequency of theft. Conclusions Developmental trajectories of physical violence and theft during adolescence and early adulthood are different and differently related to neurocognitive functioning. Global indexes of antisocial behavior mask the development of antisocial behavior subtypes and putative causal mechanisms. PMID:17485611
Dog Theft: A Case for Tougher Sentencing Legislation
Harris, Lauren K.
2018-01-01
Simple Summary The Sentencing Council (England and Wales) currently considers dogs to be “property”. This means that if someone steals a dog, they may be punished in the same way as someone who steals a non-living object, like a mobile phone or a piece of furniture. This review argues that losing a dog is very different to losing a non-living object, and that many people consider their dog to be a friend or a family member, not just a “possession”. The review concludes that that people who steal dogs should be punished in a way that reflects the emotional harm that can be caused to victims of dog theft. Abstract Dogs, and other companion animals, are currently classed as “property” in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere “property” are used to support this argument. The review concludes that the Sentencing Council’s guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that “theft of a companion animal” should be listed in the Sentencing Council’s guidelines as an aggravating factor. PMID:29786637
Code of Federal Regulations, 2011 CFR
2011-01-01
..., in conjunction with the member's social security number, driver's license number, account number... should provide the FTC's Web site address and toll-free telephone number that members may use to obtain... Web site for the ID Theft brochure and the FTC Hotline phone number are http://www.ftc.gov/idtheft and...
Carter, Ned; Kindstedt, Angeli; Melin, Lennart
1995-01-01
We used an A-B-A design to evaluate the effects of two commonly used promotional activities—price reduction and increased exposure, in combination and separately—on sales and thefts of candy at a grocery store. The combination of activities and the increased exposure condition produced the greatest increases in sales. The combination of activities was also associated with the greatest increase in thefts. PMID:16795853
Medical identity theft in the emergency department: awareness is crucial.
Mancini, Michelino
2014-11-01
Medical identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient's identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior.
Discrimination of ginseng cultivation regions using light stable isotope analysis.
Kim, Kiwook; Song, Joo-Hyun; Heo, Sang-Cheol; Lee, Jin-Hee; Jung, In-Woo; Min, Ji-Sook
2015-10-01
Korean ginseng is considered to be a precious health food in Asia. Today, thieves frequently compromise ginseng farms by pervasive theft. Thus, studies regarding the characteristics of ginseng according to growth region are required in order to deter ginseng thieves and prevent theft. In this study, 6 regions were selected on the basis of Korea regional criteria (si, gun, gu), and two ginseng-farms were randomly selected from each of the 6 regions. Then 4-6 samples of ginseng were acquired from each ginseng farm. The stable isotopic compositions of H, O, C, and N of the collected ginseng samples were analyzed. As a result, differences in the hydrogen isotope ratios could be used to distinguish regional differences, and differences in the nitrogen isotope ratios yielded characteristic information regarding the farms from which the samples were obtained. Thus, stable isotope values could be used to differentiate samples according to regional differences. Therefore, stable isotope analysis serves as a powerful tool to discriminate the regional origin of Korean ginseng samples from across Korea. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
1993-10-01
Concern about wandering patients and infant abduction on the part of hospitals has sparked renewed interest in Electronic Article Surveillance (EAS) systems. Such systems had their origins in department stores and libraries where they are almost universally used. They also have applications in hospitals for preventing the theft of supplies and equipment. A number of companies provide EAS products for the health care field. How do you select the system that is best for your needs? "Talk to users. Pick out a number of profit and non-profit hospitals to get their views," advises Ted Algaier, vice president, marketing and sales, Innovative Control Systems, Inc., Waukesha, WI. "Examine the history of the company or vendor to determine if it understands the health care market and find out if the product really works." In this report, we'll review a number of EAS systems currently on the market, and present information on how they work, how effective they are, and costs involved. Also included are comments from users who have installed such systems.
Medical Identity Theft in the Emergency Department: Awareness is Crucial
Mancini, Michelino
2014-01-01
Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. PMID:25493150
Exploring Medical Identity Theft
Mancilla, Desla; Moczygemba, Jackie
2009-01-01
The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification. PMID:20169017
Exploring medical identity theft.
Mancilla, Desla; Moczygemba, Jackie
2009-09-16
The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.
Identity Theft in the Academic World Leads to Junk Science.
Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn
2018-02-01
In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.